CN113704828A - System and method for preventing file from being tampered and leaked through watermark encryption - Google Patents
System and method for preventing file from being tampered and leaked through watermark encryption Download PDFInfo
- Publication number
- CN113704828A CN113704828A CN202010441968.3A CN202010441968A CN113704828A CN 113704828 A CN113704828 A CN 113704828A CN 202010441968 A CN202010441968 A CN 202010441968A CN 113704828 A CN113704828 A CN 113704828A
- Authority
- CN
- China
- Prior art keywords
- document
- file
- watermark
- tampered
- leaked
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 230000002441 reversible effect Effects 0.000 abstract description 3
- 230000000694 effects Effects 0.000 description 2
- 238000009877 rendering Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Image Processing (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The invention discloses a system and a method for preventing a file from being tampered and leaked through watermark encryption, wherein the method comprises the steps of judging whether a built file needs to be encrypted according to the requirement of a filing worker, and performing subsequent steps if the built file needs to be encrypted; acquiring information of a filing worker, including filing time and a filing IP; the obtained information of the filing staff is encrypted in a reversible way, and the whole file is paved; the filing is completed and the entire document is displayed. The system comprises a security document establishing module, a document anti-tampering module and a document tracing module, wherein the security document establishing module is used for establishing a security document with watermark encryption, the document anti-tampering module is used for preventing a document from being tampered or leaked after the document is established, and the document tracing module is used for tracing the document after the document is tampered or leaked. The method encrypts the file more humanizedly, so that the file is encrypted, the leakage can be traced, and the high security of the electronic document is realized.
Description
Technical Field
The invention relates to the technical field of electronic document encryption, in particular to a system and a method for preventing a file from being tampered and leaked through watermark encryption.
Background
In the 21 st century of rapid development of informatization, computer technology is changed day by day and is closely related to daily life of people, and the privacy information stored in an electronic document is maliciously stolen, which often brings endless troubles and troubles to individuals and even enterprise units; how to ensure the safety of the electronic document after the outgoing becomes a topic which is very important to the current society.
When a document is previewed through the SVG, excessive use of the DOM can be caused, so that the rendering speed of the complex SVG is influenced. In this context, Canvas shows the advantage that firstly it acts as a container only, does not contain any elements, and secondly renders pixel by pixel while drawing, once the graphics drawing is complete, without the browser continuing to focus on it. The Canvas, as part of the HTML5, allows scripting language dynamic rendering, and is therefore more flexible in the processing of complex images.
Therefore, in combination with the above-mentioned technical problems, there is a need to provide a new technical solution.
Disclosure of Invention
In order to solve the technical problems in the prior art, the invention provides a system and a method for preventing a file from being tampered and leaked through watermark encryption, and the specific technical scheme is as follows:
the invention relates to a system for preventing a file from being tampered and leaked through watermark encryption, which comprises:
the security document establishing module is used for establishing a security document with watermark encryption;
the document anti-tampering module is used for preventing a document from being tampered or leaked after being established;
and the document tracing module is used for tracing the document after the document is tampered or leaked.
The invention also discloses a method for preventing the file from being tampered and leaked through watermark encryption, which comprises the following steps:
the method comprises the following steps: acquiring a document type, wherein the document is divided into internal data and public data;
step two: adding a watermark to the document according to the document type;
step three: acquiring information of a filing worker, wherein the information comprises filing time and a filing IP;
step four: reversibly encrypting the information of the filing staff obtained in the step three, and paving the whole document;
step five: the document content is converted and encrypted through a background server and the whole document is displayed;
step six: the front end displays and previews the whole document through Canvas preview technology.
Further, in the second step, the watermarks include a common watermark and an encrypted watermark, and if the document is common public data, the common watermark is added to the document; if the document is internal data, judging whether the established document needs to be encrypted according to the security level, and if so, continuing to perform the subsequent steps.
Furthermore, in the fourth step, the information of the person who creates the file is encrypted by means of watermark encryption and attached to the bottom of the document by means of watermark.
Furthermore, when the encrypted documenting personnel information is attached to the bottom of the document, the color, the size, the rotation angle and the transparency attribute of the font can be configured.
Further, in the sixth step, the document content is drawn through JS, one page in the browser is identified as a Canvas node, the content in the node cannot be expanded, and the user cannot view and modify the content of the preview page through the developer mode of the browser.
The system and the method for preventing the file from being tampered and leaked through the watermark encryption encrypt the file more humanly, so that the file is encrypted, the leaked secret can be traced, and the high security of the electronic document is realized.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The present invention will be more readily understood by reference to the following detailed description when considered in conjunction with the accompanying drawings, wherein like reference numerals designate like structural elements, and in which:
FIG. 1 is a diagram of a watermarked effect of a document preview in an embodiment of the present invention;
FIG. 2 is an interface screenshot of a browser open developer option without Canvas preview technology in one embodiment of the invention;
FIG. 3 is an interface screenshot of a browser open developer option in one embodiment of the invention using Canvas preview technology;
FIG. 4 is a screenshot 1 of an embodiment of embedding the font;
FIG. 5 is a screenshot 2 of an embodiment operation embedding the font;
FIG. 6 is a screenshot 3 of an operation of an embodiment embedding the font;
FIG. 7 is a screenshot 4 of an embodiment operation embedding the font;
FIG. 8 is a screenshot 5 of an operation of an embodiment embedding the font;
FIG. 9 is a screenshot 6 of an operation of an embodiment embedding the font;
FIG. 10 is a screenshot 7 of an embodiment operation embedding this font;
fig. 11 is a screenshot 8 of the operation of the embodiment embedding the font.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
Reference herein to "one embodiment" or "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least an implementation of the invention. The appearances of the phrase "in one embodiment" in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments.
Examples
The embodiment provides a method and a system for preventing file contents from being tampered and leaked through watermark encryption, wherein the method comprises the steps of judging whether a built document needs to be encrypted according to the requirements of a filing worker, and performing subsequent steps if the built document needs to be encrypted; acquiring information of a filing worker, including filing time and a filing IP; the obtained information of the filing staff is encrypted in a reversible way, and the whole file is paved; the filing is completed and the entire document is displayed. The system comprises a security document establishing module, a document anti-tampering module and a document tracing module, wherein the security document establishing module is used for establishing a security document with watermark encryption, the document anti-tampering module is used for preventing a document from being tampered or leaked after the document is established, and the document tracing module is used for tracing the document after the document is tampered or leaked. The method encrypts the file more humanizedly, so that the file is encrypted, the leakage can be traced, and the high security of the electronic document is realized.
The method for preventing the file from being tampered and leaked through watermark encryption in the embodiment specifically comprises the following steps:
the method comprises the following steps: acquiring a document type, and dividing the document into internal data and open data according to the requirement of a filing worker;
step two: adding watermarks to the document according to the document type, wherein the watermarks include common watermarks and encrypted watermarks, and if the document is common public data, adding the common watermarks to the document; if the document is internal data, judging whether the established document needs to be encrypted according to the security level, and if so, continuing to perform the subsequent steps.
Step three: acquiring information of a filing worker, wherein the information comprises filing time and a filing IP (Internet protocol) which are provided by the filing worker;
step four: reversibly encrypting the information of the filing staff obtained in the step three, and paving the whole document; the reversible encryption is watermark encryption, information of a filing person is encrypted in a watermark encryption mode, and the information is attached to the bottom of a document in a watermark mode. When the encrypted documenting personnel information is attached to the bottom of the document, the attributes such as the color, the size, the rotation angle, the transparency and the like of the font can be configured. Referring to FIG. 1, the effect of watermarking a preview of a document is shown.
Step five: the document content is converted and encrypted through a background server and the whole document is displayed;
step six: the front end displays and previews the whole document through Canvas preview technology. The document content is drawn through JS, a page in the browser is identified as a Canvas node, the content in the node cannot be expanded, and the user cannot view and modify the content of the preview page through the developer mode of the browser, as shown in fig. 2. In the normal page, the user can view and modify the contents of the preview page through F12 (developer mode of the browser), as shown in fig. 3.
Aiming at the uncommon fonts which are lacked at the user side, the technical scheme supports embedding the fonts, and the specific implementation mode is as follows:
illustrated in a Canvas data structure: json, which is the attribute of the document, is used as an entry, and the page data is 0 json and 1 json … …, respectively, and the total number is the total number of pages of the document.
Attributes of a document, such as page number, document paper size, and font attributes of fonts contained in the document, as shown in fig. 4-6, fig. 4 shows that the total page number of the document is 20, fig. 5 shows that the document has a default size of 960 × 720, and the page size with index 1 is 720 × 960; FIG. 6 shows a font property with sequence number 0;
content operations in the page; such as text, pictures, discretionary graphics, animation data; as shown in fig. 7-10, the front end uses this technique to extract data structures contained in the document, such as information of related fonts used by the document, format structures, animation information, and the like, from the data; requesting document attributes and page data by means of axios, as shown in fig. 11;
the specific drawing method is as follows:
and (3) drawing characters:
the text attributes of fig. 4 are analyzed, the corresponding text attributes as in fig. 3 are fetched, and the text attributes are set to the canvas object and then are set on the canvas object by the text drawing method
Drawing a picture:
draw image (img, x, y, width, height) by parsing the picture attributes of FIG. 5 and then calling canvas to draw the picture method
Drawing a graph:
stroke () is called by parsing the graph attributes of fig. 6 and then canvas, the method of drawing a graph.
The system and the method for preventing the file from being tampered and leaked through the watermark encryption encrypt the file more humanly, so that the file is encrypted, the leaked secret can be traced, and the high security of the electronic document is realized.
The foregoing description has disclosed fully preferred embodiments of the present invention. It should be noted that those skilled in the art can make modifications to the embodiments of the present invention without departing from the scope of the appended claims. Accordingly, the scope of the appended claims is not to be limited to the specific embodiments described above.
Claims (6)
1. A system for preventing a file from being tampered and leaked through watermark encryption, comprising:
the security document establishing module is used for establishing a security document with watermark encryption;
the document anti-tampering module is used for preventing a document from being tampered or leaked after being established;
and the document tracing module is used for tracing the document after the document is tampered or leaked.
2. A method for preventing a file from being tampered and leaked through watermark encryption is characterized by comprising the following steps:
the method comprises the following steps: acquiring a document type, wherein the document is divided into internal data and public data;
step two: adding a watermark to the document according to the document type;
step three: acquiring information of a filing worker, wherein the information comprises filing time and a filing IP;
step four: reversibly encrypting the information of the filing staff obtained in the step three, and paving the whole document;
step five: the document content is converted and encrypted through a background server and the whole document is displayed;
step six: the front end displays and previews the whole document through Canvas preview technology.
3. The method for preventing the file from being tampered and leaked through the watermark encryption according to claim 2, wherein in the second step, the watermark comprises a common watermark and an encrypted watermark, and if the file is common public material, the common watermark is added to the file; if the document is internal data, judging whether the established document needs to be encrypted according to the security level, and if so, continuing to perform the subsequent steps.
4. The method for preventing file from being tampered and leaked through watermark encryption according to claim 2, wherein in step four, the information of the documenting personnel is encrypted through watermark encryption and attached to the bottom of the file in a watermark manner.
5. The method for preventing file from being tampered and leaked through watermark encryption according to claim 4, wherein the encrypted documenting personnel information can configure the color, size, rotation angle and transparency of the font when attached to the bottom of the document.
6. The method for preventing the file from being tampered and disclosed through the watermark encryption according to claim 2, wherein in the sixth step, the content of the document is drawn through JS, a page is identified as a Canvas node in a browser, the content in the node cannot be expanded, and a user cannot view and modify the content of the preview page through a developer mode of the browser.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010441968.3A CN113704828A (en) | 2020-05-22 | 2020-05-22 | System and method for preventing file from being tampered and leaked through watermark encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010441968.3A CN113704828A (en) | 2020-05-22 | 2020-05-22 | System and method for preventing file from being tampered and leaked through watermark encryption |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113704828A true CN113704828A (en) | 2021-11-26 |
Family
ID=78646369
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010441968.3A Withdrawn CN113704828A (en) | 2020-05-22 | 2020-05-22 | System and method for preventing file from being tampered and leaked through watermark encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113704828A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115618806A (en) * | 2022-09-01 | 2023-01-17 | 睿智合创(北京)科技有限公司 | PPT document processing method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102541817A (en) * | 2010-12-26 | 2012-07-04 | 上海量明科技发展有限公司 | Method and device for previewing digital files |
CN106407820A (en) * | 2016-08-31 | 2017-02-15 | 江苏中威科技软件系统有限公司 | Method and system for preventing document from being tampered and leaked through watermark encryption |
CN106502506A (en) * | 2016-11-01 | 2017-03-15 | 上海爱数信息技术股份有限公司 | The mask method of document, system and electronic equipment in webpage |
US20180137300A1 (en) * | 2016-11-17 | 2018-05-17 | Barracuda Networks, Inc. | Method and apparatus for document preview and delivery with password protection |
-
2020
- 2020-05-22 CN CN202010441968.3A patent/CN113704828A/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102541817A (en) * | 2010-12-26 | 2012-07-04 | 上海量明科技发展有限公司 | Method and device for previewing digital files |
CN106407820A (en) * | 2016-08-31 | 2017-02-15 | 江苏中威科技软件系统有限公司 | Method and system for preventing document from being tampered and leaked through watermark encryption |
CN106502506A (en) * | 2016-11-01 | 2017-03-15 | 上海爱数信息技术股份有限公司 | The mask method of document, system and electronic equipment in webpage |
US20180137300A1 (en) * | 2016-11-17 | 2018-05-17 | Barracuda Networks, Inc. | Method and apparatus for document preview and delivery with password protection |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115618806A (en) * | 2022-09-01 | 2023-01-17 | 睿智合创(北京)科技有限公司 | PPT document processing method and device |
CN115618806B (en) * | 2022-09-01 | 2023-06-27 | 睿智合创(北京)科技有限公司 | PPT document processing method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9141332B2 (en) | Masking sensitive information in a screen sharing session | |
US11640498B2 (en) | Method and system for selective document redaction | |
US10049421B2 (en) | Secure content and document watermarking | |
Heather | Turnitoff: Identifying and fixing a hole in current plagiarism detection software | |
CN108052491A (en) | A kind of automatic processing method and device of certificate document | |
US10929597B2 (en) | Techniques and systems for storing and protecting signatures and images in electronic documents | |
US20030167334A1 (en) | Provision of content to a client device | |
US10936791B2 (en) | Dynamically changing text wherein if text is altered unusual shapes appear | |
EP2758919B1 (en) | Apparatus for tracing a document in an electronic publication | |
CN107301046B (en) | Icon processing method and device, computer equipment and storage medium | |
CN110489943B (en) | Page watermark tamper-proofing method and system | |
Garfinkel | Leaking Sensitive Information in Complex Document Files--and How to Prevent It | |
CN111859853A (en) | Webpage text encryption and decryption method based on random font | |
CN113704828A (en) | System and method for preventing file from being tampered and leaked through watermark encryption | |
US20230153402A1 (en) | System and method for deterring data leakage through photographing of display screen by external camera | |
US10891432B2 (en) | System and process for generating an internet application | |
JP2009505133A (en) | Data encryption and decryption method using pixels | |
US9116643B2 (en) | Retrieval of electronic document using hardcopy document | |
JP2000358154A (en) | Electric watermark capable of adjusting visibility of watermark | |
CN101276440B (en) | Method for realizing electric stamp | |
Rog et al. | PDF Guidelines Recommendations for the creation of PDF files for long-term preservation and access | |
JPH0830759A (en) | Document secrecy managing method and picture processing unit | |
Sikos et al. | Optimized Appearance | |
Davies | Using Word Boundaries for Automatic Reflowing of Text within an Image | |
CN113703699A (en) | Real-time output method and device of electronic file |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20211126 |
|
WW01 | Invention patent application withdrawn after publication |