CN114363068A - Image-text publishing method and device, electronic equipment and storage medium - Google Patents

Image-text publishing method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114363068A
CN114363068A CN202210006093.3A CN202210006093A CN114363068A CN 114363068 A CN114363068 A CN 114363068A CN 202210006093 A CN202210006093 A CN 202210006093A CN 114363068 A CN114363068 A CN 114363068A
Authority
CN
China
Prior art keywords
text
key
image
public key
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210006093.3A
Other languages
Chinese (zh)
Inventor
霍晓芳
郭东辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhiyunxin Technology Co ltd
Original Assignee
Beijing Zhiyunxin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhiyunxin Technology Co ltd filed Critical Beijing Zhiyunxin Technology Co ltd
Priority to CN202210006093.3A priority Critical patent/CN114363068A/en
Publication of CN114363068A publication Critical patent/CN114363068A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/608Watermarking

Abstract

The application discloses a method for publishing pictures and texts, which belongs to the technical field of electronic information and can comprise the following steps: acquiring an image-text; randomly generating a first key, and encrypting the pictures and texts by using the first key to obtain encrypted pictures and texts; encrypting the first key by using the author signature public key of the image and text to obtain a first encryption key; and uploading the encrypted graphics and the first encryption key to a distributed storage system to obtain a content identifier. The method utilizes the symmetric cryptographic algorithm to ensure the safety of the image-text works, and utilizes the digital certificate of the author to sign the image-text works, so that the copyright of the image-text works owned by the author can be proved simply and quickly.

Description

Image-text publishing method and device, electronic equipment and storage medium
Technical Field
The application belongs to the technical field of electronic information, and particularly relates to a method and a device for publishing pictures and texts, electronic equipment and a storage medium.
Background
The popularity of electronic writing and the internet makes it easy to acquire books, pictures and videos, but at the cost of the practice of copyright and copyright rights, and in recent years, the dispute in this respect is rare.
Indeed, the work is entitled to copyright protection whether or not it is published. Books, pictures, videos that are distributed over a network do not represent copyright protection even if the source is unknown or there is no copyright statement. Some authors lack copyright awareness or technical means for copyright protection, which leaves hidden troubles for copyright disputes. Even more, under the condition that pirates are not aware of the authors, the electronic books, pictures and videos of the authors are recorded and traded on commercial websites, and a large amount of litigation generated by the transaction causes waste of social resources for the authors and the society.
Piracy infringes the legitimate interests of the authors and seriously hits the enthusiasm of the authors.
Disclosure of Invention
The application aims to provide a method and a device for publishing pictures and texts, electronic equipment and a storage medium to protect the copyright of pictures and texts works.
According to a first aspect of the embodiments of the present application, there is provided a method for publishing pictures and texts, where the method may include:
acquiring an image-text;
randomly generating a first key, and encrypting the pictures and texts by using the first key to obtain encrypted pictures and texts;
encrypting the first key by using the author signature public key of the image and text to obtain a first encryption key;
and uploading the encrypted graphics and the first encryption key to a distributed storage system to obtain a content identifier.
In some optional embodiments of the present application, the method for publishing the teletext further includes:
calculating the hash value of the encrypted image-text to obtain a first hash value;
the method for issuing the encrypted graphics and texts after uploading the encrypted graphics and the first encryption key to the distributed storage system further comprises the following steps:
a blockchain intelligent contract is issued, the blockchain intelligent contract including a content identifier, a first encryption key, and a first hash value.
In some optional embodiments of the present application, after the block chain intelligent contract is issued, the method for issuing the teletext further includes:
obtaining a public key of a user from a blockchain;
the public key of the user and the signature public key of the author are connected in series to form target information;
calculating a hash value of the target information to obtain a second hash value;
forming a character string by the second hash value and the target information;
embedding the character string as watermark information into the image-text to obtain a watermark image-text;
randomly generating a second key, and encrypting the watermark image-text by using the second key to obtain an encrypted watermark image-text;
and sending the encrypted watermark image-text to a target user.
In some optional embodiments of the present application, before sending the encrypted watermark image to the target user, the image publishing method further includes:
generating information to be signed, wherein the information to be signed comprises: the content identifier, the author information, the public key of the target user and a second encryption key, wherein the second encryption key is generated by encrypting the second key by using the public key of the target user;
signing the information to be signed by using a signature private key of a writer to obtain a signature value;
and issuing the information to be signed and the signature value on the block chain.
According to a second aspect of the embodiments of the present application, there is provided a method for using graphics and text, the method may include:
acquiring signature information from the block chain, wherein the signature information comprises: the content identifier, the author information, the public key of the target user and a second encryption key, wherein the second encryption key is generated by encrypting the second key by using the public key of the target user;
extracting a second encryption key in the signature information;
decrypting the second encryption key by using a private key of the target user to obtain a second key;
acquiring an encrypted watermark image-text;
and decrypting the encrypted watermark image-text by using the second key to obtain the watermark image-text.
In some optional embodiments of the present application, after decrypting the encrypted watermark image and text with the second key to obtain the watermark image and text, the method for publishing and using the image and text further includes:
extracting watermark information in the watermark text;
extracting a first public key of a author from the watermark information and extracting a second public key of the author from the blockchain transaction;
and comparing the first public key with the second public key, if the first public key and the second public key are consistent, determining that the watermark image-texts are legal, and if the first public key and the second public key are inconsistent, determining that the watermark image-texts are illegal.
In some optional embodiments of the present application, after comparing the first public key and the second public key, the method for using the image-text further includes:
and superposing the signature public key of the target user and the signature public key of the author on the watermark image-text as the watermark to obtain the copy-proof image-text.
According to a third aspect of the embodiments of the present application, there is provided an apparatus for issuing texts, the apparatus may include:
the acquisition module is used for acquiring images and texts;
the image-text encryption module is used for randomly generating a first key and encrypting the image-text by using the first key to obtain encrypted image-text;
the key encryption module is used for encrypting the first key by using the author signature public key of the image and text to obtain a first encryption key;
and the release module is used for uploading the encrypted image-text and the first encryption key to the distributed storage system to obtain the content identifier.
According to a fourth aspect of the embodiments of the present application, there is provided an apparatus for using graphics and text, the apparatus may include:
a signature obtaining module, configured to obtain signature information from a blockchain, where the signature information includes: the content identifier, the author information, the public key of the target user and a second encryption key, wherein the second encryption key is generated by encrypting the second key by using the public key of the target user;
the extraction module is used for extracting a second encryption key in the signature information;
the key decryption module is used for decrypting the second encryption key by using a private key of the target user to obtain a second key;
the image-text acquisition module is used for acquiring the encrypted watermark image-text;
and the image-text decryption module is used for decrypting the encrypted watermark image-text by using the second secret key to obtain the watermark image-text.
According to a fifth aspect of embodiments of the present application, there is provided an electronic apparatus, which may include:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to execute instructions to implement a method of publishing the teletext as shown in any embodiment of the first aspect or a method of using the teletext as shown in any embodiment of the second aspect.
According to a sixth aspect of embodiments of the present application, there is provided a storage medium, wherein instructions in the storage medium, when executed by a processor of an information processing apparatus or a server, cause the information processing apparatus or the server to implement a method of issuing a teletext as shown in any one of the embodiments of the first aspect or a method of using a teletext as shown in any one of the embodiments of the second aspect.
The technical scheme of the application has the following beneficial technical effects:
the method comprises the steps of obtaining pictures and texts, randomly generating a first secret key, encrypting the pictures and texts by using the first secret key to obtain encrypted pictures and texts, encrypting the first secret key by using a writer signature public key of the pictures and texts to obtain a first encryption secret key, and uploading the encrypted pictures and the first encryption secret key to a distributed storage system to obtain a content identifier. The method utilizes the symmetric cryptographic algorithm to ensure the safety of the image-text works, and utilizes the digital certificate of the author to sign the image-text works, so that the copyright of the image-text works owned by the author can be proved simply and quickly.
Drawings
Fig. 1 is a schematic flow chart of a method for publishing graphics context in an exemplary embodiment of the present application;
FIG. 2 is a flow chart illustrating a method for using graphics in an exemplary embodiment of the present application;
FIG. 3 is a schematic diagram of an electronic device according to an exemplary embodiment of the present application;
fig. 4 is a schematic diagram of a hardware structure of an electronic device in an exemplary embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is further described in detail below with reference to the accompanying drawings in combination with the detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present application. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present application.
In the drawings, a schematic diagram of a layer structure according to an embodiment of the application is shown. The figures are not drawn to scale, wherein certain details are exaggerated and possibly omitted for clarity. The shapes of various regions, layers, and relative sizes and positional relationships therebetween shown in the drawings are merely exemplary, and deviations may occur in practice due to manufacturing tolerances or technical limitations, and a person skilled in the art may additionally design regions/layers having different shapes, sizes, relative positions, as actually required.
It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the description of the present application, it is noted that the terms "first", "second", and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In addition, the technical features mentioned in the different embodiments of the present application described below may be combined with each other as long as they do not conflict with each other.
The method, the apparatus, the electronic device, and the storage medium for distributing the graphics context provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
As shown in fig. 1, in a first aspect of the embodiments of the present application, a method for publishing pictures and texts is provided, where the method may include:
s110: acquiring an image-text;
s120: randomly generating a first key, and encrypting the pictures and texts by using the first key to obtain encrypted pictures and texts;
s130: encrypting the first key by using the author signature public key of the image and text to obtain a first encryption key;
s140: and uploading the encrypted graphics and the first encryption key to a distributed storage system to obtain a content identifier.
The method of the embodiment ensures the safety of the image-text works by using the symmetric cryptographic algorithm, and simultaneously signs the image-text works by using the digital certificate of the author, so that the copyright of the image-text works owned by the author can be proved simply and quickly. The digital certificate is used for authenticating the real identity and is the embodiment of national public trust. The digital certificate contains a pair of public and private keys for signature. Furthermore, when the author and the user purchase the image-text works by paying the funds of the legal money, the transaction needs to be signed by the signature private key, and the financial institution verifies the transaction and completes the corresponding fund payment.
For clarity, the following steps are described separately:
first, step S110: and acquiring the image-text.
The graphics and texts in the step refer to graphics and text works, are electronic documents, are commonly known as electronic articles, treatises (professional treatises, academic treatises and the like), books and the like, and are also referred to as graphics and texts in digital photos, pictures, videos and the like.
Next, step S120 is described: and randomly generating a first key, and encrypting the image-text by using the first key to obtain an encrypted image-text.
In the step, the author can create the abstract of the image and text and upload the abstract to the distributed storage system. The abstract contains the title, author, introduction, table of contents of the text and may even include a portion of the text. The purpose of the abstract is to allow the user to easily retrieve and understand the text. The digest appears in clear on the distributed storage system, and anyone can freely download the document digest as long as he can access the distributed storage system. Then, the author randomly generates a first Key of a symmetric cryptographic algorithm, and encrypts the complete image and text by using the Key to obtain the encrypted image and text.
Then, step S130: and encrypting the first secret key by using the author signature public key of the image and text to obtain a first encryption secret key.
In this step, the author encrypts the first Key of the symmetric cryptographic algorithm with their own public signature keys (X _ a, Y _ a) to obtain a first Encrypted Key Encrypted _ Key 1.
Finally, step S140: and uploading the encrypted graphics and the first encryption key to a distributed storage system to obtain a content identifier.
This step is that the author uploads the Encrypted image and text together with the first Encrypted _ Key1 to the distributed storage system to obtain a content identifier CID. Up to this point, the encrypted teletext and content identifier CID are equivalent to a confirmation of the teletext release, and if the author modifies the document, steps S110-S140 need to be repeated to obtain a new content identifier CID.
In an embodiment, the method for publishing the image-text further comprises:
calculating the hash value of the encrypted image-text to obtain a first hash value;
the method for issuing the encrypted graphics and texts after uploading the encrypted graphics and the first encryption key to the distributed storage system further comprises the following steps:
a blockchain intelligent contract is issued, the blockchain intelligent contract including a content identifier, a first encryption key, and a first hash value.
In this embodiment, in order to verify whether the encrypted image-text is tampered, the hash value of the encrypted image-text may be calculated to obtain HashValue 1. The hash HashValue1 can be used to verify the integrity of the encrypted image-text. The author then issues a blockchain intelligent contract, the contents of which may include: 1) HashValue1 of the hash value of the encrypted image-text; 2) a first encryption Key Encrypted _ Key 1; 3) encrypting an index CID of the image-text on the distributed file system; 4) the validity period of the intelligent contract; 5) acquiring the use cost of the image-text; 6) the author only has payment indicia of the collection or an equivalent collection account number; 7) other necessary information such as discounts, etc.
In an embodiment, after the block chain intelligent contract is issued, the method for issuing the teletext further includes:
obtaining a public key of a user from a blockchain;
the public key of the user and the signature public key of the author are connected in series to form target information;
calculating a hash value of the target information to obtain a second hash value;
forming a character string by the second hash value and the target information;
embedding the character string as watermark information into the image-text to obtain a watermark image-text;
randomly generating a second key, and encrypting the watermark image-text by using the second key to obtain an encrypted watermark image-text;
and sending the encrypted watermark image-text to a target user.
In this embodiment, after detecting that the USER completes the payment transaction, the author acquires the public key (USER _ X _ a, USER _ Y _ a) of the USER and the ID of the USER payment transaction, i.e., UAER _ TX _ ID, from the block chain, signs the image-text data by using an image-text agent DAPP, and embeds a watermark; specifically, a) signature public keys (X _ a, Y _ a) of authors, public keys (USER _ X _ a, USER _ Y _ a) of USERs, ID of USER payment transaction, i.e. USER _ TX _ ID, are sequentially connected, and the CID, deletion, copyright statement, form Message1, i.e. Message1 { X _ a, Y _ a, USER _ X _ a, USER _ Y _ a, USER _ TX _ ID, CID, deletion }; b) calculating the hash value of the Message1 to obtain HashValue 2; hash algorithms such as SM3, SHA256, SHA3, etc. may be used. Constructing a character string DocOwnerInfo1 ═ { Message1, HashValue2 }; c) the author downloads the Encrypted image and text and the Encrypted Key Encrypted _ Key1 according to the indicated position of the CID, the author decrypts the Encrypted _ Key1 by using a signature private Key of the author to obtain a first Key, and the first Key is used for decrypting the Encrypted electronic image and text; the locally stored graphics and texts can also be used, but the author needs to ensure that the content of the local graphics and texts is completely consistent with the graphics and texts indicated by the CID; d) the image-text agent DAPP is used for adding the watermark to the electronic image-text, and the application does not limit which algorithm for adding the invisible watermark is specifically adopted, and the method is required to have strong attack resistance regardless of a frequency domain method or a space-frequency combination method. The added watermark information is the aforementioned character string DocOwnerInfo1, and is written into the image and text. The image-text has a traceable identity, and indicates the image-text exit and the identity of an authorized user; e) randomly generating a Key2 of a symmetric cryptographic algorithm, and encrypting the complete image-text by using a Key2 to obtain an encrypted electronic image-text; f) the encryption Key2 of the electronic image and text is Encrypted by the public Key of the user to obtain Encrypted _ Key 2.
In one embodiment, before sending the encrypted watermark image to the target user, the method for issuing the image further includes:
generating information to be signed, wherein the information to be signed comprises: the content identifier, the author information, the public key of the target user and a second encryption key, wherein the second encryption key is generated by encrypting the second key by using the public key of the target user;
signing the information to be signed by using a signature private key of a writer to obtain a signature value;
and issuing the information to be signed and the signature value on the block chain.
The message to be signed in this step may contain the following information: 1) a CID, a CID of the encrypted electronic document on the distributed storage system; 2) declaration of copyright; 3) name, identity information of the author such as Name, stroke Name, network code number, etc.; 4) token, payment sign for payment only or equivalent payment account number; 5) the public keys of the USERs (USER _ X _ a, USER _ Y _ a); 6) the ID of the user payment transaction is UAER _ TX _ ID; 7) the Encrypted electronic document encryption Key Encrypted _ Key 2. By connecting the above information, the Message2 to be signed is obtained, i.e. Message2 ═ { CID, Declaration, Name, Token, USER _ X _ a, USER _ Y _ a, USER _ TX _ ID, Encrypted _ Key2 }. The present application does not limit the order of connection of the individual pieces of information constituting the Message2, and may increase or decrease the partial information as appropriate without changing the actual meaning.
As shown in fig. 2, in a second aspect of the embodiments of the present application, there is provided a method for using graphics and text, the method may include:
s210: acquiring signature information from the block chain, wherein the signature information comprises: the content identifier, the author information, the public key of the target user and a second encryption key, wherein the second encryption key is generated by encrypting the second key by using the public key of the target user;
s220: extracting a second encryption key in the signature information;
s230: decrypting the second encryption key by using a private key of the target user to obtain a second key;
s240: acquiring an encrypted watermark image-text;
s250: and decrypting the encrypted watermark image-text by using the second key to obtain the watermark image-text.
The method of the embodiment is to Sign the Message2 by using a signature private key of a author to obtain a signature value (R _ Sign, S _ Sign), and issue the Message2 and the signature value on a block chain; sending the encrypted image-text to an authorized user through a channel approved by both transaction parties, wherein the channel comprises but is not limited to an electronic mail, a distributed storage system, an instant communication tool and the like; the user acquires effective transaction information from the block chain, extracts Encrypted _ Key2 in Message2, and decrypts by using the private Key of the user to obtain an image-text encryption Key 2; the encrypted image and text are obtained through a channel approved by both parties of the transaction and are decrypted by using an encryption Key 2.
In an embodiment, after the encrypted watermark image and text are decrypted by using the second key to obtain the watermark image and text, the method for publishing and using the image and text further includes:
extracting watermark information in the watermark text;
extracting a first public key of a author from the watermark information and extracting a second public key of the author from the blockchain transaction;
and comparing the first public key with the second public key, if the first public key and the second public key are consistent, determining that the watermark image-texts are legal, and if the first public key and the second public key are inconsistent, determining that the watermark image-texts are illegal.
In an embodiment, after comparing the first public key and the second public key, the method for using the image-text further includes:
and superposing the signature public key of the target user and the signature public key of the author on the watermark image-text as the watermark to obtain the copy-proof image-text.
The method steps of the embodiment can be executed by a user reading with a customized reader. And the reader extracts the public key information PubKey1 of the author from the invisible watermarks, extracts the public key information PubKey2 of the author from the blockchain transaction, compares whether the two are consistent, and if so, considers that the electronic document comes from a legal channel. The reader adds a visible watermark which minimally affects reading, extracts a writer signature public key and a signature public key of a paying user of the document from the invisible watermark of the electronic document, and superposes the writer signature public key and the signature public key on the document as a part of the content of the visible watermark, so that the document can be prevented from being copied in a mode of simply copying a screen. In addition, the high attack resistance of the invisible watermark is utilized, so that even if the visible watermark is erased by copying the screen and reusing a tool, the reader can still extract the watermark information of the document, and a traceable basis is provided for unauthorized copying.
It should be noted that, in the method for distributing and using graphics and text and the method for using graphics and text provided in the embodiment of the present application, the execution subject may be a device for distributing and using graphics and text, or a control module for executing the method for distributing and using graphics and text in the device for distributing and using graphics and text. In the embodiment of the present application, an image-text distribution device and an image-text using device are taken as examples to execute an image-text distribution method and an image-text using method, and the image-text distribution device and the image-text using device provided in the embodiment of the present application are described.
In a third aspect of the embodiments of the present application, there is provided an apparatus for publishing pictures and texts, the apparatus may include:
the acquisition module is used for acquiring images and texts;
the image-text encryption module is used for randomly generating a first key and encrypting the image-text by using the first key to obtain encrypted image-text;
the key encryption module is used for encrypting the first key by using the author signature public key of the image and text to obtain a first encryption key;
and the release module is used for uploading the encrypted image-text and the first encryption key to the distributed storage system to obtain the content identifier.
According to a fourth aspect of the embodiments of the present application, there is provided an apparatus for using graphics and text, the apparatus may include:
a signature obtaining module, configured to obtain signature information from a blockchain, where the signature information includes: the content identifier, the author information, the public key of the target user and a second encryption key, wherein the second encryption key is generated by encrypting the second key by using the public key of the target user;
the extraction module is used for extracting a second encryption key in the signature information;
the key decryption module is used for decrypting the second encryption key by using a private key of the target user to obtain a second key;
the image-text acquisition module is used for acquiring the encrypted watermark image-text;
and the image-text decryption module is used for decrypting the encrypted watermark image-text by using the second secret key to obtain the watermark image-text.
The device for distributing and using the graphics context in the embodiment of the present application may be a device, and may also be a component, an integrated circuit, or a chip in a terminal. The device can be mobile electronic equipment or non-mobile electronic equipment. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine or a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The device for issuing the graphics context and the device for using the graphics context in the embodiment of the application can be a device with an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present application are not limited specifically.
The image-text publishing device and the image-text using device provided by the embodiment of the application can implement each process implemented by the method embodiment of fig. 1, and are not described herein again to avoid repetition.
Optionally, as shown in fig. 3, an electronic device 300 is further provided in this embodiment of the present application, and includes a processor 301, a memory 302, and a program or an instruction stored in the memory 302 and capable of running on the processor 301, where the program or the instruction is executed by the processor 301 to implement each process of the foregoing method for issuing a text or the method for using a text, and can achieve the same technical effect, and details are not repeated here to avoid repetition.
It should be noted that the electronic device in the embodiment of the present application includes the mobile electronic device and the non-mobile electronic device described above.
Fig. 4 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
The electronic device 400 includes, but is not limited to: radio unit 401, network module 402, audio output unit 403, input unit 404, sensor 405, display unit 406, user input unit 407, interface unit 408, memory 409, and processor 410.
Those skilled in the art will appreciate that the electronic device 400 may further include a power source (e.g., a battery) for supplying power to various components, and the power source may be logically connected to the processor 410 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system. The electronic device structure shown in fig. 4 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is omitted here.
It should be understood that in the embodiment of the present application, the input Unit 404 may include a Graphics Processing Unit (GPU) 4041 and a microphone 4042, and the Graphics processor 4041 processes image data of a still picture or a video obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The display unit 406 may include a display panel 4061, and the display panel 4061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 407 includes a touch panel 4071 and other input devices 4072. A touch panel 4071, also referred to as a touch screen. The touch panel 4071 may include two parts, a touch detection device and a touch controller. Other input devices 4072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein. The memory 409 may be used to store software programs as well as various data including, but not limited to, application programs and an operating system. The processor 410 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 410.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the foregoing method for issuing an image and text or the method for using an image and text, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and so on.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to execute a program or an instruction to implement each process of the foregoing method for issuing an image and text or the method for using an image and text, and can achieve the same technical effect, and in order to avoid repetition, the details are not repeated here.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A method for publishing pictures and texts is characterized by comprising the following steps:
acquiring an image-text;
randomly generating a first key, and encrypting the pictures and texts by using the first key to obtain encrypted pictures and texts;
encrypting the first key by using the author signature public key of the image and text to obtain a first encryption key;
and uploading the encrypted image-text and the first encryption key to a distributed storage system to obtain a content identifier.
2. The method for distributing teletext according to claim 1, wherein the method for distributing teletext further comprises:
calculating the hash value of the encrypted image-text to obtain a first hash value;
the method for distributing the encrypted teletext after uploading the encrypted teletext and the first encryption key to the distributed storage system further comprises:
a blockchain smart contract is issued, the blockchain smart contract comprising a content identifier, a first encryption key, and a first hash value.
3. The teletext release method according to claim 2, wherein after the block chain intelligent contract is released, the teletext release method further comprises:
obtaining a public key of a user from a blockchain;
connecting the public key of the user and the signature public key of the author in series to form target information;
calculating a hash value of the target information to obtain a second hash value;
forming a character string by the second hash value and the target information;
embedding the character string as watermark information into the image-text to obtain watermark image-text;
randomly generating a second key, and encrypting the watermark image-text by using the second key to obtain an encrypted watermark image-text;
and sending the encrypted watermark image-text to a target user.
4. The method for distributing teletext according to claim 3, wherein before sending the encrypted watermark teletext to a target user, the method for distributing teletext further comprises:
generating information to be signed, wherein the information to be signed comprises: the content identifier, the author information, the public key of the target user and a second encryption key, wherein the second encryption key is generated by encrypting the second key by using the public key of the target user;
signing the information to be signed by using the signature private key of the author to obtain a signature value;
and issuing the information to be signed and the signature value on a block chain.
5. A method for using graphics and text, comprising:
acquiring signature information from a block chain, wherein the signature information comprises: the content identifier, the author information, the public key of the target user and a second encryption key, wherein the second encryption key is generated by encrypting the second key by using the public key of the target user;
extracting a second encryption key in the signature information;
decrypting a second encryption key by using the private key of the target user to obtain a second key;
acquiring an encrypted watermark image-text;
and decrypting the encrypted watermark image-text by using the second secret key to obtain the watermark image-text.
6. The method for using the image-text according to claim 5, wherein after the encrypted watermark image-text is decrypted by the second key to obtain the watermark image-text, the method for publishing and using the image-text further comprises:
extracting watermark information in the watermark picture text;
extracting a first public key of a author from the watermark information and extracting a second public key of the author from the blockchain transaction;
and comparing the first public key with the second public key, if the first public key and the second public key are consistent, determining that the watermark image-texts are legal, and if the first public key and the second public key are inconsistent, determining that the watermark image-texts are illegal.
7. The method for using the image-text according to claim 6, wherein after comparing the first public key and the second public key, the method for using the image-text further comprises:
and superposing the signature public key of the target user and the signature public key of the author on the watermark image-text as a watermark to obtain an anti-copy image-text.
8. An apparatus for distributing graphics and text, comprising:
the acquisition module is used for acquiring images and texts;
the image-text encryption module is used for randomly generating a first key and encrypting the image-text by using the first key to obtain encrypted image-text;
the key encryption module is used for encrypting the first key by using the author signature public key of the image and text to obtain a first encryption key;
and the release module is used for uploading the encrypted image-text and the first encryption key to a distributed storage system to obtain a content identifier.
9. A device for using graphics and text, comprising:
a signature obtaining module, configured to obtain signature information from a blockchain, where the signature information includes: the content identifier, the author information, the public key of the target user and a second encryption key, wherein the second encryption key is generated by encrypting the second key by using the public key of the target user;
the extraction module is used for extracting a second encryption key in the signature information;
the key decryption module is used for decrypting a second encryption key by using the private key of the target user to obtain a second key;
the image-text acquisition module is used for acquiring the encrypted watermark image-text;
and the image-text decryption module is used for decrypting the encrypted watermark image-text by using the second secret key to obtain the watermark image-text.
10. An electronic device, comprising: processor, memory and a program or instructions stored on the memory and executable on the processor, which when executed by the processor implement the steps of the method for issuing a teletext according to any one of claims 1-4 or the method for using a teletext according to any one of claims 5-7.
CN202210006093.3A 2022-01-05 2022-01-05 Image-text publishing method and device, electronic equipment and storage medium Pending CN114363068A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210006093.3A CN114363068A (en) 2022-01-05 2022-01-05 Image-text publishing method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210006093.3A CN114363068A (en) 2022-01-05 2022-01-05 Image-text publishing method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114363068A true CN114363068A (en) 2022-04-15

Family

ID=81106324

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210006093.3A Pending CN114363068A (en) 2022-01-05 2022-01-05 Image-text publishing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114363068A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114745198A (en) * 2022-05-05 2022-07-12 杭州云象网络技术有限公司 File management method, system and device based on block chaining operation and maintenance management

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1444145A (en) * 2002-03-07 2003-09-24 温天 Digital bar code watermark and antifalse method
CN1486461A (en) * 2001-01-17 2004-03-31 ��̹�е¿عɹɷ����޹�˾ Method and apparatus for managing digital content usage rights
CN101989984A (en) * 2010-08-24 2011-03-23 北京易恒信认证科技有限公司 Electronic document safe sharing system and method thereof
CN106413041A (en) * 2015-07-31 2017-02-15 展讯通信(上海)有限公司 Mobile terminal cell dwelling method and apparatus
CN109508552A (en) * 2018-11-09 2019-03-22 江苏大学 The method for secret protection of distributed cloud storage system
CN109740317A (en) * 2018-12-29 2019-05-10 北京奇虎科技有限公司 A kind of digital finger-print based on block chain deposits card method and device
CN110032839A (en) * 2019-04-04 2019-07-19 深圳大通实业股份有限公司 The digital media content infringement detection system of high security digital watermarking
CN113065149A (en) * 2021-05-06 2021-07-02 广西师范大学 Data copyright protection method based on block chain and collusion attack resistant fingerprint code
CN113254884A (en) * 2021-06-29 2021-08-13 浩鲸云计算科技股份有限公司 Method for realizing digital copyright authorization based on proxy re-encryption and block chain technology

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1486461A (en) * 2001-01-17 2004-03-31 ��̹�е¿عɹɷ����޹�˾ Method and apparatus for managing digital content usage rights
CN1444145A (en) * 2002-03-07 2003-09-24 温天 Digital bar code watermark and antifalse method
CN101989984A (en) * 2010-08-24 2011-03-23 北京易恒信认证科技有限公司 Electronic document safe sharing system and method thereof
CN106413041A (en) * 2015-07-31 2017-02-15 展讯通信(上海)有限公司 Mobile terminal cell dwelling method and apparatus
CN109508552A (en) * 2018-11-09 2019-03-22 江苏大学 The method for secret protection of distributed cloud storage system
CN109740317A (en) * 2018-12-29 2019-05-10 北京奇虎科技有限公司 A kind of digital finger-print based on block chain deposits card method and device
CN110032839A (en) * 2019-04-04 2019-07-19 深圳大通实业股份有限公司 The digital media content infringement detection system of high security digital watermarking
CN113065149A (en) * 2021-05-06 2021-07-02 广西师范大学 Data copyright protection method based on block chain and collusion attack resistant fingerprint code
CN113254884A (en) * 2021-06-29 2021-08-13 浩鲸云计算科技股份有限公司 Method for realizing digital copyright authorization based on proxy re-encryption and block chain technology

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114745198A (en) * 2022-05-05 2022-07-12 杭州云象网络技术有限公司 File management method, system and device based on block chaining operation and maintenance management

Similar Documents

Publication Publication Date Title
JP5331920B2 (en) Computer-readable storage medium
EP3673455B1 (en) Identifying copyrighted material using embedded copyright information
JP2006338249A (en) Content protection device and content protection release device
CN103942470A (en) Electronic audio-visual product copyright management method with source tracing function
US10339283B2 (en) System and method for creating, processing, and distributing images that serve as portals enabling communication with persons who have interacted with the images
Diehl Securing digital video: techniques for DRM and content protection
US11861021B2 (en) Digital artwork display device, management method, and electronic device
EP3673390B1 (en) Identifying copyrighted material using embedded copyright information
CN109145617B (en) Block chain-based digital copyright protection method and system
CN105303069A (en) Digital rights management system and method
KR20210037274A (en) Apparatus and method for managing contents
CN114359010A (en) Image work copyright protection method and device, electronic equipment and storage medium
Motwani et al. A proposed digital rights management system for 3d graphics using biometric watermarks
CN113486122A (en) Data sharing method and electronic equipment
CN104966000A (en) Multimedia copyright protection method based on security engine
CN112395560A (en) Copyright data processing method and device
CN109040760A (en) The guard method of network image copyright information, device and storage medium
CN108900472B (en) Information transmission method and device
CN114363068A (en) Image-text publishing method and device, electronic equipment and storage medium
CN101086754A (en) Mobile image digital copyright secure processing system based on digital watermark technology
CN112954403B (en) Video encryption method, device, equipment and storage medium
Yi et al. Digital rights management scheme based on redactable blockchain and perceptual hash
CN101404573B (en) Authorization method, system and apparatus
Huang et al. Intellectual property protection for FPGA designs using the public key cryptography
He et al. Digital right management model based on cryptography and digital watermarking

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination