CN114980298A - Tamper-proofing method based on positioning system and network time information - Google Patents
Tamper-proofing method based on positioning system and network time information Download PDFInfo
- Publication number
- CN114980298A CN114980298A CN202210515930.5A CN202210515930A CN114980298A CN 114980298 A CN114980298 A CN 114980298A CN 202210515930 A CN202210515930 A CN 202210515930A CN 114980298 A CN114980298 A CN 114980298A
- Authority
- CN
- China
- Prior art keywords
- information
- watermark
- algorithm
- time
- photo
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 35
- 238000012795 verification Methods 0.000 claims abstract description 17
- 238000012544 monitoring process Methods 0.000 claims description 12
- 230000002159 abnormal effect Effects 0.000 claims description 5
- 238000012986 modification Methods 0.000 abstract description 2
- 230000004048 modification Effects 0.000 abstract description 2
- 238000013461 design Methods 0.000 description 6
- 238000007405 data analysis Methods 0.000 description 4
- 238000007689 inspection Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000004080 punching Methods 0.000 description 1
- 238000009938 salting Methods 0.000 description 1
- 150000003839 salts Chemical class 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W56/00—Synchronisation arrangements
-
- G—PHYSICS
- G04—HOROLOGY
- G04G—ELECTRONIC TIME-PIECES
- G04G7/00—Synchronisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Abstract
The invention discloses a method for preventing falsification based on a positioning system and network time information, which relates to the technical field of information security and comprises the following steps: acquiring watermark information of positioning and time through a mobile phone positioning system and a national time service center interface; the obtained watermark information is encrypted and stored through an information storage algorithm, the stored watermark information is decrypted through the information storage algorithm, and the decrypted watermark information is displayed in a preview window; recording and generating watermark information and picture pixel point information, and generating a watermark picture with an anti-counterfeiting two-dimensional code through a picture information encryption algorithm. The invention solves the possibility of information modification by calculating the photo information and combining the encryption and decryption algorithms of the invention and then passing the information verification algorithm.
Description
Technical Field
The invention relates to the technical field of information security, in particular to a method for preventing falsification based on a positioning system and network time information.
Background
With the rapid development of economy and technology, the field information recording mode becomes diversified, and especially under the field relevant operation scenes such as field attendance card punching, engineering inspection, acquisition inspection and the like, the field photo and the information watermarking become a special management and control method. In this scenario, the authenticity, real-time performance, and effectiveness of the watermark information on the photo are particularly important, and especially, the time and the location are the most important components in the watermark information.
Firstly, a typical time acquisition method in the existing market is to acquire mobile phone time, and the method of adding water to the mobile phone time has the disadvantages that the mobile phone time of a user is not synchronous with the real time or the mobile phone time is modified manually, or a tool is adopted to modify the time in the mobile phone memory, so that the real-time performance and the authenticity of time information in the watermark can be influenced. Secondly, the typical positioning information in the existing market cannot be generated along with the real positioning of the user, so that the positioning information in the watermark is not matched with the real positioning information, the information is acquired from the interface of the mobile phone positioning system and then is put into the memory, and then the information is acquired from the memory of the mobile phone to be used as the positioning watermark information, so that whether the latitude in the memory is real and effective information cannot be determined. Thirdly, the photos are easily modified by the image modifying tools such as PS, the modified on-site photos and videos have no credibility, and enterprises and units cannot effectively acquire real and effective on-site operation information and effectively manage and control the on-site.
Therefore, it is important to ensure the authenticity of watermark information in photos and videos.
Disclosure of Invention
The invention aims to solve the defects in the prior art, and provides a method for preventing falsification based on a positioning system and network time information.
In order to achieve the purpose, the invention adopts the following technical scheme:
the method for preventing tampering based on the positioning system and the network time information comprises the following steps:
s1, acquiring watermark information of positioning and time through a mobile phone positioning system and a national time service center interface;
s2, the obtained watermark information is encrypted and stored through a watermark information storage algorithm;
s3, carrying out information decryption on the encrypted and stored watermark information through a watermark information storage algorithm, and displaying the decrypted watermark information in a preview window;
s4, recording the generated watermark information and the picture pixel point information, and generating a watermark picture with an anti-counterfeiting two-dimensional code through a picture information encryption algorithm;
s5, uploading the generated watermark picture to a SaaS platform, and checking the picture information through the SaaS platform;
s6, decrypting the information in the anti-counterfeiting two-dimensional code through a photo information verification algorithm, and comparing the information with the information in the photo to generate a result, thereby realizing anti-counterfeiting verification of the photo information;
s7, outputting a verification result;
preferably, in step S2, a monitoring method is built in the watermark information storage algorithm, the monitoring method is used to obtain the watermark information, a monitoring interval is set, and the callback monitoring method is circulated in the interval.
Preferably, in step S2, the built-in encryption method of the watermark information storage algorithm encrypts the positioning information and the time information by using the national password 4.0, and stores the encrypted positioning information and time information by setting a global variable.
Preferably, in step S3, a time timer is set in the preview window, the time timer is started, the time of the preview page is controlled to jump, and the interval refresh is increased.
Preferably, in step S4, the built-in encryption method of the photo information encryption algorithm uses a national secret 4.0 algorithm to generate a dynamic key, then performs salting processing on the positioning, time and photo pixel point information, then uses the national secret 4.0 algorithm to encrypt the dynamic key, then uses the national secret 4.0 algorithm to generate a fixed key, and then writes the encrypted information into the two-dimensional code.
Preferably, in step S6, the photo information verification algorithm includes a two-dimensional code recognition module built in to recognize the two-dimensional code, and after the ciphertext information is obtained, the fixed key is used to decrypt the ciphertext, the ciphertext is decrypted by using the dynamic key when the hint information is incorrect, the decryption is performed by entering data analysis when the decryption is normal, and the data analysis is performed by using the hint information when the hint information is incorrect, and the result of the display information is analyzed when the decryption is normal.
The invention has the beneficial effects that:
1. according to the method for acquiring the real time through the national time service center, after the real time is acquired, the APP starts the automatic counter, the time is counted once every second to synchronize the time operation, and meanwhile, the timer is used for calibrating the time information, so that the effect that the time information is more real and more real is achieved.
2. The invention refreshes the memory of the mobile phone and updates the position information in the memory through automatic refreshing and positioning, thereby achieving the method of obtaining real and effective positioning.
3. The invention solves the possibility of information modification by calculating the photo information and combining the encryption and decryption algorithms of the invention and then passing the information verification algorithm.
Drawings
Fig. 1 is a schematic structural diagram of a positioning system and a method for preventing network time information from being tampered according to the present invention.
Fig. 2 is a flow chart of a watermark information storage algorithm design based on a positioning system and a network time information tamper-proofing method of the present invention.
Fig. 3 is a flowchart of a photo information encryption algorithm design based on a positioning system and a network time information tamper-proofing method of the present invention.
Fig. 4 is a flowchart of a photo information verification algorithm design based on a positioning system and a network time information tamper-proofing method according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
As shown in fig. 1 to 4:
the method for preventing tampering based on the positioning system and the network time information comprises the following steps:
s1, acquiring watermark information of positioning and time through a mobile phone positioning system and a national time service center interface;
s2, the obtained watermark information is encrypted and stored through a watermark information storage algorithm;
s3, carrying out watermark information decryption on the encrypted and stored watermark information through a watermark information storage algorithm, and displaying the decrypted watermark information in a preview window;
s4, recording and generating watermark information and picture pixel point information, and generating a watermark picture with an anti-counterfeiting two-dimensional code through a picture information encryption algorithm;
s5, uploading the generated watermark picture to a SaaS platform, and checking the picture information through the SaaS platform;
s6, decrypting the information in the anti-counterfeiting two-dimensional code through a photo information verification algorithm, and comparing the information with the information in the photo to generate a result, thereby realizing anti-counterfeiting verification of the photo information;
s7, outputting a verification result;
in step S2, the built-in monitoring method of the watermark information storage algorithm is used for acquiring watermark information by the monitoring method, meanwhile, the monitoring interval is set, the monitoring method is circularly called back in the interval time, in step S2, the built-in encryption method of the watermark information storage algorithm adopts the national secret 4.0 to encrypt the positioning information and the time information, in step S4, the encrypted positioning information and the encrypted time information are stored by setting a global variable, in step S3, a time timer is set in a preview window, the time timer is started to control the time jump of a preview page, interval refreshing is increased, in step S4, the built-in encryption method of the photo information encryption algorithm adopts the national secret 4.0 algorithm to generate a dynamic key, then salt processing is carried out on the positioning information, the time information and the photo pixel point information, then the dynamic key is encrypted by the national secret 4.0 algorithm, then a fixed key is generated by the national secret 4.0 algorithm, and then the encrypted information is written into a two-dimensional code, in step S6, the two-dimensional code recognition device built in the photo information verification algorithm recognizes the two-dimensional code to obtain ciphertext information, and then decrypts the ciphertext using the fixed key, where the prompt information is incorrect when the ciphertext is abnormal, the ciphertext is decrypted using the dynamic key normally, the prompt information is incorrect when the dynamic key is abnormal, data analysis is entered when decryption is normal, and the prompt information is incorrect when data analysis is abnormal, and the display information result is analyzed normally.
Fig. 2 shows a flow chart of a watermark information storage algorithm design of the present invention, where the watermark information storage algorithm is to encrypt and store the obtained watermark information and add an automatic refresh mechanism to ensure that the watermark information in the preview is real-time information and real information.
Fig. 3 shows a design flow chart of a photo information encryption algorithm of the present invention, in which the photo information encryption algorithm is to perform double encryption on watermark information and photo pixel information in a photo by a national password and write encrypted information into an anti-counterfeiting two-dimensional code at the same time when the photo is generated.
Fig. 4 shows a design flow chart of a photo information verification algorithm of the present invention, where the photo information verification algorithm is a result generated by decrypting information in the anti-counterfeit two-dimensional code and comparing the information with information in a photo.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.
Claims (6)
1. The method for preventing tampering based on the positioning system and the network time information is characterized by comprising the following steps:
s1, acquiring watermark information of positioning and time through a mobile phone positioning system and a national time service center interface;
s2, the obtained watermark information is encrypted and stored through a watermark information storage algorithm;
s3, carrying out watermark information decryption on the encrypted and stored watermark information through a watermark information storage algorithm, and displaying the decrypted watermark information in a preview window;
s4, recording and generating watermark information and picture pixel point information, and generating a watermark picture with an anti-counterfeiting two-dimensional code through a picture information encryption algorithm;
s5, uploading the generated watermark picture to a SaaS platform, and checking the picture information through the SaaS platform;
s6, decrypting the information in the anti-counterfeiting two-dimensional code through a photo information verification algorithm, and comparing the information with the information in the photo to generate a result, thereby realizing anti-counterfeiting verification of the photo information;
and S7, outputting a verification result.
2. The method for preventing falsification of network time information and positioning system according to claim 1, wherein in step S2, the watermark information storage algorithm has a built-in monitoring method, the monitoring method is used to obtain the watermark information, and the monitoring interval is set, and the callback monitoring method is cycled during the interval.
3. The method for preventing falsification of time information based on a positioning system and a network according to claim 1, wherein in step S2, the positioning information and the time information are encrypted by using a national password of 4.0, and the encrypted positioning and time information are stored by setting a global variable.
4. The method for preventing falsification of network time information and location based system according to claim 1, wherein in step S3, a time timer is set in the preview window, the time timer is started, the time of the preview page is controlled to jump, and the interval refresh is increased.
5. The method as claimed in claim 1, wherein in step S4, the photo information encryption algorithm is built in a dynamic key generated by using the national secret 4.0 algorithm, then the location, time and photo pixel information are salted, the dynamic key is encrypted by using the national secret 4.0 algorithm, a fixed key is generated by using the national secret 4.0 algorithm, and then the encrypted information is written into the two-dimensional code.
6. The method for preventing falsification based on the positioning system and the network time information as claimed in claim 1, wherein in step S6, the two-dimensional code recognition module built in the photo information verification algorithm recognizes the two-dimensional code to obtain the ciphertext information, and then decrypts the ciphertext by using the fixed key, the prompt information is incorrect when the ciphertext is abnormal, the ciphertext is decrypted by using the dynamic key normally, the prompt information is incorrect when the dynamic key is decrypted abnormally, the decryption is performed normally, the data parsing is performed normally, the prompt information is incorrect when the data parsing is abnormal, and the prompt information result is parsed normally.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210515930.5A CN114980298A (en) | 2022-05-12 | 2022-05-12 | Tamper-proofing method based on positioning system and network time information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210515930.5A CN114980298A (en) | 2022-05-12 | 2022-05-12 | Tamper-proofing method based on positioning system and network time information |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114980298A true CN114980298A (en) | 2022-08-30 |
Family
ID=82981012
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210515930.5A Pending CN114980298A (en) | 2022-05-12 | 2022-05-12 | Tamper-proofing method based on positioning system and network time information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114980298A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116884106A (en) * | 2023-06-09 | 2023-10-13 | 广州欢聚马克网络信息有限公司 | Inspection path signing-in method and device, equipment, medium and product thereof |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020191810A1 (en) * | 2001-06-13 | 2002-12-19 | Brian Fudge | Apparatus and method for watermarking a digital image |
JP2003304230A (en) * | 2002-04-10 | 2003-10-24 | Nec Corp | Encryption device, decryption device, digital watermark inserting device, and digital watermark detection device |
CN103685939A (en) * | 2013-11-22 | 2014-03-26 | 毛秀允 | Method for affixing watermarks on photos during photography |
CN106803289A (en) * | 2016-12-22 | 2017-06-06 | 五邑大学 | A kind of false proof method and system of registering of intelligent mobile |
CN109151506A (en) * | 2018-07-27 | 2019-01-04 | 广东工业大学 | A kind of method of video file operation, system and server |
CN110175683A (en) * | 2019-05-30 | 2019-08-27 | 北京慧眼智行科技有限公司 | One kind information of tracing to the source determines method and system |
-
2022
- 2022-05-12 CN CN202210515930.5A patent/CN114980298A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020191810A1 (en) * | 2001-06-13 | 2002-12-19 | Brian Fudge | Apparatus and method for watermarking a digital image |
JP2003304230A (en) * | 2002-04-10 | 2003-10-24 | Nec Corp | Encryption device, decryption device, digital watermark inserting device, and digital watermark detection device |
CN103685939A (en) * | 2013-11-22 | 2014-03-26 | 毛秀允 | Method for affixing watermarks on photos during photography |
CN106803289A (en) * | 2016-12-22 | 2017-06-06 | 五邑大学 | A kind of false proof method and system of registering of intelligent mobile |
CN109151506A (en) * | 2018-07-27 | 2019-01-04 | 广东工业大学 | A kind of method of video file operation, system and server |
CN110175683A (en) * | 2019-05-30 | 2019-08-27 | 北京慧眼智行科技有限公司 | One kind information of tracing to the source determines method and system |
Non-Patent Citations (1)
Title |
---|
闫涛;游福成;刘福平;: "基于数字签名的QR码水印认证系统", 信息安全研究, no. 03 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116884106A (en) * | 2023-06-09 | 2023-10-13 | 广州欢聚马克网络信息有限公司 | Inspection path signing-in method and device, equipment, medium and product thereof |
CN116884106B (en) * | 2023-06-09 | 2024-03-19 | 广州欢聚马克网络信息有限公司 | Inspection path signing-in method and device, equipment, medium and product thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106251278B (en) | A kind of image encryption domain reversible information hidden method based on histogram feature | |
EP3179438B1 (en) | System and method for creating a temporal-based dynamic watermark | |
US7418599B2 (en) | Deterring theft of media recording devices by encrypting recorded media files | |
WO2019098895A1 (en) | Method and arrangement for detecting digital content tampering | |
EP3234904B1 (en) | Method and apparatus for publishing locational copyrighted watermarking video | |
WO2016045548A1 (en) | Data synchronization method and device | |
CN103765811A (en) | Method and device for securely sharing images across untrusted channels | |
US8327150B2 (en) | System, method and program for managing information | |
CN110610456A (en) | Imaging system and video processing method | |
CN111581659B (en) | Method and device for calling electronic evidence | |
CN110674765A (en) | Imaging system and video processing method | |
CN110647659A (en) | Imaging system and video processing method | |
CN114980298A (en) | Tamper-proofing method based on positioning system and network time information | |
CN105981036B (en) | The online picture of safety | |
CN102158768B (en) | MP4 file encapsulation format-based video authentication watermark embedding and extraction method | |
KR101809086B1 (en) | System for Suppling and Authenticating Digital Contents using Real Time Image Watermarking Technic | |
GB2544453A (en) | System for secure analysis of datasets | |
CN108234467B (en) | Method and system for judging authenticity of engineering construction photo | |
US20100272312A1 (en) | Information hiding with similar structures | |
CN115802005A (en) | Security monitoring video storage method for residential houses | |
CN111860726B (en) | Two-dimensional code display method, verification method, device and computer readable storage medium | |
JP2006094536A (en) | Electronic still camera | |
CN109756459B (en) | Data processing method, data identification method, data processing device, data identification device, and data processing medium | |
CN110532740A (en) | Image ciphering method, apparatus, the encroach right method of determination and computer storage medium | |
KR101582579B1 (en) | Encryption apparatus and method for generating an encryption key using the biometric information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |