CN115114598A - Watermark generation method, and method and device for file tracing by using watermark - Google Patents

Watermark generation method, and method and device for file tracing by using watermark Download PDF

Info

Publication number
CN115114598A
CN115114598A CN202210740345.5A CN202210740345A CN115114598A CN 115114598 A CN115114598 A CN 115114598A CN 202210740345 A CN202210740345 A CN 202210740345A CN 115114598 A CN115114598 A CN 115114598A
Authority
CN
China
Prior art keywords
watermark
generation
information
invisible
visible
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210740345.5A
Other languages
Chinese (zh)
Inventor
唐琦松
林平
吴鑫
靳志业
鲁埝生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai I Search Software Co ltd
Original Assignee
Shanghai I Search Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai I Search Software Co ltd filed Critical Shanghai I Search Software Co ltd
Priority to CN202210740345.5A priority Critical patent/CN115114598A/en
Publication of CN115114598A publication Critical patent/CN115114598A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention discloses a method and a device for generating a watermark and using the watermark for tracing a file, wherein the watermark generation comprises the following steps: a watermark client generates a watermark generation request; the watermark server obtains the watermark content, the encryption information and the parameter values of the watermark generation parameters according to the watermark generation request and the preset watermark generation rule, and records the related information into a watermark database; and the watermark client generates a visible watermark on the target page according to the watermark content and the parameter value of the watermark generation parameter, and generates an invisible watermark on the target page according to the encryption information. Watermarking for file tracing includes: and reading the visible watermark and the invisible watermark through a computer program, respectively matching the watermark content of the visible watermark, the parameter value of the watermark generation parameter and the encryption information of the invisible watermark with the watermark database, obtaining user information and terminal information corresponding to the file according to the matching result, and finishing file tracing. The invention can increase the difficulty of modifying and forging the watermark and improve the reliability and traceability of the watermark.

Description

Watermark generation method, and method and device for file tracing by using watermark
Technical Field
The invention relates to a method and a device for generating a watermark and using the watermark for tracing a file, and belongs to the technical field of information security.
Background
In order to protect sensitive information from being leaked, many enterprises can use watermarks to encrypt and protect important files, and the watermarks can be printed on paper files and can also be displayed on electronic screens or specific windows. The watermark can remind an operator that the information read currently is sensitive, and can trace the source through the watermark when the information is leaked.
At present, most watermarks are visible and have several fixed forms, the fixed and visible watermarks are easy to identify and low in manufacturing cost, but are also easy to modify and forge, the reliability of the watermarks is reduced, traceability through the watermarks is difficult, and in addition, if information is leaked, the existing watermarks cannot be traced back to specific individuals, and traceability is still required to be improved.
Disclosure of Invention
In order to solve the problems that watermarks are easy to modify and forge and poor in traceability in the prior art, the invention provides a method and a device for generating watermarks and using the watermarks for document traceability, a dynamic mechanism is introduced to generate irregular watermarks, invisible watermarks are added, the difficulty of modifying and forging the watermarks can be increased, and the reliability and traceability of the watermarks are improved.
In order to solve the technical problems, the invention adopts the following technical means:
in a first aspect, the present invention provides a watermark generating method, including the following steps:
acquiring a watermark generation request;
obtaining parameter values of watermark content, encrypted information and watermark generation parameters according to the watermark generation request and a preset watermark generation rule;
recording the watermark generation request, the watermark content, the encryption information and the parameter values of the watermark generation parameters into a watermark database;
generating a visible watermark on a target page according to the watermark content and the parameter value of the watermark generation parameter;
generating an invisible watermark on a target page according to the encrypted information;
the watermark generation parameters comprise the font type, the font size, the color, the line number and the font offset angle of the watermark, and the encrypted information is used as one parameter value in the watermark generation parameters.
With reference to the first aspect, further, the watermark generation request includes user information, terminal information, request time, and target page information.
With reference to the first aspect, further, the watermark generation rule includes a watermark format, a value range of a watermark generation parameter, and an encryption information generation logic.
With reference to the first aspect, further, the method for obtaining the watermark content, the watermark generation parameter, and the encryption information according to the watermark generation request and the preset watermark generation rule includes:
forming watermark content by using user information, terminal information and/or request time in the watermark generation request according to a preset watermark format;
according to the watermark generation request, using a preset encryption information generation logic to obtain encryption information;
and taking the encrypted information as one parameter value in the watermark generation parameters, and randomly generating parameter values of other watermark generation parameters in the value range of the watermark generation parameters.
With reference to the first aspect, the encryption information generating logic further includes: information having directivity in the watermark generation request is used as the encryption information.
With reference to the first aspect, further, the invisible watermark is in a braille pattern, and the encrypted information is embedded into the target page in braille by using an approximate color of the target page, wherein a difference between an RGB value of the approximate color and an RGB value of the target page is not greater than 20.
With reference to the first aspect, further, the invisible watermark is an encryption pattern, and encryption information is embedded into the target page by using an image encryption algorithm.
In a second aspect, the present invention provides a watermark generating apparatus based on the watermark generating method in the first aspect, including:
the watermark server is used for acquiring a watermark generation request, obtaining parameter values of watermark content, encryption information and watermark generation parameters according to the watermark generation request and a preset watermark generation rule, and recording the parameter values of the watermark generation request, the watermark content, the encryption information and the watermark generation parameters into a watermark database;
the watermark client is used for generating a watermark generation request, acquiring watermark content, encryption information and parameter values of watermark generation parameters, generating a visible watermark in a target page according to the watermark content and the parameter values of the watermark generation parameters, and generating an invisible watermark in the target page according to the encryption information;
the watermark generation parameters comprise the font type, the font size, the color, the line number and the font offset angle of the watermark, and the encrypted information is used as one parameter value in the watermark generation parameters.
In a third aspect, the invention provides a file tracing method based on watermarks, which includes the following steps:
acquiring a file containing a visible watermark and an invisible watermark, wherein the visible watermark and the invisible watermark are generated by the watermark generation method in the first aspect;
reading the visible watermark and the invisible watermark through a computer program, and decrypting the invisible watermark to obtain watermark content, parameter values of watermark generation parameters and encrypted information of the invisible watermark;
matching the watermark content of the visible watermark, the parameter value of the watermark generation parameter and the encryption information of the invisible watermark with a watermark database respectively;
and judging whether the visible watermark and the invisible watermark on the file are forged or not according to the matching result, and simultaneously extracting the user information and the terminal information corresponding to the file from the watermark database to finish the file tracing.
In a fourth aspect, the present invention provides a watermark-based file tracing apparatus, including:
the file acquisition module is used for acquiring a file containing a visible watermark and an invisible watermark, and the visible watermark and the invisible watermark are generated by the watermark generation method in the first aspect;
the watermark reading module is used for reading the visible watermark and the invisible watermark through a computer program and decrypting the invisible watermark to obtain watermark content, parameter values of watermark generation parameters and encrypted information of the invisible watermark;
the data matching module is used for respectively matching the watermark content of the visible watermark, the parameter value of the watermark generation parameter and the encryption information of the invisible watermark with the watermark database to obtain a matching result;
and the anti-counterfeiting and tracing module is used for judging whether the visible watermark and the invisible watermark on the file are forged or not according to the matching result, and simultaneously extracting the user information and the terminal information corresponding to the file from the watermark database to finish file tracing.
The following advantages can be obtained by adopting the technical means:
the invention provides a method and a device for generating a watermark and using the watermark for tracing a file, wherein in the method and the device for generating the watermark, a visible watermark and an invisible watermark are introduced, the watermark content and the watermark generation parameter of the visible watermark are adjusted through a dynamic mechanism, the flexibility and the variability of the visible watermark are improved, the invisible watermark is embedded into a target page through braille or an encrypted pattern, important files can be further protected, the difficulty of modifying and counterfeiting the watermark can be increased through the visible watermark and the invisible watermark, and the effectiveness and the reliability of the confidentiality of the watermark are improved. In the file tracing method and device based on the watermark, the invention stores the relevant information of the watermark through the watermark database, analyzes the visible watermark and the invisible watermark through the computer program after the file is leaked, acquires the watermark content, the watermark generation parameter and the encryption information, and performs information matching with the watermark database, thereby realizing the tracing function, mutually verifying the watermark content, the watermark generation parameter and the encryption information, effectively improving the traceability of the watermark and improving the accuracy and reliability of the tracing.
Drawings
Fig. 1 is a flowchart illustrating steps of a watermark generation method according to the present invention;
FIG. 2 is a schematic diagram of a visible watermark in an embodiment of the invention;
FIG. 3 is a comparison graph of Braille and number in the embodiment of the present invention;
fig. 4 is a flowchart illustrating steps of a watermark-based file tracing method according to the present invention.
Detailed Description
The technical scheme of the invention is further explained by combining the accompanying drawings as follows:
example 1:
the invention provides a watermark generation method, which carries out watermark generation operation through a watermark client and a watermark server, wherein the server can dynamically adjust the style and content of a watermark, and the client generates the watermark in real time after acquiring related information of the watermark, as shown in figure 1, the method specifically comprises the following steps:
and step A, acquiring a watermark generation request. And running the watermark client on a PC, a mobile phone or other electronic equipment. The watermark client is an application program which runs continuously and is automatically connected with the watermark server after the system is started. The connection may be in various ways, such as HTTP or socket connection. After the connection is successful, the watermark client enters a normal operation state, and if the connection is unsuccessful, the connection needs to be continuously retried. In a normal operation state, when a trigger condition (such as starting up, opening a certain webpage, APP or document) occurs, the watermark client reads the information of the terminal where the watermark client is located, and the logged-in user information generates a watermark generation request and sends the watermark generation request to the watermark server.
The watermark generation request comprises information such as user information, terminal information, request time and target page information, the user information comprises staff names, staff numbers and the like, the terminal information comprises terminal names, terminal numbers, terminal IP, terminal hardware identifiers and the like, the request time adopts the current time of a watermark client or the time when a user opens a webpage, an APP or a document needing to be kept secret, and the target page information is the information of the webpage, the APP page, a window or the document needing to be kept secret.
And step B, obtaining the watermark content, the encryption information and the parameter values of the watermark generation parameters according to the watermark generation request and the preset watermark generation rule.
In the embodiment of the invention, the watermark generation rule comprises a watermark format, a value range of a watermark generation parameter and encryption information generation logic; the watermark generation parameters comprise the font type, the font size (12-32), the color, the line number, the font offset angle (0-360 degrees), the character spacing, the line spacing and the like of the watermark.
And step B01, according to the preset watermark format, the user information, the terminal information and/or the request time in the watermark generation request are used for forming watermark content. The watermark format may be a fixed format, such as employee number + request time, or a semi-fixed format, such as employee number + any other information, where the fixed content may be information that accurately refers to a person.
And step B02, according to the watermark generation request, using the preset encryption information generation logic to obtain the encryption information. The encryption information can be numbers or other characters, the encryption information has a range limitation because the amount of information which can be encrypted is limited currently, and the total length of the character string is not too large and is generally set within 16 characters. The encryption information generation logic includes: information having directivity in the watermark generation request is used as encryption information to trace back a specific watermark generation request based on the encryption information, for example, user information is used as the encryption information.
In the embodiment of the present invention, the encrypted information is a number, and the encrypted information generation logic may use the number in the watermark generation request as the encrypted information, for example, use the employee number in the user information as the encrypted information; or, the number obtained by operating the watermark generation request may be used as the encryption information, for example, the corresponding number is searched in the squared table according to the initial of each word in the user name, and the number is added to the terminal number to obtain the encryption information.
And step B03, taking the encrypted information as a parameter value in the watermark generation parameters, and randomly generating parameter values of other watermark generation parameters in the value range of the watermark generation parameters.
When the encrypted information is digital, the encrypted information can be used as parameter values of font size, color (RGB value), line number or font offset angle, and when the encrypted information is other characters, the encrypted information can be converted into digital or text type through self-defined mapping relation, and then used as parameter values of watermark generation parameters. In the embodiment of the invention, the employee number of the user is selected as the encryption information, the encryption information is used as the parameter value of the font offset angle, for example, the employee number of a certain user is 20, and when the employee logs in the watermark client and sends the watermark generation request, the font offset angle of the visible watermark is set to be 20.
The encrypted information can be embedded into the visible watermark by using the encrypted information as a parameter value of the watermark generation parameter, so that the variability of the visible watermark can be improved, meanwhile, the visible watermark and the invisible watermark can be mutually verified, and the traceability of the watermark can be improved.
And step C, recording parameter values of the watermark generation request, the watermark content, the encryption information and the watermark generation parameters into a watermark database, so that the watermark related information can be searched, and the tracing difficulty can be reduced.
And D, generating a visible watermark on the target page according to the watermark content and the parameter value of the watermark generation parameter, as shown in figure 2.
And E, generating an invisible watermark on the target page according to the encrypted information. The invisible watermark can adopt a braille pattern or an encryption pattern.
When the braille pattern is selected by the invisible watermark, the encrypted information is converted into the braille pattern through the corresponding relation between the braille and the number in fig. 3, and then the encrypted information is embedded into the target page in the form of braille by utilizing the approximate color of the target page, wherein the difference between the RGB value of the approximate color and the RGB value of the target page is not more than 20. The Braille patterns are embedded in the target page through the approximate colors, so that the probability of identifying invisible watermarks by naked eyes can be reduced, and the Braille patterns and the background of the target page can be accurately distinguished by analyzing the RGB values of the pixel points through a machine.
When the invisible watermark adopts the encrypted pattern, the encrypted information is embedded into the target page by using an image encryption algorithm, the encrypted pattern can be embedded into a fixed area, for example, a screen is divided into a plurality of blocks with fixed size of 256 × 256, the middle block and the rightmost lower block are selected for encryption, for the block needing encryption, the image of the block is firstly intercepted, discrete cosine transformation is applied, then the encrypted information is added into a high-frequency signal, then inverse transformation is carried out, the encrypted pattern is obtained, and finally the encrypted pattern is placed into the target page, so that the invisible watermark is completed. The image encrypted by the image encryption algorithm is almost the same as the original image, and the encrypted information can be recovered relatively stably even if the image is zoomed and cropped. In an embodiment of the invention, the python library blind-watermark is called to implement the encryption pattern.
Example 2:
based on the method in embodiment 1, the invention also provides a watermark generating device, which comprises a plurality of watermark clients and a watermark server, wherein the watermark clients are generally installed on computers of enterprise employees, the watermark server is installed in an enterprise local area network, the watermark clients interact information with the watermark server through the network, the watermark clients send watermark generating requests to the watermark server, the watermark server records the requests of the watermark clients and returns parameters required by watermark generation, and the watermark clients finish watermark generating operations.
The watermark server acquires a watermark generation request, and obtains watermark content, encryption information and parameter values of watermark generation parameters according to the watermark generation request and a preset watermark generation rule; the watermark generation parameters comprise the font type, the font size, the color, the line number and the font offset angle of the watermark, and the encryption information can be used as a parameter value in the watermark generation parameters. The watermark server sends the watermark content, the encryption information and the watermark generation parameter to the watermark client, and simultaneously records the watermark generation request, the watermark content, the encryption information and the parameter value of the watermark generation parameter into the watermark database for subsequent inquiry.
The watermark client generates a watermark generation request according to the information of the current terminal, the user information (such as name and number), the current time and the like, and sends the watermark generation request to the watermark server. The watermark client is internally preset with a plurality of watermark generation modes, including visible watermarks and invisible watermarks, wherein the invisible watermarks adopt braille patterns or encrypted patterns. After the watermark client side obtains the watermark content, the encryption information and the parameter values of the watermark generation parameters, visible watermarks are generated on a target page according to the watermark content and the parameter values of the watermark generation parameters, the form of the visible watermarks is selected, and invisible watermarks are generated on the target page according to the encryption information.
The administrator can update the watermark generation rule on the watermark server at any time, can aim at all users during updating, can also aim at specified users, and after the rule is updated, when the watermark client sends a watermark generation request again, the watermark can be generated according to the new watermark generation rule.
The invention introduces the visible watermark and the invisible watermark, adjusts the watermark content and the watermark generation parameter of the visible watermark through a dynamic mechanism, improves the flexibility and the variability of the visible watermark, embeds the invisible watermark into a target page through braille or encrypted patterns, can further protect important files, increases the difficulty of watermark modification and forgery by the visible watermark and the invisible watermark, and improves the validity and the reliability of watermark confidentiality.
Example 3:
considering that the watermark is used for preventing the file leakage and is used for tracing the leakage source after the file leakage, the invention also provides a file tracing method based on the watermark, as shown in fig. 4, which comprises the following steps:
and step A, acquiring a file containing a visible watermark and an invisible watermark, wherein the file can be a leaked screenshot, a photo, a document and the like, and the visible watermark and the invisible watermark are generated by the watermark generation method in the embodiment 1.
And B, reading the visible watermark and the invisible watermark through a computer program, and decrypting the invisible watermark to obtain the watermark content, the parameter value of the watermark generation parameter and the encryption information of the invisible watermark. If the invisible watermark is a braille pattern, the braille pattern is converted into encrypted information through fig. 3, and if the invisible watermark is an encrypted pattern, the encrypted information is reversely decoded through an image encryption algorithm.
And step C, respectively matching the watermark content of the visible watermark, the parameter value of the watermark generation parameter and the encryption information of the invisible watermark with the watermark database, if the same information exists in the watermark database, successfully matching, extracting the watermark generation request successfully matched, and obtaining a matching result.
And D, judging whether the visible watermark and the invisible watermark on the file are forged or not according to the matching result, and simultaneously extracting the user information and the terminal information corresponding to the file from the watermark database to finish the file tracing.
Generally, firstly reading the parameter values of the watermark content and the watermark generation parameter from the visible watermark, searching the same information from the watermark database according to the parameter values of the watermark content and the watermark generation parameter, if the same information can be found, directly outputting user information and terminal information according to the watermark generation request, tracing, if the same information cannot be found, modifying the visible watermark with high probability, then respectively extracting encryption information through the visible watermark and the invisible watermark, judging whether the encryption information of the two is consistent, if the encryption information is consistent, indicating that the encryption information is effective, searching the watermark generation request from the watermark database according to the encryption information, directly outputting the corresponding user information and terminal information, tracing, if the encryption information of the two is inconsistent, considering that the difficulty of modifying the invisible watermark is higher, and if the encryption information of the two is inconsistent, The probability is smaller, the invisible watermark is taken as the main, the user information and the terminal information corresponding to the encrypted information of the invisible watermark are output, and the tracing is finished.
The method embeds the encryption information in the visible watermark and the invisible watermark, the watermark content and the watermark generation parameter of the visible watermark, the encryption information of the visible watermark and the encryption information of the invisible watermark can be mutually verified when the file is traced, and the original watermark record can be positioned in the watermark database as long as one part is not completely destroyed/modified, thereby being convenient for tracing and improving the tracing accuracy.
Example 4:
based on the method in embodiment 3, the invention also provides a watermark-based file tracing device, which comprises a file acquisition module, a watermark reading module, a data matching module and an anti-counterfeiting and tracing module.
The file acquisition module is mainly used for acquiring a file containing a visible watermark and an invisible watermark, wherein the visible watermark and the invisible watermark are generated by the watermark generation method in the embodiment 1.
The watermark reading module is mainly used for reading the visible watermark and the invisible watermark through a computer program and decrypting the invisible watermark to obtain the watermark content, the parameter value of the watermark generation parameter and the encryption information of the invisible watermark.
The data matching module is mainly used for matching the watermark content of the visible watermark, the parameter value of the watermark generation parameter and the encryption information of the invisible watermark with the watermark database respectively to obtain a matching result.
The anti-counterfeiting and tracing module is mainly used for judging whether the visible watermark and the invisible watermark on the file are forged or not according to the matching result, and extracting the user information and the terminal information corresponding to the file from the watermark database to finish file tracing.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, several modifications and variations can be made without departing from the technical principle of the present invention, and these modifications and variations should also be regarded as the protection scope of the present invention.

Claims (10)

1. A watermark generation method, comprising the steps of:
acquiring a watermark generation request;
obtaining parameter values of watermark content, encryption information and watermark generation parameters according to the watermark generation request and a preset watermark generation rule;
recording parameter values of the watermark generation request, the watermark content, the encryption information and the watermark generation parameter into a watermark database;
generating a visible watermark on a target page according to the watermark content and the parameter value of the watermark generation parameter;
generating an invisible watermark on a target page according to the encrypted information;
the watermark generation parameters comprise the font type, the font size, the color, the line number and the font offset angle of the watermark, and the encrypted information is used as one parameter value in the watermark generation parameters.
2. The watermark generation method according to claim 1, wherein the watermark generation request includes user information, terminal information, request time, and target page information.
3. The watermark generation method according to claim 1, wherein the watermark generation rule includes a watermark format, a value range of a watermark generation parameter, and an encryption information generation logic.
4. The watermark generation method according to claim 2 or 3, wherein the method for obtaining the watermark content, the watermark generation parameter, and the encryption information according to the watermark generation request and the preset watermark generation rule comprises:
forming watermark content by using user information, terminal information and/or request time in the watermark generation request according to a preset watermark format;
according to the watermark generation request, utilizing a preset encryption information generation logic to obtain encryption information;
and taking the encrypted information as one parameter value in the watermark generation parameters, and randomly generating parameter values of other watermark generation parameters in the value range of the watermark generation parameters.
5. The watermark generation method of claim 4, wherein the encryption information generation logic comprises: information having directivity in the watermark generation request is used as the encryption information.
6. The watermark generation method according to claim 1, wherein the invisible watermark is in a braille pattern, and the encrypted information is embedded in the target page in braille using an approximate color of the target page, wherein a difference between an RGB value of the approximate color and an RGB value of the target page is not more than 20.
7. The watermark generation method of claim 1, wherein the invisible watermark is an encrypted pattern, and the encrypted information is embedded in the target page by using an image encryption algorithm.
8. A watermark generation apparatus based on the watermark generation method according to any one of claims 1 to 7, comprising:
the watermark server is used for acquiring a watermark generation request, obtaining parameter values of watermark content, encryption information and watermark generation parameters according to the watermark generation request and a preset watermark generation rule, and recording the parameter values of the watermark generation request, the watermark content, the encryption information and the watermark generation parameters into a watermark database;
the watermark client is used for generating a watermark generation request, acquiring watermark content, encryption information and parameter values of watermark generation parameters, generating a visible watermark in a target page according to the watermark content and the parameter values of the watermark generation parameters, and generating an invisible watermark in the target page according to the encryption information;
the watermark generation parameters comprise the font type, the font size, the color, the line number and the font offset angle of the watermark, and the encrypted information is used as one parameter value in the watermark generation parameters.
9. A file tracing method based on watermark is characterized by comprising the following steps:
acquiring a file containing a visible watermark and an invisible watermark, wherein the visible watermark and the invisible watermark are generated by the watermark generation method of any one of claims 1-7;
reading the visible watermark and the invisible watermark through a computer program, and decrypting the invisible watermark to obtain watermark content, parameter values of watermark generation parameters and encrypted information of the invisible watermark;
matching the watermark content of the visible watermark, the parameter value of the watermark generation parameter and the encryption information of the invisible watermark with a watermark database respectively;
and judging whether the visible watermark and the invisible watermark on the file are forged or not according to the matching result, and simultaneously extracting the user information and the terminal information corresponding to the file from the watermark database to finish the file tracing.
10. A file tracing device based on watermark is characterized by comprising:
a file acquisition module for acquiring a file containing a visible watermark and an invisible watermark, wherein the visible watermark and the invisible watermark are generated by the watermark generation method of any one of claims 1 to 7;
the watermark reading module is used for reading the visible watermark and the invisible watermark through a computer program and decrypting the invisible watermark to obtain watermark content, parameter values of watermark generation parameters and encrypted information of the invisible watermark;
the data matching module is used for respectively matching the watermark content of the visible watermark, the parameter value of the watermark generation parameter and the encryption information of the invisible watermark with the watermark database to obtain a matching result;
and the anti-counterfeiting and tracing module is used for judging whether the visible watermark and the invisible watermark on the file are forged or not according to the matching result, and simultaneously extracting the user information and the terminal information corresponding to the file from the watermark database to finish file tracing.
CN202210740345.5A 2022-06-28 2022-06-28 Watermark generation method, and method and device for file tracing by using watermark Pending CN115114598A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210740345.5A CN115114598A (en) 2022-06-28 2022-06-28 Watermark generation method, and method and device for file tracing by using watermark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210740345.5A CN115114598A (en) 2022-06-28 2022-06-28 Watermark generation method, and method and device for file tracing by using watermark

Publications (1)

Publication Number Publication Date
CN115114598A true CN115114598A (en) 2022-09-27

Family

ID=83331413

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210740345.5A Pending CN115114598A (en) 2022-06-28 2022-06-28 Watermark generation method, and method and device for file tracing by using watermark

Country Status (1)

Country Link
CN (1) CN115114598A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115455383A (en) * 2022-11-14 2022-12-09 北京奕之宣科技有限公司 Method, device and equipment for processing watermark information of database
CN117473470A (en) * 2023-12-28 2024-01-30 深圳昂楷科技有限公司 Dynamic watermark generation method and system and watermark tracing method
CN117688527A (en) * 2023-12-28 2024-03-12 北京领雁科技股份有限公司 Method and system for dynamically configuring watermark by application software

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115455383A (en) * 2022-11-14 2022-12-09 北京奕之宣科技有限公司 Method, device and equipment for processing watermark information of database
CN117473470A (en) * 2023-12-28 2024-01-30 深圳昂楷科技有限公司 Dynamic watermark generation method and system and watermark tracing method
CN117688527A (en) * 2023-12-28 2024-03-12 北京领雁科技股份有限公司 Method and system for dynamically configuring watermark by application software
CN117473470B (en) * 2023-12-28 2024-05-07 深圳昂楷科技有限公司 Dynamic watermark generation method and system and watermark tracing method

Similar Documents

Publication Publication Date Title
CN107423629B (en) Method and system for file information output anti-disclosure and tracing
CN107239713B (en) Sensitive content data information protection method and system
JP3804012B2 (en) Document image alteration determination method and system, and control program therefor
CN115114598A (en) Watermark generation method, and method and device for file tracing by using watermark
US20190364038A1 (en) Digital Identification Document
US5765176A (en) Performing document image management tasks using an iconic image having embedded encoded information
KR100335308B1 (en) Secured signal modification and verification with privacy control
US9497349B2 (en) Dynamic digital watermark
US10204390B2 (en) Dynamic digital watermark
US20040001606A1 (en) Watermark fonts
Fang et al. A camera shooting resilient watermarking scheme for underpainting documents
CN111680273B (en) Watermark embedding method, watermark embedding device, electronic equipment and readable storage medium
US10706160B1 (en) Methods, systems, and articles of manufacture for protecting data in an electronic document using steganography techniques
CN109785222B (en) Method for quickly embedding and extracting information of webpage
CN112085643B (en) Image desensitization processing method, verification method and device, equipment and medium
CN111860727A (en) Two-dimensional code generation method, verification method, device and computer-readable storage medium
CN108960387B (en) Anti-counterfeiting two-dimensional code and generation and identification method thereof
CN112800398A (en) PDF file circulation tracking method
KR20130011868A (en) Method for generating electronic document available at mobile devices and device of producing the same
CN110069907A (en) Big data source tracing method and system based on digital watermarking
CN116029777A (en) Anti-counterfeiting bill generation method, device, equipment and medium
CN115511030A (en) Anti-counterfeiting verification method and device and electronic equipment
Pilania et al. A roadmap of steganography tools: conventional to modern
CN111860726A (en) Two-dimensional code display method, verification method, equipment and computer-readable storage medium
RU2739936C1 (en) Method of adding digital labels to digital image and apparatus for realizing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination