CN115883260A - Digital Tibetan traceability system based on steganography technology - Google Patents

Digital Tibetan traceability system based on steganography technology Download PDF

Info

Publication number
CN115883260A
CN115883260A CN202310166241.2A CN202310166241A CN115883260A CN 115883260 A CN115883260 A CN 115883260A CN 202310166241 A CN202310166241 A CN 202310166241A CN 115883260 A CN115883260 A CN 115883260A
Authority
CN
China
Prior art keywords
scheme
tracing
value
steganographic
steganography
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310166241.2A
Other languages
Chinese (zh)
Other versions
CN115883260B (en
Inventor
江寅
黄从武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Shendi Technology Co ltd
Original Assignee
Anhui Shendi Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Shendi Technology Co ltd filed Critical Anhui Shendi Technology Co ltd
Priority to CN202310166241.2A priority Critical patent/CN115883260B/en
Publication of CN115883260A publication Critical patent/CN115883260A/en
Application granted granted Critical
Publication of CN115883260B publication Critical patent/CN115883260B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Automatic Analysis And Handling Materials Therefor (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a digital Tibetan traceability system based on steganography technology, which belongs to the technical field of steganography and comprises a steganography library, an initial module, an analysis module, a traceability module and a server; the initial module is used for selecting an initial tracing scheme according to the sample and sending the obtained initial tracing scheme number and the sample to the analysis module; the analysis module is used for determining a corresponding tracing scheme, obtaining a first sequence and sending the first sequence to the tracing module; the tracing module is used for tracing the source of the sample, acquiring a first sequence, tracing the source of the sample by matching a corresponding tracing scheme from the steganographic library according to the first sequence, acquiring corresponding hidden data, and adjusting a correction factor lambda corresponding to the corresponding tracing scheme according to a tracing result; through the mutual cooperation of the steganographic library, the initial module, the analysis module and the tracing module, the intelligent tracing of various steganographic technologies is realized.

Description

Digital Tibetan traceability system based on steganography technology
Technical Field
The invention belongs to the technical field of steganography, and particularly relates to a digital Tibetan traceability system based on steganography.
Background
With the rapid development of internet information technology, the information security problem becomes more and more serious, which has become a hot spot of the current society and arouses the attention of academics. Steganography is an important method for ensuring information security transmission and realizing covert communication, and is an important branch of the information security field. Steganography mainly realizes the safe transmission of secret information through hidden communication behaviors, embeds the secret information into digital media files such as audios and videos, images and documents, does not cause the visual and auditory perception distortion of an original carrier, and enables the secret information to be transmitted under the condition of not causing the attention of a third party.
However, with the increase of data needing to be hidden in an enterprise, higher requirements are placed on data security, if only one steganographic technology is used in the enterprise, when the steganographic technology is cracked, large-scale leakage of secret data in the enterprise can be caused; therefore, a plurality of steganographic techniques are adopted for transmission in an enterprise, and even if one steganographic technique is cracked, the generated security problem is much smaller; therefore, how to integrate multiple steganographic technologies for tracing is a problem to be solved currently.
Disclosure of Invention
In order to solve the problems existing in the scheme, the invention provides a digital Tibetan traceability system based on a steganography technology.
The purpose of the invention can be realized by the following technical scheme:
a digital Tibetan traceability system based on a steganography technology comprises a steganography library, an initial module, an analysis module, a traceability module and a server;
the steganographic library is used for storing applied steganographic schemes, comprises a first storage node, a second storage node and a third storage node, acquires a tracing scheme corresponding to each steganographic scheme, stores the steganographic schemes into the first storage node, and stores the tracing scheme into the second storage node; setting a feature identification item corresponding to each tracing scheme, integrating the feature identification item, the weight and the standard value corresponding to the same tracing scheme into an identification set, storing the identification set into a third storage node, and marking corresponding associated labels on the corresponding steganography scheme, the tracing scheme and the identification set;
the initial module is used for selecting an initial tracing scheme according to the sample and sending the obtained initial tracing scheme number and the sample to the analysis module;
the analysis module is used for determining a corresponding tracing scheme, obtaining a first sequence and sending the first sequence to the tracing module;
the tracing module is used for tracing the source of the sample, acquiring a first sequence, tracing the source of the sample from the steganographic library by matching the corresponding tracing scheme according to the first sequence ordering, acquiring corresponding hidden data, and adjusting the correction factor lambda corresponding to the tracing scheme according to the tracing result.
Further, the working method of the initial module comprises the following steps:
obtaining a sample needing tracing, identifying a sample format, matching a corresponding tracing scheme from the steganographic library according to the identified sample format, and marking the obtained tracing scheme as an initial tracing scheme.
Further, the working method of the analysis module comprises the following steps:
and matching the corresponding identification sets from the steganography library according to the received initial tracing scheme, calculating the matching values of the initial tracing schemes according to the feature identification items in the identification sets, and sequencing the obtained matching values from small to large to obtain a first sequence.
Further, the method for calculating the matching value of each initial tracing scheme according to the feature identification items in the identification set comprises the following steps:
marking the characteristic identification items in the identification set as i, wherein i =1, 2, … …, n is a positive integer; performing characteristic identification on the sample according to each characteristic identification item to obtain a corresponding characteristic value, marking the obtained characteristic value as TZi, obtaining a standard value corresponding to each characteristic identification item, marking the obtained standard value as BZi, obtaining a weight coefficient corresponding to each characteristic identification item, marking the obtained weight coefficient as beta i, and obtaining the weight coefficient according to a formula
Figure SMS_1
And calculating a corresponding matching value, wherein alpha i is a conversion coefficient corresponding to the corresponding feature identification item, and lambda is a correction factor.
Further, the method for acquiring the steganographic scheme in the steganographic library comprises the following steps:
acquiring a steganographic scheme in use by an enterprise in real time, and sending the obtained steganographic scheme to a steganographic library for storage; the method comprises the steps of retrieving a steganographic scheme from the Internet based on the steganographic scheme stored in a steganographic library to obtain a scheme to be selected, evaluating the obtained scheme to be selected, marking the qualified scheme to be selected as a recommended scheme, and sending the recommended scheme to a corresponding manager for selection.
Further, the method for evaluating the obtained candidate scheme comprises the following steps:
the method comprises the steps of obtaining an application range corresponding to each scheme to be selected, conducting matching analysis on the obtained application range and hidden requirements of enterprises, obtaining an application value corresponding to each scheme to be selected, obtaining a use share and a hidden mode corresponding to the scheme to be selected, evaluating the obtained use share and the hidden mode, obtaining a corresponding safety value and a rewriting difficulty value, calculating a corresponding recommended value according to the application value, the safety value and the rewriting difficulty value, and listing the scheme to be selected with the recommended value larger than a threshold value X1 as the scheme to be selected qualified in evaluation.
Further, the method of calculating a corresponding recommended value according to the application value, the security value, and the rewriting difficulty value includes:
marking the candidate scheme as j, wherein j =1, 2, … …, m is a positive integer; marking the obtained application value as YZj, the obtained safety value as AQj, the obtained rewriting difficulty value as GXj, and calculating the corresponding recommended value according to a formula QMj = b1 × YZj + b2 × AQj-b3 × GXj, wherein b1, b2 and b3 are all proportional coefficients and have the value range of 0 & lt b1 & lt 1,0 & lt b2 & lt 1, and 0 & lt b3 & lt 1.
Furthermore, the steganography library, the initial module, the analysis module and the source tracing module are all in communication connection with the server.
Compared with the prior art, the invention has the beneficial effects that:
through the mutual cooperation of the steganography library, the initial module, the analysis module and the tracing module, the intelligent tracing of various steganography technologies is realized, enterprises can select the corresponding steganography technology in a targeted manner according to the required confidentiality level to carry out safe communication conveniently, more steganography data samples with weak confidentiality level are used for shielding, and the probability of discovering the steganography data samples with high confidentiality level is reduced.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic block diagram of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the following embodiments, and it should be understood that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, a digital Tibetan traceability system based on steganography technology includes a steganography library, an initial module, an analysis module, a traceability module and a server;
the steganographic library, the initial module, the analysis module and the source tracing module are all in communication connection with the server.
The steganographic library is used for storing applied steganographic schemes, comprises a first storage node, a second storage node and a third storage node, acquires the traceability schemes corresponding to the steganographic schemes, stores the steganographic schemes into the first storage node, and stores the traceability schemes into the second storage node; setting a feature identification item corresponding to each tracing scheme, wherein the feature identification item is used for identifying whether the tracing scheme is applied to the sample, for example, for an image sample, a final value of a blue component of an image pixel at a certain position is identified, data of each feature identification item corresponding to different steganography schemes are different, the feature identification item is specifically set in a manual mode, and a weight and a standard value of each feature identification item are set, the weight is set according to the difference and the feature difference of each tracing scheme, if the other tracing schemes of a certain feature identification item do not exist, the weight of the feature identification item is high, and the standard value is set according to historical data through statistical analysis, namely, the data of the feature identification item is generally located near which numerical value, namely the standard value, and is also set in a manual mode; and integrating the feature identification items, the weights and the standard values corresponding to the same tracing scheme into an identification set, storing the identification set into a third storage node, and marking corresponding associated labels on the corresponding steganography scheme, the tracing scheme and the identification set so as to facilitate subsequent identification and matching.
The stored steganographic scheme is applied by the enterprise or the user, namely the stored steganographic scheme is from the existing or the user adaptation and original. In summary, the present invention is mainly directed to enterprises or users applying multiple steganographic schemes simultaneously; a user adopts various steganography schemes mainly for improving the security and avoiding the complete information security failure caused by the leakage of one steganography technology.
The method for acquiring the steganographic scheme in the steganographic library comprises the following steps:
acquiring a steganographic scheme in use by an enterprise in real time, and sending the obtained steganographic scheme to a steganographic library for storage; performing steganographic scheme retrieval from the Internet based on the steganographic scheme stored in the steganographic library to obtain a scheme to be selected, evaluating the obtained scheme to be selected, marking the qualified scheme to be selected as a recommended scheme, and sending the recommended scheme to a corresponding manager for selection; if the selected application is selected, the selected application is still applied and then sent to the steganographic library for storage.
And (3) performing hidden writing scheme retrieval from the Internet based on the hidden writing scheme stored in the hidden writing library, namely retrieving schemes with different implementation modes from the hidden writing scheme in the hidden writing library in the Internet by utilizing the existing retrieval technology, and marking the schemes as candidate schemes.
The method for evaluating the obtained candidate scheme comprises the following steps:
acquiring an application range corresponding to each scheme to be selected, namely being suitable for hiding of which kinds of data, performing matching analysis on the acquired application range and the hiding requirements of enterprises to acquire an application value corresponding to each scheme to be selected, and marking the scheme to be selected as j, wherein j =1, 2, … …, m, and m is a positive integer; marking the obtained application value as YZj, and acquiring the value to be obtainedSelecting a use share and a hiding mode corresponding to the scheme, wherein the use share is estimated according to the known degree of the use share in the field of steganography, and the hiding mode is the steganography mode and is obtained by evaluating through the prior art; evaluating the obtained use share and the hiding mode to obtain a corresponding safety value and a rewriting difficulty value, wherein the rewriting difficulty value refers to the adaptation of the scheme to be selected and the evaluation is carried out according to the rewriting mode preset by an enterprise; specifically, a corresponding safety evaluation model is established based on a CNN network or a DNN network, a corresponding training set is established in a manual mode for training, and a safety evaluation model after successful training is used for evaluation to obtain a corresponding safety value and a rewriting difficulty value; marking the obtained safety value as AQj, marking the obtained rewriting difficulty value as GXj, and calculating a corresponding recommended value according to a formula QMj = b1 × YZj + b2 × AQj-b3 × GXj, wherein b1, b2 and b3 are all proportional coefficients and have a value range of AQj and b2 × AQj-b3 × GXj
Figure SMS_2
(ii) a And listing the candidate schemes with the recommended values larger than the threshold value X1 as candidate schemes qualified in evaluation.
The obtained application range is matched and analyzed with the hidden requirements of the enterprise, namely, application value setting is carried out according to whether the applications meeting the enterprise requirements can be carried out or how many applications meeting the enterprise requirements can be carried out, a corresponding requirement evaluation model is specifically established based on a CNN network or a DNN network, a corresponding training set is established in a manual mode for training, and the requirement evaluation model after the training is successful is used for evaluation to obtain the corresponding application value.
The initial module is used for selecting an initial tracing scheme according to a sample, wherein the sample refers to data or articles for hidden communication according to a steganographic scheme, such as audio, pictures, texts and the like; the specific method comprises the following steps:
obtaining a sample needing tracing, and identifying the format of the sample, namely the format of a picture, an audio format or other formats; and matching a corresponding tracing scheme from the steganography library according to the identified sample format, marking the obtained tracing scheme as an initial tracing scheme, and sending the obtained initial tracing scheme number and the sample to an analysis module. Namely, the preliminary screening is carried out on the sample format aimed by each tracing scheme.
The analysis module is used for determining a corresponding tracing scheme, and the specific method comprises the following steps:
matching the corresponding identification set from the steganography library according to the received initial tracing scheme, calculating the matching value of each initial tracing scheme according to the feature identification items in the identification set, sequencing the obtained matching values from small to large to obtain a first sequence, and sending the first sequence to the tracing module.
The method for calculating the matching value of each initial tracing scheme according to the feature identification items in the identification set comprises the following steps:
marking the characteristic identification items in the identification set as i, wherein i =1, 2, … …, n is a positive integer; carrying out feature recognition on the sample according to each feature recognition item to obtain a corresponding feature value, and carrying out corresponding recognition and conversion based on the existing tracing method, namely for non-numerical recognition data, setting a corresponding conversion scheme manually based on the existing numerical conversion method to carry out intelligent conversion, wherein the unit of the conversion scheme is the same as that of a corresponding standard value; marking the obtained characteristic value as TZi, obtaining a standard value corresponding to each characteristic identification item, marking the obtained standard value as BZi, obtaining a weight coefficient corresponding to each characteristic identification item, marking the obtained weight coefficient as beta i, and obtaining the weight coefficient of the characteristic identification item according to a formula
Figure SMS_3
Calculating corresponding matching values, wherein alpha i is a conversion coefficient corresponding to the corresponding feature identification item and is used for unit conversion, and the conversion coefficient is 1 when the conversion is not needed; and lambda is a correction factor and is dynamically adjusted mainly according to the traceability feedback of the traceability module.
The tracing module is used for tracing the source of the sample, acquiring a first sequence, tracing the source of the sample by matching a corresponding tracing scheme from the steganographic library according to the first sequence, acquiring corresponding hidden data, and adjusting a correction factor lambda corresponding to the corresponding tracing scheme according to the tracing result.
The correction factor lambda corresponding to the tracing scheme is adjusted according to the tracing result, if tracing is performed according to the first sequence ordering, the first tracing is successful, the surface matching is reasonable, no correction is needed, when tracing failure occurs, the next tracing scheme is selected according to the ordering for tracing, the tracing scheme corresponding to the tracing failure and the tracing scheme corresponding to the tracing success need to be adjusted when similar samples occur, a corresponding correction model can be specifically established based on a CNN network or a DNN network, a corresponding training set is set in a manual mode for training, the correction factor lambda is adjusted according to the tracing result through the correction model after the training is successful, and the neural network is common knowledge in the field, so the specific establishment and training process is not described in detail.
The above formulas are all calculated by removing dimensions and taking numerical values thereof, the formula is a formula which is obtained by acquiring a large amount of data and performing software simulation to obtain the closest real situation, and the preset parameters and the preset threshold value in the formula are set by the technical personnel in the field according to the actual situation or obtained by simulating a large amount of data.
Although the present invention has been described in detail with reference to the preferred embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the spirit and scope of the present invention.

Claims (8)

1. A digital Tibetan traceability system based on a steganography technology is characterized by comprising a steganography library, an initial module, an analysis module, a traceability module and a server;
the steganographic library is used for storing applied steganographic schemes, comprises a first storage node, a second storage node and a third storage node, acquires the traceability schemes corresponding to the steganographic schemes, stores the steganographic schemes into the first storage node, and stores the traceability schemes into the second storage node; setting a feature identification item corresponding to each tracing scheme, integrating the feature identification item, the weight and the standard value corresponding to the same tracing scheme into an identification set, storing the identification set into a third storage node, and marking corresponding associated labels on the corresponding steganography scheme, the tracing scheme and the identification set;
the initial module is used for selecting an initial traceability scheme according to the sample and sending the obtained initial traceability scheme number and the sample to the analysis module;
the analysis module is used for determining a corresponding tracing scheme, obtaining a first sequence and sending the first sequence to the tracing module;
the tracing module is used for tracing the source of the sample, acquiring a first sequence, tracing the source of the sample by matching a corresponding tracing scheme from the steganographic library according to the first sequence, acquiring corresponding hidden data, and adjusting a correction factor lambda corresponding to the corresponding tracing scheme according to the tracing result.
2. The digital Tibetan traceability system based on steganography technology as defined in claim 1, wherein the working method of the initial module comprises:
obtaining a sample needing tracing, identifying a sample format, matching a corresponding tracing scheme from the steganography library according to the identified sample format, and marking the obtained tracing scheme as an initial tracing scheme.
3. The digital Tibetan traceability system based on steganography technology as claimed in claim 1, characterized in that the working method of the analysis module comprises:
and matching the corresponding identification sets from the steganographic library according to the received initial tracing scheme, calculating the matching values of the initial tracing schemes according to the feature identification items in the identification sets, and sequencing the obtained matching values from small to large to obtain a first sequence.
4. The digital Tibetan traceability system based on steganography technology, wherein the method for calculating the matching value of each initial traceability scheme according to the feature identification items in the identification set comprises the following steps:
marking the characteristic identification items in the identification set as i, wherein i =1, 2, … …, n is a positive integer; carrying out feature recognition on the sample according to each feature recognition item to obtain corresponding featuresAnd (4) characterizing the value, marking the obtained characteristic value as TZi, obtaining a standard value corresponding to each characteristic identification item, marking the obtained standard value as BZi, obtaining a weight coefficient corresponding to each characteristic identification item, marking the obtained weight coefficient as beta i, and obtaining the weight coefficient corresponding to each characteristic identification item according to a formula
Figure QLYQS_1
And calculating a corresponding matching value PW, wherein alpha i is a conversion coefficient corresponding to the corresponding feature identification item, and lambda is a correction factor.
5. The digital Tibetan traceability system based on the steganographic technique of claim 1, wherein the method for acquiring the steganographic scheme in the steganographic library comprises the following steps:
acquiring a steganographic scheme in use by an enterprise in real time, and sending the obtained steganographic scheme to a steganographic library for storage; and performing steganography scheme retrieval from the Internet based on the steganography scheme stored in the steganography library to obtain a scheme to be selected, evaluating the obtained scheme to be selected, marking the scheme to be selected qualified through evaluation as a recommendation scheme, and sending the recommendation scheme to a corresponding manager for selection.
6. The digital Tibetan traceability system based on steganography technology as claimed in claim 5, wherein the method for evaluating the obtained candidate schemes comprises:
the method comprises the steps of obtaining an application range corresponding to each scheme to be selected, conducting matching analysis on the obtained application range and hidden requirements of enterprises, obtaining an application value corresponding to each scheme to be selected, obtaining a use share and a hidden mode corresponding to the scheme to be selected, evaluating the obtained use share and the hidden mode, obtaining a corresponding safety value and a rewriting difficulty value, calculating a corresponding recommended value according to the application value, the safety value and the rewriting difficulty value, and listing the scheme to be selected with the recommended value larger than a threshold value X1 as the scheme to be selected qualified in evaluation.
7. The digital Tibetan traceability system based on steganography technology as defined in claim 6, wherein the method for calculating the corresponding recommended value according to the application value, the security value and the rewriting difficulty value comprises:
marking the candidate scheme as j, wherein j =1, 2, … …, m is a positive integer; the obtained application value is marked as YZj, the obtained safety value is marked as AQj, the obtained rewriting difficulty value is marked as GXj, and the corresponding recommended value QMj is calculated according to the formula QMj = b1 × YZj + b2 × AQj-b3 × GXj, wherein b1, b2 and b3 are all proportional coefficients and have the value range of 0 & lt b1 & lt 1,0 & lt b2 & lt 1,0 & lt b3 & lt 1.
8. The digital Tibetan traceability system based on steganography technology as claimed in claim 1, wherein the steganography library, the initial module, the analysis module and the traceability module are all in communication connection with the server.
CN202310166241.2A 2023-02-27 2023-02-27 Digital collection traceability system based on steganography technology Active CN115883260B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310166241.2A CN115883260B (en) 2023-02-27 2023-02-27 Digital collection traceability system based on steganography technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310166241.2A CN115883260B (en) 2023-02-27 2023-02-27 Digital collection traceability system based on steganography technology

Publications (2)

Publication Number Publication Date
CN115883260A true CN115883260A (en) 2023-03-31
CN115883260B CN115883260B (en) 2023-05-16

Family

ID=85761636

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310166241.2A Active CN115883260B (en) 2023-02-27 2023-02-27 Digital collection traceability system based on steganography technology

Country Status (1)

Country Link
CN (1) CN115883260B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150200940A1 (en) * 2014-01-15 2015-07-16 Cisco Technology, Inc. Tracking and tracing information theft from information systems
CN106203492A (en) * 2016-06-30 2016-12-07 中国科学院计算技术研究所 The system and method that a kind of image latent writing is analyzed
CN110096897A (en) * 2019-04-15 2019-08-06 山东三未信安信息科技有限公司 Data desensitization method and device, leaking data source localization method and device
CN110691080A (en) * 2019-09-25 2020-01-14 光通天下网络科技股份有限公司 Automatic tracing method, device, equipment and medium
CA3165583A1 (en) * 2018-12-21 2020-06-25 10353744 Canada Ltd. Backtraceable invisible watermark adding method and apparatus thereof
US20210136117A1 (en) * 2019-11-04 2021-05-06 ColorTokens, Inc. Method and system for providing a complete traceability of changes incurred in a security policy
WO2021088719A1 (en) * 2019-11-07 2021-05-14 四川农链数科科技有限公司 Decentralized item anti-counterfeiting identification and source-tracing method and system
CN113497786A (en) * 2020-03-20 2021-10-12 腾讯科技(深圳)有限公司 Evidence obtaining and tracing method and device and storage medium
CN113989097A (en) * 2021-12-30 2022-01-28 南京中孚信息技术有限公司 Information steganography model training method, information steganography device and storage medium
CN114006899A (en) * 2021-11-03 2022-02-01 南京中孚信息技术有限公司 Multi-receiving-unit sending mechanism in paper document sending information hiding system
WO2022021697A1 (en) * 2020-07-31 2022-02-03 中诚区块链研究院(南京)有限公司 Multi-field traceability system
CN115208643A (en) * 2022-06-28 2022-10-18 广西电网有限责任公司电力科学研究院 Tracing method and device based on WEB dynamic defense

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150200940A1 (en) * 2014-01-15 2015-07-16 Cisco Technology, Inc. Tracking and tracing information theft from information systems
CN106203492A (en) * 2016-06-30 2016-12-07 中国科学院计算技术研究所 The system and method that a kind of image latent writing is analyzed
CA3165583A1 (en) * 2018-12-21 2020-06-25 10353744 Canada Ltd. Backtraceable invisible watermark adding method and apparatus thereof
CN110096897A (en) * 2019-04-15 2019-08-06 山东三未信安信息科技有限公司 Data desensitization method and device, leaking data source localization method and device
CN110691080A (en) * 2019-09-25 2020-01-14 光通天下网络科技股份有限公司 Automatic tracing method, device, equipment and medium
US20210136117A1 (en) * 2019-11-04 2021-05-06 ColorTokens, Inc. Method and system for providing a complete traceability of changes incurred in a security policy
WO2021088719A1 (en) * 2019-11-07 2021-05-14 四川农链数科科技有限公司 Decentralized item anti-counterfeiting identification and source-tracing method and system
CN113497786A (en) * 2020-03-20 2021-10-12 腾讯科技(深圳)有限公司 Evidence obtaining and tracing method and device and storage medium
WO2022021697A1 (en) * 2020-07-31 2022-02-03 中诚区块链研究院(南京)有限公司 Multi-field traceability system
CN114006899A (en) * 2021-11-03 2022-02-01 南京中孚信息技术有限公司 Multi-receiving-unit sending mechanism in paper document sending information hiding system
CN113989097A (en) * 2021-12-30 2022-01-28 南京中孚信息技术有限公司 Information steganography model training method, information steganography device and storage medium
CN115208643A (en) * 2022-06-28 2022-10-18 广西电网有限责任公司电力科学研究院 Tracing method and device based on WEB dynamic defense

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
乔蕊;曹琰;王清贤;: "基于联盟链的物联网动态数据溯源机制", 软件学报 *
刘晓义;王述洋;: "数字隐写技术及发展趋势", 中国安全科学学报 *
樊小龙;: "计算机网络追踪溯源技术", 科技风 *

Also Published As

Publication number Publication date
CN115883260B (en) 2023-05-16

Similar Documents

Publication Publication Date Title
Jia et al. Saliency-based deep convolutional neural network for no-reference image quality assessment
WO2020000879A1 (en) Image recognition method and apparatus
CN110334585A (en) Table recognition method, apparatus, computer equipment and storage medium
CN106777177A (en) Search method and device
CN107330731B (en) Method and device for identifying click abnormity of advertisement space
CN106685916A (en) Electronic meeting intelligence
EP2164009A2 (en) Architecture for mixed media reality retrieval of locations and registration of images
US11948187B2 (en) Artificial intelligence based digital leasing assistant
CN104866553A (en) Method, system, and computer program for identification and sharing of digital images with face signatures
CN106407078B (en) Client performance monitoring device and method based on information exchange
CN110738323B (en) Method and device for establishing machine learning model based on data sharing
CN112686258A (en) Physical examination report information structuring method and device, readable storage medium and terminal
CN110990617B (en) Picture marking method, device, equipment and storage medium
Bertini et al. Are social networks watermarking us or are we (unawarely) watermarking ourself?
CN105447148B (en) A kind of Cookie mark correlating method and device
CN117150555B (en) Shared data privacy processing method combining artificial intelligence
Ramesh et al. Facial recognition as a tool to identify Roman emperors: towards a new methodology
CN115883260A (en) Digital Tibetan traceability system based on steganography technology
CN111309848A (en) Generation method and system of gradient lifting tree model
CN111143688B (en) Evaluation method and system based on mobile news client
CN114821219A (en) Unsupervised multi-source field self-adaption method based on deep joint semantics
CN114297426A (en) Method, device, equipment and storage medium for identifying abnormal loan behaviors of enterprise
CN113487389A (en) Information recommendation method and device
CN115587200A (en) Content classification method and device based on intelligent photo album housekeeper system
CN115269901A (en) Method, device and equipment for generating extended image

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant