CN117955658A - Method and system for realizing electronic signature authentication and anti-counterfeiting - Google Patents

Method and system for realizing electronic signature authentication and anti-counterfeiting Download PDF

Info

Publication number
CN117955658A
CN117955658A CN202410187784.7A CN202410187784A CN117955658A CN 117955658 A CN117955658 A CN 117955658A CN 202410187784 A CN202410187784 A CN 202410187784A CN 117955658 A CN117955658 A CN 117955658A
Authority
CN
China
Prior art keywords
electronic signature
watermark
information
digital
embedded
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410187784.7A
Other languages
Chinese (zh)
Inventor
王艳红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Software Group Co Ltd
Original Assignee
Inspur Software Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Software Group Co Ltd filed Critical Inspur Software Group Co Ltd
Priority to CN202410187784.7A priority Critical patent/CN117955658A/en
Publication of CN117955658A publication Critical patent/CN117955658A/en
Pending legal-status Critical Current

Links

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a method and a system for realizing electronic signature authentication and anti-counterfeiting, belonging to the technical field of electronic signature anti-counterfeiting, wherein the method adds fingerprints and related information into an electronic signature in the form of digital watermarks, and the realization of the method comprises the following steps: the electronic signature is embedded with a digital watermark: firstly, carrying out handwriting digital signature on a client and obtaining fingerprints; then, digital processing is carried out on the electronic signature at the server end, the acquired fingerprint and other related information are used as digital watermarks to be embedded into the electronic signature, and the electronic signature carrying the digital watermarks is generated; finally, the digitally processed electronic signature is displayed back at the client; digital watermark is extracted from the electronic signature: watermark information is extracted from the propagated electronic signature through a server, and authentication is performed on the information and the fingerprint. The invention can ensure the authenticity and the integrity of the digital signature, ensure the active traceability of the electronic signature and prevent the occurrence of events of signing, tampering or embezzlement of the electronic signature.

Description

Method and system for realizing electronic signature authentication and anti-counterfeiting
Technical Field
The invention relates to the technical field of electronic signature anti-counterfeiting, in particular to a method and a system for realizing electronic signature authentication and anti-counterfeiting.
Background
With the rapid development of 5G technology and the internet, physical distance will not cause any obstacle to communication among people, and people increasingly rely on processing daily transactions and works across space through a network, wherein electronic signature instead of paper signature has become a common way.
Electronic signatures refer to a way to convert a signature on a paper document into electronic form. Currently, electronic signatures have been applied to various industries. For example, a holiday security notification issued by a school holiday needs to be signed and confirmed by parents of students; bank system account opening behavior and the like need to be signed and confirmed by the user himself; or subscription of an electronic contract, etc. However, with the popularization of electronic signatures, security problems (signing, theft, unauthorized use, etc.) of electronic signatures are involved.
To ensure the security, efficiency, and legal effectiveness of electronic signatures, electronic signatures often ensure the authenticity and integrity of the signature through the use of cryptographic techniques and digital certificates. How to make the electronic signature more convenient to use while ensuring the authenticity and the integrity is a problem that needs to be broken through at present.
Disclosure of Invention
The technical task of the invention is to provide a method and a system for realizing electronic signature authentication and anti-counterfeiting, which can ensure the authenticity and the integrity of a digital signature, so that file transmission and transaction are more convenient and reliable in a digital environment; the electronic signature is ensured to be active and traceable, and the occurrence of events of signing, tampering or embezzlement of the electronic signature is avoided.
The technical scheme adopted for solving the technical problems is as follows:
a method for realizing electronic signature authentication and anti-counterfeiting adds fingerprint and related information into an electronic signature in the form of digital watermark, and the realization of the method comprises the following steps:
The electronic signature is embedded with a digital watermark: firstly, carrying out handwriting digital signature on a client (a terminal or a browser) and obtaining fingerprints; then, digital processing is carried out on the electronic signature at the server end, the acquired fingerprint and other related information are used as digital watermarks to be embedded into the electronic signature, and the electronic signature carrying the digital watermarks is generated; finally, the digitally processed electronic signature is displayed back at the client (terminal or browser);
Digital watermark is extracted from the electronic signature: watermark information is extracted from the propagated electronic signature through a server, and authentication is performed on the information and the fingerprint.
The authenticity and the integrity of the digital signature are ensured by the mode of superposing fingerprints by the digital watermark, so that file transmission and transaction are more convenient and reliable in a digital environment. Digital watermarking is a technique for embedding hidden information in digital media (e.g., images, audio, video, etc.). Unlike traditional paper watermarks, digital watermarks are invisible and difficult to detect, and hidden information can be extracted only by a specific decoding method. Digital watermarking has two main roles:
Authentication function: mainly for confirming the authenticity and integrity of digital content. By embedding watermark information in digital media, ownership and origin of the content can be verified and piracy and tampering prevented.
Tracking function: for tracking and tracing the spread and usage of digital content.
The method can collect electronic handwriting signature and fingerprint information at the terminal, and the data of the electronic handwriting signature and the fingerprint information are transmitted to the rear end for processing; the fingerprint information and other needed identification data such as unique identification codes, time stamps, user information and the like are encrypted, so that information leakage is prevented; the encrypted fingerprint and other data information are used as an electronic watermark to be embedded into the electronic signature, so that the electronic signature has uniqueness and safety, the validity of the electronic signature is ensured, and the illegal use of the electronic signature is prevented. And watermark extraction, watermark analysis and data decryption are carried out on the propagated electronic signature picture, so that original fingerprints and related data in the hidden electronic signature are obtained, and the source, the effectiveness and the authenticity of the electronic signature are verified through comparison and identification of the data, so that illegal utilization of the electronic signature is effectively avoided.
Preferably, the relevant information comprises a unique identifier or tracking code, a time stamp.
Further, the method comprises the following steps:
collecting an electronic signature and a fingerprint: acquiring electronic signature data and fingerprint data and transmitting the electronic signature data and the fingerprint data to a back-end server;
The electronic signature is embedded with a digital watermark: selecting a proper embedding algorithm to embed information;
Extracting information digital watermark information: information is extracted using corresponding extraction algorithms and techniques, the extraction algorithms correspond to the embedding algorithms, and authentication is performed by comparing differences between the original media file and the extracted watermark information.
Preferably, the embedding algorithm includes a frequency domain method in which embedded information (unique identifier or tracking code, time stamp, etc.) is added to frequency domain coefficients using fourier transform, and a spatial domain method; in the spatial domain approach, information is embedded by fine-tuning the sample value of pixels or audio of an image, which may be a sequence of numbers, text, images, or other forms of data.
Further, the specific workflow of the method is as follows:
s1, carrying out electronic signature and fingerprint collection on a client, and sending electronic signature data and fingerprint data to a server;
s2, the server receives the electronic signature data and the fingerprint data, selects an embedding algorithm and an embedding technology, and embeds the fingerprint and related information into the electronic signature data in the form of a digital watermark;
S3, the electronic signature picture embedded with the watermark is displayed back at the client;
s4, the electronic signature picture of the client may be transmitted and used in an unauthorized downloading, screenshot or other improper forms; the acquired and transmitted electronic signature picture is transmitted to a server side for digital watermark extraction to verify the reality and integrity of the electronic signature.
Further, the electronic signature is embedded with a digital watermark, an original electronic signature is obtained, and a hidden position is selected to be embedded with fingerprints and other related watermark information in an intermediate frequency domain of the sub-image block after DCT conversion by adopting an additive embedding mode;
The electronic signature extracts the digital watermark, verifies the validity of the electronic signature, and performs digital watermark extraction verification on the propagated electronic signature.
Further, the implementation mode of embedding the digital watermark into the electronic signature is as follows:
1.1 Block processing: setting a host image as P, and partitioning the host image into K sub-blocks of 8 x 8;
1.2 Watermark encoding process: setting the watermark image as W, encrypting the watermark and controlling the distribution of watermark energy;
1.3 DCT transform): DCT transformation is carried out in each sub-block, the DCT coefficient is scanned by utilizing zig-zag, and the sequence of the k sub-image block is Zk (i), i=0, 1,2, … and 63; the DCT transform formula is as follows:
1.4 Watermark embedding algorithm): selecting specific coefficients x (m) and x (n) in the middle and low frequency bands of each sub-block according to the zig-zag ordering, embedding watermark information images W at coefficient coordinates (a, b) and (c, d), and taking the watermark information images W as secret keys 3; similarly, embedding a complementary watermark picture W', and taking the embedded position as a key 4; the watermark embedding method is as follows:
Wherein D k (i) is the sequence after the watermark information is superimposed, S K is the kth bit of the watermark for selecting the DCT coefficient sequence in which the watermark information needs to be embedded, A watermark image adjustment factor;
1.5 IDCT transform: each sub-image block is subjected to two-dimensional DCT inverse transformation, and an IDCT transformation formula is as follows:
1.6 Sub-block merging): merging each sub-block into a watermark-embedded image P';
the specific implementation mode of the digital watermark extraction by the electronic signature is as follows:
2.1 Block processing: the watermark embedded image P' is divided into K sub-blocks of 8 x 8;
2.2 DCT transform): DCT transformation is carried out in each sub-block, and the calculation formula is as follows:
2.3 Watermark extraction algorithm): finding an embedded area according to an embedding algorithm, comparing the values of the binary array and the ternary array according to a basic rule when the watermark is embedded, and then determining a watermark information value;
2.4 Watermark decoding): and performing decoding operation of decrypting the information value comprising the preliminary watermark to obtain watermark information W.
The digital blind watermark based on DTC frequency domain superposition can effectively resist watermark attack, such as smearing, shearing, scaling, rotating, compressing, noise adding, filtering and the like, and can effectively ensure the authenticity and accuracy of the electronic signature.
The invention also claims a device for realizing the authentication and anti-counterfeiting of the electronic signature, which comprises:
The electronic signature embedding digital watermark module is used for performing data operation on the acquired original electronic signature data, and embedding fingerprints, unique codes and other needed information into the electronic signature as hidden digital watermarks;
And the electronic signature extraction watermark module is used for extracting the digital watermark in the electronic signature by using an extraction algorithm mode consistent with the embedding time, and performing subsequent operations on the electronic signature after the extraction, including authentication and verification on whether the electronic signature is complete and correct.
The invention also claims a device for realizing the authentication and anti-counterfeiting of the electronic signature, which comprises: at least one memory and at least one processor;
The at least one memory for storing a machine readable program;
The at least one processor is configured to invoke the machine-readable program to implement the method described above.
The invention also claims a computer readable medium having stored thereon computer instructions which, when executed by a processor, cause the processor to perform the above-described method.
Compared with the prior art, the method and the system for realizing the authentication and the anti-counterfeiting of the electronic signature have the following beneficial effects:
1. the secrecy is stronger, and the visibility of the original image is not influenced;
2. The attack resistance is stronger;
3. The reality and the accuracy of the electronic signature are effectively protected.
Drawings
Fig. 1 is a diagram of a digital watermark embedding process provided by an embodiment of the present invention;
Fig. 2 is a diagram of a digital watermark extraction process according to an embodiment of the present invention.
Detailed Description
The invention will be further illustrated with reference to specific examples.
The embodiment of the invention provides a method for realizing authentication and anti-counterfeiting of an electronic signature, which adds fingerprints and related information into the electronic signature in the form of digital watermarks, and the method comprises the following steps:
The electronic signature is embedded with a digital watermark: firstly, carrying out handwriting digital signature on a client (a terminal or a browser) and obtaining fingerprints; then digital processing is carried out on the electronic signature at the server end, the acquired fingerprint and other related information (unique identifier or tracking code, timestamp and the like) are used as digital watermarks to be embedded into the electronic signature, and the electronic signature carrying the digital watermarks is generated; finally, the digitally processed electronic signature is displayed back at the client (terminal or browser);
Digital watermark is extracted from the electronic signature: watermark information is extracted from the propagated electronic signature through a server, and authentication is performed on the information and the fingerprint.
The method for realizing the authentication and anti-counterfeiting of the electronic signature based on the fingerprint, wherein the process of embedding the digital watermark into the electronic signature and extracting the digital watermark from the electronic signature involves the following key steps:
1. Collecting an electronic signature and a fingerprint: acquiring electronic signature data and fingerprint data and transmitting the electronic signature data and the fingerprint data to a back-end server;
2. The electronic signature is embedded with a digital watermark: selecting a proper embedding algorithm to embed information; common embedding algorithms include frequency domain methods, in which fourier transforms can be used to add embedded information (unique identifiers or tracking codes, time stamps, etc.) to frequency domain coefficients, and spatial domain methods; in the spatial domain approach, information may be embedded by fine-tuning the sample values of pixels or audio of an image, which may be a sequence of numbers, text, images, or other forms of data.
3. Extracting information digital watermark information: information is extracted using corresponding extraction algorithms and techniques, the extraction algorithms correspond to the embedding algorithms, and authentication is performed by comparing differences between the original media file and the extracted watermark information.
The specific working procedure is as follows:
(1) Electronic signature and fingerprint collection are carried out on the client side, and electronic signature data and fingerprint data are sent to the server side;
(2) The server receives the electronic signature data and the fingerprint data, selects an embedding algorithm and an embedding technology, and embeds the fingerprint and related information (a unique identifier or a tracking code, a timestamp and the like) into the electronic signature data in the form of a digital watermark;
(3) The electronic signature picture embedded with the watermark is displayed back at the client;
(4) The electronic signature pictures of the client may be transmitted and used in unauthorized downloading, screenshot or other improper forms;
(5) The acquired and transmitted electronic signature picture is transmitted to a server side for digital watermark extraction to verify the reality and integrity of the electronic signature.
By embedding specific hidden information in the electronic signature, the authentication of the electronic signature is realized by utilizing digital processing and cryptography technology, the authenticity, the integrity and the legal use of the electronic signature content are ensured, and the electronic signature has important application value.
The implementation of the method is further described in detail below with specific algorithms in conjunction with the accompanying drawings:
as shown in fig. 1 and 2, the method for implementing electronic signature authentication based on fingerprints mainly includes: embedding digital watermark of electronic signature carrying fingerprint and other information, and extracting digital watermark of electronic signature.
Wherein the embedding of the digital watermark of the electronic signature is as follows:
And acquiring an original image of the electronic signature, and selecting a secret position to embed fingerprints and other related watermark information in an intermediate frequency domain of the sub-image block after DCT conversion by adopting an additive embedding mode. The specific operation steps are as follows:
1.1 Block processing: setting a host image as P, and partitioning the host image into K sub-blocks of 8 x 8;
1.2 Watermark encoding process: setting the watermark image as W, encrypting the watermark and controlling the distribution of watermark energy;
1.3 DCT transform): DCT transformation is carried out in each sub-block, the DCT coefficient is scanned by utilizing zig-zag, and the sequence of the k sub-image block is Zk (i), i=0, 1,2, … and 63; the DCT transform formula is as follows:
1.4 Watermark embedding algorithm): selecting specific coefficients x (m) and x (n) in the middle and low frequency bands of each sub-block according to the zig-zag ordering, embedding watermark information images W at coefficient coordinates (a, b) and (c, d), and taking the watermark information images W as secret keys 3; similarly, embedding a complementary watermark picture W', and taking the embedded position as a key 4; the watermark embedding method is as follows:
Wherein D k (i) is the sequence after the watermark information is superimposed, S K is the kth bit of the watermark for selecting the DCT coefficient sequence in which the watermark information needs to be embedded, A watermark image adjustment factor;
1.5 IDCT transform: each sub-image block is subjected to two-dimensional DCT inverse transformation, and an IDCT transformation formula is as follows:
1.6 Sub-block merging): merging each sub-block into a watermark-embedded image P';
The electronic signature embedded with the digital watermark is obtained according to the calculation. In order to verify the validity of the electronic signature, the propagated electronic signature needs to be subjected to digital watermark extraction verification. The electronic signature extraction and embedding process are opposite, and the steps are as follows:
2.1 Block processing: the watermark embedded image P' is divided into K sub-blocks of 8 x 8;
2.2 DCT transform): DCT transformation is carried out in each sub-block, and the calculation formula is as follows:
2.3 Watermark extraction algorithm): finding an embedded area according to an embedding algorithm, comparing the values of the binary array and the ternary array according to a basic rule when the watermark is embedded, and then determining a watermark information value;
2.4 Watermark decoding): and performing decoding operation of decrypting the information value comprising the preliminary watermark to obtain watermark information W.
The digital blind watermark based on DTC frequency domain superposition can effectively resist watermark attack, such as smearing, shearing, scaling, rotating, compressing, noise adding, filtering and the like, and can effectively ensure the authenticity and accuracy of the electronic signature.
The method ensures the authenticity and the integrity of the digital signature by superposing the fingerprints by the digital watermark, so that file transmission and transaction are more convenient and reliable in a digital environment.
The method can collect electronic handwriting signature and fingerprint information at the terminal, and the data of the electronic handwriting signature and the fingerprint information are transmitted to the rear end for processing; the fingerprint information and other needed identification data such as unique identification codes, time stamps, user information and the like are encrypted, so that information leakage is prevented; the encrypted fingerprint and other data information are used as an electronic watermark to be embedded into the electronic signature, so that the electronic signature has uniqueness and safety, the validity of the electronic signature is ensured, and the illegal use of the electronic signature is prevented. And watermark extraction, watermark analysis and data decryption are carried out on the propagated electronic signature picture, so that original fingerprints and related data in the hidden electronic signature are obtained, and the source, the effectiveness and the authenticity of the electronic signature are verified through comparison and identification of the data, so that illegal utilization of the electronic signature is effectively avoided.
The embodiment of the invention also provides a device for realizing the authentication and anti-counterfeiting of the electronic signature, which comprises the following steps:
The electronic signature embedding digital watermark module is used for performing data operation on the acquired original electronic signature data, and embedding fingerprints, unique codes and other needed information into the electronic signature as hidden digital watermarks;
And the electronic signature extraction watermark module is used for extracting the digital watermark in the electronic signature by using an extraction algorithm mode consistent with the embedding time, and performing subsequent operations on the electronic signature after the extraction, including authentication and verification on whether the electronic signature is complete and correct.
The digital watermark embedding method of the electronic signature comprises the following steps: firstly, carrying out handwriting digital signature on a client (a terminal or a browser) and obtaining fingerprints; then digital processing is carried out on the electronic signature at the server end, the acquired fingerprint and other related information (unique identifier or tracking code, timestamp and the like) are used as digital watermarks to be embedded into the electronic signature, and the electronic signature carrying the digital watermarks is generated; finally, the digitally processed electronic signature is displayed back at the client (terminal or browser);
the digital watermark extraction method of the electronic signature comprises the following steps: watermark information is extracted from the propagated electronic signature through a server, and authentication is performed on the information and the fingerprint.
The method for realizing the authentication and anti-counterfeiting of the electronic signature based on the fingerprint, wherein the process of embedding the digital watermark into the electronic signature and extracting the digital watermark from the electronic signature involves the following key steps:
1. Collecting an electronic signature and a fingerprint: acquiring electronic signature data and fingerprint data and transmitting the electronic signature data and the fingerprint data to a back-end server;
2. The electronic signature is embedded with a digital watermark: selecting a proper embedding algorithm to embed information; common embedding algorithms include frequency domain methods, in which fourier transforms can be used to add embedded information (unique identifiers or tracking codes, time stamps, etc.) to frequency domain coefficients, and spatial domain methods; in the spatial domain approach, information may be embedded by fine-tuning the sample values of pixels or audio of an image, which may be a sequence of numbers, text, images, or other forms of data.
3. Extracting information digital watermark information: information is extracted using corresponding extraction algorithms and techniques, the extraction algorithms correspond to the embedding algorithms, and authentication is performed by comparing differences between the original media file and the extracted watermark information.
The specific working procedure is as follows:
(1) Electronic signature and fingerprint collection are carried out on the client side, and electronic signature data and fingerprint data are sent to the server side;
(2) The server receives the electronic signature data and the fingerprint data, selects an embedding algorithm and an embedding technology, and embeds the fingerprint and related information (a unique identifier or a tracking code, a timestamp and the like) into the electronic signature data in the form of a digital watermark;
(3) The electronic signature picture embedded with the watermark is displayed back at the client;
(4) The electronic signature pictures of the client may be transmitted and used in unauthorized downloading, screenshot or other improper forms;
(5) The acquired and transmitted electronic signature picture is transmitted to a server side for digital watermark extraction to verify the reality and integrity of the electronic signature.
By embedding specific hidden information in the electronic signature, the authentication of the electronic signature is realized by utilizing digital processing and cryptography technology, the authenticity, the integrity and the legal use of the electronic signature content are ensured, and the electronic signature has important application value.
The specific algorithm of the digital watermark embedding module and the watermark extracting module for the electronic signature is as follows:
Wherein the embedding of the digital watermark of the electronic signature is as follows:
And acquiring an original image of the electronic signature, and selecting a secret position to embed fingerprints and other related watermark information in an intermediate frequency domain of the sub-image block after DCT conversion by adopting an additive embedding mode. The specific operation steps are as follows:
1.1 Block processing: setting a host image as P, and partitioning the host image into K sub-blocks of 8 x 8;
1.2 Watermark encoding process: setting the watermark image as W, encrypting the watermark and controlling the distribution of watermark energy;
1.3 DCT transform): DCT transformation is carried out in each sub-block, the DCT coefficient is scanned by utilizing zig-zag, and the sequence of the k sub-image block is Zk (i), i=0, 1,2, … and 63; the DCT transform formula is as follows:
1.4 Watermark embedding algorithm): selecting specific coefficients x (m) and x (n) in the middle and low frequency bands of each sub-block according to the zig-zag ordering, embedding watermark information images W at coefficient coordinates (a, b) and (c, d), and taking the watermark information images W as secret keys 3; similarly, embedding a complementary watermark picture W', and taking the embedded position as a key 4; the watermark embedding method is as follows:
Wherein D k (i) is the sequence after the watermark information is superimposed, S K is the kth bit of the watermark for selecting the DCT coefficient sequence in which the watermark information needs to be embedded, A watermark image adjustment factor;
1.5 IDCT transform: each sub-image block is subjected to two-dimensional DCT inverse transformation, and an IDCT transformation formula is as follows:
1.6 Sub-block merging): merging each sub-block into a watermark-embedded image P';
The electronic signature embedded with the digital watermark is obtained according to the calculation. In order to verify the validity of the electronic signature, the propagated electronic signature needs to be subjected to digital watermark extraction verification.
The electronic signature extraction and embedding process are opposite, and the steps are as follows:
2.1 Block processing: the watermark embedded image P' is divided into K sub-blocks of 8 x 8;
2.2 DCT transform): DCT transformation is carried out in each sub-block, and the calculation formula is as follows:
2.3 Watermark extraction algorithm): finding an embedded area according to an embedding algorithm, comparing the values of the binary array and the ternary array according to a basic rule when the watermark is embedded, and then determining a watermark information value;
2.4 Watermark decoding): and performing decoding operation of decrypting the information value comprising the preliminary watermark to obtain watermark information W.
The digital blind watermark based on DTC frequency domain superposition can effectively resist watermark attack, such as smearing, shearing, scaling, rotating, compressing, noise adding, filtering and the like, and can effectively ensure the authenticity and accuracy of the electronic signature.
The embodiment of the invention also provides a device for realizing the authentication and anti-counterfeiting of the electronic signature, which comprises the following steps: at least one memory and at least one processor;
The at least one memory for storing a machine readable program;
the at least one processor is configured to invoke the machine-readable program to implement the method for implementing electronic signature authentication and anti-counterfeiting described in the foregoing embodiment.
The embodiment of the invention also provides a computer readable medium, wherein the computer readable medium stores computer instructions, and the computer instructions, when executed by a processor, cause the processor to execute the method for implementing electronic signature authentication and anti-counterfeiting described in the above embodiment. Specifically, a system or apparatus provided with a storage medium on which a software program code realizing the functions of any of the above embodiments is stored, and a computer (or CPU or MPU) of the system or apparatus may be caused to read out and execute the program code stored in the storage medium.
In this case, the program code itself read from the storage medium may realize the functions of any of the above-described embodiments, and thus the program code and the storage medium storing the program code form part of the present invention.
Examples of storage media for providing program code include floppy disks, hard disks, magneto-optical disks, optical disks (e.g., CD-ROMs, CD-R, CD-RWs, DVD-ROMs, DVD-RAMs, DVD-RWs, DVD+RWs), magnetic tapes, nonvolatile memory cards, and ROMs. Alternatively, the program code may be downloaded from a server computer by a communication network.
Further, it should be apparent that the functions of any of the above-described embodiments may be implemented not only by executing the program code read out by the computer, but also by causing an operating system or the like operating on the computer to perform part or all of the actual operations based on the instructions of the program code.
Further, it is understood that the program code read out by the storage medium is written into a memory provided in an expansion board inserted into a computer or into a memory provided in an expansion unit connected to the computer, and then a CPU or the like mounted on the expansion board or the expansion unit is caused to perform part and all of actual operations based on instructions of the program code, thereby realizing the functions of any of the above embodiments.
While the invention has been illustrated and described in detail in the drawings and in the preferred embodiments, the invention is not limited to the disclosed embodiments, and it will be appreciated by those skilled in the art that the code audits of the various embodiments described above may be combined to produce further embodiments of the invention, which are also within the scope of the invention.

Claims (10)

1. A method for realizing electronic signature authentication and anti-counterfeiting is characterized in that fingerprints and related information are added into an electronic signature in the form of digital watermarks, and the method comprises the following steps:
The electronic signature is embedded with a digital watermark: firstly, carrying out handwriting digital signature on a client and obtaining fingerprints; then, digital processing is carried out on the electronic signature at the server end, the acquired fingerprint and other related information are used as digital watermarks to be embedded into the electronic signature, and the electronic signature carrying the digital watermarks is generated; finally, the digitally processed electronic signature is displayed back at the client;
Digital watermark is extracted from the electronic signature: watermark information is extracted from the propagated electronic signature through a server, and authentication is performed on the information and the fingerprint.
2. A method of implementing electronic signature authentication and anti-counterfeiting according to claim 1, wherein the related information comprises a unique identifier or tracking code, a time stamp.
3. A method of implementing electronic signature authentication and anti-counterfeiting according to claim 1, wherein the method is implemented by:
collecting an electronic signature and a fingerprint: acquiring electronic signature data and fingerprint data and transmitting the electronic signature data and the fingerprint data to a back-end server;
The electronic signature is embedded with a digital watermark: selecting a proper embedding algorithm to embed information;
Extracting information digital watermark information: information is extracted using corresponding extraction algorithms and techniques, the extraction algorithms correspond to the embedding algorithms, and authentication is performed by comparing differences between the original media file and the extracted watermark information.
4. A method of implementing electronic signature authentication and anti-counterfeit according to claim 3, wherein the embedding algorithm includes a frequency domain method in which embedded information is added to frequency domain coefficients using fourier transform and a spatial domain method; in the spatial domain approach, information is embedded by fine-tuning the sample value of pixels or audio of an image, which may be a sequence of numbers, text, images, or other forms of data.
5. A method for implementing electronic signature authentication and anti-counterfeiting according to claim 3 or 4, wherein the specific workflow of the method is as follows:
s1, carrying out electronic signature and fingerprint collection on a client, and sending electronic signature data and fingerprint data to a server;
s2, the server receives the electronic signature data and the fingerprint data, selects an embedding algorithm and an embedding technology, and embeds the fingerprint and related information into the electronic signature data in the form of a digital watermark;
S3, the electronic signature picture embedded with the watermark is displayed back at the client;
s4, the electronic signature picture of the client may be transmitted and used in an unauthorized downloading, screenshot or other improper forms; the acquired and transmitted electronic signature picture is transmitted to a server side for digital watermark extraction to verify the reality and integrity of the electronic signature.
6. The method for realizing electronic signature authentication and anti-counterfeiting according to claim 1, wherein the electronic signature is embedded with a digital watermark, an original electronic signature is obtained, and a hidden position is selected to be embedded with fingerprints and other related watermark information in an intermediate frequency domain of a sub-image block after DCT conversion by adopting an additive embedding mode;
The electronic signature extracts the digital watermark, verifies the validity of the electronic signature, and performs digital watermark extraction verification on the propagated electronic signature.
7. The method for implementing electronic signature authentication and anti-counterfeiting according to claim 5, wherein the electronic signature embedded digital watermark is implemented as follows:
1.1 Block processing: setting a host image as P, and partitioning the host image into K sub-blocks of 8 x 8;
1.2 Watermark encoding process: setting the watermark image as W, encrypting the watermark and controlling the distribution of watermark energy;
1.3 DCT transform): DCT transformation is carried out in each sub-block, the DCT coefficient is scanned by utilizing zig-zag, and the sequence of the k sub-image block is Zk (i), i=0, 1,2, … and 63; the DCT transform formula is as follows:
1.4 Watermark embedding algorithm): selecting specific coefficients x (m) and x (n) in the middle and low frequency bands of each sub-block according to the zig-zag ordering, embedding watermark information images W at coefficient coordinates (a, b) and (c, d), and taking the watermark information images W as secret keys 3; similarly, embedding a complementary watermark picture W', and taking the embedded position as a key 4; the watermark embedding method is as follows:
Wherein D k (i) is the sequence after the watermark information is superimposed, S K is the kth bit of the watermark for selecting the DCT coefficient sequence in which the watermark information needs to be embedded, A watermark image adjustment factor;
1.5 IDCT transform: each sub-image block is subjected to two-dimensional DCT inverse transformation, and an IDCT transformation formula is as follows:
1.6 Sub-block merging): merging each sub-block into a watermark-embedded image P';
the specific implementation mode of the digital watermark extraction by the electronic signature is as follows:
2.1 Block processing: the watermark embedded image P' is divided into K sub-blocks of 8 x 8;
2.2 DCT transform): DCT transformation is carried out in each sub-block, and the calculation formula is as follows:
2.3 Watermark extraction algorithm): finding an embedded area according to an embedding algorithm, comparing the values of the binary array and the ternary array according to a basic rule when the watermark is embedded, and then determining a watermark information value;
2.4 Watermark decoding): and performing decoding operation of decrypting the information value comprising the preliminary watermark to obtain watermark information W.
8. An apparatus for implementing electronic signature authentication and anti-counterfeiting, comprising:
The electronic signature embedding digital watermark module is used for performing data operation on the acquired original electronic signature data, and embedding fingerprints, unique codes and other needed information into the electronic signature as hidden digital watermarks;
And the electronic signature extraction watermark module is used for extracting the digital watermark in the electronic signature by using an extraction algorithm mode consistent with the embedding time, and performing subsequent operations on the electronic signature after the extraction, including authentication and verification on whether the electronic signature is complete and correct.
9. An apparatus for implementing electronic signature authentication and anti-counterfeiting, comprising: at least one memory and at least one processor;
The at least one memory for storing a machine readable program;
the at least one processor being configured to invoke the machine readable program to implement the method of any of claims 1 to 7.
10. A computer readable medium having stored thereon computer instructions which, when executed by a processor, cause the processor to perform the method of any of claims 1 to 7.
CN202410187784.7A 2024-02-20 2024-02-20 Method and system for realizing electronic signature authentication and anti-counterfeiting Pending CN117955658A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410187784.7A CN117955658A (en) 2024-02-20 2024-02-20 Method and system for realizing electronic signature authentication and anti-counterfeiting

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410187784.7A CN117955658A (en) 2024-02-20 2024-02-20 Method and system for realizing electronic signature authentication and anti-counterfeiting

Publications (1)

Publication Number Publication Date
CN117955658A true CN117955658A (en) 2024-04-30

Family

ID=90803594

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410187784.7A Pending CN117955658A (en) 2024-02-20 2024-02-20 Method and system for realizing electronic signature authentication and anti-counterfeiting

Country Status (1)

Country Link
CN (1) CN117955658A (en)

Similar Documents

Publication Publication Date Title
Shih Digital watermarking and steganography: fundamentals and techniques
Bartolini et al. Image authentication techniques for surveillance applications
Voyatzis et al. The use of watermarks in the protection of digital multimedia products
Tao et al. Robust image watermarking theories and techniques: A review
Rey et al. A survey of watermarking algorithms for image authentication
Barni et al. Digital watermarking
Wong et al. Secret and public key image watermarking schemes for image authentication and ownership verification
Chandra et al. Digital watermarking technique for protecting digital images
Chandramouli et al. Digital watermarking
WO1999017536A1 (en) Method for generating and verifying degital watermarks and for exchanging data containing digital watermarks
CN107103577A (en) Half fragile uniqueness image watermark insertion and extracting method for integrity protection
Kumar et al. Implementation of wavelet based modified buyer-seller watermarking protocol (BSWP)
Katariya Digital watermarking
Koliwad A comprehensive survey of contemporary researches in watermarking for copyright protection of digital images
Lin et al. Semi-fragile watermarking scheme for authentication of JPEG images
Benrhouma Cryptanalysis and improvement of a semi-fragile watermarking technique for tamper detection and recovery
Tefas et al. Image watermarking: Techniques and applications
Ridzoň et al. Content protection in grayscale and color images based on robust digital watermarking
Terzija Robust digital image watermarking algorithms for copyright protection.
Riaz et al. Image authentication and restoration by multiple watermarking techniques with advance encryption standard in digital photography
CN117955658A (en) Method and system for realizing electronic signature authentication and anti-counterfeiting
Bhattacharya Survey on Digital Watermarking–A Digital Forensics & Security Application
Al-Kadei et al. Improve a secure blind watermarking technique for digital video
Abdelrahman Mohamed Mostafa Overview and Classification of Digital Watermarking Algorithms
Hussein Digital image authentication algorithm based on fragile invisible watermark and MD-5 function in the DWT domain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination