CN118171248A - Digital watermark embedding and extracting method, system and device - Google Patents
Digital watermark embedding and extracting method, system and device Download PDFInfo
- Publication number
- CN118171248A CN118171248A CN202410179233.6A CN202410179233A CN118171248A CN 118171248 A CN118171248 A CN 118171248A CN 202410179233 A CN202410179233 A CN 202410179233A CN 118171248 A CN118171248 A CN 118171248A
- Authority
- CN
- China
- Prior art keywords
- watermark
- file
- verification
- identification information
- digital
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 23
- 238000012795 verification Methods 0.000 claims abstract description 69
- 230000002452 interceptive effect Effects 0.000 claims abstract description 66
- 238000004364 calculation method Methods 0.000 claims abstract description 23
- 238000000605 extraction Methods 0.000 claims description 39
- 238000003780 insertion Methods 0.000 claims description 6
- 230000037431 insertion Effects 0.000 claims description 6
- 238000004806 packaging method and process Methods 0.000 claims description 6
- 238000010586 diagram Methods 0.000 description 14
- 238000005516 engineering process Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000003607 modifier Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000010008 shearing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The invention discloses a method, a system and a device for embedding and extracting a digital watermark based on non-interactive zero knowledge proof, firstly, marking content as knowledge input of the non-interactive zero knowledge proof, and embedding output as watermark at the tail of an original file; secondly, in order to ensure the integrity of the file after the watermark is embedded, carrying out hash calculation on the file once, and carrying out digital signature on a hash result, wherein the digital watermark is embedded; and finally, when the digital watermark is extracted, the digital signature is verified a priori, if the signature verification is unsuccessful, the file can be directly returned to fail to extract the digital watermark, if the signature verification is successful, the watermark at the end of the file is extracted, the verification of non-interactive zero knowledge proof is carried out, and if the verification is passed, the identification content is proved to be legal, so that the real watermark content is extracted.
Description
Technical Field
The invention relates to the technical field of digital watermarking, in particular to a method, a system and a device for embedding and extracting digital watermarking based on non-interactive zero knowledge proof.
Background
With the development of network technology and multimedia technology, multimedia information can be spread on the internet more rapidly and more widely, which makes the problems of information security, intellectual property protection, identity authentication and the like prominent. In order to solve the problems of multimedia copyright infringement, illegal copying and the like, people have widely explored in the fields of encryption and digital watermarking. Encryption can ensure secure transmission of multimedia files between a provider and a user who obtains a key, but after the user obtains the encrypted multimedia files, the encryption algorithm does not work any more, and the user can copy and transmit the decrypted files, which may cause illegal copying and other problems. The digital watermark can implicitly embed copyright information into multimedia files such as audio, images, video and the like, is not easy to be perceived by ordinary people, and is not easy to be attacked or removed. Thus, digital watermarking technology is more widely applied to multimedia copyright protection.
The digital watermark is a technology for embedding identification information into multimedia files by a certain algorithm on the premise of not affecting the original multimedia value and use. The markers embedded in this way are often not directly perceived by the user and can withstand certain attacks. The digital watermarking technology can embed author information, company logo, file transfer information, etc. into original multimedia so as to be used as evidence or for tracing file transfer process, etc. when copyright disputes occur.
Most of the current digital watermarking algorithms embed identification information in a multimedia file in the clear, so that information is easy to leak, and meanwhile, the digital watermarking algorithms face shearing attacks, coverage attacks and the like.
Disclosure of Invention
In order to overcome the defects of the technology, the invention provides a method, a system and a device for embedding and extracting the digital watermark based on the non-interactive zero knowledge proof, which utilizes the zero knowledge and reliability of the non-interactive zero knowledge proof to hide identification information and prove the correctness of the identification information, and utilizes a digital signature to ensure the integrity of an embedded watermark file to resist digital watermark attack.
In order to achieve the above purpose, the technical scheme of the invention is as follows:
A digital watermark embedding method based on non-interactive zero knowledge proof is to make non-interactive zero knowledge proof for various identification information of a file as watermark to be embedded at the end of the file, make hash calculation for the file and then make signature, package and output the digital signature and the file embedded with the watermark.
A digital watermark extraction method based on non-interactive zero knowledge proof carries out hash calculation on a file with watermark, verifies digital signature, and if the verification signature does not pass, indicates that the file is changed and does not carry out digital watermark extraction; if the verification sign passes, watermark extraction is carried out on the file. After the verification is passed, extracting the watermark embedded at the end of the file, and performing verification of non-interactive zero knowledge proof, wherein the verification indicates that the identification information exists and is correct, so that the identification information can be extracted from the watermark; if the verification is not passed, the identification information is not existed or is wrong, and the watermark extraction fails.
A digital watermark embedding and extracting system based on non-interactive zero knowledge proof comprises,
The digital watermark embedding interface is used for converting the identification information into a watermark to be embedded into a file, generating a digital signature and finally packaging;
And the digital watermark extraction interface is used for extracting the watermark content from the packaged watermark-embedded file, carrying out verification of non-interactive zero knowledge proof after successful signature verification, and outputting the identification information after the verification is passed.
Further, the digital watermark embedding interface includes:
The non-interactive zero knowledge proof operator is used for performing non-interactive zero knowledge proof on the selected identification information, hiding the identification information, and simultaneously proving the existence and correctness of the identification information, wherein the result of the non-interactive zero knowledge proof is used as a watermark to be inserted;
The watermark insertion file operator is used for inserting watermark information at the tail of a file to be embedded with the watermark;
HASH operator, which is used to HASH the file embedded with watermark;
And the digital signature operator is used for carrying out digital signature on the hash calculation result.
Further, the digital watermark extraction interface includes:
HASH operator, which is used to HASH the file embedded with watermark;
The signature verification operator is used for carrying out signature verification operation on the hash calculation result and the embedded watermark file, and watermark extraction is carried out after signature verification is passed;
The non-interactive zero-knowledge proof verification operator is used for verifying the watermark information, and the identification information is taken as output after the verification is passed;
The identification information is extracted for extracting the identification information of the file from the non-interactive zero knowledge proof.
A digital watermark embedding and extracting device based on non-interactive zero knowledge proof comprises,
The digital watermark embedding module is used for converting the identification information into a watermark to be embedded into a file, generating a digital signature and finally packaging;
And the digital watermark extraction module is used for extracting the watermark content from the packaged watermark-embedded file, carrying out verification of non-interactive zero knowledge proof after successful signature verification, and outputting the identification information after the verification is passed.
Further, the digital watermark embedding module includes:
The non-interactive zero knowledge proof unit is used for carrying out zero knowledge proof on the selected identification information, hiding the identification information, and simultaneously proving the existence and the correctness of the identification information, wherein the result of the non-interactive zero knowledge proof is used as a watermark to be inserted;
A watermark insertion file unit for inserting watermark information at the end of a file to be embedded with the watermark;
HASH unit to HASH the watermark embedded file;
And the digital signature unit is used for carrying out digital signature on the hash calculation result.
Further, the digital watermark extraction module includes:
HASH unit to HASH the watermark embedded file;
The signature verification unit is used for carrying out signature verification operation on the hash calculation result and the embedded watermark file, and carrying out watermark extraction after the signature verification is passed;
The non-interactive zero-knowledge proof verification unit is used for verifying the watermark information, and the identification information is output after the verification is passed;
And the extraction identification information unit is used for extracting the identification information of the file from the non-interactive zero-knowledge proof.
The invention has the beneficial effects that: the invention discloses a method, a system and a device for embedding and extracting a digital watermark based on non-interactive zero knowledge proof, which are used for hiding identification information and proving the correctness of the identification information by utilizing the zero knowledge and reliability of the non-interactive zero knowledge proof and ensuring the integrity of an embedded watermark file to resist digital watermark attack by utilizing a digital signature.
Drawings
Fig. 1 is a schematic flow diagram of a digital watermark embedding method based on non-interactive zero knowledge proof.
Fig. 2 is a schematic flow diagram of a digital watermark extraction method based on non-interactive zero knowledge proof.
Fig. 3 is a block diagram of a digital watermark embedding and extracting system based on non-interactive zero knowledge proof.
Fig. 4 is a block diagram of a digital watermark embedding interface based on non-interactive zero knowledge proof.
Fig. 5 is a diagram of a digital watermark extraction interface structure based on non-interactive zero knowledge proof.
Fig. 6 is a block diagram of a digital watermark embedding and extracting apparatus based on non-interactive zero knowledge proof.
Fig. 7 is a block diagram of a digital watermark embedding module based on non-interactive zero knowledge proof.
Fig. 8 is a block diagram of a digital watermark extraction module based on non-interactive zero knowledge proof.
Detailed Description
The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings so that the advantages and features of the present invention can be more easily understood by those skilled in the art, thereby making clear and defining the scope of the present invention.
In the description of the present invention, it should be noted that the described embodiments of the present invention are some, but not all embodiments of the present invention; all other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The terms first, second and the like in the description and in the claims and in the above-described figures, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments described herein may be capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, apparatus, article, or device that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed or inherent to such process, method, article, or device.
Example 1
Referring to fig. 1, a digital watermark embedding method based on non-interactive zero knowledge proof is implemented, which comprises the following steps:
Step 101, determining a file Which identification information of (a) needs to be used as watermark content, such as creator, last modifier, creation time, last modification time, and the like, and splicing the selected identification information into character string/>;
Step 102, the step 101 is used for identifying the information character stringAs input, non-interactive zero knowledge proof is made to obtain。/>As the watermark embedded at the end of the file, obtain;
Step 103, for the file embedded with watermarkHash calculation is carried out, and signature is carried out, so that the obtained product is obtained,/>Representing hash computation,/>Representing a signature function.
Step 104, for the file embedded with watermarkAnd signature/>Packaging output/>。
Example 2
Referring to fig. 2, a digital watermark extraction method based on non-interactive zero knowledge proof is implemented, which comprises the following steps:
step 201, for a file embedded with watermark Hash calculation is performed and signature verification is performedRepresenting verification signature function, if/>The signature passes the signature verification, and the step 202 is continued; if/>The signature verification fails, and the watermark extraction failure is returned;
Step 202, embedding watermark files from Tail extraction watermark/>And verify non-interactive zero knowledge proof;/>Representing a verification non-interactive zero knowledge proof calculation;
Step 203, if Verification is passed, output/>Identification information/>; If/>And if the verification is not passed, returning to failure in watermark extraction.
Example 3
Fig. 3 is a block diagram of a digital watermark embedding and extracting system based on non-interactive zero knowledge proof, the system includes:
the digital watermark embedding interface 301 is configured to convert the identification information into a watermark, embed the watermark into a file, generate a digital signature, and finally package the digital signature;
The digital watermark extraction interface 302 is used for extracting watermark content from the packaged watermark-embedded file, performing verification of non-interactive zero knowledge proof after verification is successful, and outputting identification information after verification is passed;
The specific structure of the digital watermark embedding interface is shown in fig. 4, and fig. 4 is a diagram of the digital watermark embedding interface based on non-interactive zero knowledge proof.
A non-interactive zero knowledge proof operator 401, configured to perform zero knowledge proof on the selected identification information, hide the identification information, and at the same time perform proof on the existence and correctness of the identification information;
a watermark insertion file 402 for inserting watermark information at the end of a file to be embedded with a watermark;
HASH operator 403, which is used to HASH the file embedded with watermark;
And the digital signature operator 404 is used for digitally signing the hash calculation result and guaranteeing the integrity of the file embedded with the watermark.
The specific structure of the digital watermark extraction interface is shown in fig. 5, and fig. 5 is a structure diagram of the digital watermark extraction interface based on non-interactive zero knowledge proof.
HASH operator 501, which is used to HASH the file embedded with watermark;
the signature verification operator 502 is configured to perform signature verification operation on the hash calculation result and the embedded watermark file, and only if the signature verification passes, it can be stated that the file is not tampered, and watermark extraction can be performed;
A non-interactive zero knowledge proof verification operator 503 for proving watermark information, wherein only the proof can indicate that the identification information is present and correct;
Identification information 504 is extracted for extracting identification information of the file from the non-interactive zero knowledge proof.
Example 4
Fig. 6 is a block diagram of a digital watermark embedding and extracting apparatus based on non-interactive zero knowledge proof, the apparatus includes:
The digital watermark embedding module 601 is configured to convert the identification information into a watermark, embed the watermark into a file, generate a digital signature, and finally package the digital signature;
The digital watermark extraction module 602 is configured to extract watermark content from the packaged watermark-embedded file, perform verification of non-interactive zero knowledge proof after verification is successful, and output identification information after verification is passed;
The specific structure of the digital watermark embedding module is shown in fig. 7, and fig. 7 is a block diagram of the digital watermark embedding module based on non-interactive zero knowledge proof.
The non-interactive zero-knowledge proof unit 701 is configured to perform zero-knowledge proof on the selected identification information, hide the identification information, and simultaneously perform proof on the existence and correctness of the identification information;
A watermark insertion file 702 for inserting watermark information at the end of a file to be embedded with a watermark;
HASH unit 703, configured to perform HASH calculation on the watermark embedded file;
and the digital signature unit 704 is used for digitally signing the hash calculation result to ensure the integrity of the file embedded with the watermark.
The specific structure of the digital watermark extraction module is shown in fig. 8, and fig. 8 is a block diagram of the digital watermark extraction module based on non-interactive zero knowledge proof.
HASH unit 801, configured to perform HASH calculation on the watermark embedded file;
a signature verification unit 802, configured to perform signature verification operation on the hash calculation result and the embedded watermark file, where only if the signature verification passes, it can be stated that the file is not tampered, and watermark extraction can be performed;
A non-interactive zero-knowledge proof verification unit 803 for proving watermark information, only if the watermark information is proved to be present and correct;
Identification information 804 is extracted for extracting identification information of the file from the non-interactive zero knowledge proof.
It should also be understood that in embodiments herein, the term "and/or" is merely one relationship that describes an associated object, meaning that three relationships may exist. For example, a and/or B may represent: a exists alone, A and B exist together, and B exists alone. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps described in connection with the embodiments disclosed herein may be embodied in electronic hardware, in computer software, or in a combination of the two, and that the elements and steps of the examples have been generally described in terms of function in the foregoing description to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the several embodiments provided herein, it should be understood that the disclosed systems, devices, and methods may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. In addition, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices, or elements, or may be an electrical, mechanical, or other form of connection.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the elements may be selected according to actual needs to achieve the objectives of the embodiments herein.
In addition, each functional unit in the embodiments herein may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solutions herein are essentially or portions contributing to the prior art, or all or portions of the technical solutions may be embodied in the form of a software product stored in a storage medium, including several instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods described in the embodiments herein. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Finally, it should be noted that: the foregoing description is only a preferred embodiment of the present invention, and the present invention is not limited thereto, but it is to be understood that modifications and equivalents of some of the technical features described in the foregoing embodiments may be made by those skilled in the art, although the present invention has been described in detail with reference to the foregoing embodiments. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (10)
1. A digital watermark embedding method is characterized in that: the method comprises the steps of firstly confirming identification information of watermark content, then carrying out non-interactive zero knowledge proof on the identification information, and embedding a result of the non-interactive zero knowledge proof as a watermark at the tail of a file.
2. The digital watermark embedding method according to claim 1, wherein: and carrying out hash calculation on the file embedded with the watermark, carrying out digital signature on a hash calculation result, and finally packaging the file embedded with the watermark and the digital signature to be used as output of the method.
3. A digital watermark extraction method is characterized in that: carrying out hash calculation on the file with the watermark, verifying the digital signature, and if the verification signature does not pass, indicating that the file is changed and not carrying out digital watermark extraction; if the verification sign passes, watermark extraction is carried out on the file.
4. A digital watermark extraction method according to claim 3, wherein: after the verification is passed, extracting the watermark embedded at the tail of the file, performing verification of non-interactive zero knowledge proof, verifying that the identification information exists and is correct through the verification, and extracting the identification information from the watermark; if the verification is not passed, the identification information is not existed or is wrong, and the watermark extraction fails.
5. A digital watermark embedding and extracting system is characterized in that: comprising the following steps:
The digital watermark embedding interface is used for converting the identification information into a watermark to be embedded into a file, generating a digital signature and finally packaging;
And the digital watermark extraction interface is used for extracting the watermark content from the packaged watermark-embedded file, carrying out verification of non-interactive zero knowledge proof after successful signature verification, and outputting the identification information after the verification is passed.
6. The digital watermark embedding and extraction system as claimed in claim 5, wherein: the digital watermark embedding interface includes:
The non-interactive zero knowledge proof operator is used for performing non-interactive zero knowledge proof on the selected identification information, hiding the identification information, and simultaneously proving the existence and correctness of the identification information, wherein the result of the non-interactive zero knowledge proof is used as a watermark to be inserted;
The watermark insertion file is used for inserting watermark information at the tail of the file to be embedded with the watermark;
HASH operator, which is used to HASH the file embedded with watermark;
And the digital signature operator is used for carrying out digital signature on the hash calculation result.
7. The digital watermark embedding and extraction system as claimed in claim 5, wherein: the digital watermark extraction interface comprises:
HASH operator, which is used to HASH the file embedded with watermark;
The signature verification operator is used for carrying out signature verification operation on the hash calculation result and the embedded watermark file, and watermark extraction is carried out after signature verification is passed;
The non-interactive zero-knowledge proof verification operator is used for verifying the watermark information, and the identification information is taken as output after the verification is passed;
The identification information is extracted for extracting the identification information of the file from the non-interactive zero knowledge proof.
8. A digital watermark embedding and extracting device is characterized in that: comprising the following steps:
The digital watermark embedding module is used for converting the identification information into a watermark to be embedded into a file, generating a digital signature and finally packaging;
And the digital watermark extraction module is used for extracting the watermark content from the packaged watermark-embedded file, carrying out verification of non-interactive zero knowledge proof after successful signature verification, and outputting the identification information after the verification is passed.
9. The digital watermark embedding and extracting apparatus according to claim 8, wherein: the digital watermark embedding module includes:
The non-interactive zero knowledge proof unit is used for carrying out zero knowledge proof on the selected identification information, hiding the identification information, and simultaneously proving the existence and the correctness of the identification information, wherein the result of the non-interactive zero knowledge proof is used as a watermark to be inserted;
A watermark insertion file unit for inserting watermark information at the end of a file to be embedded with the watermark;
HASH unit to HASH the watermark embedded file;
And the digital signature unit is used for carrying out digital signature on the hash calculation result.
10. The digital watermark embedding and extracting apparatus according to claim 8, wherein: the digital watermark extraction module comprises:
HASH unit to HASH the watermark embedded file;
The signature verification unit is used for carrying out signature verification operation on the hash calculation result and the embedded watermark file, and carrying out watermark extraction after the signature verification is passed;
The non-interactive zero-knowledge proof verification unit is used for verifying the watermark information, and the identification information is output after the verification is passed;
The identification information is extracted for extracting the identification information of the file from the non-interactive zero knowledge proof.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410179233.6A CN118171248A (en) | 2024-02-18 | 2024-02-18 | Digital watermark embedding and extracting method, system and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410179233.6A CN118171248A (en) | 2024-02-18 | 2024-02-18 | Digital watermark embedding and extracting method, system and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN118171248A true CN118171248A (en) | 2024-06-11 |
Family
ID=91349644
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410179233.6A Pending CN118171248A (en) | 2024-02-18 | 2024-02-18 | Digital watermark embedding and extracting method, system and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN118171248A (en) |
-
2024
- 2024-02-18 CN CN202410179233.6A patent/CN118171248A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rey et al. | A survey of watermarking algorithms for image authentication | |
EP1652383B1 (en) | Content identification for broadcast media | |
US7873183B2 (en) | Embedding and detecting watermarks based on embedded positions in document layout | |
US6856977B1 (en) | Method and system for proving ownership of digital data | |
US7236610B1 (en) | Authenticating executable code and executions thereof | |
US8175322B2 (en) | Method of digital watermark and the corresponding device, and digital camera which can append watermark | |
US20050172130A1 (en) | Watermarking a digital object with a digital signature | |
Nagra et al. | A functional taxonomy for software watermarking | |
CN110809763A (en) | Identifying copyrighted material using time-stamped embedded copyright information | |
WO2007035062A1 (en) | Method for generating standard file based on steganography technology, and apparatus and method for validating integrity of metadata in the standard file | |
JP2007104643A (en) | Information processing apparatus, verification processing apparatus, control methods thereof, computer program, and storage medium | |
US20020181732A1 (en) | Method of collaborative watermarking of a digital content | |
Craver et al. | Copyright protection protocols based on asymmetric watermarking: The ticket concept | |
CN108564520A (en) | GIS vector data copyright authentication method based on not blue index | |
Katzenbeisser | On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking | |
CN115955308B (en) | Digital asset processing method, device, equipment and medium based on quantum-resistant key | |
KR100906067B1 (en) | Standard file generation method using a steganography technology, and apparatus and method to validate the integrity of a metadata in its | |
CN118171248A (en) | Digital watermark embedding and extracting method, system and device | |
CN115396117A (en) | Block chain based tamper-proof electronic document signing and verifying method and system | |
Kuang et al. | Watermarking image authentication in hospital information system | |
Li et al. | Security issues in watermarking applications-A deeper look | |
Ahmed et al. | A secure watermarking scheme for buyer-seller identification and copyright protection | |
CN116366232B (en) | Digital asset processing method, device, equipment and medium based on quantum-resistant key | |
KR101023436B1 (en) | Digital image management system for making the printed circuit board and managing method thereof | |
KR20080019863A (en) | Method for embedding codes to contents and apparatus therefor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |