CN118171248A - Digital watermark embedding and extracting method, system and device - Google Patents

Digital watermark embedding and extracting method, system and device Download PDF

Info

Publication number
CN118171248A
CN118171248A CN202410179233.6A CN202410179233A CN118171248A CN 118171248 A CN118171248 A CN 118171248A CN 202410179233 A CN202410179233 A CN 202410179233A CN 118171248 A CN118171248 A CN 118171248A
Authority
CN
China
Prior art keywords
watermark
file
verification
identification information
digital
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410179233.6A
Other languages
Chinese (zh)
Inventor
韩涛
沈国栋
孙善宝
罗清彩
李锐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Inspur Science Research Institute Co Ltd
Original Assignee
Shandong Inspur Science Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Inspur Science Research Institute Co Ltd filed Critical Shandong Inspur Science Research Institute Co Ltd
Priority to CN202410179233.6A priority Critical patent/CN118171248A/en
Publication of CN118171248A publication Critical patent/CN118171248A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a method, a system and a device for embedding and extracting a digital watermark based on non-interactive zero knowledge proof, firstly, marking content as knowledge input of the non-interactive zero knowledge proof, and embedding output as watermark at the tail of an original file; secondly, in order to ensure the integrity of the file after the watermark is embedded, carrying out hash calculation on the file once, and carrying out digital signature on a hash result, wherein the digital watermark is embedded; and finally, when the digital watermark is extracted, the digital signature is verified a priori, if the signature verification is unsuccessful, the file can be directly returned to fail to extract the digital watermark, if the signature verification is successful, the watermark at the end of the file is extracted, the verification of non-interactive zero knowledge proof is carried out, and if the verification is passed, the identification content is proved to be legal, so that the real watermark content is extracted.

Description

Digital watermark embedding and extracting method, system and device
Technical Field
The invention relates to the technical field of digital watermarking, in particular to a method, a system and a device for embedding and extracting digital watermarking based on non-interactive zero knowledge proof.
Background
With the development of network technology and multimedia technology, multimedia information can be spread on the internet more rapidly and more widely, which makes the problems of information security, intellectual property protection, identity authentication and the like prominent. In order to solve the problems of multimedia copyright infringement, illegal copying and the like, people have widely explored in the fields of encryption and digital watermarking. Encryption can ensure secure transmission of multimedia files between a provider and a user who obtains a key, but after the user obtains the encrypted multimedia files, the encryption algorithm does not work any more, and the user can copy and transmit the decrypted files, which may cause illegal copying and other problems. The digital watermark can implicitly embed copyright information into multimedia files such as audio, images, video and the like, is not easy to be perceived by ordinary people, and is not easy to be attacked or removed. Thus, digital watermarking technology is more widely applied to multimedia copyright protection.
The digital watermark is a technology for embedding identification information into multimedia files by a certain algorithm on the premise of not affecting the original multimedia value and use. The markers embedded in this way are often not directly perceived by the user and can withstand certain attacks. The digital watermarking technology can embed author information, company logo, file transfer information, etc. into original multimedia so as to be used as evidence or for tracing file transfer process, etc. when copyright disputes occur.
Most of the current digital watermarking algorithms embed identification information in a multimedia file in the clear, so that information is easy to leak, and meanwhile, the digital watermarking algorithms face shearing attacks, coverage attacks and the like.
Disclosure of Invention
In order to overcome the defects of the technology, the invention provides a method, a system and a device for embedding and extracting the digital watermark based on the non-interactive zero knowledge proof, which utilizes the zero knowledge and reliability of the non-interactive zero knowledge proof to hide identification information and prove the correctness of the identification information, and utilizes a digital signature to ensure the integrity of an embedded watermark file to resist digital watermark attack.
In order to achieve the above purpose, the technical scheme of the invention is as follows:
A digital watermark embedding method based on non-interactive zero knowledge proof is to make non-interactive zero knowledge proof for various identification information of a file as watermark to be embedded at the end of the file, make hash calculation for the file and then make signature, package and output the digital signature and the file embedded with the watermark.
A digital watermark extraction method based on non-interactive zero knowledge proof carries out hash calculation on a file with watermark, verifies digital signature, and if the verification signature does not pass, indicates that the file is changed and does not carry out digital watermark extraction; if the verification sign passes, watermark extraction is carried out on the file. After the verification is passed, extracting the watermark embedded at the end of the file, and performing verification of non-interactive zero knowledge proof, wherein the verification indicates that the identification information exists and is correct, so that the identification information can be extracted from the watermark; if the verification is not passed, the identification information is not existed or is wrong, and the watermark extraction fails.
A digital watermark embedding and extracting system based on non-interactive zero knowledge proof comprises,
The digital watermark embedding interface is used for converting the identification information into a watermark to be embedded into a file, generating a digital signature and finally packaging;
And the digital watermark extraction interface is used for extracting the watermark content from the packaged watermark-embedded file, carrying out verification of non-interactive zero knowledge proof after successful signature verification, and outputting the identification information after the verification is passed.
Further, the digital watermark embedding interface includes:
The non-interactive zero knowledge proof operator is used for performing non-interactive zero knowledge proof on the selected identification information, hiding the identification information, and simultaneously proving the existence and correctness of the identification information, wherein the result of the non-interactive zero knowledge proof is used as a watermark to be inserted;
The watermark insertion file operator is used for inserting watermark information at the tail of a file to be embedded with the watermark;
HASH operator, which is used to HASH the file embedded with watermark;
And the digital signature operator is used for carrying out digital signature on the hash calculation result.
Further, the digital watermark extraction interface includes:
HASH operator, which is used to HASH the file embedded with watermark;
The signature verification operator is used for carrying out signature verification operation on the hash calculation result and the embedded watermark file, and watermark extraction is carried out after signature verification is passed;
The non-interactive zero-knowledge proof verification operator is used for verifying the watermark information, and the identification information is taken as output after the verification is passed;
The identification information is extracted for extracting the identification information of the file from the non-interactive zero knowledge proof.
A digital watermark embedding and extracting device based on non-interactive zero knowledge proof comprises,
The digital watermark embedding module is used for converting the identification information into a watermark to be embedded into a file, generating a digital signature and finally packaging;
And the digital watermark extraction module is used for extracting the watermark content from the packaged watermark-embedded file, carrying out verification of non-interactive zero knowledge proof after successful signature verification, and outputting the identification information after the verification is passed.
Further, the digital watermark embedding module includes:
The non-interactive zero knowledge proof unit is used for carrying out zero knowledge proof on the selected identification information, hiding the identification information, and simultaneously proving the existence and the correctness of the identification information, wherein the result of the non-interactive zero knowledge proof is used as a watermark to be inserted;
A watermark insertion file unit for inserting watermark information at the end of a file to be embedded with the watermark;
HASH unit to HASH the watermark embedded file;
And the digital signature unit is used for carrying out digital signature on the hash calculation result.
Further, the digital watermark extraction module includes:
HASH unit to HASH the watermark embedded file;
The signature verification unit is used for carrying out signature verification operation on the hash calculation result and the embedded watermark file, and carrying out watermark extraction after the signature verification is passed;
The non-interactive zero-knowledge proof verification unit is used for verifying the watermark information, and the identification information is output after the verification is passed;
And the extraction identification information unit is used for extracting the identification information of the file from the non-interactive zero-knowledge proof.
The invention has the beneficial effects that: the invention discloses a method, a system and a device for embedding and extracting a digital watermark based on non-interactive zero knowledge proof, which are used for hiding identification information and proving the correctness of the identification information by utilizing the zero knowledge and reliability of the non-interactive zero knowledge proof and ensuring the integrity of an embedded watermark file to resist digital watermark attack by utilizing a digital signature.
Drawings
Fig. 1 is a schematic flow diagram of a digital watermark embedding method based on non-interactive zero knowledge proof.
Fig. 2 is a schematic flow diagram of a digital watermark extraction method based on non-interactive zero knowledge proof.
Fig. 3 is a block diagram of a digital watermark embedding and extracting system based on non-interactive zero knowledge proof.
Fig. 4 is a block diagram of a digital watermark embedding interface based on non-interactive zero knowledge proof.
Fig. 5 is a diagram of a digital watermark extraction interface structure based on non-interactive zero knowledge proof.
Fig. 6 is a block diagram of a digital watermark embedding and extracting apparatus based on non-interactive zero knowledge proof.
Fig. 7 is a block diagram of a digital watermark embedding module based on non-interactive zero knowledge proof.
Fig. 8 is a block diagram of a digital watermark extraction module based on non-interactive zero knowledge proof.
Detailed Description
The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings so that the advantages and features of the present invention can be more easily understood by those skilled in the art, thereby making clear and defining the scope of the present invention.
In the description of the present invention, it should be noted that the described embodiments of the present invention are some, but not all embodiments of the present invention; all other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The terms first, second and the like in the description and in the claims and in the above-described figures, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments described herein may be capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, apparatus, article, or device that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed or inherent to such process, method, article, or device.
Example 1
Referring to fig. 1, a digital watermark embedding method based on non-interactive zero knowledge proof is implemented, which comprises the following steps:
Step 101, determining a file Which identification information of (a) needs to be used as watermark content, such as creator, last modifier, creation time, last modification time, and the like, and splicing the selected identification information into character string/>
Step 102, the step 101 is used for identifying the information character stringAs input, non-interactive zero knowledge proof is made to obtain。/>As the watermark embedded at the end of the file, obtain
Step 103, for the file embedded with watermarkHash calculation is carried out, and signature is carried out, so that the obtained product is obtained,/>Representing hash computation,/>Representing a signature function.
Step 104, for the file embedded with watermarkAnd signature/>Packaging output/>
Example 2
Referring to fig. 2, a digital watermark extraction method based on non-interactive zero knowledge proof is implemented, which comprises the following steps:
step 201, for a file embedded with watermark Hash calculation is performed and signature verification is performedRepresenting verification signature function, if/>The signature passes the signature verification, and the step 202 is continued; if/>The signature verification fails, and the watermark extraction failure is returned;
Step 202, embedding watermark files from Tail extraction watermark/>And verify non-interactive zero knowledge proof;/>Representing a verification non-interactive zero knowledge proof calculation;
Step 203, if Verification is passed, output/>Identification information/>; If/>And if the verification is not passed, returning to failure in watermark extraction.
Example 3
Fig. 3 is a block diagram of a digital watermark embedding and extracting system based on non-interactive zero knowledge proof, the system includes:
the digital watermark embedding interface 301 is configured to convert the identification information into a watermark, embed the watermark into a file, generate a digital signature, and finally package the digital signature;
The digital watermark extraction interface 302 is used for extracting watermark content from the packaged watermark-embedded file, performing verification of non-interactive zero knowledge proof after verification is successful, and outputting identification information after verification is passed;
The specific structure of the digital watermark embedding interface is shown in fig. 4, and fig. 4 is a diagram of the digital watermark embedding interface based on non-interactive zero knowledge proof.
A non-interactive zero knowledge proof operator 401, configured to perform zero knowledge proof on the selected identification information, hide the identification information, and at the same time perform proof on the existence and correctness of the identification information;
a watermark insertion file 402 for inserting watermark information at the end of a file to be embedded with a watermark;
HASH operator 403, which is used to HASH the file embedded with watermark;
And the digital signature operator 404 is used for digitally signing the hash calculation result and guaranteeing the integrity of the file embedded with the watermark.
The specific structure of the digital watermark extraction interface is shown in fig. 5, and fig. 5 is a structure diagram of the digital watermark extraction interface based on non-interactive zero knowledge proof.
HASH operator 501, which is used to HASH the file embedded with watermark;
the signature verification operator 502 is configured to perform signature verification operation on the hash calculation result and the embedded watermark file, and only if the signature verification passes, it can be stated that the file is not tampered, and watermark extraction can be performed;
A non-interactive zero knowledge proof verification operator 503 for proving watermark information, wherein only the proof can indicate that the identification information is present and correct;
Identification information 504 is extracted for extracting identification information of the file from the non-interactive zero knowledge proof.
Example 4
Fig. 6 is a block diagram of a digital watermark embedding and extracting apparatus based on non-interactive zero knowledge proof, the apparatus includes:
The digital watermark embedding module 601 is configured to convert the identification information into a watermark, embed the watermark into a file, generate a digital signature, and finally package the digital signature;
The digital watermark extraction module 602 is configured to extract watermark content from the packaged watermark-embedded file, perform verification of non-interactive zero knowledge proof after verification is successful, and output identification information after verification is passed;
The specific structure of the digital watermark embedding module is shown in fig. 7, and fig. 7 is a block diagram of the digital watermark embedding module based on non-interactive zero knowledge proof.
The non-interactive zero-knowledge proof unit 701 is configured to perform zero-knowledge proof on the selected identification information, hide the identification information, and simultaneously perform proof on the existence and correctness of the identification information;
A watermark insertion file 702 for inserting watermark information at the end of a file to be embedded with a watermark;
HASH unit 703, configured to perform HASH calculation on the watermark embedded file;
and the digital signature unit 704 is used for digitally signing the hash calculation result to ensure the integrity of the file embedded with the watermark.
The specific structure of the digital watermark extraction module is shown in fig. 8, and fig. 8 is a block diagram of the digital watermark extraction module based on non-interactive zero knowledge proof.
HASH unit 801, configured to perform HASH calculation on the watermark embedded file;
a signature verification unit 802, configured to perform signature verification operation on the hash calculation result and the embedded watermark file, where only if the signature verification passes, it can be stated that the file is not tampered, and watermark extraction can be performed;
A non-interactive zero-knowledge proof verification unit 803 for proving watermark information, only if the watermark information is proved to be present and correct;
Identification information 804 is extracted for extracting identification information of the file from the non-interactive zero knowledge proof.
It should also be understood that in embodiments herein, the term "and/or" is merely one relationship that describes an associated object, meaning that three relationships may exist. For example, a and/or B may represent: a exists alone, A and B exist together, and B exists alone. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps described in connection with the embodiments disclosed herein may be embodied in electronic hardware, in computer software, or in a combination of the two, and that the elements and steps of the examples have been generally described in terms of function in the foregoing description to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the several embodiments provided herein, it should be understood that the disclosed systems, devices, and methods may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. In addition, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices, or elements, or may be an electrical, mechanical, or other form of connection.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the elements may be selected according to actual needs to achieve the objectives of the embodiments herein.
In addition, each functional unit in the embodiments herein may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solutions herein are essentially or portions contributing to the prior art, or all or portions of the technical solutions may be embodied in the form of a software product stored in a storage medium, including several instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods described in the embodiments herein. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Finally, it should be noted that: the foregoing description is only a preferred embodiment of the present invention, and the present invention is not limited thereto, but it is to be understood that modifications and equivalents of some of the technical features described in the foregoing embodiments may be made by those skilled in the art, although the present invention has been described in detail with reference to the foregoing embodiments. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A digital watermark embedding method is characterized in that: the method comprises the steps of firstly confirming identification information of watermark content, then carrying out non-interactive zero knowledge proof on the identification information, and embedding a result of the non-interactive zero knowledge proof as a watermark at the tail of a file.
2. The digital watermark embedding method according to claim 1, wherein: and carrying out hash calculation on the file embedded with the watermark, carrying out digital signature on a hash calculation result, and finally packaging the file embedded with the watermark and the digital signature to be used as output of the method.
3. A digital watermark extraction method is characterized in that: carrying out hash calculation on the file with the watermark, verifying the digital signature, and if the verification signature does not pass, indicating that the file is changed and not carrying out digital watermark extraction; if the verification sign passes, watermark extraction is carried out on the file.
4. A digital watermark extraction method according to claim 3, wherein: after the verification is passed, extracting the watermark embedded at the tail of the file, performing verification of non-interactive zero knowledge proof, verifying that the identification information exists and is correct through the verification, and extracting the identification information from the watermark; if the verification is not passed, the identification information is not existed or is wrong, and the watermark extraction fails.
5. A digital watermark embedding and extracting system is characterized in that: comprising the following steps:
The digital watermark embedding interface is used for converting the identification information into a watermark to be embedded into a file, generating a digital signature and finally packaging;
And the digital watermark extraction interface is used for extracting the watermark content from the packaged watermark-embedded file, carrying out verification of non-interactive zero knowledge proof after successful signature verification, and outputting the identification information after the verification is passed.
6. The digital watermark embedding and extraction system as claimed in claim 5, wherein: the digital watermark embedding interface includes:
The non-interactive zero knowledge proof operator is used for performing non-interactive zero knowledge proof on the selected identification information, hiding the identification information, and simultaneously proving the existence and correctness of the identification information, wherein the result of the non-interactive zero knowledge proof is used as a watermark to be inserted;
The watermark insertion file is used for inserting watermark information at the tail of the file to be embedded with the watermark;
HASH operator, which is used to HASH the file embedded with watermark;
And the digital signature operator is used for carrying out digital signature on the hash calculation result.
7. The digital watermark embedding and extraction system as claimed in claim 5, wherein: the digital watermark extraction interface comprises:
HASH operator, which is used to HASH the file embedded with watermark;
The signature verification operator is used for carrying out signature verification operation on the hash calculation result and the embedded watermark file, and watermark extraction is carried out after signature verification is passed;
The non-interactive zero-knowledge proof verification operator is used for verifying the watermark information, and the identification information is taken as output after the verification is passed;
The identification information is extracted for extracting the identification information of the file from the non-interactive zero knowledge proof.
8. A digital watermark embedding and extracting device is characterized in that: comprising the following steps:
The digital watermark embedding module is used for converting the identification information into a watermark to be embedded into a file, generating a digital signature and finally packaging;
And the digital watermark extraction module is used for extracting the watermark content from the packaged watermark-embedded file, carrying out verification of non-interactive zero knowledge proof after successful signature verification, and outputting the identification information after the verification is passed.
9. The digital watermark embedding and extracting apparatus according to claim 8, wherein: the digital watermark embedding module includes:
The non-interactive zero knowledge proof unit is used for carrying out zero knowledge proof on the selected identification information, hiding the identification information, and simultaneously proving the existence and the correctness of the identification information, wherein the result of the non-interactive zero knowledge proof is used as a watermark to be inserted;
A watermark insertion file unit for inserting watermark information at the end of a file to be embedded with the watermark;
HASH unit to HASH the watermark embedded file;
And the digital signature unit is used for carrying out digital signature on the hash calculation result.
10. The digital watermark embedding and extracting apparatus according to claim 8, wherein: the digital watermark extraction module comprises:
HASH unit to HASH the watermark embedded file;
The signature verification unit is used for carrying out signature verification operation on the hash calculation result and the embedded watermark file, and carrying out watermark extraction after the signature verification is passed;
The non-interactive zero-knowledge proof verification unit is used for verifying the watermark information, and the identification information is output after the verification is passed;
The identification information is extracted for extracting the identification information of the file from the non-interactive zero knowledge proof.
CN202410179233.6A 2024-02-18 2024-02-18 Digital watermark embedding and extracting method, system and device Pending CN118171248A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410179233.6A CN118171248A (en) 2024-02-18 2024-02-18 Digital watermark embedding and extracting method, system and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410179233.6A CN118171248A (en) 2024-02-18 2024-02-18 Digital watermark embedding and extracting method, system and device

Publications (1)

Publication Number Publication Date
CN118171248A true CN118171248A (en) 2024-06-11

Family

ID=91349644

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410179233.6A Pending CN118171248A (en) 2024-02-18 2024-02-18 Digital watermark embedding and extracting method, system and device

Country Status (1)

Country Link
CN (1) CN118171248A (en)

Similar Documents

Publication Publication Date Title
Rey et al. A survey of watermarking algorithms for image authentication
EP1652383B1 (en) Content identification for broadcast media
US7873183B2 (en) Embedding and detecting watermarks based on embedded positions in document layout
US6856977B1 (en) Method and system for proving ownership of digital data
US7236610B1 (en) Authenticating executable code and executions thereof
US8175322B2 (en) Method of digital watermark and the corresponding device, and digital camera which can append watermark
US20050172130A1 (en) Watermarking a digital object with a digital signature
Nagra et al. A functional taxonomy for software watermarking
CN110809763A (en) Identifying copyrighted material using time-stamped embedded copyright information
WO2007035062A1 (en) Method for generating standard file based on steganography technology, and apparatus and method for validating integrity of metadata in the standard file
JP2007104643A (en) Information processing apparatus, verification processing apparatus, control methods thereof, computer program, and storage medium
US20020181732A1 (en) Method of collaborative watermarking of a digital content
Craver et al. Copyright protection protocols based on asymmetric watermarking: The ticket concept
CN108564520A (en) GIS vector data copyright authentication method based on not blue index
Katzenbeisser On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking
CN115955308B (en) Digital asset processing method, device, equipment and medium based on quantum-resistant key
KR100906067B1 (en) Standard file generation method using a steganography technology, and apparatus and method to validate the integrity of a metadata in its
CN118171248A (en) Digital watermark embedding and extracting method, system and device
CN115396117A (en) Block chain based tamper-proof electronic document signing and verifying method and system
Kuang et al. Watermarking image authentication in hospital information system
Li et al. Security issues in watermarking applications-A deeper look
Ahmed et al. A secure watermarking scheme for buyer-seller identification and copyright protection
CN116366232B (en) Digital asset processing method, device, equipment and medium based on quantum-resistant key
KR101023436B1 (en) Digital image management system for making the printed circuit board and managing method thereof
KR20080019863A (en) Method for embedding codes to contents and apparatus therefor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination