1272814 九、發明說明: 【發明所屬之技術領域】 本發明係關於加岔糸統及方法’特別係一種文本加密系統及方法。 【先前技術】 一隨著數位化時代的來臨,資訊數位化已成為必然的趨勢,然而由於 位資訊(如:文字,圖片,影像…)的傳播性和易拷貝性,以及蓬勃發 的網路,使得人解以很容易從網路獲得資訊,因此對於數位資訊的^ 不再如轉統著條獅料,從崎崎職權的倾及相_智= 產權問題已備受關注,成為一刻不容緩急需解決的問題。 ^、 目前最廣為被個_厂浮水印編碼技術”。所謂的“浮水印 技^ L即是在欲傳送的原始數位資訊中嵌人某些與原始數位資訊盖關的 貧訊,使得未經授權的第三者無法私自任意使用未經授權的原始數 =貝訊,其具透· ’錢加人浮水印的數位龍與原始數位㈣間 f明顯的《,即隱㈣,不讓人察覺數錄訊中有浮存在^ 目w大多數的數位資訊都會採取這樣的方式來降低有心人士對傳 位貧訊的可以破壞竊取的意圖。但是以目前f知的 術,,口 卩_, =位處理i式獲取數位貧訊時,其才具有—糾保 貝題猎由還原作業進行確認’即失去了版權保護的作用。 因此有必要提出―種文本加密純及方法 二$在以紙本娜式顯示過程中能顯性的指示出進 ^^者’從而防止非法者藉由拍照、列印等形式進行盜版,最 【發明内容】 與本ίΓί供一種文本加密系統,該系統包括一存儲單元,-文本#取 用於广:始位置確定模組,一加密模組及一保存模組。且中今存綠東1 用於存儲文本資訊,其中文本包括北旦 旦 /、中該存儲早兀, 其相應-粗糙紋粗糙背景及平滑背景, L纹理特徵及滑紋理特徵。該f景對應_像素點標,其中 1272814 對應—亮度值。該文本獲取模組,用於從存儲單元帽取要加 ’即文本#景像素點槽。該加密位置確定模組,用於確定加 資訊保存保存模組’用於將加密後的文本 子模ΐ中確賴組包括—f景區塊分割子模組,—背景區塊分析 、 區塊確疋子权組及一像素點確定子模組。該背景區塊分巧 f景分織複數互不重疊、大小相等的背景區塊。該 區塊的紋i特徵11析該f 塊的紐,即確定_背景區麟加練置。像素 H 用於根據—函數較粗糙背景區塊中像素點。 要加inr加密方法,其包括有如下步驟:⑴獲取所 文本背去本包括背景,其包括_背景及平滑背景,該 本背景為魏2分割該文 行’ Μ為平滑背景區塊’返回執 中像素點;根據—函數獲取該粗婦景區塊 加密後的文^訊月景區塊中像素點當前亮度值;及(g)保存 歹=等形式進行錄,最者,從而防止非法者藉由拍照、 【實施方式】 存儲單:二-文本^文本 =密f、統的模組架構圖。系統包括一 13,及-保存模組14。又果存^元=口密位置確定模組12,-加密模組 括背景,談昔旦仏」、中存錯 用於存儲文本資訊,其中文本包 m且糙背景及平滑背景,分別對應一粗糙紋理特徵及一 7 ⑧ 1272814 :滑紋理特徵。前景減地藉由—像素點檔來表示 =可_數二進餘元絲科亮錄。例如,當該 其像素點可用8位二進位位元表示,其顯示出來料是白守, 素點的亮度值為“〇’’,最白像素_亮度值為“255” ”,、、個旦 素點的亮度值隨機分佈在“〇,,到“255,,的F 月豕各個像 ,可通過:組…G,表4=其==個 、位位7G來表不其骨度級別,例如可為8位,16位,32位,位 =示的像素點亮度級別越多。上述表示像素點亮度值二進位位 體=應用科同。文本獲取歡U,赠料元帽取要加= 的背景像素點權。加密位置確定模組12,確定了所要加密的 j定粗糙背景巾像餘。加密做13,麟織該加密位置崎 二中中«關亮度值。健模組14,用於將加密後的文本贿^儲單1 如第二圖所示,係為本發明模組架構圖中加密位置確定模組Η子模組 圖。該加密位置嫁定模、組12包括-背親塊分割子模組12〇、—背景區塊 分析子模組121、一背景區塊確定子模組122及一像素點確定子模組。 其中背景區塊分割子模組12〇,用於將文本背景分割成複數互不重疊大小相 等的背景區塊,即將該背景像素點檔分誠大小相等的象素塊,該象素塊 大小可依具體應用而定,例如可為8χ8,16χ16,32χ32大小象素塊。背景 區塊分析子模組m,用於讀取-背景區塊並根據一分析函數對背景區塊内 的背景,即象素塊,進行紋理特徵分析產生—分析結果。其中該分析函數 為-習知圖像分析函數。背景區塊確定子模組⑵,用於將分析結果與一預 定值比對,確定該背景區塊的紋理特徵。像素點確定子模組123,用於根據 一函數確定該加密背景區塊中像素點。其中該函數為一習知位置確定函數。 如第三圖所示,係為本發明文本加密方法的流程圖。首先,文本獲取 模組11從存儲單元10中獲取要加密的文本資訊,其中該文本包括背景, 其包括粗糙背景及平滑背景,分別對應一粗糙紋理特徵及一平滑紋理特 徵。該背景相應地藉由一像素點檔來表示,該像素點檔中每一像素點對應 一焭度值,其可藉由複數二進位位元表示(步驟S300)。加密位置確定模組 1272814 12確定粗糙背景中像素點為加練置(步驟讓)。加練組i3按一調整 值調整該加^位置所對應粗糙背景中像素點的當前亮度值。該調整可包ς 按調整值提亮度值與降低當前亮度值,該值可 -特定百分比,輕後像素點亮度值不超出亮度值賴。例如,當^3 用8位二進位位元表示(即為黑白背景)的當前亮度值為12 ^ 的5崎低當前亮度值時,調整後的亮度值則為6〇。當像素點肖值 Β)表不(即為彩色背景)的當前亮度值為(126,126,126) 值的50%降低當前亮度值時,調整後的亮度值為(63,63,⑹。^ 位置上被織的像纽亮雜可對應_二進位加密資練元(例如、二 ί位點撤可對應相應二進位加嫩位元⑽ Γ由步驟S302)。保親组14將加密後的文本 貝δίΐ保存於存儲早πΐο中(步驟S303)。 上述流程可以是作為對一頁文本資訊的加密過程,因此,對於 正的電子書物域可躺魏上述域擁實現。 、 8301 ° 塊(每堍顧m 成n個互不重疊、大小鱗的背景區 即將背景像素點標分割細個大小相等的象辛塊, ZT^rtAM ^ 8x8 ^ 16x16 * 32-2 ^ ° ^析子模組121讀取一背景區塊1,其中〇<也(步驟 徵並i生二莫组121根據一分析函數分析該背景區塊i紋理特 _2)。該分析函數可為-習知的圖像分析函數(步驟 識)。月景區塊綠定子模M122將該 爾細賊,返回執 ;_徵,像素點確定子模組;;==== 二’返回執一,該函數可為 如弟五圖所不,係為利用本發明實對文本加密的實施例。在本實施 ⑧ 1272814 例中^由串―進餘%表不加密資訊,其巾該加密資湖於證實該文 本的版核财者。加密位置上被織轉麵紐值可聽—加密資訊二 進位位=(例如υ ’減’域位置上未被纏的像麵亮度值可對岸另 -加密,二進位位元(例如G)。藉由像翻亮度值的調整,實賴 顯性加密。 Τ U獲取來自存料元1G巾要加㈣文本f景的像素點 以=自使用者的加密資訊(步驟s駕)。背景區塊分割子模組12〇分判 為;1塊互不重疊、大小相等的f景區塊(即象素塊),並將η賦 值魏!(步驟讀)。背景區塊分析子模組m判斷;是否為〇 (步驟1272814 IX. DESCRIPTION OF THE INVENTION: TECHNICAL FIELD OF THE INVENTION The present invention relates to a system and method of the invention, and in particular to a text encryption system and method. [Prior Art] With the advent of the digital age, information digitization has become an inevitable trend, but due to the dissemination and copyability of information (such as: text, images, images...), and the booming network It makes it easy for people to get information from the Internet. Therefore, the digital information is no longer as good as the singer. From the perspective of Sakizaki’s authority and the status of intellectual property rights, it has become a concern. Urgent problems. ^, at present, the most widely used is a _factory watermark coding technology. The so-called "watermarking technology ^ L is to embed some of the information related to the original digital information in the original digital information to be transmitted, so that An authorized third party is not allowed to use the unauthorized original number = Beixun arbitrarily, and it is obvious that the 'Dragon's watermarked digital dragon and the original number (four) are obvious, that is, hidden (four), not letting people There are some kinds of digital information in the video recording. This way, the digital information will be used in such a way as to reduce the intention of the person concerned to destroy the information. However, in the current practice, the 卩_, = bit processing i-type to obtain the digital poor news, it has - the corrective protection of the problem is confirmed by the reduction operation, that is, lost the role of copyright protection. Therefore, it is necessary to propose a kind of text encryption pure and method two. In the paper-based display process, the explicit indication can be made to prevent the illegal person from pirating by taking pictures, printing, etc. SUMMARY OF THE INVENTION A text encryption system is provided, the system includes a storage unit, and the text # is used for the wide: start position determining module, an encryption module and a saving module. And in the present, the green east 1 is used to store text information, wherein the text includes the north/denier, the middle storage, the corresponding-rough grain rough background and smooth background, the L texture feature and the slip texture feature. The f-field corresponds to the _pixel marker, where 1272814 corresponds to the luminance value. The text acquisition module is configured to extract, from the storage unit, a text box. The encrypted location determining module is configured to determine that the information saving and saving module is configured to: the encrypted text sub-module is determined to include a group of sub-blocks, the background block analysis, the block determination The dice group and a pixel point determine the sub-module. The background block is divided into a number of background blocks that do not overlap each other and are equal in size. The feature i of the block is analyzed as the n of the f block, that is, the _background area is added. Pixel H is used to base pixels in a coarser background block based on the function. To add the inr encryption method, the method includes the following steps: (1) obtaining the text back to the background including the background, including the background and the smooth background, the background is Wei 2 splitting the text 'Μ is a smooth background block' The pixel is in the middle; according to the function, the current brightness value of the pixel in the encrypted moonlight block is obtained; and (g) the file is saved in the form of 歹=, etc., thereby preventing the illegal person from Photographing, [Embodiment] Storage list: two-text ^ text = dense f, unified module architecture diagram. The system includes a 13, and - save module 14. In addition, the memory = element = mouth-tight position determination module 12, - the encryption module includes the background, talk about the past," and the error is used to store text information, wherein the text package m and the rough background and the smooth background correspond to one Rough texture features and a 7 8 1272814: slip texture feature. The foreground is reduced by the pixel point file = can be _ number two into the remaining yuan silk record. For example, when the pixel point is represented by an 8-bit binary bit, the display material is white-shoulder, the luminance value of the prime point is “〇”, and the white pixel_luminance value is “255” ”, The brightness values of the denier points are randomly distributed in the "〇,, to the "255,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, For example, it can be 8 bits, 16 bits, 32 bits, and the bit = the pixel level brightness level shown. The above indicates the pixel point luminance value binary bit = application section. The text gets the U, and the gift element cap takes the background pixel right of the plus. The encrypted position determining module 12 determines the j-rough background towel to be encrypted. Encryption is done 13 and the woven weave is encrypted in position. The health module 14 is configured to display the encrypted text storage module 1 as shown in the second figure, which is a block diagram of the encrypted location determining module in the module architecture diagram of the present invention. The encryption location grafting module, group 12 includes a back-parent segmentation sub-module 12〇, a background block analysis sub-module 121, a background block determination sub-module 122, and a pixel determination sub-module. The background block dividing sub-module 12〇 is configured to divide the text background into a plurality of background blocks of equal size and non-overlapping, that is, the background pixel points are divided into equal-sized pixel blocks, and the pixel block size can be Depending on the application, for example, it can be 8χ8, 16χ16, 32χ32 size pixel blocks. Background The block analysis sub-module m is used to read the background block and perform texture feature analysis on the background in the background block, that is, the pixel block, according to an analysis function. Wherein the analysis function is a conventional image analysis function. The background block determining sub-module (2) is configured to compare the analysis result with a predetermined value to determine a texture feature of the background block. The pixel determination sub-module 123 is configured to determine a pixel point in the encrypted background block according to a function. Wherein the function is a conventional position determining function. As shown in the third figure, it is a flowchart of the text encryption method of the present invention. First, the text acquisition module 11 obtains text information to be encrypted from the storage unit 10, wherein the text includes a background including a rough background and a smooth background, corresponding to a rough texture feature and a smooth texture feature, respectively. The background is correspondingly represented by a pixel dot file, each pixel point of the pixel dot file corresponding to a threshold value, which can be represented by a plurality of binary bit bits (step S300). The encrypted position determining module 1272814 12 determines that the pixel points in the rough background are added (steps). The training group i3 adjusts the current brightness value of the pixel in the rough background corresponding to the plus position according to an adjustment value. The adjustment can include the brightness value according to the adjustment value and the current brightness value, which can be - a certain percentage, and the brightness value of the pixel point does not exceed the brightness value. For example, when ^3 is represented by an 8-bit binary bit (that is, a black-and-white background) with a current luminance value of 12^, the adjusted luminance value is 6〇. When the pixel value is 肖)) The current brightness value of the table (ie, the color background) is (126, 126, 126). When the current brightness value is reduced by 50%, the adjusted brightness value is (63, 63, (6). ^ The position of the woven image can be corresponding to the _ binary cryptographic training element (for example, the two 位 position withdrawal can correspond to the corresponding binary plus position (10) Γ by step S302). The security group 14 will be encrypted The text δ ΐ ΐ is stored in the storage ΐ ΐ ( ( (step S303). The above process may be used as an encryption process for a page of text information, and therefore, for the positive e-book object domain lie, the above domain is implemented., 8301 ° block ( Each care m is n non-overlapping, large-scale background areas of the scale, that is, the background pixel points are divided into small equal-sized symplectic blocks, ZT^rtAM ^ 8x8 ^ 16x16 * 32-2 ^ ° ^ analysis sub-module 121 Reading a background block 1 , where 〇 < also (step merging and generating omni-group 121 analyzes the background block i texture according to an analysis function _2). The analytic function can be a conventional image Analysis function (step identification). The moon-shaped block green stator model M122 will return to the thief, return to the ruling; Point determining sub-module;;==== Two's returning one, the function may be the same as the fifth figure, which is an embodiment of real-text encryption using the present invention. In this example, the implementation of 8 1272814 The string-return % table does not encrypt the information, and the towel is encrypted by the lake to verify the version of the text. The encrypted position is woven and the value is audible - the encrypted information binary bit = (for example, υ 'minus' The image plane luminance value that is not wrapped in the domain position can be encrypted on the other side, and the binary bit (for example, G). By adjusting the brightness value, the explicit encryption is performed. Τ U acquires the 1G towel from the storage element. To add (4) the pixel of the text f scene to = from the user's encrypted information (step s drive). The background block segmentation sub-module 12 is divided into; 1 block of non-overlapping, equal size f blocks (ie Pixel block), and assign η to Wei! (step read). Background block analysis sub-module m judge; whether it is 〇 (step
t果Λ不為G,背景區塊分析子模組121讀取第1塊背景區塊(步驟 ^ U區塊分析子歡121根據—分析函數分析該背塊紋理特 ί ’ Ϊ分析結果(步驟S5G4)。背景區塊確定子模組122將該分析結果 ”預疋值進行比對,確定該背景區塊敝理特徵(步驟s5〇5)。 如果該背景區塊敝理特徵為粗糙紋理特徵,判斷加㈣訊長度是否 為〇,如果加密資訊長度為〇,執行步驟S511 (步驟S5〇6)。如果加” 為G,像素點確好模組123根據—函數獲取雜糖背景區塊^ 進位位點° W加㈣訊二進位位元值’如果該加密資訊二 插Ϊ 執行步驟S51° (步驟S5°8)。如果該加密資訊二進位位 ^的密模組13按—調錄調魏加密位置賴雜糙背景中像素 献值,該調整值可為當前亮度值的—特定百分比(例如5〇%), 二度值或降低當前亮度值(步驟S5〇9)。保存模組 二、,呆存該加滤果’同時加密資訊長度減―,返喊行步驟娜。 S51〇r密結果包括加密位置以及相應的加密資訊二進位位元值(步驟 如果該背景區塊的紋理特徵為平敎理特徵,變數i減_,返 驟 S502 (步驟 S511)。 (步,保存模組14保存加密後的文本背景像素點槽,流程結束 1272814 綜上所述,以上所述僅為本發明之較佳實施例而已,且已達廣泛 其他未脫離本發明所揭示之精神下所完成之均等變化或修飾, 均應包含在下述之申請專利範圍内。 Τ 【圖式簡單說明】 ^圖係為本發明文本加密系統的模組架構圖。 第二圖係為本發明核組架構圖中加密位置確定模組子模組圖 第三圖係為本發明文本加密方法的流程圖。 ^圖係林發败本加財絲財麵隱子流程圖。 如峨實施例。t fruit is not G, the background block analysis sub-module 121 reads the first block background block (step ^ U block analysis child Huan 121 according to the analysis function analysis of the back block texture feature ' Ϊ analysis results (step S5G4) The background block determining sub-module 122 compares the analysis result "pre-value" to determine the background block texture feature (step s5〇5). If the background block texture feature is a rough texture feature If the length of the encrypted information is 〇, if the length of the encrypted information is 〇, step S511 is performed (step S5〇6). If the added value is G, the pixel is determined to be a module 123 to obtain the background of the sugar background according to the function ^ Carry position ° W plus (four) message binary bit value 'If the encrypted information is inserted, perform step S51° (step S5°8). If the encrypted information binary bit ^ is pressed, the key module 13 is adjusted The Wei encryption position depends on the pixel value in the rough background, and the adjustment value may be a specific percentage (for example, 5〇%) of the current brightness value, a second value or a decrease in the current brightness value (step S5〇9). , and save the added filter fruit at the same time, the length of the encrypted information is reduced. The S51 密 密 。 S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S S (Step, save module 14 saves the encrypted text background pixel dot slot, flow ends 1272814. In summary, the above is only a preferred embodiment of the present invention, and has reached a wide range without departing from the disclosure of the present invention. The equal changes or modifications made under the spirit of the company shall be included in the scope of the following patent application. Τ [Simple description of the diagram] ^ The diagram is the module architecture diagram of the text encryption system of the invention. The third diagram of the encrypted location determining module sub-module in the invention core architecture diagram is a flow chart of the text encryption method of the present invention. ^ The diagram of the forest is defeated by the riches and the financial face hidden sub-flow chart. .
10 11 12 120 121 122 123 13 14 存儲單元 文本獲取模組 加密位置確定模組 背景區塊分割子模組 背景區塊分析子模組 背景區塊確定子模組 像素點確定子模組 加密模組 保存模組 11 ⑧10 11 12 120 121 122 123 13 14 Storage unit text acquisition module encryption position determination module background block division sub-module background block analysis sub-module background block determination sub-module pixel point determination sub-module encryption module Save module 11 8