Unlock instant, AI-driven research and patent intelligence for your innovation.

Watermark processing method, device and system

A processing method and watermarking technology, applied in the field of information security management, can solve problems such as not being applicable to text documents without character styles

Inactive Publication Date: 2015-08-19
CHINA MOBILE GRP FUJIAN CO LTD
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Existing digital watermarking technology is mainly used in the field of images and videos, and there are relatively few applications in electronic documents, and some applications are only for special electronic document formats. Specifically, digital watermarking can be performed by using character redundancy codes of documents, etc. However, the above processing method can only be applied to documents with character styles such as word and pdf, and is not suitable for text documents without character styles, such as txt text documents. However, in the process of social informatization, txt text documents, etc. have no Character-style text documents are widely used, and most important data information is stored in txt text documents, etc., so it is necessary to have a complete set of digital watermarking technology solutions that can be applied to text documents without character styles in order to effectively Identify the identity of the text document, track the data source of the text document, and ensure the data security of the text document. However, no digital watermark processing technology applicable to text documents without character styles has been proposed so far.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Watermark processing method, device and system
  • Watermark processing method, device and system
  • Watermark processing method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0150] This embodiment describes the watermark generation process of the txt text document. Figure 13 It is a schematic diagram of the watermark generation process described in Embodiment 1 of the present invention, such as Figure 13 As shown, the method includes:

[0151] Step 1301: The txt digital watermark application program at the application layer accesses the watermark processing device through a service request or an API request, and performs watermark generation processing of a txt text document. During the access process, the txt text document and the embedded Watermark element information such as: "user number, user name, organization, contact number, address, ip address, mac address, data access time".

[0152] Step 1302: the watermark processing apparatus receives a watermark generation request from an application program.

[0153] Step 1303: The watermark processing device generates a unique watermark identification code according to the watermark element inf...

Embodiment 2

[0182] This embodiment describes the watermark extraction process of a txt text document. Figure 19 It is a schematic diagram of the watermark extraction process described in Embodiment 2 of the present invention, such as Figure 19 As shown, the method includes:

[0183] Step 1901: The watermark processing apparatus receives a watermark extraction request from an application program.

[0184] The txt digital watermark application program of the application layer accesses the watermark processing device through a service request or an API request to extract the digital watermark of the txt text document, and the txt text document needs to be imported during the access process.

[0185] Step 1902: The watermark processing device invokes the txt file processing engine through the invisible watermark processing function of the txt watermark generation algorithm to read the hidden watermark position code in the last line of the txt text file.

[0186] For example, the read wate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a watermark processing method. The method comprises the following steps: acquiring a text document and watermark element information; acquiring watermark information to be embedded according to the watermark element information; and embedding the watermark information to be embedded into the text document. The invention correspondingly discloses a watermark processing device and system. According to the technical scheme in the embodiment of the invention, the embedding and extraction of digital watermarks do not need to be performed on the basis of character styles, so that the method can be applied to text documents without character styles such as txt text documents; the application range of a digital watermark technology is expanded; and the data security is enhanced.

Description

technical field [0001] The invention relates to the technical field of information security management, in particular to a watermark processing method, device and system. Background technique [0002] With the continuous development of social informatization, the amount of information is increasing day by day, and the value of information is constantly increasing. Once important data information is leaked, it will bring immeasurable losses to enterprises and even the country, such as the information exposed in telecommunications, banking and other industries in recent years. The economic loss and negative social impact caused by leakage. Therefore, how to more effectively control the risk of information dissemination and protect the security of important information has very important practical value. [0003] Traditional security control focuses on "pre-event" authority control and "in-event" encryption methods, but the protection of information content by encryption metho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/16
Inventor 魏建荣彭家华谢志崇蔡智佑
Owner CHINA MOBILE GRP FUJIAN CO LTD