Method, terminal and server for realizing screen digital watermarks

A technology of digital watermarking and realization method, applied in the field of information hiding, can solve problems such as failure to leak secrets, and achieve the effect of being difficult to remove

Active Publication Date: 2015-12-09
SHENZHEN LEAGSOFT TECH
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a screen digital watermark implementation method, which aims to solve the problem that the obvious visible watermark not only has a certain impact on data display and work, but also is easy to be processed and re-propagated during transmission, so that it cannot be displayed. The way of watermarking solves the problem of leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, terminal and server for realizing screen digital watermarks
  • Method, terminal and server for realizing screen digital watermarks
  • Method, terminal and server for realizing screen digital watermarks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] see figure 1 , figure 1 It is a flow chart of the implementation method of screen digital watermarking provided by Embodiment 1 of the present invention, and the details are as follows:

[0035] In step 101, a sensitive data read request is received.

[0036] Wherein, the sensitive data read request indicates sensitive data.

[0037] In step 102, it is judged whether there is a digital watermark in the sensitive data.

[0038] Wherein, upon receiving the sensitive data read request, the sensitive data is not read immediately, but whether there is a digital watermark in the sensitive data is judged first.

[0039] In step 103, sensitive data with a digital watermark is generated for the sensitive data according to the user watermark information, and the sensitive data with the digital watermark is read.

[0040] Among them, when it is judged that there is no digital watermark, sensitive data with a digital watermark will be generated for the sensitive data, and the u...

Embodiment 2

[0044] It should be noted that the method of the embodiment of the present invention also provides a way to generate sensitive data with a digital watermark, please refer to figure 2 , figure 2 It is a flow chart of the implementation method of the screen digital watermark provided by Embodiment 2 of the present invention, in figure 1 On the basis of , when the sensitive data is a sensitive image, such as figure 2 As shown, step 103 may include:

[0045] Step 103a, divide the sensitive picture into M sub-sensitive pictures.

[0046] Wherein, M is an integer not less than 1, and when dividing the sub-sensitive picture, it can be divided according to the preset size of the sub-sensitive picture.

[0047] For example, the size of each sub-sensitive picture is divided into 120px*150px, where px is a pixel, and the size of the sub-sensitive picture can be divided according to the actual situation.

[0048] Step 103b, dividing the sub-sensitive picture into N sub-picture bloc...

Embodiment 3

[0076] see image 3 , image 3 It is a flow chart of the implementation method of the screen digital watermark provided by Embodiment 3 of the present invention, such as image 3 shown in figure 1 or figure 2 On the basis of , methods may also include:

[0077] Step 104: Determine a vector map set of user watermark information corresponding to the digital watermark according to the digital watermark.

[0078] Wherein, if there is a digital watermark in the sensitive data, the vector map set of user watermark information corresponding to the digital watermark can be determined according to the digital watermark.

[0079] Step 105, sending a user watermark information query request to the server.

[0080] Wherein, after the vector map set is determined, a user watermark information query request is sent to the server, and the user watermark information request carries the vector map set of the user watermark information corresponding to the digital watermark.

[0081] It ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applied to the technical field of information hiding, and provides a method, terminal and server for realizing screen digital watermarks. The method comprises the following steps: receiving a sensitive data reading request; judging whether the digital watermarks exit in sensitive data or not; and if not, generating the sensitive data having the digital watermarks aiming at the sensitive data according to user watermark information of a user, and reading the sensitive data having the digital watermarks, wherein the user watermark information comprises a vector diagram set with vector diagrams respectively corresponding to each character in a user character set; and the user character set is a character set distributed to the user by the server. According to the embodiment of the invention, the digital watermarks are generated aiming at the sensitive data according to the vector diagrams in the vector diagram set; the digital watermarks are generated by adopting the vector diagrams; furthermore, the vector diagrams can be composed of pixel points according to a pre-set rule; namely, only few pixel points can be replaced by the vector diagrams after being added onto the sensitive data; and thus, display of the sensitive data cannot be influenced by the vector diagrams.

Description

technical field [0001] The invention belongs to the technical field of information hiding, and in particular relates to a method for realizing a screen digital watermark, a terminal and a server. Background technique [0002] Digital watermarking (Digital Watermarking) technology is to embed some identification information (that is, digital watermark) directly into digital carriers (including multimedia, documents, software, etc.) or indirectly represent (modify the structure of a specific area), without affecting the use value of the original carrier. , and it is not easy to be detected and modified again. But it can be identified and identified by the producer. Through the information hidden in the carrier, the purpose of confirming content creators, buyers, transmitting secret information, or judging whether the carrier has been tampered with can be achieved. Digital watermarking is an effective way to protect information security, realize anti-counterfeiting traceabili...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04N1/32
Inventor 何华荣张双峻刘兴艾王志
Owner SHENZHEN LEAGSOFT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products