Watermark embedding method, watermark reading method and watermark system based on desensitized data

A watermark embedding and data technology, applied in the field of data security, can solve the problems of unable to prove data leakage, data unable to be watermarked, unfavorable data security protection, etc.

Active Publication Date: 2020-10-27
NEWLAND DIGITAL TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004]Because of the reproducibility of data, once a problem occurs, the data owner needs to prove his innocence and prove where the data output was leaked from
However, the existing desensitized data cannot be watermarked. Once the data spreads out of control, it is impossible to prove the source of the data leakage, which is not conducive to data security protection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Watermark embedding method, watermark reading method and watermark system based on desensitized data
  • Watermark embedding method, watermark reading method and watermark system based on desensitized data
  • Watermark embedding method, watermark reading method and watermark system based on desensitized data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings. It should be noted here that the descriptions of these embodiments are used to help understand the present invention, but are not intended to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below may be combined with each other as long as they do not constitute a conflict with each other.

[0039] The technical solution of the present invention is: on the one hand, the present invention proposes a kind of watermark embedding method based on desensitized data, comprising steps:

[0040] S10: Log in to the watermark system; sort the data, set the order of the data columns, and record the order of the rows and columns of the data; when reading the watermark later, it is necessary to restore the order of the data according to the order of the rows and columns o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a watermark embedding method, watermark reading method and watermark system based on desensitized data. The watermark embedding method based on desensitized data comprises thesteps: sorting data, setting the sequence of data columns, and recording the sequence of rows and columns of the data; performing desensitization processing on the sensitive field of the data to obtain a desensitization field; encrypting and encoding the traceability information to obtain watermark information; and embedding watermark information into the desensitization field through a preset rule, the preset rule being that one or more bits in the desensitization field are changed into preset symbols to serve as carriers of the watermark information. According to the technical scheme, data can be traced back effectively, more data information cannot be lost when watermarks are added in the encryption method, the watermark removing cost is low, sensitive information can be effectively protected, leakers can be traced back, and privacy rights and interests of enterprises and individuals are protected.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a watermark embedding method based on desensitized data, a watermark reading method and a watermark system. Background technique [0002] In the era of big data, while data brings great value, it also brings difficulties in user privacy protection. The leakage of sensitive information will give some criminals an opportunity to seriously damage the legal rights of enterprises and individuals. How to protect user privacy and prevent sensitive information leakage in the process of big data development and application has become a new challenge. The Cybersecurity Law of the People's Republic of China has stricter data privacy protection requirements, and data protection technology is becoming a popular research direction for universities and enterprises. [0003] In the prior art, when the sensitive data is exported, the only way to protect the data security is to desensitize ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/16G06F21/60G06F21/62
CPCG06F21/16G06F21/602G06F21/6245
Inventor 林锋仰
Owner NEWLAND DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products