Movatterモバイル変換


[0]ホーム

URL:


CN104517045B - Digital document guard method and system - Google Patents

Digital document guard method and system
Download PDF

Info

Publication number
CN104517045B
CN104517045BCN201310447489.2ACN201310447489ACN104517045BCN 104517045 BCN104517045 BCN 104517045BCN 201310447489 ACN201310447489 ACN 201310447489ACN 104517045 BCN104517045 BCN 104517045B
Authority
CN
China
Prior art keywords
watermark
digital document
image file
tiff
customized label
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310447489.2A
Other languages
Chinese (zh)
Other versions
CN104517045A (en
Inventor
步彤
杨小林
武勇
刘焱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai middle shift information technology Co., Ltd.
Original Assignee
SHANGHAI ZHONGYI COMMUNICATION TECHNOLOGY ENGINEERING Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI ZHONGYI COMMUNICATION TECHNOLOGY ENGINEERING Co LtdfiledCriticalSHANGHAI ZHONGYI COMMUNICATION TECHNOLOGY ENGINEERING Co Ltd
Priority to CN201310447489.2ApriorityCriticalpatent/CN104517045B/en
Publication of CN104517045ApublicationCriticalpatent/CN104517045A/en
Application grantedgrantedCritical
Publication of CN104517045BpublicationCriticalpatent/CN104517045B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

The invention provides a kind of method for creating shielded digital document, including:The digital document is parsed;The digital document is changed into tiff image file from unprocessed form;The first customized label defined in the first image file directory IFD of the tiff image file;Unprocessed form digital document is stored in first customized label;And the embedded watermark in the view data of the tiff image file.

Description

Digital document guard method and system
Technical field
The present invention relates to document process, more particularly to digital document guard method and system.
Background technology
With the arrival of digital Age, document content is gradually changed from paper-based form to digital form, and digital document is believedCease content and medium is unrelated, replicate very simple, and the bandwidth that content transmission needs is relatively low.These features cause digital documentStorage, duplication and propagation become very convenient, but thus trigger it is unwarranted for sensitive information in document contentDistorting and reusing also turns into document publisher increasingly concern.
Currently, for electronic documents such as conventional Word, Excel, PowerPoint, MS Office office softwares are providedTo the Information Rights Management method of associated documents, these documents can also export as to PDF format file distribution.These methodsDocument sensitive information can be helped prevent to be diffused into due to unexpected or carelessness in personnel's hand of mistake.But these methods can only be directed toMS Office document formats carry out protection processing, there is the limitation of document process form.Moreover, typically being handled through overprotectionDigital document in do not include by the original document of protection document, this comes for the user for needing to control whole document access rightsSay, it is more inconvenient on the contrary.
Therefore, this area needs a kind of general, flexible digital document protection scheme badly.
The content of the invention
The brief overview of one or more aspects given below is to provide to the basic comprehension in terms of these.This general introduction is notThe extensive overview of all aspects contemplated, and it is also non-to be both not intended to identify the key or decisive key element of all aspectsAttempt to define the scope in terms of any or all.Its unique purpose is to provide the one of one or more aspects in simplified formA little concepts think the sequence of more detailed description given later.
According to an aspect of the present invention there is provided a kind of method for creating shielded digital document, including:To the numberWord document is parsed;The digital document is changed into tiff image file from unprocessed form;The of the tiff image fileFirst customized label defined in one image file directory IFD;Unprocessed form digital document is stored in the first self-defined markIn label;And the embedded watermark in the view data of the tiff image file.
In one example, the unprocessed form of the digital document is Word, Excel, PowerPoint, html web page, textOne of file format.
In one example, the digital document is stored in into first customized label includes:To unprocessed form numeralDocument performs compression;Unprocessed form digital document after compression is encrypted;And the unprocessed form numeral after encryption is literaryShelves are stored in first customized label.
In one example, this method also includes:Second is self-defined defined in the first IFD in the tiff image fileLabel;And the classification information of the digital document is stored in second customized label.
In one example, the embedded watermark includes in the view data of the tiff image file:The watermark is performedEncryption and disorder processing;Dct transform is performed to the view data;According to watermark embedding strategy in the frequency domain of the view data it is embeddingEnter encrypted and scramble watermark;And idct transform is performed to the view data after embedded watermark.
There is provided a kind of method for browsing shielded digital document, the numeral according to another aspect of the present inventionDocument is included in tiff image file, and this method includes:Recover watermark from the view data of the tiff image file;TestThe recovered watermark of card;If being proved to be successful, the image of the tiff image file is played;And if authentication failed, from thisUnprocessed form digital document is read in the first customized label in first image file directory IFD of tiff image file.
In one example, the unprocessed form digital document bag is extracted from the first customized label of the tiff image fileInclude:The unprocessed form digital document is decrypted;And the unprocessed form digital document after decryption is performed decompression to obtainObtain original digital document.
In one example, recovering the watermark from the view data of the tiff image file includes:To the view dataPerform dct transform;The watermark is extracted from the frequency domain of the view data according to watermark extracting strategy;And the water to being extractedPrint performs decryption and anti-disorder processing to recover watermark.
In one example, verify that recovered watermark includes:The watermark recovered and original watermark are compared;IfBoth are consistent, then are proved to be successful, otherwise authentication failed.
In one example, this method also includes:The second customized label from the first IFD of the tiff image fileThe middle classification information for reading the digital document.
According to another aspect of the invention there is provided a kind of service end for being used to create shielded digital document, including:Document resolver, to be parsed to the digital document;Format converter, the digital document to be converted from unprocessed formInto tiff image file;Customized label write device, to fixed in the first image file directory IFD of the tiff image fileAdopted first customized label, and the digital document is stored in first customized label;And water mark embedding device, toEmbedded watermark in the view data of the tiff image file.
In one example, the unprocessed form of the digital document is Word, Excel, PowerPoint, html web page, textOne of file format.
In one example, the service end also includes compression and encryption equipment, to perform compression and to pressure to the digital documentDigital document after contracting is encrypted, and wherein the digital document is stored in the first self-defined mark by the customized label write deviceLabel include the digital document after encryption being stored in first customized label.
In one example, customized label write device also defined in the first IFD of the tiff image file second fromLabel is defined, and the classification information of the digital document is stored in second customized label.
In one example, water mark embedding device insertion watermark includes:Encryption and disorder processing are performed to the watermark;To the figureAs data perform dct transform;According to the watermark of watermark embedding strategy embedded encrypted and scramble in the frequency domain of the view data;And idct transform is performed to the view data after embedded watermark.
There is provided a kind of client for being used to browse shielded digital document, the number in accordance with a further aspect of the present inventionWord document is included in tiff image file, and the client includes:Watermark detector, to the figure from the tiff image fileAs recovering watermark in data, and verify recovered watermark;And image viewer, should to be played in watermark verification successThe image of tiff image file;And customized label reader, to the first image file mesh from the tiff image fileRecord and unprocessed form digital document is read in the first customized label in IFD.
In one example, the client also includes decompression and decipher, to be carried out to the unprocessed form digital documentDecryption, and the unprocessed form digital document after decryption is performed decompression to obtain original digital document.
In one example, the watermark detector, which recovers watermark, includes:Dct transform is performed to the view data;According to watermarkExtract strategy and the watermark is extracted from the frequency domain of the view data;And decryption is performed to the watermark extracted and random place is invertedManage to recover watermark.
In one example, the watermark detector verifies that recovered watermark includes:By the watermark recovered and initial conditionPrint is compared;If both are consistent, it is proved to be successful, otherwise authentication failed.
In one example, the customized label reader also from second in the first IFD of the tiff image file fromDefine the classification information that the digital document is read in label.
Brief description of the drawings
After the detailed description of embodiment of the disclosure is read in conjunction with the following drawings, it better understood when the present invention'sFeatures described above and advantage.In the accompanying drawings, each component is not necessarily drawn to scale, and with similar correlation properties or featureComponent may have same or like reference.
Fig. 1 is the schematic diagram for the file structure for showing tiff format image file;
Fig. 2 is the schematic diagram for showing digital watermarking system according to an aspect of the present invention.
Fig. 3 is the flow for showing the method performed by the service end of file protection system according to an aspect of the present inventionFigure.
Fig. 4 is the flow for showing the method performed by the client of file protection system according to an aspect of the present inventionFigure.
Fig. 5 is the block diagram of the service end and client that show file protection system according to an aspect of the present invention.
Embodiment
Below in conjunction with the drawings and specific embodiments, the present invention is described in detail.Note, it is below in conjunction with accompanying drawing and specifically realIt is only exemplary to apply the aspects of example description, and is understood not to carry out any limitation to protection scope of the present invention.
TIFF(TIF)It is the file format based on mark, being widely used in will to picture qualityAsk the storage and conversion of higher image.GIFf image file format designs to store scanner image earliest, canTo handle black and white, gray scale and coloured image, when storing true color image as BMP forms, RGB is directly stored trichromaticColor value and without using palette.Because its flexible structure and pardon is big, it has turned into a kind of mark of image file formatStandard, most picture systems all support this form.The image file of tiff format is conveniently to check first, is supported" photo viewer " that windows operating systems are carried checks picture material.The maximum color depth of the image file of tiff format is32, very fine and smooth image color can be showed.The image file of tiff format also has two important features, and one is to support multipageImage, two be that the maximum feature of tiff image form is favorable expandability, and file structure is supported the self-defined of label field and read.JustIt is the two features based on tiff image form, the present invention proposes a kind of general, flexible digital document protection scheme.
Fig. 1 shows the schematic diagram of the file structure of tiff format image file.GIFf format image file is generally comprisedThree key elements, i.e. image file head(IFH), image file directory(IFD)And directory entry(DE)And view data, such as figure instituteShow.Each tiff image file is started with the IFH of 8 bytes, and IFH is first data structure in tiff file, in imageFile architecture it is top.This structure is only in a tiff file, there is fixed position.IFH is containedNecessary information needed for the correct other parts for explaining tiff file, such as IFH has the pointer for pointing to first IFD, such as schemesIt is shown.IFD contains the various information of image, while also including the pointer of a sensing actual image data.As illustrated, everyIndividual IFD includes multiple DE, and one label of each DE correspondences, these DE identify size, resolution ratio, color depth of tiff image etc.Each attribute.Similarly, each DE can have a pointer(For example, offset)To point to associated data field opening hereofBeginning position, and provide data type and length, as shown in the figure.This file structure allows data field to be positioned at appointing for fileIt is where square, and can be random length, therefore file format is very flexible.The standard mark defined except tiff image filespecSign outside attribute, customized label can also be used to identify special image attributes as needed.Because an IFD only identifies oneThere can be multiple images in all tag attributes of image, a tiff file, so, there are several pages of figures in a tiff filePicture, will be to that should have several IFD.
In view of the These characteristics of tiff format image file, according to an aspect of the present invention, can be by electronic document filesEvery page be recorded as a width tiff image, correspond to an IFD.Shown because the content of electronic document is converted into image,So as to effectively prevent the duplication to editable document content and reuse.Furthermore it is possible in an IFD(Such as the first IFD)In it is fixedAdopted first customized label, and original electronic document is compressed and encrypted, it is then store in first customized labelIn.Thus, when the need for the user having permission is present to the access of original document or editor, original document can be extracted.RootAccording to another aspect of the present invention, the second customized label defined in the IFD, and by the electronic document contentClassification information is stored in second customized label.It is well known that the retrieval and abnormal classification for picture material are difficult, becauseThis electronic document is after tiff image file is converted into, and direct retrieval and classification for the document become hardly may be usedOK.In the present invention, by the way that the classification information of document is stored in customized label, user can read in search fileThe classification information stored in the customized label, so as to easily realize the retrieval and classification to document.
Digital watermarking is in digital media information(Such as image, sound, video)The middle some digital informations of addition, to protectProtect the copyright of Digital Media, it was demonstrated that the real reliability of product, tracking is pirate or provides the additional information of product.Watermark informationIt is embedded in bearer documents, the sense organ and integrality of original document is not influenceed.According to resistivity of the digital watermarking to attack, numberWord watermark can be divided into:Multipurpose watermarking, fragility watermark, half fragility watermark.Multipurpose watermarking is mainly used in digital pictureIntellectual property protection, prevent from illegally obtaining image file, to modification have stronger robustness;Fragility watermark then mainly shouldUsed in the integrality and Trusting eBusiness of picture material, there is stronger sensitiveness to modification;Half fragility watermark Ze Keyi areasPoint accidentally modification and malice is distorted, and only distorts more sensitive to malice.
According to another aspect of the present invention, water can be embedded in the view data for the tiff image file being converted toPrint, such as fragility watermark.Thus, if the image in tiff image file is changed, what is be embedded by detecting is brittleProperty watermark, the integrality of picture material and credibility can be verified.When detecting the image quilt in tiff image fileWhen distorting, possess the user of due authority and can obtain and consulted and editing and processing by the original document file of protection document.
Fig. 2 shows the schematic diagram of digital watermarking system according to an aspect of the present invention.As shown in Fig. 2 watermaking systemIncluding water mark embedding device 210 and watermark detector 220.In one embodiment, water mark embedding device 210 can be included in for creatingIn the service end of shielded electronic document, and watermark detector 220 can be included in for browsing shielded electronic documentClient in.Water mark embedding device 210 may include pretreatment module 212.Pretreatment module 212 can use Arnold disorder processingsWith Logistic chaos encryption Processing Algorithms, watermarking images to be embedded are encrypted and disorder processing, to strengthen watermark figureThe security of picture.Embedded module 214 is input into by the watermark encrypted with scramble.Embedded module 214 also receives host image,Such as view data of tiff image file, and dct transform processing can be carried out to view data, view data is become from spatial domainChange to frequency domain.Then, encrypted and scramble can be embedded according to watermark embedding strategy in the frequency domain of view data by being embedded in module 214Watermark, and idct transform is performed to the view data after embedded watermark, thus obtains the image containing watermark.
Image containing watermark may be by various attacks, and such as image is distorted.Therefore, recipient user can be by rightThe detection of watermark is verified come integrality and feasibility to picture material.Extraction module 224 in watermark detector 220 canDct transform is performed to view data first, then can be according to watermark extracting strategy by view data from spatial transform to frequency domainWatermark is extracted from the frequency domain of view data.The watermark extracted can be input into anti-pretreatment module 222, the anti-pretreatmentModule 222 can be carried out using the anti-disorder processings of Arnold and the ignorant encryption algorithm of Logistic back mixing to the watermark signal of extractionDecryption and anti-disorder processing, to recover watermark.Although being not shown, watermark detector 220, which may also include, to be recoveredThe module that watermark is compared with original watermark, to be verified to the watermark recovered.If both are consistent, verify intoWork(, represents that view data is not tampered with, otherwise authentication failed, and view data may be tampered.
Fig. 3 shows the flow of the method performed by the service end of file protection system according to an aspect of the present inventionFigure.In step 302, digital document is parsed.Pending file is fed as input to the service of file protection systemEnd, service end recognizes the file type of digital document according to the suffix name of input file, and calls corresponding analyzing component documentData, are that work is ready in follow-up form conversion.Can be by the text of multiple format according to the file protection system of the present inventionFiles are converted into multipage tiff image file, mainly including common Word, Excel, PowerPoint and html web page andDigital document of text formatting etc..Corresponding processing assembly can be added for the processing for increasing document format newly, to cause documentProtection system possesses good autgmentability in terms of accessible document format.
In step 304, the digital document is changed into tiff image file from unprocessed form.Thus, original figure documentEditable sensitive information as on each page image of tiff image file picture material be shown.Before conversionDocument format, because image file is not easy to enter edlin to sensitive information, can prevent in document sensitive information it is directDistort and reuse.In some instances, form conversion, which may also include, first shows the data after parsing according to set formShow to come, the display content of each page is corresponding to one page image in tiff image file.Thus, user can pass through formSet to adjust the page display content of document, so as to for example, when user browses shown document, by grabbing can shield currentlyThe page and current page display content is converted into one page image in tiff image file, also can be by the way that document file page be enteredRow batch grab screen and by the Content Transformation of whole document into the multi-page pictures in tiff image file.In this way, after conversionEvery page of image of tiff image file may correspond to the respective page display content of the document shown according to set form.This hairBright form conversion includes but is not limited to above-mentioned form conversion regime, and those skilled in the art will appreciate that, can using it is anyDocument data after parsing is converted into tiff image file format by the document format conversion regime known.
In step 306, with write-in customized label defined in obtained tiff image file.In one embodiment, may be usedWith the first customized label defined in the specific IFD in the tiff image file, and can be by the digital document of unprocessed formIt is stored in first customized label.Specifically, a tag number example defined in the first IFD of tiff image fileSuch as be 42222 and storage class be byte arrays customized label.For the ease of safely and effectively backing up store document fileOriginal copy, more preferably, can also storage unprocessed form digital document before, digital document is compressed to reduce tiff imageThe size of backup file is stored in customized label, for example, the efficient lossless being combined with Huffman encoding can be encoded using LZWCompression algorithm is compressed to document files.Then, the document after compression can be encrypted, for example, to the document after compressionIt is encrypted using 3DES symmetric encipherment algorithms.Finally, the digital document of the unprocessed form after encryption is stored in above-mentionedIn customized label.In another embodiment, the second self-defined mark defined in the specific IFD of the tiff image fileLabel, and the classification information of the digital document can be stored in second customized label.Specifically, can be in tiff imageA tag number is, for example, 42220 defined in first IFD of file and storage class is the customized label of text type, by thisClassification information is stored in the customized label.
In step 308, the embedded watermark in the view data of the tiff image file.For example, the watermark can be brittleProperty watermark.Fragility watermark to picture material modification have stronger sensitiveness, can be used for picture material integrality andCredible checking.Specifically, encryption and disorder processing can be performed to watermark first, then DCT is performed to the view data and is becomeChange to be transformed to frequency domain, then according to the water of watermark embedding strategy embedded encrypted and scramble in the frequency domain of view dataPrint, finally performs idct transform to be switched back to spatial domain to the view data that embedded in watermark again.
Thus, shielded digital document is created, in the shielded digital document, the sensitivity of original document fileInformation is visible by user of picture material, while having the effect spread information content, because picture material is not easy to editor, preventsDirectly distorting and reuse to sensitive information., can be by the detection of watermark in addition, in the case where view data is tamperedIt was found that view data is distorted, the user having permission still can by reading to customized label in tiff image file comeObtain original document file.
Fig. 4 shows the flow of the method performed by the client of file protection system according to an aspect of the present inventionFigure.In step 402, watermark is recovered from the view data of tiff image file.Specifically, the view data can be held firstRow dct transform is so that it from spatial transform to frequency domain, then to be extracted according to watermark extracting strategy from the frequency domain of the view dataWatermark, then the watermark extracted is performed decryption and anti-disorder processing to recover watermark., can be to being recovered in step 404Watermark is verified.Specifically, the watermark recovered and original watermark can be compared, if both are consistent, verified intoWork(, otherwise authentication failed.
If being proved to be successful, method advances to step 406, wherein can play the image of the tiff image file.As above instituteState, fragility watermark has stronger sensitiveness for distorting, therefore, can be with the case where fragility watermark is not destroyedThink that the picture material in tiff image file is genuine and believable, thus the image of the tiff image file can be played for userBrowse.If authentication failed, method marches to step 408.The authentication failed of fragility watermark shows that picture material is tampered, byThe present image of this tiff image file is insincere.In one example, the prompting that image may be tampered can also be provided.CauseThis, the user having permission can read original figure document from the customized label in the specific IFD of tiff image file.ToolBody, original lattice can be read from the first customized label in the first image file directory IFD of the tiff image fileFormula digital document.Byte array types for example can be read in 42222 customized label from the tag number in the first IFDUnprocessed form digital document.The judgement of authority can be realized by requiring user's offer password.More preferably, the unprocessed form numberWord document is compressed and encrypted.In this case, the unprocessed form digital document of extraction can be decrypted, then to decryptionDocument afterwards performs decompression to obtain original digital document.In another embodiment, can also be from the tiff image fileThe first image file directory IFD in the second customized label in read the classification information of the digital document.Due to original textShelves are after tiff image file is converted into, and retrieval of the user to tiff image content is more inconvenient, therefore the user having permissionThe retrieval of document content can be realized by the classification information extracted in customized label.
Fig. 5 shows the service end of file protection system according to an aspect of the present invention and the block diagram of client.As schemedShown, file protection system 500 includes service end 510 and client 520.Service end 510 can perform the stream described in Fig. 3Journey, and client 520 can perform the flow described in Fig. 4.Service end 510 may include document resolver 511, for holdingThe parsing of row digital document.The document resolver 511 can be using modularity design, easily to extend the file for needing to supportForm.Document data after parsing can be converted into tiff image file format by format converter 512.In some instances, latticeFormula converter 512 can also show the data after parsing according to set form, then by grabbing screen current pageAnd current page display content is converted into one page image in tiff image file, also can be by the way that document file page be criticizedAmount grab screen and by the Content Transformation of whole document into the multi-page pictures in tiff image file.Format converter 512, which can be used, appointsDocument data after parsing is converted into tiff image file format by what known document format conversion regime.Customized label is writeEnter device 514 can defined in tiff image file and write-in customized label.For example, customized label write device 514 can beA tag number is, for example, 42222 defined in first IFD of tiff image file and storage class is the self-defined of byte arraysThe digital document of unprocessed form, is then written in the customized label by label.Server 510 may also include compression and encryptDevice 513, compresses and encrypts for being performed to unprocessed form digital document, for example can be using LZW codings and Huffman encoding phaseWith reference to efficient lossless compression algorithm document files is compressed, and to the document after compression use 3DES symmetric encipherment algorithmsIt is encrypted.In this case, customized label write device can write compressed and encryption in above-mentioned customized labelUnprocessed form digital document.Service end 510 may also include water mark embedding device 515.Water mark embedding device 515 can be in tiff image textEmbedded watermark, for example, be embedded in fragility watermark in the view data of part.Specifically, water mark embedding device 515 can be held to watermark firstRow encryption and disorder processing, then dct transform is performed to be transformed to frequency domain to the view data, plan is then embedded according to watermarkThe watermark of embedded encrypted and scramble slightly in the frequency domain of view data, is finally performed to the view data that embedded in watermark againIdct transform is to be switched back to spatial domain.The concrete composition of water mark embedding device 515 is carrying out retouching in detail above in association with Fig. 2State.
Client 520 may include watermark detector 521, for recovering water outlet from the view data of tiff image filePrint and it is verified.Specifically, watermark detector 521 can first to the view data perform dct transform with by its fromThen spatial transform extracts watermark according to watermark extracting strategy to frequency domain from the frequency domain of the view data, then to being extractedWatermark perform decryption and anti-disorder processing to recover watermark.Watermark detector 521 can also by the watermark recovered with it is originalWatermark is compared, if both are consistent, is proved to be successful, otherwise authentication failed.The concrete composition of watermark detector 521 is upperText is described in detail with reference to Fig. 2.
Client 520 may also include image viewer 522 to play the image of tiff image file.For example, picture browsingDevice 522 can play the image of tiff image file in the case of watermark verification is successful.User can be by browsing tiff imageTo consult the content of digital document, the image viewer 522 supports the played in order of tiff image sequence and random selection to play,Support the zoom and moving operation to image views.Client may also include customized label reader 523 for readingTake customized label.For example, when user inputs password by Authority Verification, customized label reader 523 can scheme from TIFFUnprocessed form digital document is read in the first customized label in first IFD of picture file.The unprocessed form digital document canIt can be compressed and encrypted, decompression and decipher 524 can be decrypted and decompress to the unprocessed form digital document, withObtain original document files.Customized label reader 523 can also be made by oneself from second in the first IFD of tiff image fileThe classification information of the digital document is read in adopted label, in order to be retrieved to document content.
Although for make explanation simplify the above method is illustrated and is described as a series of actions, it should be understood that and understand,The order that these methods are not acted is limited, because according to one or more embodiments, some actions can occur in different orderAnd/or with from it is depicted and described herein or herein it is not shown and describe but it will be appreciated by those skilled in the art that otherAction concomitantly occurs.
It is for so that any person skilled in the art all can make or use this public affairs to provide of this disclosure be previously describedOpen.Various modifications of this disclosure all will be apparent for a person skilled in the art, and as defined herein generalSuitable principle can be applied to spirit or scope of other variants without departing from the disclosure.Thus, the disclosure is not intended to be limitedDue to example described herein and design, but it should be awarded and principle disclosed herein and novel features phase oneThe widest scope of cause.

Claims (12)

CN201310447489.2A2013-09-262013-09-26Digital document guard method and systemActiveCN104517045B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201310447489.2ACN104517045B (en)2013-09-262013-09-26Digital document guard method and system

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201310447489.2ACN104517045B (en)2013-09-262013-09-26Digital document guard method and system

Publications (2)

Publication NumberPublication Date
CN104517045A CN104517045A (en)2015-04-15
CN104517045Btrue CN104517045B (en)2017-10-03

Family

ID=52792334

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201310447489.2AActiveCN104517045B (en)2013-09-262013-09-26Digital document guard method and system

Country Status (1)

CountryLink
CN (1)CN104517045B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105740657A (en)*2016-01-262016-07-06唐山新质点科技有限公司On-line browsing method and device of file
CN106529597A (en)*2016-11-112017-03-22理光图像技术(上海)有限公司Scanning image file generation device
CN106506518A (en)*2016-11-252017-03-15天津津航计算技术研究所The encryption/decryption module of big data safe transmission
CN109635525A (en)*2018-12-112019-04-16上海智臻智能网络科技股份有限公司Adding method, device, equipment and the storage medium of watermark
CN110750961A (en)*2019-09-122020-02-04北京真视通科技股份有限公司File format conversion method and device, computer equipment and storage medium
CN112258376B (en)*2020-10-202024-04-12中国农业银行股份有限公司Method and system for processing encrypted document
CN114168079B (en)*2021-12-092023-08-22深圳软牛科技有限公司Method, device and related component for identifying tiff type data deleted from disk

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1752920A (en)*2004-09-212006-03-29三星电子株式会社 Image forming apparatus and method
CN102222195A (en)*2011-07-292011-10-19飞天诚信科技股份有限公司E-book reading method and system
CN102479349A (en)*2010-11-232012-05-30金蝶软件(中国)有限公司Method and device for sending document file through mail in ERP system and ERP system
CN102844749A (en)*2010-05-082012-12-26惠普发展公司,有限责任合伙企业Executing transcription requests on files

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101625684A (en)*2008-07-072010-01-13全国组织机构代码管理中心Method and system for acquiring and compressing paper document image-text information

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1752920A (en)*2004-09-212006-03-29三星电子株式会社 Image forming apparatus and method
CN102844749A (en)*2010-05-082012-12-26惠普发展公司,有限责任合伙企业Executing transcription requests on files
CN102479349A (en)*2010-11-232012-05-30金蝶软件(中国)有限公司Method and device for sending document file through mail in ERP system and ERP system
CN102222195A (en)*2011-07-292011-10-19飞天诚信科技股份有限公司E-book reading method and system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
fairage.雪莹DocConvert文档转化工具0.6.《URL:http://dl.pconline.com.cn/download/63581.html》.2010,*
基于DCT变换的图像数字水印算法;徐世刚 等;《计算机与数字工程》;20070831;第35卷(第8期);第109-112页*
无法打开图像文件tiff文件;深谷憂狼;《URL:https://zhidao.baidu.com/question/399567097.html》;20120323;文档第1页*

Also Published As

Publication numberPublication date
CN104517045A (en)2015-04-15

Similar Documents

PublicationPublication DateTitle
ShihDigital watermarking and steganography: fundamentals and techniques
CN104517045B (en)Digital document guard method and system
JP4097773B2 (en) Digital image editing system
US8571212B2 (en)Image encrypting device, image decrypting device and method
KR100383312B1 (en)Method and apparatus for imprinting id information into a digital content and for reading out the same
Haghighi et al.TRLH: Fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique
US8175322B2 (en)Method of digital watermark and the corresponding device, and digital camera which can append watermark
JP5290556B2 (en) Barcode for cross-validation of documents
US5646997A (en)Method and apparatus for embedding authentication information within digital data
JP3804012B2 (en) Document image alteration determination method and system, and control program therefor
US7120273B2 (en)Apparatus and method for image group integrity protection
JP2009517929A (en) Method and device for embedding a digital watermark in a text document and for detecting the digital watermark
Rey et al.Blind detection of malicious alterations on still images using robust watermarks
CN102646179A (en) A PDF file information embedding and extraction method based on PDF file body
KR102108192B1 (en)Method, Apparatus and System for Inserting Watermark
CN101834726A (en)Safe encryption method based on bi-dimensional codes
KR20090088432A (en) Method and system for secure distribution of audiovisual data by transaction marking
CN101388076A (en)Method and apparatus for generating two-dimension bar-code
CN105989569A (en)Digital watermark embedding method and apparatus for EPUB document as well as extraction method and apparatus
CN114021084A (en)Cross-media attack-based digital watermark technology implementation method
Kavitha et al.Lossless steganography on avi file using swapping algorithm
CN110532740A (en)Image ciphering method, apparatus, the encroach right method of determination and computer storage medium
JP2001344557A (en)Method and device for managing document
CN212135424U (en)Tracking management system for dynamically tracking leakage information
JP2005347867A (en)Electronic document alteration detection method, electronic document alteration detection apparatus, and computer program

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
EXSBDecision made by sipo to initiate substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant
CP01Change in the name or title of a patent holder
CP01Change in the name or title of a patent holder

Address after:200083 B building, No. 420, Guang Zhong Road, Hongkou District, Shanghai

Patentee after:Shanghai middle shift information technology Co., Ltd.

Address before:200083 B building, No. 420, Guang Zhong Road, Hongkou District, Shanghai

Patentee before:SHANGHAI ZHONGYI COMMUNICATION TECHNOLOGY ENGINEERING CO., LTD.


[8]ページ先頭

©2009-2025 Movatter.jp