[go: up one dir, main page]

CN118940232A - Watermark trusted source tracing method and system based on summary - Google Patents

Watermark trusted source tracing method and system based on summary Download PDF

Info

Publication number
CN118940232A
CN118940232A CN202410930144.0A CN202410930144A CN118940232A CN 118940232 A CN118940232 A CN 118940232A CN 202410930144 A CN202410930144 A CN 202410930144A CN 118940232 A CN118940232 A CN 118940232A
Authority
CN
China
Prior art keywords
watermark
information
request
digest
processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410930144.0A
Other languages
Chinese (zh)
Inventor
朱捷
肖鹏
陈璐
莫文峰
张涛
李奔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National Energy Group Materials Co ltd E Commerce Center
Guoneng Beijing Business Network Co ltd
Original Assignee
National Energy Group Materials Co ltd E Commerce Center
Guoneng Beijing Business Network Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Energy Group Materials Co ltd E Commerce Center, Guoneng Beijing Business Network Co ltd filed Critical National Energy Group Materials Co ltd E Commerce Center
Priority to CN202410930144.0A priority Critical patent/CN118940232A/en
Publication of CN118940232A publication Critical patent/CN118940232A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention provides a watermark credible tracing method and system based on abstracts, belonging to the technical field of digital watermarking. The method comprises the following steps: in response to the watermark request signal, collecting watermark request information; performing standardized processing on the watermark request information, generating a digest based on the watermark request information after the standardized processing, and signing the digest; performing the digest and the signature uplink processing based on a pre-built blockchain; responding to the watermark information inquiry request, inquiring the corresponding abstract information based on the pre-constructed block chain, and pushing the corresponding inquiry result information to the user side. The scheme of the invention improves the copyright protection effect of the digital watermark and ensures the traceability of the digital watermark.

Description

Watermark credible tracing method and system based on abstract
Technical Field
The invention relates to the technical field of digital watermarking, in particular to a watermark credible tracing method based on a abstract and a watermark credible tracing system based on the abstract.
Background
The digital watermark is a digital product which can be integrated with the identification information of the representative enterprise into the enterprise of the enterprise, such as documents, software and multimedia, and is not tampered, modified and pirated under the condition of not affecting the use value of the original digital product, but can be identified and confirmed by the manufacturer. By hiding the information in the digital product, the creator of the digital product, whether it is tampered with, etc. can be traced back. Digital watermarking is an effective method for protecting the integrity of digital products of enterprises, information security, tamper resistance, traceability and other copyright protection. Digital watermarking is a content-based, non-cryptographic mechanism computer information hiding technique.
Although the prior art adopts the watermark technology to conduct anti-theft treatment on digital products, copyright protection is conducted. Watermarking techniques such as watermark unit names, marking times, etc., but too long watermark information can interfere with the source digital product effect, resulting in distortion. If the watermark information is too short, the anti-theft effect, the copyright protection effect and the like are weaker and the watermark information is not credible. In order to ensure the copyright protection effect of the digital watermark and the traceability of the digital watermark, a new digital watermark scheme needs to be provided.
Disclosure of Invention
The embodiment of the invention aims to provide a watermark credible tracing method and system based on abstract, which at least solve the problem that the existing digital watermark scheme cannot consider the copyright protection effect and guarantee the source digital product effect.
To achieve the above object, a first aspect of the present invention provides a watermark trusted tracing method based on a digest, the method including: in response to the watermark request signal, collecting watermark request information; performing standardized processing on the watermark request information, generating a digest based on the watermark request information after the standardized processing, and signing the digest; performing the digest and the signature uplink processing based on a pre-built blockchain; responding to the watermark information inquiry request, inquiring the corresponding abstract information based on the pre-constructed block chain, and pushing the corresponding inquiry result information to the user side.
Optionally, the watermark request information includes: issuer information, author information, time stamps, and work identity information.
Optionally, the performing normalization processing on the watermark request information includes: performing a bit number process and a formatting process on the watermark request information; wherein, the processing rule for executing bit number processing on the watermark request information is as follows: matching corresponding watermark target digits based on a preset security level of work information corresponding to the current watermark request; based on the watermark request information and the watermark target bit number, generating watermark information of corresponding bit number as initial watermark information.
Optionally, a processing rule for executing formatting processing on the watermark request information is to determine whether a standardized format preset by a user exists; if yes, formatting is carried out on the initial watermark information based on a standardized format preset by a user, and watermark request information after standardized processing is obtained; if the watermark is not present, determining a standardized format corresponding to the current embedding algorithm based on the embedding algorithm corresponding to the current watermark request; and carrying out formatting processing on the initial watermark information based on a standardized format corresponding to the current embedding algorithm, and obtaining watermark request information after the standardized processing.
Optionally, the generating the digest based on the watermark request information after the normalization processing and signing the digest includes: performing hash operation on the watermark request information subjected to the standardization processing based on a preset hash algorithm to obtain a summary with a corresponding length; wherein the preset hash algorithm is MD5, SHA-1 or SHA-256; generating a pair of public key and private key based on a preset digital signature algorithm; encrypting the abstract based on the private key to generate a digital signature; wherein, the preset digital signature algorithm is RSA algorithm, DSA algorithm or ECDSA algorithm.
Optionally, the performing the digest and the signature uplink processing based on the pre-built blockchain includes: creating a transaction comprising a data digest and a digital signature in a pre-constructed blockchain; broadcasting the constructed transaction to each node in the blockchain; each node verifies the authenticity and the integrity of the transaction, and performs transaction confirmation based on a consensus mechanism after verification is passed; and after the confirmation is passed, packaging the current transaction into a new block, broadcasting the new block to all nodes in a block chain, and finishing the billing of all nodes to realize the summary and the signature uplink.
Optionally, after the digest and the signature uplink processing are performed based on the pre-built blockchain, the method further includes: encrypting the watermark request information after the standardization processing to obtain watermark information ciphertext; and sending the watermark information ciphertext to each distributed storage system, and executing the watermark information ciphertext distributed storage.
Optionally, the responding to the watermark information query request, performing corresponding summary information query based on the pre-constructed blockchain, and pushing corresponding query result information to the user side, includes: if the watermark information inquiry request is a checking request, synchronously checking the pre-constructed block chain based on the abstract information and the signature in the checking request, and feeding back the checked confirmation information to the user side after the matching structure is inquired; if the watermark information inquiry request is a tracing request, watermark information ciphertext is carried out in each distributed storage system based on abstract information and signature in the checking request, and the watermark information ciphertext is decrypted to obtain watermark information; and judging the copyright holder of the current work based on the watermark information, and sending the judging result to the user side.
The second aspect of the present invention provides a watermark trusted tracing system based on a digest, the system comprising: the acquisition unit is used for responding to the watermark request signal and acquiring watermark request information; the processing unit is used for executing standardized processing on the watermark request information, generating a digest based on the watermark request information after the standardized processing and signing the digest; the uplink unit is used for carrying out the digest and the signature uplink processing based on a pre-constructed blockchain; and the query unit is used for responding to the watermark information query request, carrying out corresponding abstract information query based on the pre-constructed blockchain, and pushing corresponding query result information to the user side.
In another aspect, the present invention provides a computer readable storage medium having instructions stored thereon, which when executed on a computer, cause the computer to perform the above-described digest-based watermark reliability tracing method.
Through the technical scheme, the digest signature of the watermark is stored in the blockchain, and the authenticity and the integrity of the watermark are ensured by utilizing the decentralization and non-tamperable characteristics of the blockchain, so that the tampering behavior cannot be hidden. The system realizes a quick and efficient watermark verification process by extracting the abstract signature, verifying the blockchain record and decrypting the watermark content, and improves the availability and user experience of the system.
Additional features and advantages of embodiments of the invention will be set forth in the detailed description which follows.
Drawings
The accompanying drawings are included to provide a further understanding of embodiments of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain, without limitation, the embodiments of the invention. In the drawings:
Fig. 1 is a flowchart of steps of a watermark trusted tracing method based on a digest according to an embodiment of the present invention;
Fig. 2 is a system structure diagram of a watermark trusted traceability system based on a digest according to an embodiment of the present invention.
Detailed Description
The following describes specific embodiments of the present invention in detail with reference to the drawings. It should be understood that the detailed description and specific examples, while indicating and illustrating the invention, are not intended to limit the invention.
Fig. 1 is a flowchart of a method for providing a watermark trusted tracing method based on a digest according to an embodiment of the present invention. As shown in fig. 1, an embodiment of the present invention provides a watermark trusted tracing method based on a digest, where the method includes:
step S10: in response to the watermark request signal, watermark request information is collected.
Specifically, the watermark request information includes: issuer information, author information, time stamps, and work identity information.
In an embodiment of the invention, the watermark requester sends information to be embedded in the digital product to be issued to the trusted execution environment. A trusted execution environment (Trusted Execution Environment, TEE for short) is a secure area of a combination of hardware and software for performing sensitive tasks and storing sensitive data. TEE provides greater security and isolation from unauthorized access and operation than traditional computing environments. The watermark requester may ensure that the relevant information is not tampered with or revealed during embedding of the digital product by sending the information to the TEE. The embedded information includes vendor, author, time stamp and identity information, which can be freely configured according to the requirements. This means that the application of the watermarking technique is very flexible and the watermark content can be tailored to the specific scenario and requirements. For example, a manufacturer may embed own brand information to prove the origin and legitimacy of a digital product; the author can embed own signature and authoring time to protect own copyright and authoring rights; the time stamp can record the generation or modification time of the digital product, so that the timeliness and the credibility of the content are ensured; the identity information can then be used to track and verify the identity of the user or device, preventing illegal copying and distribution.
In accordance with the present invention, embedded information is encrypted and stored in a trusted execution environment, and any attempt to modify or delete such information is detected and prevented. This ensures the integrity of the information during distribution and use of the digital product. By embedding vendor, author, and identity information, the source and distribution path of the digital product can be accurately tracked. Once copyright disputes or illegal distribution behaviors occur, responsible parties can be quickly found. The embedded time stamp and identity information may be used to verify the authenticity and legitimacy of the digital product. The user or device may verify the trustworthiness of the content by verifying the watermark information when accessing or using the digital product. Watermarking technology provides an effective means of copyright protection for both the creator and vendor. The embedded signature and timestamp can serve as legal evidence of creation and release, preventing unauthorized copying and theft. The free collocation of the watermark information enables the watermark information to adapt to various application scenes. Whether literary works, music, videos or software and digital certificates, the watermark content can be customized according to specific requirements, and the application breadth and depth of the technology are improved.
Step S20: and carrying out standardization processing on the watermark request information, generating a digest based on the watermark request information after the standardization processing, and signing the digest.
In the embodiment of the invention, bit number processing and formatting processing are performed on the watermark request information; wherein, the processing rule for executing bit number processing on the watermark request information is as follows: matching corresponding watermark target digits based on a preset security level of work information corresponding to the current watermark request; based on the watermark request information and the watermark target bit number, generating watermark information of corresponding bit number as initial watermark information.
In embodiments of the present invention, the embedding of watermark information in digital products typically involves minor modifications to the original data to embed the copyright information in an imperceptible manner. To ensure concealment and difficulty in removal of the watermark, the number of bits of the watermark must be dynamically adjusted to different security requirements and work types. The preset security level is a key parameter for determining the watermark target bit number, and different security levels correspond to different security requirements. For example, a work involving a high level of confidentiality or value, such as a commercial confidential document or a high-end artwork, may require a higher level of security and a greater number of bits of watermark information to increase the difficulty of tampering and removal. Watermark request information typically includes data in multiple dimensions, such as vendor, author, timestamp, identity information, and the like. In order to generate efficient and secure watermark information, it is necessary to encode such information into a watermark of a corresponding number of bits using a specific algorithm. Algorithms used by the scheme of the invention comprise Discrete Cosine Transform (DCT), discrete Wavelet Transform (DWT), singular Value Decomposition (SVD) and the like, and can effectively embed a large amount of watermark information on the premise of not affecting the quality of the original work.
According to the scheme, through the bit processing rule, watermark information can be embedded into the digital work in a more concealed mode, so that the risk of being found and removed is reduced. For example, a work of high security level may use more bits of watermark information, making its distribution more diffuse and difficult to detect. The bit number processing of watermark information increases the difficulty of tampering. Even if a tamperer can find part of watermark information, it is difficult to effectively tamper without damaging the overall quality of the work. The matching of the preset security level and the target number of bits ensures that each watermark is the best protection for a particular work. Different types of works and security requirements can be flexibly accommodated by adjusting preset security levels. For example, normal pictures and video may require a lower level of security, while commercial confidential documents require a higher level of security. This flexibility enables the wide application of watermarking technology to a variety of digital works.
Further, the processing rule for executing the formatting processing on the watermark request information is as follows: judging whether a user preset standardized format exists or not; if yes, formatting is carried out on the initial watermark information based on a standardized format preset by a user, and watermark request information after standardized processing is obtained; if the watermark is not present, determining a standardized format corresponding to the current embedding algorithm based on the embedding algorithm corresponding to the current watermark request; and carrying out formatting processing on the initial watermark information based on a standardized format corresponding to the current embedding algorithm, and obtaining watermark request information after the standardized processing.
In the embodiment of the invention, the step of judging whether the user has the preset standardized format increases the flexibility and the customization capability of the watermark technology. If the user has specific format requirements, the watermark information can be processed according to the preset format of the user, so that the watermark information is ensured to accord with specific industry standards or enterprise specifications. For example, certain industries may have strict requirements on the format of watermark information, such as electronic medical records in the medical industry or digital contracts in the financial industry, and by a user preset standardized format, it may be ensured that the watermark information meets these specific requirements. If no user presets the standardized format, the system will determine the standardized format based on the embedding algorithm to which the current watermark request corresponds. This step ensures that the watermark information is highly compatible with the embedding algorithm used. For example, different embedding algorithms may be required for different types of digital content (e.g., pictures, video, audio, etc.), and the standardized formats to which these algorithms correspond may be different. By automatically determining the standardized format, it is ensured that watermark information can be efficiently embedded and extracted in a variety of digital content and algorithms. Whether based on user preset or standardized format determined by embedding algorithm, the consistency and normalization of watermark information can be ensured. The formatting process can avoid information confusion and improve the reading and verification efficiency of watermark information.
Based on the scheme of the invention, the watermark information after formatting is more stable and reliable in the embedding and extracting processes, and the recognition error or watermark loss caused by non-uniform formats is reduced. Standardized watermark information may be more effective to the creator and copyright owner in protecting their intellectual property rights from unauthorized copying and distribution. Through formatting, watermark information can be better hidden in digital content, and the security and anti-counterfeiting performance of the watermark are improved. The formatting process can make watermark information distributed more uniformly and hidden in the embedding process, and increase the difficulty of an attacker to discover and tamper with the watermark. The formatting process ensures compatibility of the watermark information across different platforms and devices. Whether desktop, mobile, or professional, the formatted watermark information may be consistently identified and verified. For example, watermark information in an electronic book can be accurately identified on different readers, improving the usability and user experience of digital content.
Further, generating a digest based on the watermark request information after the normalization processing and signing the digest, including: performing hash operation on the watermark request information subjected to the standardization processing based on a preset hash algorithm to obtain a summary with a corresponding length; wherein the preset hash algorithm is MD5, SHA-1 or SHA-256; generating a pair of public key and private key based on a preset digital signature algorithm; encrypting the abstract based on the private key to generate a digital signature; wherein, the preset digital signature algorithm is RSA algorithm, DSA algorithm or ECDSA algorithm.
In the embodiment of the invention, based on a preset hash algorithm, hash operation is performed on watermark request information after standardized processing, and a digest with a corresponding length is obtained. This step ensures the integrity of the watermark request information, and can quickly verify whether the information is tampered with by the hash value. For example, watermark information embedded in a digital media file may be found by hash values even if the file itself has minor modifications (e.g., compression or format conversion). And encrypting the hash digest by using the generated private key to generate a digital signature. Digital signatures are an important means of ensuring data origin and integrity. The signature encrypted by the private key can only be decrypted and verified by the corresponding public key, so that the authenticity and tamper resistance of the signature data are ensured.
Based on the scheme of the invention, the abstract generated by the hash algorithm can effectively detect the integrity of the data. Any minor modification to the watermark request information will result in a significant change in the hash value so that unauthorized modification can be detected. This is particularly important when protecting digital rights, and may prevent malicious tampering of the work during distribution. The digital signature generated by encrypting the hash abstract by using the private key can ensure that the source of watermark information is true and reliable. Only the person with the private key can generate an effective signature to prevent the person from being faked and counterfeited. For example, a digital music distribution company may sign a hash value of a music file with a private key, and a user may verify the signature by a public key to confirm the authenticity and integrity of the music.
Step S30: and carrying out the digest and the signature uplink processing based on the pre-constructed blockchain.
Specifically, the method comprises the following steps: creating a transaction comprising a data digest and a digital signature in a pre-constructed blockchain; broadcasting the constructed transaction to each node in the blockchain; each node verifies the authenticity and the integrity of the transaction, and performs transaction confirmation based on a consensus mechanism after verification is passed; and after the confirmation is passed, packaging the current transaction into a new block, broadcasting the new block to all nodes in a block chain, and finishing the billing of all nodes to realize the summary and the signature uplink.
In an embodiment of the invention, a transaction is created in a blockchain that includes a data digest and a digital signature. The method comprises the steps of generating a data digest of data to be protected through a hash algorithm, and signing the data digest by utilizing a digital signature technology. The data digest provides integrity verification of the data, and the digital signature ensures authenticity and non-repudiation of the data. For example, in digital rights protection, a hash value may be generated for a piece of music or video content and signed with the private key of the creator to generate a transaction containing that information. The constructed transaction is broadcast to nodes in the blockchain. The blockchain network is a distributed network in which each node holds a copy of the entire blockchain. The transaction is broadcast to all nodes in the network, so that the transaction information is ensured to be widely spread and backed up in the network, and single-point faults are prevented. For example, when a transaction containing copyright information is broadcast into a blockchain network, all nodes receive the transaction and prepare for verification.
Further, each node verifies the authenticity and integrity of the transaction. The node checks whether the data is tampered or not through the hash value, and verifies whether the signature of the data is valid or not through the digital signature. Only validated transactions are further processed. This process ensures the security and reliability of the transaction data during transmission. For example, after a node in the blockchain network receives a transaction containing copyright information, the node verifies whether the signature is valid or not through the public key of the creator, and checks whether the data digest is consistent with the original data. After verification is passed, the node performs transaction confirmation based on a consensus mechanism. Common consensus mechanisms include proof of work (PoW), proof of equity (PoS), and Bayer Fault Tolerance (BFT), among others. These mechanisms ensure that nodes in the blockchain network agree on without a central authority.
Further, after the confirmation is passed, the current transaction is packed into a new block. The blocks are the basic units of a blockchain, and each block contains a plurality of transactions and hash values of the previous block to form a chained structure. This step ensures the order and integrity of all transactions. For example, when a transaction containing copyright information is authenticated and agreed, the node packages it into a new block. The new block is broadcast to all nodes in the blockchain, and all node accounting is completed. Each node, upon receiving the new block, will add it to its own copy of the blockchain, thereby ensuring blockchain consistency and non-tamper ability. For example, a newly generated block containing copyright information is broadcast to the entire network, and all nodes record the information in their own blockchain, ensuring permanent storage and non-falsification of the copyright information.
Preferably, after the digest and the signature uplink processing are performed based on a pre-built blockchain, the method further includes: encrypting the watermark request information after the standardization processing to obtain watermark information ciphertext; and sending the watermark information ciphertext to each distributed storage system, and executing the watermark information ciphertext distributed storage.
According to the scheme of the invention, the encrypted watermark content is stored in the distributed storage system, and the security and reliability of data are improved by storing a plurality of nodes or manufacturers, so that the risk of single-point faults is reduced.
Step S40: responding to the watermark information inquiry request, inquiring the corresponding abstract information based on the pre-constructed block chain, and pushing the corresponding inquiry result information to the user side.
Specifically, if the watermark information inquiry request is a checking request, synchronously checking the watermark information inquiry request in the pre-constructed block chain based on the abstract information and the signature in the checking request, and feeding back the checking confirmation information to the user side after the matching result is inquired; if the watermark information inquiry request is a tracing request, watermark information ciphertext is carried out in each distributed storage system based on abstract information and signature in the checking request, and the watermark information ciphertext is decrypted to obtain watermark information; and judging the copyright holder of the current work based on the watermark information, and sending the judging result to the user side.
In one possible implementation, the watermark information verification includes:
1) The digest signature of the watermark is stored in the blockchain, and the authenticity and the integrity of the watermark are ensured by utilizing the decentralization and non-tamperable characteristics of the blockchain, so that the tampering behavior cannot be hidden.
2) And checking the digest and the signature in the blockchain at the same time, and if the result is checked, indicating that the requester does the watermark request.
Further, watermark information is traced back to extracting signature records from the blockchain according to the digest signature, and encrypted watermark content is obtained from the distributed storage system for decryption and verification to verify the authenticity and integrity of the watermark. The method specifically comprises the following steps:
1) By decrypting the vendor, time stamp, etc. trait information in the content.
2) And judging through the time stamp, and judging that the requesting party with the earlier time stamp is the copyright holder.
Fig. 2 is a system structure diagram of a watermark trusted traceability system based on a digest according to an embodiment of the present invention. As shown in fig. 2, an embodiment of the present invention provides a watermark trusted tracing system based on a digest, where the system includes: the acquisition unit is used for responding to the watermark request signal and acquiring watermark request information; the processing unit is used for executing standardized processing on the watermark request information, generating a digest based on the watermark request information after the standardized processing and signing the digest; the uplink unit is used for carrying out the digest and the signature uplink processing based on a pre-constructed blockchain; and the query unit is used for responding to the watermark information query request, carrying out corresponding abstract information query based on the pre-constructed blockchain, and pushing corresponding query result information to the user side.
The embodiment of the invention also provides a computer readable storage medium, wherein the computer readable storage medium stores instructions which, when run on a computer, cause the computer to execute the watermark trusted tracing method based on the abstract.
Those skilled in the art will appreciate that all or part of the steps in a method for implementing the above embodiments may be implemented by a program stored in a storage medium, where the program includes several instructions for causing a single-chip microcomputer, chip or processor (processor) to perform all or part of the steps in a method according to the embodiments of the invention. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The alternative embodiments of the present invention have been described in detail above with reference to the accompanying drawings, but the embodiments of the present invention are not limited to the specific details of the above embodiments, and various simple modifications may be made to the technical solutions of the embodiments of the present invention within the scope of the technical concept of the embodiments of the present invention, and all the simple modifications belong to the protection scope of the embodiments of the present invention. In addition, the specific features described in the above embodiments may be combined in any suitable manner without contradiction. In order to avoid unnecessary repetition, the various possible combinations of embodiments of the invention are not described in detail.
In addition, any combination of the various embodiments of the present invention may be made, so long as it does not deviate from the idea of the embodiments of the present invention, and it should also be regarded as what is disclosed in the embodiments of the present invention.

Claims (10)

1. A watermark trusted tracing method based on a digest, the method comprising:
In response to the watermark request signal, collecting watermark request information;
Performing standardized processing on the watermark request information, generating a digest based on the watermark request information after the standardized processing, and signing the digest;
performing the digest and the signature uplink processing based on a pre-built blockchain;
Responding to the watermark information inquiry request, inquiring the corresponding abstract information based on the pre-constructed block chain, and pushing the corresponding inquiry result information to the user side.
2. The method of claim 1, wherein the watermark request information comprises:
issuer information, author information, time stamps, and work identity information.
3. The method of claim 1, wherein the performing a normalization process on the watermark request information comprises:
performing a bit number process and a formatting process on the watermark request information;
Wherein, the processing rule for executing bit number processing on the watermark request information is as follows:
matching corresponding watermark target digits based on a preset security level of work information corresponding to the current watermark request;
based on the watermark request information and the watermark target bit number, generating watermark information of corresponding bit number as initial watermark information.
4. A method according to claim 3, wherein the processing rule for performing formatting processing on the watermark request information is:
Judging whether a user preset standardized format exists or not;
if yes, formatting is carried out on the initial watermark information based on a standardized format preset by a user, and watermark request information after standardized processing is obtained;
If the watermark is not present, determining a standardized format corresponding to the current embedding algorithm based on the embedding algorithm corresponding to the current watermark request;
and carrying out formatting processing on the initial watermark information based on a standardized format corresponding to the current embedding algorithm, and obtaining watermark request information after the standardized processing.
5. The method of claim 1, wherein generating and signing the digest based on the normalized watermark request information comprises:
Performing hash operation on the watermark request information subjected to the standardization processing based on a preset hash algorithm to obtain a summary with a corresponding length; wherein,
The preset hash algorithm is MD5, SHA-1 or SHA-256;
generating a pair of public key and private key based on a preset digital signature algorithm;
Encrypting the abstract based on the private key to generate a digital signature; wherein,
The preset digital signature algorithm is an RSA algorithm, a DSA algorithm or an ECDSA algorithm.
6. The method of claim 1, wherein the performing the digest and the signature uplink processing based on a pre-built blockchain comprises:
Creating a transaction comprising a data digest and a digital signature in a pre-constructed blockchain;
Broadcasting the constructed transaction to each node in the blockchain;
each node verifies the authenticity and the integrity of the transaction, and performs transaction confirmation based on a consensus mechanism after verification is passed;
And after the confirmation is passed, packaging the current transaction into a new block, broadcasting the new block to all nodes in a block chain, and finishing the billing of all nodes to realize the summary and the signature uplink.
7. The method of claim 1, wherein after the digest and the signature uplink processing based on a pre-built blockchain, the method further comprises:
encrypting the watermark request information after the standardization processing to obtain watermark information ciphertext;
And sending the watermark information ciphertext to each distributed storage system, and executing the watermark information ciphertext distributed storage.
8. The method of claim 7, wherein responding to the watermark information query request, performing a corresponding summary information query based on the pre-constructed blockchain, and pushing corresponding query result information to the user side, comprises:
if the watermark information inquiry request is a checking request, synchronously checking the pre-constructed block chain based on the abstract information and the signature in the checking request, and feeding back the checked confirmation information to the user side after the matching result is inquired;
If the watermark information inquiry request is a tracing request, watermark information ciphertext is carried out in each distributed storage system based on abstract information and signature in the checking request, and the watermark information ciphertext is decrypted to obtain watermark information;
and judging the copyright holder of the current work based on the watermark information, and sending the judging result to the user side.
9. A digest-based watermark trusted trace-source system, the system comprising:
the acquisition unit is used for responding to the watermark request signal and acquiring watermark request information;
The processing unit is used for executing standardized processing on the watermark request information, generating a digest based on the watermark request information after the standardized processing and signing the digest;
The uplink unit is used for carrying out the digest and the signature uplink processing based on a pre-constructed blockchain;
And the query unit is used for responding to the watermark information query request, carrying out corresponding abstract information query based on the pre-constructed blockchain, and pushing corresponding query result information to the user side.
10. A computer readable storage medium having instructions stored thereon, which when run on a computer cause the computer to perform the digest-based watermark trusted tracing method of any one of claims 1 to 8.
CN202410930144.0A 2024-07-11 2024-07-11 Watermark trusted source tracing method and system based on summary Pending CN118940232A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410930144.0A CN118940232A (en) 2024-07-11 2024-07-11 Watermark trusted source tracing method and system based on summary

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410930144.0A CN118940232A (en) 2024-07-11 2024-07-11 Watermark trusted source tracing method and system based on summary

Publications (1)

Publication Number Publication Date
CN118940232A true CN118940232A (en) 2024-11-12

Family

ID=93359130

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410930144.0A Pending CN118940232A (en) 2024-07-11 2024-07-11 Watermark trusted source tracing method and system based on summary

Country Status (1)

Country Link
CN (1) CN118940232A (en)

Similar Documents

Publication Publication Date Title
US6801999B1 (en) Passive and active software objects containing bore resistant watermarking
US7305564B2 (en) System and method to proactively detect software tampering
US8850214B2 (en) Methods and systems for encoding and protecting data using digital signature and watermarking techniques
US8769292B2 (en) Method for generating standard file based on steganography technology and apparatus and method for validating integrity of metadata in the standard file
CN101262599B (en) Method and system for data processing
US20040039932A1 (en) Apparatus, system and method for securing digital documents in a digital appliance
CN110809763A (en) Identify copyrighted material using embedded copyright information with timestamps
CN112119424A (en) Identifying copyrighted material using embedded copyright information
CN111279338A (en) Identifying copyrighted material using embedded copyright information
CN108985364A (en) Verification method, device, computer equipment and the storage medium of sealed files
CN109145617B (en) Block chain-based digital copyright protection method and system
WO2001023981A1 (en) Authentification of digital data works using signatures and watermarks
Nair et al. Enabling DRM-preserving digital content redistribution
CN113837875A (en) Transaction method, node and medium based on blockchain network
CN111444479A (en) A method and system for verifying ownership of digital fingerprints
Xu et al. Verifiable image revision from chameleon hashes
JP2000156781A (en) Digital watermark embedding device, fraud detection device, and computer-readable storage medium
CN118965420A (en) A file access control system and control method
CN118940232A (en) Watermark trusted source tracing method and system based on summary
Yampolskiy et al. Crypto-steganographic validity for additive manufacturing (3D printing) design files
Kwok et al. Intellectual property protection for electronic commerce applications.
US8032755B2 (en) Request linked digital watermarking
CN110334487A (en) A digital watermark-based virtual machine image copyright protection method
KR100906067B1 (en) Method for generating standard file using information hiding technology, apparatus for checking metadata integrity of standard file format and method thereof
Tomsich et al. Copyright protection protocols for multimedia distribution based on trusted hardware

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination