CN102393892A - Word document copyright protection method - Google Patents

Word document copyright protection method Download PDF

Info

Publication number
CN102393892A
CN102393892A CN2011103994053A CN201110399405A CN102393892A CN 102393892 A CN102393892 A CN 102393892A CN 2011103994053 A CN2011103994053 A CN 2011103994053A CN 201110399405 A CN201110399405 A CN 201110399405A CN 102393892 A CN102393892 A CN 102393892A
Authority
CN
China
Prior art keywords
identifier
eudc
document
word
copyright identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011103994053A
Other languages
Chinese (zh)
Other versions
CN102393892B (en
Inventor
张释如
姚展
孟晓春
杨金才
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian University of Science and Technology
Original Assignee
Xian University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University of Science and Technology filed Critical Xian University of Science and Technology
Priority to CN201110399405.3A priority Critical patent/CN102393892B/en
Publication of CN102393892A publication Critical patent/CN102393892A/en
Application granted granted Critical
Publication of CN102393892B publication Critical patent/CN102393892B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Document Processing Apparatus (AREA)

Abstract

The invention relates to a word document copyright protection method which mainly comprises the following steps: making a copyright identifier with a TrueType character editor, and generating a key; embedding the copyright identifier into a word document; and carrying out copyright detection with the key. By utilizing the display characteristics of the TrueType character editor and the Windows word stock in the present universal Windows operating system as well as some functions in the word processor, the invention implements word document copyright protection through design integration without special programming. The method is easy and simple to implement, has favorable universality, and can be freely used by any person familiar with Windows operation. The embedded copyright identifier is 100% invisible, and does not influence reading. After the word document processed by the method is deleted, added, replaced, typeset, compressed or decompressed, the copyright information can not be missing.

Description

A kind of method of word document copyright protection
Technical field
The present invention relates to a kind of method of text document copyright protection, particularly a kind of method of word document copyright protection.
Background technology
At present; The copyright protection of text document still is in conceptual phase, and wherein Chinese patent 200510077471.3 provides " a kind of method that in English text, embeds and extract watermark ", and it can be used for the copyright protection of English text; This method converts copyright information to binary number; And through the programming computing copyright information (being digital watermarking) is embedded in the English text, carry out inverse operation during detection, can extract the embedded copyright information of reduction.The major advantage of this method is that anti-format conversion attacking ability is strong, and can not influence reading because of the existence of copyright information (being digital watermarking), but it exists following shortcoming:
1, only is applicable to english document.
2, computing is complicated, and the programming difficulty is not easy to realize.
3, the watermark information that adds can increase the capacity of host's document, to storage and transmit unfavorable.
In text document, the use of word document is the most general, and it has become the main carrier of text document; For example: works such as some novels, prose and paper all are to adopt word to make; But, up to the present, go back the neither one effective method and can carry out copyright protection the word works; For this reason, numerous word user expects to have a kind of simple, effectively word copy-right protection method appearance always.
Summary of the invention
The objective of the invention is provides a kind of method of word document copyright protection to the present situation in the prior art, and achieve easy, simple to operate, versatility is good.
For realizing above-mentioned purpose, technical scheme of the present invention is following:
(1), utilizes TrueType EUDC Editor making copyright identifier and produce key: open TrueType EUDC Editor subsidiary in the windows operating system, in " editor " drop-down menu, click " selection code ", the code frame then occurs; Select a code arbitrarily, edit box appears in carriage return; In " instrument " drop-down menu, select an instrument, in edit box, write a character then, perhaps earlier a copyright identifier is replicated on the office clipbook as the copyright identifier; After above-mentioned edit box occurring; In " editor " drop-down menu, select " character reproduction ", dialog box appears and after, according to prompting operation; Copyright identifier in the office clipbook is sticked in the edit box; Click " preservation character " in " editor " drop-down menu then, then the TrueType EUDC Editor Windows generation eudc.euf and two hidden files of eudc.tte automatically under the catalogue, the copyright identifier of being produced is stored in these two hidden files automatically; A plurality of if desired characters are as the copyright identifier; Can select different codes to repeat aforesaid operations, a plurality of characters of then being produced all are stored in eudc.euf and the eudc.tte file as the copyright identifier, and eudc.euf and two files of eudc.tte are taken care of as key;
(2), the copyright identifier of (1) step being produced is embedded into and needs the word of copyright protection document: open a word document that needs copyright protection; Input method is switched to " ISN " input method; Selection needs to embed the character position of copyright identifier, and the character position input copyright identifier selected utilizes the deflation of word program " character pitch " to regulate then; The character at place, selected location is stacked together with the copyright identifier that accesses; Also can select the position, space in the literary composition, directly the input copyright identifier of making is preserved document then;
(3), carrying out copyright with key detects: key copy that will (1) step gained perhaps send to copyright detect in the used computer Windows under the catalogue; Open the copyright protection document then; The copyright identifier that then embeds displays automatically; The existence of copyright identifier has promptly shown under the copyright of the document.
Characteristics of the present invention are following:
One, the present invention utilizes some functions in display characteristic and the word word processor of TrueType EUDC Editor and windows character library in the at present general windows operating system, integrates through design, has realized the copyright protection of word document; Need not special programming, realize easily, simultaneously; Method is simple; Processing ease, versatility is good, and the people of any windows of being familiar with operation can use without barrier.
Two, the present invention utilizes the TrueType EUDC Editor to make copyright information and produces key, does not need programming, has saved software cost.
Three, the present invention utilizes the display characteristic (be eudc.euf that coinage produces only in the computer of making watermark character, could show with two font files of eudc.tte and do not have in the computer of eudc.euf and two font files of eudc.tte not characteristics showed at other) of windows character library; Do not show when making copyright protection information not have key; Have 100% invisibility, do not produce any influence reading.
Four,, copyright is detected also become very simple, promptly as long as the copy key just can be seen copyright information in the used computer of copyright detection because the present invention has utilized the display characteristic of above-mentioned windows character library.
Five, experiment shows, the present invention has the ability of anti-deletion, interpolation, replacement, composing and compression and decompress(ion) attack.
Six, copyright identifier of the present invention does not increase the capacity of host's document basically, helps storage and transmission.
Description of drawings
Fig. 1 is the printed words figure of one piece of source document.
Fig. 2 is the printed words figure of copyright identifier.
Fig. 3 is one of source document printed words figure that embeds the copyright identifier.
Fig. 4 be embed the copyright identifier source document printed words figure two.
Fig. 5 is the source document printed words figure that is deleted after the attack.
Fig. 6 is deleted to attack the printed words figure that the back copyright detects.
Fig. 7 is the source document printed words figure that is replaced after the attack.
Fig. 8 is replaced to attack the printed words figure that the back copyright detects.
Fig. 9 is the source document printed words figure that is inserted after the attack.
Figure 10 is inserted to attack the printed words figure that the back copyright detects.
Figure 11 is the source document printed words figure that suffers after font is attacked.
Figure 12 suffers font to attack the printed words figure that the back copyright detects.
Figure 13 is the source document printed words figure that suffers after font size is attacked.
Figure 14 suffers font size to attack the printed words figure that the back copyright protection detects.
Embodiment
One, implementation step of the present invention is following:
(1), utilizes TrueType EUDC Editor making copyright identifier and produce key: open TrueType EUDC Editor subsidiary in the windows operating system, in " editor " drop-down menu, click " selection code ", the code frame then occurs; Select a code arbitrarily, suppose to select code aaa1, carriage return; Edit box occurs, in " instrument " drop-down menu, select an instrument, in edit box, write a character then as the copyright identifier; Perhaps earlier the copyright identifier of making is replicated on the office clipbook, after above-mentioned edit box occurring, in " editor " drop-down menu, selects " character reproduction " menu; After dialog box occurring; According to prompting operation, character in the office clipbook is sticked in the edit box, click " preservation character " in " editor " drop-down menu then; Then the TrueType EUDC Editor Windows generate eudc.euf and two hidden files of eudc.tte under the catalogue automatically; The copyright identifier of being produced is stored in these two hidden files automatically, if the copyright identifier is a plurality of characters, for example: Xi'an Technology University; Can select different codes to repeat aforesaid operations; A plurality of characters are produced, and a plurality of characters of then being produced all are stored in eudc.euf and the eudc.tte file as the copyright identifier, and eudc.euf and two files of eudc.tte are taken care of as key.
(2), the copyright identifier of (1) step being produced is embedded into the word document that needs protection: open a word document that needs copyright protection; As shown in Figure 1; Input method is switched to " ISN " input method; Selection needs to embed the character position of copyright identifier, and this example selects the position of all punctuation marks in the document for needing to embed the position of copyright identifier, the input copyright identifier of making on selected character position; Suppose that the copyright identifier of being produced is the school badge badge of an Xi'an Technology University as shown in Figure 2; Utilize the deflation of " character pitch " of word program to regulate then, character on the selected character position and the copyright identifier that is accessed are stacked together, as shown in Figure 3; Also can select the position, space in the literary composition, directly import the copyright identifier, for example: the position, space of last column accesses multicharacter copyright identifier " Xi'an Technology University " and school badge badge thereof with last space line in the text, preserves document then.Copyright protection document after this processing can arbitrarily be opened in the computer that does not copy key, and copyright protection identifier wherein can not show, and can read without barrier.
(3), carrying out copyright with key detects: key copy that will (1) step gained perhaps send to copyright detect used computer Windows under the catalogue; Open the copyright protection document then; The copyright identifier that then embeds displays automatically; As shown in Figure 3, the existence of copyright identifier has promptly shown under the copyright of the document.
Two, the present invention has carried out attack experiments such as deletion, replacement, insertion, composing, compression to above-mentioned copyright protection word document, is intended to test this copyright protection document through after the above-mentioned attack, and whether its copyright identifier can not have safely ripples.
It is source document that word document shown in Figure 1 is still selected in this experiment, and is chosen in each punctuation mark place embedding copyright identifier shown in Figure 2, and the printed words after the embedding are as shown in Figure 3, and the experiment situation is following:
1, deletion experiment
Under the situation that the copyright identifier does not manifest; With " opened the topic arrangement of time in spring in 2012 and before 15 days March in 2012, the accomplished, " deletion in described copyright protection word document the third line, deletion back printed words are as shown in Figure 5; And then with (3) step extraction copyright identifier, as shown in Figure 6.As can be seen from Figure 6, under unwitting situation, in certain row, deleted partial content, the copyright identifier in this row is also deleted simultaneously, but the copyright identifier in other row still exists.
No matter what kind of deletion this description of test does,, just can show that the original copy of this article comes from the copyright owner as long as in the literary composition copyright identifier is arranged.
2, replacement experiment
Under the situation that the copyright identifier does not manifest; With " Xi'an Technology University " in described copyright protection word document the 6th row and " ask and carry out, ask each " usefulness " * " replacement in the 7th row, replacement back printed words are as shown in Figure 7; And then with (3) step extraction copyright identifier, as shown in Figure 8.As can be seen from Figure 8, under unwitting situation, in certain row, replaced partial content, the copyright identifier in the 7th row is also replaced simultaneously, but the copyright identifier in other row still exists.
No matter what kind of replacement this description of test does,, just can show that the original copy of this article comes from the copyright owner as long as in the literary composition copyright identifier is arranged.
3, insert experiment
Under the situation that the copyright identifier does not manifest, insert a plurality of " # " with in described copyright protection word document second row and the fifth line, it is as shown in Figure 9 to insert the back printed words, and then goes on foot extraction copyright identifier with (3), shown in figure 10.As can be seen from Figure 10, under unwitting situation, inserted partial content in the text, the copyright identifier also receives inserting and moves the position simultaneously, but the copyright identifier is not damaged.
No matter what kind of this description of test done and inserted, the copyright identifier in the literary composition only produces and moves the position, and can not be damaged, and therefore, can show that still the original copy of this article comes from the copyright owner.
4, font changes experiment
Under the situation that the copyright identifier does not manifest, the Song typeface of described copyright protection word document is changed to black matrix, it is shown in figure 11 to change the back printed words, and then with (3) step extraction copyright identifier, shown in figure 12.As can be seen from Figure 12, under unwitting situation, carry out the font conversion, the copyright identifier in the literary composition does not receive any damage.
How font changes no matter this description of test is done, and the copyright identifier in the literary composition can not be damaged, and can show that still the original copy of this article comes from the copyright owner.
5, font size changes experiment
Under the situation that the copyright identifier does not manifest, No. four words of described copyright protection word document are changed to little No. five words, it is shown in figure 13 to change the back printed words, and then with (3) step extraction copyright identifier, shown in figure 14.As can be seen from Figure 14, under unwitting situation, carry out the font size conversion, the copyright identifier in the literary composition does not receive any damage.
How font size changes no matter this description of test is done, and the copyright identifier in the literary composition can not be damaged, and can show that still the original copy of this article comes from the copyright owner.
6, compression and decompress(ion) experiment
Under the situation that the copyright identifier does not manifest, with winrar or winzip compressed software described copyright protection word document is compressed and decompress(ion) respectively, the printed words behind the decompress(ion) are as shown in Figure 3.As can be seen from Figure 3, under unwitting situation, compress and decompress(ion), the copyright identifier in the literary composition does not receive any damage.
How to compress and decompress(ion) no matter this description of test is done, the copyright identifier in the literary composition can not be damaged, and can show that still the original copy of this article comes from the copyright owner.

Claims (1)

1. the method for a word document copyright protection, its step is following:
(1), utilizes TrueType EUDC Editor making copyright identifier and produce key: open TrueType EUDC Editor subsidiary in the windows operating system, in " editor " drop-down menu, click " selection code ", the code frame then occurs; Select a code arbitrarily, edit box appears in carriage return; In " instrument " drop-down menu, select an instrument, in edit box, write a character then, perhaps earlier a copyright identifier is replicated on the office clipbook as the copyright identifier; After above-mentioned edit box occurring; In " editor " drop-down menu, select " character reproduction " menu, dialog box appears and after, according to prompting operation; Copyright identifier in the office clipbook is sticked in the edit box; Click " preservation character " in " editor " drop-down menu then, then the TrueType EUDC Editor Windows generation eudc.euf and two hidden files of eudc.tte automatically under the catalogue, the copyright identifier of being produced is stored in these two hidden files automatically; A plurality of if desired characters are as the copyright identifier; Can select different codes to repeat aforesaid operations, a plurality of characters of then being produced all are stored in eudc.euf and the eudc.tte file as the copyright identifier, and eudc.euf and two files of eudc.tte are taken care of as key;
(2), the copyright identifier of (1) step being produced is embedded into and needs the word of copyright protection document: open a word document that needs copyright protection; Input method is switched to " ISN " input method; Selection needs to embed the character position of copyright identifier, and the character position input copyright identifier selected utilizes the deflation of word program " character pitch " to regulate then; The character at place, selected location is stacked together with the copyright identifier that accesses; Also can select the position, space in the literary composition, directly the input copyright identifier of making is preserved document then;
(3), carrying out copyright with key detects: key copy that will (1) step gained perhaps send to copyright detect in the used computer Windows under the catalogue; Open the copyright protection document then; The copyright identifier that then embeds displays automatically; The existence of copyright identifier has promptly shown under the copyright of the document.
CN201110399405.3A 2011-12-05 2011-12-05 Word document copyright protection method Expired - Fee Related CN102393892B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110399405.3A CN102393892B (en) 2011-12-05 2011-12-05 Word document copyright protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110399405.3A CN102393892B (en) 2011-12-05 2011-12-05 Word document copyright protection method

Publications (2)

Publication Number Publication Date
CN102393892A true CN102393892A (en) 2012-03-28
CN102393892B CN102393892B (en) 2014-04-02

Family

ID=45861215

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110399405.3A Expired - Fee Related CN102393892B (en) 2011-12-05 2011-12-05 Word document copyright protection method

Country Status (1)

Country Link
CN (1) CN102393892B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103310130A (en) * 2013-06-25 2013-09-18 西安科技大学 Text document digital watermark embedding and extracting method
CN106845173A (en) * 2017-02-24 2017-06-13 西北工业大学 SolidWorks file anti-copy detection methods
CN110914820A (en) * 2019-05-20 2020-03-24 阿里巴巴集团控股有限公司 Identifying copyrighted material using embedded copyright information
US10755252B1 (en) 2019-05-20 2020-08-25 Alibaba Group Holding Limited Identifying copyrighted material using embedded copyright information
US10949936B2 (en) 2019-05-20 2021-03-16 Advanced New Technologies Co., Ltd. Identifying copyrighted material using copyright information embedded in tables
US11017061B2 (en) 2019-05-20 2021-05-25 Advanced New Technologies Co., Ltd. Identifying copyrighted material using copyright information embedded in electronic files
US11017060B2 (en) 2019-05-20 2021-05-25 Advanced New Technologies Co., Ltd. Identifying copyrighted material using embedded copyright information
US11036834B2 (en) 2019-05-20 2021-06-15 Advanced New Technologies Co., Ltd. Identifying copyrighted material using embedded timestamped copyright information
US11037469B2 (en) 2019-05-20 2021-06-15 Advanced New Technologies Co., Ltd. Copyright protection based on hidden copyright information
US11042612B2 (en) 2019-05-20 2021-06-22 Advanced New Technologies Co., Ltd. Identifying copyrighted material using embedded copyright information

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1812321A (en) * 2006-02-28 2006-08-02 电子科技大学 Hidden communication method for mutual independence of character graphic and code
CN101079088A (en) * 2006-12-28 2007-11-28 腾讯科技(深圳)有限公司 Cipher protection system and method
US20110072492A1 (en) * 2009-09-21 2011-03-24 Avaya Inc. Screen icon manipulation by context and frequency of use

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1812321A (en) * 2006-02-28 2006-08-02 电子科技大学 Hidden communication method for mutual independence of character graphic and code
CN101079088A (en) * 2006-12-28 2007-11-28 腾讯科技(深圳)有限公司 Cipher protection system and method
US20110072492A1 (en) * 2009-09-21 2011-03-24 Avaya Inc. Screen icon manipulation by context and frequency of use

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103310130A (en) * 2013-06-25 2013-09-18 西安科技大学 Text document digital watermark embedding and extracting method
CN103310130B (en) * 2013-06-25 2016-03-30 西安科技大学 Text document embedding algorithm and extracting method
CN106845173A (en) * 2017-02-24 2017-06-13 西北工业大学 SolidWorks file anti-copy detection methods
CN106845173B (en) * 2017-02-24 2019-08-13 西北工业大学 SolidWorks file anti-copy detection method
CN110914820A (en) * 2019-05-20 2020-03-24 阿里巴巴集团控股有限公司 Identifying copyrighted material using embedded copyright information
WO2019141292A3 (en) * 2019-05-20 2020-04-02 Alibaba Group Holding Limited Identifying copyrighted material using embedded copyright information
US10755252B1 (en) 2019-05-20 2020-08-25 Alibaba Group Holding Limited Identifying copyrighted material using embedded copyright information
US10949936B2 (en) 2019-05-20 2021-03-16 Advanced New Technologies Co., Ltd. Identifying copyrighted material using copyright information embedded in tables
US11017061B2 (en) 2019-05-20 2021-05-25 Advanced New Technologies Co., Ltd. Identifying copyrighted material using copyright information embedded in electronic files
US11017060B2 (en) 2019-05-20 2021-05-25 Advanced New Technologies Co., Ltd. Identifying copyrighted material using embedded copyright information
US11036834B2 (en) 2019-05-20 2021-06-15 Advanced New Technologies Co., Ltd. Identifying copyrighted material using embedded timestamped copyright information
US11037469B2 (en) 2019-05-20 2021-06-15 Advanced New Technologies Co., Ltd. Copyright protection based on hidden copyright information
US11042612B2 (en) 2019-05-20 2021-06-22 Advanced New Technologies Co., Ltd. Identifying copyrighted material using embedded copyright information
US11056023B2 (en) 2019-05-20 2021-07-06 Advanced New Technologies Co., Ltd. Copyright protection based on hidden copyright information
US11062000B2 (en) 2019-05-20 2021-07-13 Advanced New Technologies Co., Ltd. Identifying copyrighted material using embedded copyright information
US11080671B2 (en) 2019-05-20 2021-08-03 Advanced New Technologies Co., Ltd. Identifying copyrighted material using embedded copyright information
US11106766B2 (en) 2019-05-20 2021-08-31 Advanced New Technologies Co., Ltd. Identifying copyrighted material using copyright information embedded in electronic files
US11216898B2 (en) 2019-05-20 2022-01-04 Advanced New Technologies Co., Ltd. Identifying copyrighted material using copyright information embedded in tables
US11227351B2 (en) 2019-05-20 2022-01-18 Advanced New Technologies Co., Ltd. Identifying copyrighted material using embedded copyright information
US11256787B2 (en) 2019-05-20 2022-02-22 Advanced New Technologies Co., Ltd. Identifying copyrighted material using embedded copyright information
US11288345B2 (en) 2019-05-20 2022-03-29 Advanced New Technologies Co., Ltd. Identifying copyrighted material using embedded timestamped copyright information
US11409850B2 (en) 2019-05-20 2022-08-09 Advanced New Technologies Co., Ltd. Identifying copyrighted material using embedded copyright information

Also Published As

Publication number Publication date
CN102393892B (en) 2014-04-02

Similar Documents

Publication Publication Date Title
CN102393892B (en) Word document copyright protection method
Aabed et al. Arabic diacritics based steganography
Lee et al. A new approach to covert communication via PDF files
Por et al. UniSpaCh: A text-based data hiding method using Unicode space characters
Shirali-Shahreza et al. A new approach to Persian/Arabic text steganography
Roy et al. A novel approach to format based text steganography
Singh et al. A novel approach of text steganography based on null spaces
CN101271463B (en) Structure processing method and system of layout file
Shirali-Shahreza et al. Arabic/Persian text steganography utilizing similar letters with different codes
US7555138B2 (en) Method and apparatus for digital watermarking for the electronic literary macramé
Singh et al. A survey on text based steganography
Khairullah A novel text steganography system using font color of the invisible characters in microsoft word documents
Memon et al. EVALUATION OF STEGANOGRAPHY FOR URDU/ARABIC TEXT.
Stojanov et al. A new property coding in text steganography of Microsoft Word documents
CN102385680B (en) Tamperproof protective method for Word file
Jalil et al. Text watermarking using combined image-plus-text watermark
US20110081077A1 (en) Searchable color encoded file composing method and searchable color encoded file system
Khairullah et al. Steganography in bengali unicode text
EP2869210A1 (en) Document processing system, electronic document, document processing method, and program
CN109800547B (en) Method for quickly embedding and extracting information for WORD document protection and distribution tracking
CN103310130B (en) Text document embedding algorithm and extracting method
CN114741717B (en) Hidden information embedding and extracting method based on OOXML document
Shirali-Shahreza et al. An improved version of Persian/Arabic text steganography using" La" Word
Zhang et al. New digital text watermarking algorithm based on new-defined characters
Shah et al. Text steganography using character spacing after normalization

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140402

Termination date: 20161205