TWI650672B - Authentication method of electronic document - Google Patents
Authentication method of electronic document Download PDFInfo
- Publication number
- TWI650672B TWI650672B TW106112119A TW106112119A TWI650672B TW I650672 B TWI650672 B TW I650672B TW 106112119 A TW106112119 A TW 106112119A TW 106112119 A TW106112119 A TW 106112119A TW I650672 B TWI650672 B TW I650672B
- Authority
- TW
- Taiwan
- Prior art keywords
- image
- electronic file
- processing unit
- verifying
- electronic
- Prior art date
Links
Landscapes
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
一種電子文件的驗證方法,藉由一處理單元實施並包含下列步驟:將一電子文件轉換成一第一影像;將一個人資訊轉換成至少一第二影像;將該至少一第二影像根據一預定程序作影像處理以對應產生至少一第三影像;將該第一影像及該至少一第三影像作一運算處理以產生一最終影像。該最終影像可藉由另一處理單元根據該個人資訊、該預定程序、及該運算處理,將該最終影像還原以產生該第一影像,進而獲得該電子文件。該驗證方法相對於習知的浮水印方式,在電子文件的完整性、可讀性、去識別化、真偽辨識等方面均有較佳的優點。 An electronic file verification method is implemented by a processing unit and includes the following steps: converting an electronic file into a first image; converting a person information into at least one second image; and calculating the at least one second image according to a predetermined program Performing image processing to generate at least one third image; performing an arithmetic process on the first image and the at least one third image to generate a final image. The final image may be restored by the other processing unit according to the personal information, the predetermined program, and the computing process to generate the first image, thereby obtaining the electronic file. Compared with the conventional watermarking method, the verification method has better advantages in terms of integrity, readability, de-identification, authenticity identification and the like of the electronic file.
Description
本發明是有關於一種驗證方法,特別是指一種電子文件的驗證方法。 The invention relates to a verification method, in particular to a verification method of an electronic file.
電子簽章是一種依附於電子文件並與其相關連者,且用以辨識及確認電子文件簽署人身份、資格、及電子文件真偽者。依據電子簽章法規定,應以書面為之者,如其內容可完整呈現,並可於日後取出供查驗者,經相對人同意,得以電子文件為之。習知的一種電子文件是採用浮水印進行加密與解密的驗證方式,使得相關人可依權限檢視電子文件內容或是附加浮水印的內容。 An electronic signature is a person who is attached to and associated with an electronic document and is used to identify and confirm the identity, eligibility, and authenticity of the electronic document. According to the provisions of the Electronic Signature Law, those who should be in writing, if their contents can be fully presented, can be taken out for inspection in the future, and the electronic documents can be obtained with the consent of the relative person. A known electronic file is a method of verifying encryption and decryption using a watermark, so that the relevant person can view the content of the electronic file or attach the content of the watermark according to the authority.
習知採用浮水印作驗證的電子文件具有以下的特徵:以文件的完整性來說,電子文件的內容仍完整;以文件的可讀性來說,可依權限檢視電子文件內容或附加浮水印的內容;以文件的去識別化來說,以浮水印文字進行小面積影像重疊仍可檢視電子文件的內容;以文件的真偽辨識來說,不具備此功能;以附加資料的儲 存來說,同一檔案但電子文件與浮水印儲存於不同位置;以附加資料的移除來說,依權限移除浮水印資料。 The electronic file using the watermark for verification has the following characteristics: in terms of the integrity of the file, the content of the electronic file is still intact; in terms of the readability of the file, the content of the electronic file or the additional watermark can be viewed according to the authority. The content of the file; in the case of file recognition, the small-area image overlay with the watermark text can still view the content of the electronic file; for the authenticity identification of the file, this function is not available; In fact, the same file but the electronic file and the watermark are stored in different locations; in the case of the removal of the additional data, the watermark data is removed according to the authority.
因此,本發明的目的,即在提供一種相較於習知的浮水印方式,具有更多優點且安全性更高的電子文件的驗證方法。 Accordingly, it is an object of the present invention to provide a method of verifying an electronic document that has more advantages and is more secure than conventional watermarking methods.
於是,本發明電子文件的驗證方法,適用於一第一處理單元來實施,並包含下列步驟(a)~(d)。 Therefore, the verification method of the electronic file of the present invention is applied to a first processing unit and includes the following steps (a) to (d).
步驟(a):將一電子文件轉換成一第一影像;步驟(b):將一個人資訊轉換成至少一第二影像;步驟(c):將該至少一第二影像根據一預定程序作影像處理以對應產生至少一第三影像;及步驟(d):將該第一影像及該至少一第三影像作一運算處理以產生一最終影像。 Step (a): converting an electronic file into a first image; and (b) converting a person information into at least one second image; and (c): performing image processing on the at least one second image according to a predetermined program Correspondingly generating at least one third image; and step (d): performing an arithmetic process on the first image and the at least one third image to generate a final image.
在一些實施態樣中,其中,該第一影像及該至少一第二影像包含文字及圖片之其中至少一種。 In some implementations, the first image and the at least one second image comprise at least one of a text and a picture.
在一些實施態樣中,其中,在步驟(b)中,該個人資訊包含對應一使用者的身分證統一編號、電子信箱、電話號碼、電子裝置識別號碼、指定的一段文字、及指定的影像之其中至少一者。 In some implementations, wherein, in the step (b), the personal information includes a unified ID number, an e-mail address, a telephone number, an electronic device identification number, a specified piece of text, and a specified image corresponding to a user. At least one of them.
在一些實施態樣中,其中,在步驟(c)中,該預定程序包含旋轉、鏡射、重疊、修剪、分割、平移、及縮放之其中至少一種的影像處理。 In some implementations, wherein in step (c), the predetermined program includes image processing of at least one of rotation, mirroring, overlapping, cropping, segmenting, translating, and zooming.
在一些實施態樣中,其中,在步驟(d)中,該運算處理是一預定的演算法。 In some implementations, wherein in step (d), the operational process is a predetermined algorithm.
在一些實施態樣中,其中,在步驟(d)中,該預定的演算法是互斥或(Exclusive OR;XOR)邏輯運算。 In some implementations, wherein in step (d), the predetermined algorithm is an exclusive OR (XOR) logical operation.
在另一些實施態樣中,該驗證方法還適用於一第二處理單元,並還包含步驟(e):藉由該第二處理單元接收該最終影像及該個人資訊,並再根據該預定程序及該運算處理,將該最終影像還原以產生該第一影像,進而獲得該電子文件。 In other implementations, the verification method is further applicable to a second processing unit, and further includes the step (e): receiving, by the second processing unit, the final image and the personal information, and then according to the predetermined program And the computing process, the final image is restored to generate the first image, and the electronic file is obtained.
本發明的功效在於:藉由一處理單元將該個人資訊所轉換成的該至少一第二影像經由該預定程序作影像處理,再與該電子文件所轉換成的該第一影像作該運算處理,以產生該最終影像,使得另一處理單元可以根據該最終影像、該個人資訊、該預定程序、及該運算處理,將該最終影像還原以產生該第一影像,進而獲得該電子文件。該驗證方法相對於習知的浮水印方式,在電子文件的完整性、可讀性、去識別化、真偽辨識等方面均有較佳的優點。 The effect of the present invention is that the at least one second image converted into the personal information by a processing unit is subjected to image processing via the predetermined program, and then the operation processing is performed on the first image converted by the electronic file. The final image is generated, so that another processing unit can restore the final image to generate the first image according to the final image, the personal information, the predetermined program, and the operation processing, thereby obtaining the electronic file. Compared with the conventional watermarking method, the verification method has better advantages in terms of integrity, readability, de-identification, authenticity identification and the like of the electronic file.
1‧‧‧第一影像 1‧‧‧ first image
21~23‧‧‧第二影像 21~23‧‧‧Second image
21'~23'‧‧‧第三影像 21'~23'‧‧‧ third image
4‧‧‧最終影像 4‧‧‧ final image
S1~S5‧‧‧步驟 S1~S5‧‧‧Steps
本發明的其他的特徵及功效,將於參照圖式的實施方式中清楚地呈現,其中:圖1是一流程圖,說明本發明電子文件的驗證方法的一實施 例;圖2是一示意圖,輔助圖1說明該實施例的一個第一影像及三個第二影像的態樣;及圖3是一示意圖,輔助圖1說明該實施例的三個第三影像及一個最終影像。 Other features and effects of the present invention will be apparent from the following description of the drawings, wherein: FIG. 1 is a flowchart illustrating an implementation of the method for verifying an electronic document of the present invention. 2 is a schematic diagram, and FIG. 1 is a schematic view showing a first image and three second images of the embodiment; and FIG. 3 is a schematic view, and FIG. 3 is a schematic view showing three third images of the embodiment. And a final image.
在本發明被詳細描述之前,應當注意在以下的說明內容中,類似的元件是以相同的編號來表示。 Before the present invention is described in detail, it should be noted that in the following description, similar elements are denoted by the same reference numerals.
參閱圖1,本發明電子文件的驗證方法的一實施例,適用於一第一處理單元及一第二處理單元,並包含步驟S1~S5。該第一處理單元及該第二處理單元可以是一種電腦裝置,也可以是一種運算晶片,但不在此限。 Referring to FIG. 1, an embodiment of a method for verifying an electronic file according to the present invention is applicable to a first processing unit and a second processing unit, and includes steps S1 to S5. The first processing unit and the second processing unit may be a computer device or an arithmetic chip, but not limited thereto.
參閱圖1與圖2,在步驟S1,該第一處理單元將一電子文件轉換成一第一影像1,該第一影像1包含該電子文件的內容,且該電子文件的內容至少相關於一使用者,例如是一個使用者的帳單。在本實施例中,該第一影像1包含文字(如圖2中的橫線所示)及圖片(如圖2中的圖片所示),而在其他實施例中,該第一影像1也可以只包含文字或圖片,或包含內嵌的動畫,不在此限。 Referring to FIG. 1 and FIG. 2, in step S1, the first processing unit converts an electronic file into a first image 1, the first image 1 containing the content of the electronic file, and the content of the electronic file is related to at least one use. For example, a user's bill. In this embodiment, the first image 1 includes characters (as shown by the horizontal lines in FIG. 2) and pictures (as shown in the picture in FIG. 2), and in other embodiments, the first image 1 is also You can include only text or images, or include embedded animations.
在步驟S2,該第一處理單元將一個人資訊轉換成至少一 第二影像21~23,且該第一影像1及該至少一第二影像21~23具有相同數量的像素,例如都是800*600,但不在此限。該個人資訊包含對應該使用者的身分證統一編號、電子信箱、電話號碼、電子裝置識別號碼、指定的一段文字、及指定的影像之其中至少一者。在本實施例中,該第二影像21~23共有三個,該第二影像21包含文字且是由對應該使用者的身分證統一編號、電子信箱、及手機的電話號碼所轉換而成。該第二影像只22包含文字且是由對應該使用者的電子裝置識別號碼及所指定的一段文字所轉換而成。該第二影像23只包含圖片且是由對應該使用者所指定的影像轉換而成。而在其他實施例中,該第二影像21~23也可以同時包含文字及圖片,但不在此限。 In step S2, the first processing unit converts one person information into at least one The second image 21 to 23, and the first image 1 and the at least one second image 21 to 23 have the same number of pixels, for example, 800*600, but not limited thereto. The personal information includes at least one of a uniform number of the identity card corresponding to the user, an e-mail address, a telephone number, an electronic device identification number, a designated piece of text, and a designated image. In this embodiment, there are three second images 21 to 23, and the second image 21 includes characters and is converted by a phone number corresponding to the user's identity card, an electronic mail box, and a phone number of the mobile phone. The second image 22 contains text and is converted from the electronic device identification number corresponding to the user and the specified segment of text. The second image 23 contains only pictures and is converted from images corresponding to the user. In other embodiments, the second images 21 to 23 may also include characters and pictures, but not limited thereto.
在步驟S3,該第一處理單元將該至少一第二影像21~23根據一預定程序作影像處理以對應產生至少一第三影像21'~23'。該預定程序包含旋轉、鏡射、重疊、修剪、分割、平移、及縮放之其中至少一種的影像處理。再參閱圖3,示例性地說明三個第二影像21~23分別作不同角度的旋轉,以對應產生三個第三影像21'~23'。 In step S3, the first processing unit performs image processing on the at least one second image 21~23 according to a predetermined program to correspondingly generate at least one third image 21'-23'. The predetermined program includes image processing of at least one of rotation, mirroring, overlapping, cropping, splitting, panning, and zooming. Referring to FIG. 3 again, the three second images 21 to 23 are exemplarily illustrated to rotate at different angles to correspondingly generate three third images 21' to 23'.
參閱圖1、圖2與圖3,在步驟S4,該第一處理單元將該第一影像1及該至少一第三影像21'~23'作一運算處理以產生一最終影像4。該運算處理是一預定的演算法,在本實施例中,該預定 的演算法是互斥或(Exclusive OR;XOR)邏輯運算,在圖3中是以「+」的符號表示,也就是說,該第一處理單元將該第一影像1及該等第三影像21'~23'在相同的畫素位置的顯示數值作XOR運算,以產生該最終影像4。要特別補充說明的是:在本實施例中,該第一影像1及每一第二影像21~23具有相同數量的像素,而在其他實施例中,每一第二影像21~23與該第一影像1也可以具有不同數量的像素,且在步驟S3中,每一第二影像21~23經過縮放後,產生的該第三影像21'~23'與該第一影像1具有相同數量的像素,而能執行步驟S4的該運算處理。另外,該第一影像1、每一第二影像21~23、每一第三影像21'~23'、及該最終影像可以例如是jpg、pdf、word等等各種格式以供使用者檢視的檔案,並非僅限於影像檔。 Referring to FIG. 1 , FIG. 2 and FIG. 3 , in step S4 , the first processing unit performs an operation process on the first image 1 and the at least one third image 21 ′ 23′ to generate a final image 4 . The operation process is a predetermined algorithm, in the embodiment, the reservation The algorithm is a Exclusive OR (XOR) logic operation, which is represented by a symbol of "+" in FIG. 3, that is, the first processing unit compares the first image 1 and the third image. The display values of 21'~23' at the same pixel position are XORed to generate the final image 4. It should be particularly noted that in the embodiment, the first image 1 and each of the second images 21 to 23 have the same number of pixels, and in other embodiments, each of the second images 21 to 23 and the The first image 1 may have a different number of pixels, and in step S3, after the second image 21~23 is scaled, the generated third image 21'~23' has the same number as the first image 1. The pixel is processed, and the arithmetic processing of step S4 can be performed. In addition, the first image 1, each of the second images 21 to 23, each of the third images 21' to 23', and the final image may be, for example, jpg, pdf, word, etc., for viewing by a user. Files are not limited to image files.
在步驟S5,該最終影像4及該個人資訊可以再經過加密後,再經由網路或其他不同的管道傳送至該使用者的一電子裝置(相當於該第二處理單元)中,使得該使用者藉由該第二處理單元在接收該最終影像4及該個人資訊後,根據該預定程序及該運算處理,將該最終影像4還原以產生該第一影像1,進而獲得該電子文件。另外要補充說明的是:該預定程序及該運算處理可以分別預先設定而儲存在該第一處理單元及該第二處理單元中,或者,該預定程序及該運算處理也可以如同該最終影像4及該個人資訊,經過加密後再經由網路或其他不同的管道傳送至該使用者的該電子裝置。 In step S5, the final image 4 and the personal information may be encrypted and then transmitted to an electronic device (equivalent to the second processing unit) of the user via a network or other different pipeline, so that the use After receiving the final image 4 and the personal information, the second processing unit restores the final image 4 to generate the first image 1 according to the predetermined program and the arithmetic processing, thereby obtaining the electronic file. It should be additionally noted that the predetermined program and the operation processing may be preset and stored in the first processing unit and the second processing unit, respectively, or the predetermined program and the operation processing may be like the final image 4 And the personal information is encrypted and transmitted to the electronic device of the user via a network or other different pipeline.
綜上所述,藉由該驗證方法所產生加密的該最終影像相較於習知的浮水印方式,在文件的完整性來說,電子文件的內容已被破壞;在文件的可讀性來說,其他使用者已無法直接檢視電子文件的內容;在文件的去識別化來說,以個人資訊進行大面積的影像合併使電子文件的內容無法直接檢視;以文件的真偽辨識來說,無須電子文件而能以個人資訊還原;以附加資料的儲存來說,電子文件已與個人資訊合併成同一檔案;以附加資料的移除來說,以個人資訊來回復電子文件。該驗證方法不但在各方面相較習知的浮水印方式都具有較佳的優點,也更能提高電子文件的安全性,故確實能達成本發明的目的。 In summary, the final image encrypted by the verification method is compared with the conventional watermarking method, and the content of the electronic file is destroyed in the integrity of the file; in the readability of the file It is said that other users have been unable to directly view the contents of electronic documents; in the case of de-identification of documents, large-area image merging with personal information makes it impossible to directly view the contents of electronic documents; Personal information can be restored without electronic files; in the case of additional data storage, electronic documents have been merged into the same file with personal information; in the case of removal of additional information, electronic information is returned with personal information. The verification method not only has better advantages in various aspects than the conventional watermarking method, but also improves the security of the electronic file, so that the object of the present invention can be achieved.
惟以上所述者,僅為本發明的實施例而已,當不能以此限定本發明實施的範圍,凡是依本發明申請專利範圍及專利說明書內容所作的簡單的等效變化與修飾,皆仍屬本發明專利涵蓋的範圍內。 However, the above is only the embodiment of the present invention, and the scope of the invention is not limited thereto, and all the simple equivalent changes and modifications according to the scope of the patent application and the patent specification of the present invention are still Within the scope of the invention patent.
Claims (7)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW106112119A TWI650672B (en) | 2017-04-12 | 2017-04-12 | Authentication method of electronic document |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW106112119A TWI650672B (en) | 2017-04-12 | 2017-04-12 | Authentication method of electronic document |
Publications (2)
Publication Number | Publication Date |
---|---|
TW201837771A TW201837771A (en) | 2018-10-16 |
TWI650672B true TWI650672B (en) | 2019-02-11 |
Family
ID=64797381
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW106112119A TWI650672B (en) | 2017-04-12 | 2017-04-12 | Authentication method of electronic document |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI650672B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6018801A (en) * | 1998-02-23 | 2000-01-25 | Palage; Michael D. | Method for authenticating electronic documents on a computer network |
TW436735B (en) * | 1997-08-27 | 2001-05-28 | Csp Holdings Llc | Remote image capture with centralized processing and storage |
US6327656B2 (en) * | 1996-07-03 | 2001-12-04 | Timestamp.Com, Inc. | Apparatus and method for electronic document certification and verification |
CN104462896A (en) * | 2014-11-19 | 2015-03-25 | 福建亿榕信息技术有限公司 | Reliable video data acquisition and certification method with security certification function |
-
2017
- 2017-04-12 TW TW106112119A patent/TWI650672B/en active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6327656B2 (en) * | 1996-07-03 | 2001-12-04 | Timestamp.Com, Inc. | Apparatus and method for electronic document certification and verification |
TW436735B (en) * | 1997-08-27 | 2001-05-28 | Csp Holdings Llc | Remote image capture with centralized processing and storage |
US6018801A (en) * | 1998-02-23 | 2000-01-25 | Palage; Michael D. | Method for authenticating electronic documents on a computer network |
CN104462896A (en) * | 2014-11-19 | 2015-03-25 | 福建亿榕信息技术有限公司 | Reliable video data acquisition and certification method with security certification function |
Also Published As
Publication number | Publication date |
---|---|
TW201837771A (en) | 2018-10-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7502934B2 (en) | Electronic signatures | |
US11704764B2 (en) | Method and system for generating watermark on the basis of graphic, terminal, and medium | |
US20160248765A1 (en) | Document distribution and interaction | |
Hamid et al. | Robust image hashing scheme using Laplacian pyramids | |
KR102108192B1 (en) | Method, Apparatus and System for Inserting Watermark | |
Li et al. | Data hiding in iris image for privacy protection | |
Naseem et al. | ROBUST AND FRAGILE WATERMARKING FOR MEDICAL IMAGES USING REDUNDANT RESIDUE NUMBER SYSTEM AND CHAOS. | |
CN111881425B (en) | Picture copyright authentication method, device and storage medium | |
EP1704667B1 (en) | Electronic signing apparatus and methods | |
TWI650672B (en) | Authentication method of electronic document | |
WO2021012502A1 (en) | Screenshot information control method, device, computer apparatus, and storage medium | |
CN111339556A (en) | Data desensitization method, terminal, device and storage medium | |
JP2009535898A (en) | Secure signature | |
Arulananth et al. | Automatic Certificate Generation and Security Implementation Using LSB and Hybrid Watermarking Techniques | |
US11977661B2 (en) | System for generating a digital handwritten signature using a mobile device | |
Chhajed et al. | Data hiding in binary images for secret and secure communication using decision tree | |
TWI734259B (en) | Electronic signature authentication device and method | |
TWM573474U (en) | Electronic device of identification mechanism | |
Kumar et al. | A review on digital watermarking-based image forensic technique | |
JP2013167865A (en) | Confidential information hiding device, confidential information restoring device, confidential information hiding program, and confidential information restoring program | |
Soman et al. | Block-based forgery detection using global and local features | |
Lee et al. | Optimal pixel-level self-repairing authentication method for grayscale images under a minimax criterion of distortion reduction | |
Hilal et al. | Forensic Analysis of Images on Online Social Network: A Survey | |
Mann et al. | A Study to Ascertain and Differentiate between Genuine and Transplanted Documents/Signatures. | |
CN118761432B (en) | Anti-counterfeiting code generation method, anti-counterfeiting code decoding method and device |