CN118296574A - PPT file processing method and device, electronic equipment and readable medium - Google Patents
PPT file processing method and device, electronic equipment and readable medium Download PDFInfo
- Publication number
- CN118296574A CN118296574A CN202410358796.1A CN202410358796A CN118296574A CN 118296574 A CN118296574 A CN 118296574A CN 202410358796 A CN202410358796 A CN 202410358796A CN 118296574 A CN118296574 A CN 118296574A
- Authority
- CN
- China
- Prior art keywords
- file
- files
- ppt
- encryption information
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/11—File system administration, e.g. details of archiving or snapshots
- G06F16/116—Details of conversion of file system types or formats
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/16—File or folder operations, e.g. details of user interfaces specifically adapted to file systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
Abstract
The application relates to a processing method, a processing device, electronic equipment and a readable medium of a PPT file, wherein the method comprises the following steps: acquiring an initial PPT file to be protected, and determining a plurality of files corresponding to the initial PPT file, wherein the plurality of files comprise a plurality of components forming the content and the function of the initial PPT file; acquiring encryption information, and encrypting a plurality of files by utilizing the encryption information, wherein the encryption information is invisible in the plurality of files; generating target PPT files corresponding to the encrypted files, and sending the target PPT files to a receiver so that the receiver can verify the target PPT files. By embedding the encryption information in the components of the PPT file in a concealed manner, the problem that the integrity and traceability of the PPT file are difficult to protect in a concealed manner is solved.
Description
Technical Field
The present application relates to the field of internet technologies, and in particular, to a method and an apparatus for processing a PPT file, an electronic device, and a readable medium.
Background
In recent years, digital presentation software has become a standard tool for business, education and government lectures, especially PPT (PowerPoint), and with the advent of the digital age, PPT has become a medium for not only presenting information but also important documents and knowledge transmission, so that security issues of PPT documents have become particularly important, and enterprises and individuals have paid more attention to how to protect their presentation contents from unauthorized copying and tampering.
In order to improve the security of PPT files and prevent information leakage, the prior art generally uses password protection, digital watermarking, and the like to improve the security, but once the password is cracked, no privacy can be said, and the digital watermarking can affect the appearance display of the file content. Therefore, how to protect the integrity of the file and ensure the traceability of the source thereof without affecting the normal use and viewing of the file, namely, the integrity and traceability of the PPT file are difficult to be protected in a hidden way.
In view of the above problems, no effective solution has been proposed at present.
Disclosure of Invention
The application provides a processing method, a processing device, electronic equipment and a readable medium of a PPT file, which are used for solving the technical problem that the integrity and traceability of the PPT file are difficult to be hidden and protected.
According to one aspect of the embodiment of the application, the application provides a processing method of a PPT file, which is applied to an encryption party and comprises the following steps: acquiring an initial PPT file to be protected, and determining a plurality of files corresponding to the initial PPT file, wherein the plurality of files comprise a plurality of components forming the content and the function of the initial PPT file; acquiring encryption information, and encrypting a plurality of files by utilizing the encryption information, wherein the encryption information is invisible in the plurality of files; generating target PPT files corresponding to the encrypted files, and sending the target PPT files to a receiver so that the receiver can verify the target PPT files.
Optionally, determining a plurality of files corresponding to the initial PPT file includes: converting the initial PPT file into a first data packet in ZIP format; and decompressing the first data packet to obtain a plurality of files.
Optionally, encrypting the plurality of files with the encryption information includes: selecting a first file from a plurality of files, wherein the first file is at least one file in which encryption information is to be embedded; and acquiring encryption information, and embedding the encryption information into the first file to complete encryption of a plurality of files, wherein the encryption information is subjected to confusion encryption processing in advance.
Optionally, generating a target PPT file corresponding to the encrypted plurality of files includes: packaging the encrypted files into a second data packet in ZIP format; and converting the second data packet into a target PPT file in the PPT format.
According to another aspect of the embodiment of the present application, the present application provides a method for processing a PPT file, which is applied to a receiving party, and includes: receiving a target PPT file sent by an encryption party, wherein the target PPT file is encrypted by the encryption party in advance by using encryption information; determining a first file in the target PPT file, wherein the first file is embedded with invisible encryption information in advance by an encryptor; the encryption information is extracted from the first file and verified to determine the source of the target PPT file.
Optionally, determining the first file in the target PPT file includes: converting the target PPT file into a third data packet in ZIP format; decompressing the third data packet to obtain a plurality of second files; the first file is determined among the plurality of second files.
According to another aspect of the embodiment of the present application, there is provided a processing apparatus for a PPT file, applied to an encryption party, including: the system comprises an acquisition module, a storage module and a storage module, wherein the acquisition module is used for acquiring an initial PPT file to be protected and determining a plurality of files corresponding to the initial PPT file, wherein the plurality of files comprise a plurality of components for forming the content and the function of the initial PPT file; the encryption module is used for acquiring encryption information and encrypting a plurality of files by utilizing the encryption information, wherein the encryption information is invisible in the plurality of files; and the generating module is used for generating target PPT files corresponding to the encrypted files and sending the target PPT files to a receiver so that the receiver can verify the target PPT files.
According to another aspect of the embodiment of the present application, there is provided a processing apparatus of a PPT file, applied to a receiving party, including: the receiving module is used for receiving the target PPT file sent by the encryption party, wherein the target PPT file is encrypted by the encryption party in advance by using encryption information; the determining module is used for determining a first file in the target PPT file, wherein the first file is embedded with invisible encryption information in advance by an encryptor; and the extraction module is used for extracting the encryption information from the first file and verifying the encryption information to determine the source of the target PPT file.
According to another aspect of the embodiments of the present application, there is provided an electronic device including a memory, a processor, a communication interface, and a communication bus, where the memory stores a computer program executable on the processor, the memory, the processor, and the communication interface communicate through the communication bus, and the processor executes the steps of the method when the processor executes the computer program.
According to another aspect of embodiments of the present application, there is also provided a computer readable medium having non-volatile program code executable by a processor, the program code causing the processor to perform the above-described method.
Compared with the related art, the technical scheme provided by the embodiment of the application has the following advantages:
The application discloses a processing method of a PPT file applied to an encryption party, which comprises the following steps: acquiring an initial PPT file to be protected, and determining a plurality of files corresponding to the initial PPT file, wherein the plurality of files comprise a plurality of components forming the content and the function of the initial PPT file; acquiring encryption information, and encrypting a plurality of files by utilizing the encryption information, wherein the encryption information is invisible in the plurality of files; generating target PPT files corresponding to the encrypted files, and sending the target PPT files to a receiver so that the receiver can verify the target PPT files. By embedding the encryption information in the components of the PPT file in a concealed manner, the problem of how to protect the integrity and security of the PPT file in a concealed manner is solved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the related art, the drawings that are required to be used in the embodiments or the related technical descriptions will be briefly described, and it will be apparent to those skilled in the art that other drawings can be obtained according to these drawings without inventive effort.
FIG. 1 is a flowchart of an alternative method for processing a PPT file applied to an encryptor according to an embodiment of the present application;
FIG. 2 is a flowchart of an alternative encryption method for a PPT file applied to an encryptor according to an embodiment of the present application;
FIG. 3 is a schematic diagram of an alternative PPT processing system provided in accordance with an embodiment of the present application;
Fig. 4 is a flowchart of an alternative processing method of a PPT file applied to a receiving party according to an embodiment of the present application;
fig. 5 is a flowchart of an alternative method for verifying a PPT file applied to a receiving party according to an embodiment of the present application;
FIG. 6 is a block diagram of an alternative processing device for PPT files applied to an encryptor according to an embodiment of the present application;
Fig. 7 is a block diagram of an alternative PPT file processing device for application to a receiving party according to an embodiment of the present application;
Fig. 8 is a schematic structural diagram of an alternative electronic device according to an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
In the following description, suffixes such as "module", "component", or "unit" for representing elements are used only for facilitating the description of the present application, and are not of specific significance per se. Thus, "module" and "component" may be used in combination.
In recent years, digital presentation software has become a standard tool for business, education and government lectures, especially PPT, and with the advent of the digital age, PPT has become an important document and a medium for knowledge transmission as well as for presentation of information, so that security problems of PPT documents have become particularly important, and enterprises and individuals have paid more attention to how to protect presentation contents thereof from unauthorized copying and tampering.
In order to improve the security of PPT files and prevent information leakage, the prior art generally uses password protection, digital watermarking, and the like to improve the security, but once the password is cracked, no privacy can be said, and the digital watermarking can affect the appearance display of the file content. Therefore, how to protect the integrity of the file and ensure the traceability of the source thereof, i.e. how to protect the integrity and traceability of the PPT file in a hidden manner, while not affecting the normal use and viewing of the file, is a problem to be solved.
In order to solve the problems mentioned in the background art, according to an aspect of the embodiments of the present application, there is provided a processing method of a PPT file, applied to an encrypting party, as shown in fig. 1, including:
Step 101, acquiring an initial PPT file to be protected, and determining a plurality of files corresponding to the initial PPT file, wherein the plurality of files comprise a plurality of components forming the content and the function of the initial PPT file;
step 103, obtaining encryption information, and encrypting a plurality of files by utilizing the encryption information, wherein the encryption information is invisible in the plurality of files;
And 105, generating target PPT files corresponding to the encrypted files, and sending the target PPT files to a receiver so that the receiver verifies the target PPT files.
The application provides a PPT processing method, which is used for embedding encrypted information (such as digital fingerprints) in a PPT file in a hidden way so as to enhance the security and tracking capability of the file.
The initial PPT file and the target PPT file have no difference in file content, and after the initial PPT file is embedded with encryption information, the obtained file is the target PPT file.
After sending the encrypted target PPT file to the receiver, the receiver may verify the target PPT file and be able to trace back the file source of the target PPT file, a specific verification method is described below.
While the prior art provides some degree of security, they generally fail to address the following: once the file is out of the original secure environment, how to ensure that the file contents are not unauthorized to be used or revealed; and how to effectively track and identify the source of a document without significantly changing the appearance or use experience of the document. Based on this, the present application has been developed to provide a method for protecting PPT files that is both covert and efficient, ensuring that the security and integrity thereof is maintained even in uncontrolled environments.
As an alternative embodiment, determining a plurality of files corresponding to the initial PPT file includes: converting the initial PPT file into a first data packet in ZIP format; and decompressing the first data packet to obtain a plurality of files.
Preferably, the present application provides an automation technology of an automation script and programming interface, such as a Python script, which can be used to handle unpacking, editing and repacking of PPT files, and by which information can be efficiently embedded or extracted in a large number of files.
Optionally, converting the initial PPT file into a first packet in ZIP format, including: renaming the file name of the initial PPT file; the extension of the original PPT file is changed from. pptx (or. PPT) to.zip, resulting in a first packet.
The plurality of files includes, but is not limited to, various XML files and media content.
The first data packet is decompressed, so that the internal structure of the first data packet can be exposed, and each component (such as a slide, a picture, a font, video, audio and the like) in the first data packet can be directly accessed.
The initial PPT file is packed and decompressed, so that the format and structure of the initial PPT file can be clearly shown. PPT files are in fact a complex file format, the internal structure of which employs a ZIP-like compression format, in which a plurality of files and folders are contained, and understanding this structure is critical to being able to add hidden information without affecting normal functioning.
As an alternative embodiment, encrypting the plurality of files using the encryption information includes: selecting a first file from a plurality of files, wherein the first file is at least one file in which encryption information is to be embedded; and acquiring encryption information, and embedding the encryption information into the first file to complete encryption of a plurality of files, wherein the encryption information is subjected to confusion encryption processing in advance.
Alternatively, the encryption information may be embedded in portions of the first data packet, such as metadata, XML files for a particular slide, or media files. Specifically, which file is embedded with the encryption information and where the embedded position in the file is, the first file and the embedded position selected by the user are detected. Where metadata is data associated with the file itself, providing detailed information about the file, such as creation date, author, file size, etc., in a PPT file, the metadata may be used to store additional information, such as a specific tag or code for identifying the source of the file.
Illustratively, a first file, e.g., tabletypes. Xml, needs to be selected from a plurality of files in which encryption information is to be embedded; acquiring a digital fingerprint, encrypting and confusing to obtain encryption information; and embedding the encryption information into the appointed position of the first file tabletypes.
The encryption information provided by the application is a digital fingerprint, and the digital fingerprint needs to be encrypted and confused before being embedded into the first file so as to enhance the security and the complexity and the concealment of the digital fingerprint.
Preferably, the encryption and confusion techniques provided by the present application are mainly data encoding and encryption techniques, and in order to protect the security and confidentiality of hidden information, specific data encoding and encryption techniques can be adopted, which ensure that even if someone discovers hidden information, the hidden information cannot be interpreted.
Optionally, the digital fingerprint is also encrypted by applying an encryption algorithm (e.g., a symmetric encryption algorithm and an asymmetric encryption algorithm) so that it is not easily obtained or tampered with by unauthorized persons.
Optionally, the digital fingerprint is transformed or disguised by the confusion algorithm to present different characteristics from the original data, so that a potential attacker can be effectively prevented from stealing sensitive information or destroying the security of the system by analyzing the digital fingerprint.
The present application provides an embodiment that uses steganography, a technique that allows embedding data in a file without attention, to embed information in PPT files by minor adjustments, such as slightly changing pixels in the picture or embedding hardly visible symbols in the text, to embed the encrypted information in the file.
It should be noted that, in addition to embedding information in metadata of a file, embodiments provided by the present application may also embed information in the document content itself (such as text, image or hidden layer), and this dual embedding mechanism further enhances the security and difficulty in detecting information.
The application obviously improves the security of the file by embedding the encryption information in the PPT file. Compared with the prior art, such as password protection or digital watermarking, the method is more difficult to detect and crack, because the information embedding is hidden and is subjected to encryption processing.
As an alternative embodiment, generating a target PPT file corresponding to the encrypted plurality of files includes: packaging the encrypted files into a second data packet in ZIP format; and converting the second data packet into a target PPT file in the PPT format.
After the encryption of the initial PPT file is completed, the encrypted file and the folder are recombined and packed into a ZIP format, and a second data packet is obtained.
Optionally, the second data packet is converted into a target PPT file in PPT format, including: and changing the extension name of the second data packet in the ZIP format into the PPT to obtain a target PPT file. I.e., restored to the original usable format, the user may now use the target PPT file normally and the encrypted data will not be displayed on the file contents.
Fig. 2 is a schematic diagram of an encryption method of a PPT file applied to an encrypting party, where the method includes the following steps: selecting a PPT file to be encrypted; converting the PPT file into a ZIP format; decompressing the file to obtain a plurality of files (e.g., media, theme, etc.); embedding encryption information in a plurality of files; repackaging the plurality of files embedded with the encrypted information; the packed data packet is restored to a file in PPT format.
Fig. 3 is a schematic diagram of a PPT file processing system according to the present application, where the system includes an encryptor 302 and a receiver 304, where the encryptor is responsible for performing hidden encryption on an initial PPT file to obtain a target PPT file embedded with encryption information, and then the encrypted target PPT may be sent to the receiver, where the receiver may verify the target PPT file, so as to check the integrity of the file and trace the source of the file.
The application provides a processing system of a PPT file, which specifically comprises the following functional modules:
(1) The file processing module is responsible for unpacking and repacking the PPT file and comprises a file format converter and a file decompressor; the working principle is that the PPT file is converted into ZIP format, decompressed to access the internal file, and recombined and packed after processing.
(2) The encryption and embedding module is responsible for encrypting, confusing and embedding information and comprises an encryption processor and an information embedder; the principle of operation is to encrypt and obfuscate the information to be embedded and then to embed the information in a hidden way in a specific part of the file.
(3) The verification module is responsible for extracting and verifying the embedded information and comprises an information extractor and a verification processor; the working principle is that the encryption information is extracted from the PPT file, and decryption processing is carried out to verify the source and the integrity of the file.
(4) System hardware support, including standard computer hardware such as processors, memory and storage devices, is used to execute instructions of software modules and store PPT files.
The scheme provided by the application solves a plurality of defects in the PPT file security aspect of the prior art, such as the limitation of password protection, the visibility and easy removability of digital watermarks, the limitation of document encryption and digital signature and the like. The application provides a safer, concealed and easy-to-use method for protecting the content of the PPT file by concealingly embedding information and combining encryption and confusion technologies, and is suitable for wide application scenes.
The application discloses a processing method of a PPT file applied to an encryption party, which comprises the following steps: acquiring an initial PPT file to be protected, and determining a plurality of files corresponding to the initial PPT file, wherein the plurality of files comprise a plurality of components forming the content and the function of the initial PPT file; acquiring encryption information, and encrypting a plurality of files by utilizing the encryption information, wherein the encryption information is invisible in the plurality of files; generating target PPT files corresponding to the encrypted files, and sending the target PPT files to a receiver so that the receiver can verify the target PPT files. By embedding the encryption information in the components of the PPT file in a concealed manner, the problem that the integrity and traceability of the PPT file are difficult to protect in a concealed manner is solved.
According to another aspect of the embodiment of the present application, there is provided a processing method of a PPT file, applied to a receiving party, as shown in fig. 4, including:
Step 401, receiving a target PPT file sent by an encryptor, wherein the target PPT file is encrypted by the encryptor in advance using encryption information;
step 403, determining a first file in the target PPT file, wherein the first file is pre-embedded with invisible encryption information by an encryptor;
step 405, extracting the encrypted information from the first file, and verifying the encrypted information to determine the source of the target PPT file.
After receiving the target PPT file sent by the encryptor, the receiver can verify the source and integrity of the target PPT file.
The recipient may unpack the target PPT file, extract the embedded information, and decrypt and verify to determine the source and state of the file using a procedure similar to that described above in which the encryptor determines the first file.
As an alternative embodiment, determining the first file in the target PPT file includes: converting the target PPT file into a third data packet in ZIP format; decompressing the third data packet to obtain a plurality of second files; the first file is determined among the plurality of second files.
Specifically, the target PPT file is decompressed into a third data packet in ZIP format, and at this time, a plurality of second files, that is, encrypted files, can be obtained, the first file is found out from the plurality of second files, and then the encrypted information embedded in the first file is extracted, so that the encrypted information can be verified.
Optionally, after extracting the digital fingerprint, a query request is sent by using a pre-established API (Application Programming Interface, program interface), the digital fingerprint may be sent to a server endpoint responsible for verification, and then the server searches information such as a file source according to pre-stored information, and returns the information to the receiver.
The application allows the original file owner or authorized user to track the distribution and use of the file by extracting and verifying the embedded encryption information in the file, thereby solving the problem in the prior art that the file is difficult to track once decrypted.
Fig. 5 is a schematic diagram of a method for verifying a PPT file applied to a receiving party according to the present application, where the steps include: selecting an encrypted PPT file; converting the PPT file into a ZIP format; decompressing the files to obtain a plurality of files; extracting encryption information of the embedded file from the plurality of files; decoding the encrypted information; and submitting the decoded information to API query to obtain a query result.
The application discloses a processing method of a PPT file applied to a receiver, which comprises the following steps: receiving a target PPT file sent by an encryption party, wherein the target PPT file is encrypted by the encryption party in advance by using encryption information; determining a first file in the target PPT file, wherein the first file is embedded with invisible encryption information in advance by an encryptor; the encryption information is extracted from the first file and verified to determine the source of the target PPT file. By extracting the encrypted digital fingerprint for verification, the source of the file can be traced, and the integrity of the file can be ensured.
The processing flow of the PPT file provided by the application comprises the following steps:
(1) Selecting and preparing PPT files: the user selects a PPT file, and the system converts the PPT file into a ZIP format through a file processing module and decompresses the ZIP file;
(2) Information encryption and embedding: the encryption and embedding module receives information (such as digital fingerprints) appointed by a user, and embeds the information into an appointed position of the PPT file after encryption and confusion processing is carried out;
(3) Repacking the file: the file processing module repacks the processed file into a PPT format;
(4) Information extraction and verification: at the receiving side, the verification module is used for extracting embedded information from the PPT file, decrypting and verifying the information so as to confirm the source and the state of the file.
The information is hidden in the PPT file, the display function of the information is not affected, and meanwhile, the secrecy and the safety of the information are ensured. By the method, the use of the file can be tracked and verified, and unauthorized copying and leakage can be effectively prevented.
According to another aspect of the embodiment of the present application, the present application provides a processing apparatus for a PPT file, which is applied to an encrypting party, as shown in fig. 6, and includes:
An obtaining module 602, configured to obtain an initial PPT file to be protected, and determine a plurality of files corresponding to the initial PPT file, where the plurality of files include a plurality of components that form contents and functions of the initial PPT file;
An encryption module 604, configured to obtain encryption information, and encrypt a plurality of files using the encryption information, where the encryption information is not visible in the plurality of files;
the generating module 606 is configured to generate a target PPT file corresponding to the encrypted multiple files, and send the target PPT file to the receiving party, so that the receiving party verifies the target PPT file.
It should be noted that, the acquiring module 602 in this embodiment may be used to perform the step 101 in the embodiment of the present application, the encrypting module 604 in this embodiment may be used to perform the step 103 in the embodiment of the present application, and the generating module 606 in this embodiment may be used to perform the step 105 in the embodiment of the present application.
Optionally, the acknowledgement obtaining module 602 is further configured to convert the initial PPT file into a first data packet in ZIP format; and decompressing the first data packet to obtain a plurality of files.
Optionally, the encryption module 604 is further configured to select a first file from a plurality of files, where the first file is at least one file in which encryption information is to be embedded; and acquiring encryption information, and embedding the encryption information into the first file to complete encryption of a plurality of files, wherein the encryption information is subjected to confusion encryption processing in advance.
Optionally, the generating module 606 is further configured to package the encrypted files into a second data packet in ZIP format; and converting the second data packet into a target PPT file in the PPT format.
According to another aspect of the embodiment of the present application, the present application provides a processing apparatus of a PPT file, which is applied to a receiving party, as shown in fig. 7, and includes:
a receiving module 702, configured to receive a target PPT file sent by an encryptor, where the target PPT file is encrypted by the encryptor in advance using encryption information;
a determining module 704, configured to determine a first file in the target PPT file, where the first file is pre-embedded with invisible encryption information by an encryptor;
the extracting module 706 is configured to extract the encrypted information from the first file, and verify the encrypted information to determine a source of the target PPT file.
It should be noted that, the receiving module 702 in this embodiment may be used to perform step 401 in this embodiment, the determining module 704 in this embodiment may be used to perform step 403 in this embodiment, and the extracting module 706 in this embodiment may be used to perform step 405 in this embodiment.
Optionally, the determining module 704 is specifically configured to convert the target PPT file into a third data packet in ZIP format; decompressing the third data packet to obtain a plurality of second files; the first file is determined among the plurality of second files.
It should be noted that the above modules are the same as examples and application scenarios implemented by the corresponding steps, but are not limited to what is disclosed in the above embodiments.
According to another aspect of the embodiments of the present application, as shown in fig. 8, the present application provides an electronic device, including a memory 801, a processor 803, a communication interface 805, and a communication bus 807, where the memory 801 stores a computer program executable on the processor 803, and the memory 801 and the processor 803 communicate through the communication interface 805 and the communication bus 807, and the processor 803 implements the steps of the method when executing the computer program.
The memory and the processor in the electronic device communicate with the communication interface through a communication bus. The communication bus may be a peripheral component interconnect standard (PERIPHERAL COMPONENT INTERCONNECT, PCI) bus, or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, or the like. The communication bus may be classified as an address bus, a data bus, a control bus, or the like.
The memory may include random access memory (Random Access Memory, RAM) or may include non-volatile memory (non-volatile memory), such as at least one disk memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, abbreviated as CPU), a network processor (Network Processor, abbreviated as NP), etc.; but may also be a digital signal processor (DIGITAL SIGNAL Processing, DSP), application Specific Integrated Circuit (ASIC), field-Programmable gate array (FPGA) or other Programmable logic device, discrete gate or transistor logic device, discrete hardware components.
There is also provided in accordance with yet another aspect of an embodiment of the present application a computer readable medium having non-volatile program code executable by a processor.
Alternatively, specific examples in this embodiment may refer to examples described in the foregoing embodiments, and this embodiment is not described herein.
When the embodiment of the application is specifically implemented, the above embodiments can be referred to, and the application has corresponding technical effects.
It is to be understood that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or a combination thereof. For a hardware implementation, the Processing units may be implemented within one or more Application SPECIFIC INTEGRATED Circuits (ASICs), digital signal processors (DIGITAL SIGNAL Processing, DSPs), digital signal Processing devices (DSP DEVICE, DSPD), programmable logic devices (Programmable Logic Device, PLDs), field-Programmable gate arrays (Field-Programmable GATE ARRAY, FPGA), general purpose processors, controllers, micro-controllers, microprocessors, other electronic units for performing the functions described herein, or a combination thereof.
For a software implementation, the techniques described herein may be implemented by means of units that perform the functions described herein. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, and for example, the division of the modules is merely a logical function division, and there may be additional divisions when actually implemented, for example, multiple modules or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the embodiments of the present application may be embodied in essence or a part contributing to the prior art or a part of the technical solution, in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method described in the embodiments of the present application. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk, etc. It should be noted that in this document, relational terms such as "first" and "second" and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing is only a specific embodiment of the application to enable those skilled in the art to understand or practice the application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (10)
1. A method for processing a PPT file, the method being applied to an encryptor and comprising:
acquiring an initial PPT file to be protected, and determining a plurality of files corresponding to the initial PPT file, wherein the files comprise a plurality of components for forming the content and the function of the initial PPT file;
acquiring encryption information and encrypting the plurality of files by utilizing the encryption information, wherein the encryption information is invisible in the plurality of files;
Generating target PPT files corresponding to the encrypted files, and sending the target PPT files to a receiver so that the receiver verifies the target PPT files.
2. The method of claim 1, wherein the determining a plurality of files corresponding to the initial PPT file comprises:
Converting the initial PPT file into a first data packet in ZIP format;
decompressing the first data packet to obtain the plurality of files.
3. The method of claim 1, wherein encrypting the plurality of files using the encryption information comprises:
selecting a first file from the plurality of files, wherein the first file is at least one file in which the encryption information is to be embedded;
And acquiring the encryption information, and embedding the encryption information into the first file to complete encryption of the plurality of files, wherein the encryption information is subjected to confusion encryption processing in advance.
4. The method of claim 1, wherein the generating the target PPT file corresponding to the encrypted plurality of files comprises:
packaging the encrypted files into a second data packet in ZIP format;
And converting the second data packet into the target PPT file in the PPT format.
5. A method for processing a PPT file, the method being applied to a receiving party and comprising:
Receiving a target PPT file sent by an encrypting party, wherein the target PPT file is encrypted by the encrypting party in advance by using encryption information;
determining a first file in the target PPT file, wherein the first file is pre-embedded with invisible encryption information by the encryptor;
And extracting the encryption information from the first file and verifying the encryption information to determine the source of the target PPT file.
6. The method of claim 5, wherein said determining a first file of the target PPT files comprises:
Converting the target PPT file into a third data packet in ZIP format;
Decompressing the third data packet to obtain a plurality of second files;
The first file is determined among a plurality of the second files.
7. A PPT file processing apparatus, the apparatus being applied to an encryptor, comprising:
The device comprises an acquisition module, a storage module and a storage module, wherein the acquisition module is used for acquiring an initial PPT file to be protected and determining a plurality of files corresponding to the initial PPT file, wherein the files comprise a plurality of components for forming the content and the function of the initial PPT file;
The encryption module is used for acquiring encryption information and encrypting the files by utilizing the encryption information, wherein the encryption information is invisible in the files;
And the generating module is used for generating target PPT files corresponding to the encrypted files and sending the target PPT files to a receiver so that the receiver can verify the target PPT files.
8. A PPT file processing apparatus, the apparatus being applied to a receiving party, comprising:
The receiving module is used for receiving a target PPT file sent by an encrypting party, wherein the target PPT file is encrypted by the encrypting party in advance by using encryption information;
a determining module, configured to determine a first file in the target PPT file, where the first file is pre-embedded with the invisible encryption information by the encryptor;
and the extraction module is used for extracting the encryption information from the first file and verifying the encryption information to determine the source of the target PPT file.
9. An electronic device comprising a memory, a processor, a communication interface and a communication bus, said memory storing a computer program executable on said processor, said memory, said processor communicating with said communication interface via said communication bus, characterized in that said processor, when executing said computer program, implements the steps of the method according to any of the preceding claims 1 to 4 or 5 to 6.
10. A computer readable medium having non-volatile program code executable by a processor, the program code causing the processor to perform the method of any one of claims 1 to 4 or 5 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410358796.1A CN118296574A (en) | 2024-03-27 | 2024-03-27 | PPT file processing method and device, electronic equipment and readable medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410358796.1A CN118296574A (en) | 2024-03-27 | 2024-03-27 | PPT file processing method and device, electronic equipment and readable medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN118296574A true CN118296574A (en) | 2024-07-05 |
Family
ID=91675251
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410358796.1A Pending CN118296574A (en) | 2024-03-27 | 2024-03-27 | PPT file processing method and device, electronic equipment and readable medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN118296574A (en) |
-
2024
- 2024-03-27 CN CN202410358796.1A patent/CN118296574A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Thangadurai et al. | An analysis of LSB based image steganography techniques | |
US20230038922A1 (en) | Blockchain Implemented Data Hiding Solutions For Improvements In Secure Communication, Storage And Transmission Of Data | |
KR101088080B1 (en) | System, method and processor-readable recording medium for embedding a watermark on media | |
Muyco et al. | Least significant bit hash algorithm for digital image watermarking authentication | |
Katariya | Digital watermarking | |
CN111340676A (en) | Image watermark embedding method, image watermark identification method, image watermark embedding device, image watermark identification device and electronic equipment | |
Chugh | Image steganography techniques: A review article | |
CN118965420A (en) | A file access control system and control method | |
CN113177876A (en) | Picture processing method and device and electronic equipment | |
CN118296574A (en) | PPT file processing method and device, electronic equipment and readable medium | |
Obaid | Information hiding techniques for steganography and digital watermarking | |
Hoshi et al. | Digital watermarking: Innovations and challenges in copyright protection | |
CN111259387B (en) | A method and device for detecting tampered applications | |
Ur-Rehman et al. | Digital watermarking for image authentication | |
Hachim et al. | Cloud-based digital watermarking model for medical image integrity | |
Gvozdeva et al. | Development and implementation of the digital steganography method based on the embedding of pseudoinformation | |
Dadkhah et al. | Efficient image authentication and tamper localization algorithm using active watermarking | |
Rohith et al. | A Comprehensive Exploration of Advancements and Applications of Digital Watermarking | |
Mahajan et al. | Alpha channel for integrity verification using digital signature on reversible watermarking QR | |
Rejani et al. | Digital data protection using steganography | |
Şimşek et al. | Screen Watermark: A Novel Approach in Detecting Digital Criminals | |
Biswas et al. | Real-time watermarking of medical images and secure transmission through steganography | |
JP4515958B2 (en) | Content distribution receiving system and content distribution receiving method | |
Majumder et al. | Watermarking of data using biometrics | |
KR20040027649A (en) | The electronic management system of ledger based on the biometrics data for issuing the documents |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |