Data Security Center
Data Security Center
- What's New
- Function Overview
- Service Overview
- Billing
- Getting Started
-
User Guide
- Service Provisioning
- Allowing or Disallowing Access to Cloud Assets
- Asset Map
- Asset Management
- Sensitive Data Identification
- Data Asset Protection
- Data Security Operations
- Alarm Notifications
- Permissions Management
- Key DSC Operations
- Best Practices
-
API Reference
- Before You Start
- Calling APIs
-
API Description
- Data Watermarking
- Resource Management
- Dynamic Data Masking
- Alarm Notifications
-
Image Watermarking
- Injecting Invisible Watermarks into Images
- Extracting Invisible Text Watermarks
- Extracting Invisible Watermarks from Images
- Injecting Invisible Watermarks into Images (Image Addresses)
- Extracting Dark Watermarks from Images (Image Addresses)
- Extracting Invisible Image Watermarks from Images (Image Addresses)
- Asset Management
- Document Watermarking
-
Sensitive Data Discovery
- Querying the Identification Task List
- Querying the Result of an Identification Task
- Viewing the Rule List
- Creating a Sensitive Data Scanning Rule
- Modifying a Sensitive Data Scanning Rule
- Deleting a Sensitive Data Scanning Rule
- Querying Sensitive Data Scanning Rule Groups
- Creating a Sensitive Data Scanning Rule Group
- Deleting a Sensitive Data Scanning Rule Group
- Creating a Sensitive Data Scanning Task
- Deleting a Sensitive Data Scanning Task
- Static Data Masking
- API Call Records
- Appendixes
- Change History
- SDK Reference
-
FAQs
- Product Consulting
- Regions and AZs
- Asset Authorization
-
Sensitive Data Identification and Masking
- What Services Can Use DSC to Scan for Sensitive Data?
- How Long Does It Take for DSC to Identify and Mask Sensitive Data?
- What Are the Identification Templates Supported by DSC?
- Does Data Masking Affect My Raw Data?
- Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
- Data Watermarking
- Data Usage Audit
On this page
Help Center/
Data Security Center/
User Guide/
Data Security Operations/
Watermarks/
Extracting Watermarks from an OBS Bucket File
Extracting Watermarks from an OBS Bucket File
Updated on 2024-10-09 GMT+08:00
The content of invisible watermarks cannot be seen and needs to be extracted using tools. This section describes how to extract watermarks from a PDF, PPT, Word, or Excel file stored on the cloud (OBS buckets).
Prerequisites
- OBS asset access permissions are granted. For details, see Allowing or Disallowing Access to Cloud Assets.
- OBS has been enabled and used.
- The file format is PDF, PPT, Word, or Excel.
Constraints
- This section describes how to extract invisible watermarks from PDF, PPT, Word, or Excel documents.
- The maximum size of a PDF or Word file is 50 MB.
- The maximum size of an Excel file is 70 MB.
- The maximum size of a PPT file is 20 MB.
Creating an OBS Bucket File Watermark Extraction Task
- Log in to the management console.
- Click
in the upper left corner and select a region or project.
- In the navigation tree on the left, click
. Choose Security & Compliance > Data Security Center .
- In the navigation tree on the left, choose Data Security Operations > Watermark Tracing. The Database Watermark Extraction tab page is displayed.
- Click the OBS File Watermark Extraction tab.
- Click Create Task in the upper left corner. The Create Task page is displayed.
Figure 1 Creating a watermark extraction task
- Click Add File to select the file from which you want to extract watermarks. You can select multiple OBS bucket files.
Figure 2 Selecting a file
- Click OK. The watermark extraction task is created.
- Click
next to the target task name to view the extracted invisible watermark content.
Figure 3 Invisible watermark
Related Operations
Click
next to the target watermark injection task name to view the status of the watermark extraction task.

- Running: You can view the progress of the watermark extraction task.
- Completed: The watermark content is displayed in the Invisible Watermarks column. If there are no invisible watermarks, -- is displayed.
- Failed: The watermark extraction task fails to be executed. You can move the cursor to
to view the failure cause.
Parent topic: Watermarks
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.
The system is busy. Please try again later.