- What's New
- Function Overview
- Service Overview
- Billing
- Getting Started
-
User Guide
- Service Provisioning
- Allowing or Disallowing Access to Cloud Assets
- Asset Map
- Asset Management
- Sensitive Data Identification
- Policy Center
- Data Asset Protection
- Data Security Operations
- Alarm Notifications
- Multi-Account Management
- Permissions Management
- Key DSC Operations
- Best Practices
-
API Reference
- Before You Start
- Calling APIs
-
API Description
- Data Watermarking
- Resource Management
- Dynamic Data Masking
- Alarm Notifications
-
Image Watermarking
- Injecting Invisible Watermarks into Images
- Extracting Invisible Text Watermarks
- Extracting Invisible Watermarks from Images
- Injecting Invisible Watermarks into Images (Image Addresses)
- Extracting Dark Watermarks from Images (Image Addresses)
- Extracting Invisible Image Watermarks from Images (Image Addresses)
- Asset Management
- Document Watermarking
-
Sensitive Data Discovery
- Querying the Identification Task List
- Querying the Result of an Identification Task
- Viewing the Rule List
- Creating a Sensitive Data Scanning Rule
- Modifying a Sensitive Data Scanning Rule
- Deleting a Sensitive Data Scanning Rule
- Querying Sensitive Data Scanning Rule Groups
- Creating a Sensitive Data Scanning Rule Group
- Deleting a Sensitive Data Scanning Rule Group
- Creating a Sensitive Data Scanning Task
- Deleting a Sensitive Data Scanning Task
- Static Data Masking
- API Call Records
- Appendixes
- SDK Reference
-
FAQs
- Product Consulting
- Regions and AZs
- Asset Authorization
-
Sensitive Data Identification and Masking
- What Services Can Use DSC to Scan for Sensitive Data?
- How Long Does It Take for DSC to Identify and Mask Sensitive Data?
- What Are the Built-in Identification Rules of DSC?
- What Are the Identification Rules in the Built-in Identification Template of DSC?
- Does Data Masking Affect My Raw Data?
- Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
- Why Cannot I Find a Table in an Existing Database When Creating a Database Data Masking Task?
- Data Watermarking
- Data Usage Audit
- Videos
-
More Documents
-
User Guide (ME-Abu Dhabi Region)
- Service Overview
- Service Provisioning
- Assets
- Overview
- Sensitive Data Identification
- Data Masking
- Data Watermarking
- Alarm Notifications
- Permissions Management
-
FAQs
- Product Consulting
- Adding Data Assets
-
Sensitive Data Identification and Masking
- What Services Can Use DSC to Scan for Sensitive Data?
- How Long Does It Take for DSC to Identify and Mask Sensitive Data?
- Which Types of Sensitive Data Can Be Identified by DSC?
- Does Data Masking Affect My Raw Data?
- Does DSC Have Specific Requirements on the Character Set for Which Sensitive Data Is to Be Identified and Masked?
- How Do I Add Multiple Identification Rule Groups?
- Data Watermarking
- Change History
-
API Reference (ME-Abu Dhabi Region)
- Before You Start
- Calling APIs
-
API Description
- Data Watermarking
- Resource Management
- Dynamic Data Masking
- Alarm Notifications
-
Image Watermarking
- Injecting Invisible Watermarks into Images
- Extracting Invisible Text Watermarks
- Extracting Invisible Watermarks from Images
- Injecting Invisible Watermarks into Images (Image Addresses)
- Extracting Dark Watermarks from Images (Image Addresses)
- Extracting Invisible Image Watermarks from Images (Image Addresses)
- Asset Management
- Document Watermarking
-
Sensitive Data Discovery
- Querying the Identification Task List
- Querying the Result of an Identification Task
- Viewing the Rule List
- Creating a Sensitive Data Scanning Rule
- Modifying a Sensitive Data Scanning Rule
- Deleting a Sensitive Data Scanning Rule
- Querying Sensitive Data Scanning Rule Groups
- Creating a Sensitive Data Scanning Rule Group
- Deleting a Sensitive Data Scanning Rule Group
- Creating a Sensitive Data Scanning Task
- Querying the Database Lineage Graph
- Querying the Table Lineage Graph in Pages
- Querying Data Linage Graph at the Column Level
- Querying the OBS Bucket Lineage Graph
- Querying the OBS File Linage Graph in Pages
- Static Data Masking
- API Call Records
- Appendixes
- Change History
-
User Guide (ME-Abu Dhabi Region)
- General Reference
Copied.
Injecting Watermarks to Documents
On the DSC console, you can insert custom watermarks in PDF, PPT, Word, and Excel documents. This section describes how to insert customized watermarks into local files or cloud files (files stored in the OBS bucket).
Prerequisites
- OBS asset access permissions are granted. For details, see Allowing or Disallowing Access to Cloud Assets.
- You have enabled and created assets on OBS. For details about how to enable OBS, see Enabling and Using OBS Buckets..
- The document format is PDF, PPTX, DOCX, or XLSX.
Constraints
- The maximum size of a PDF or Word file is 50 MB.
- The maximum size of an Excel file is 70 MB.
- The maximum size of a PPT file is 20 MB.
Creating a Watermark Injection Task for Files in an OBS Bucket
- Log in to the management console.
- Click
in the upper left corner and select a region or project.
- In the navigation tree on the left, click
. Choose Security & Compliance > Data Security Center .
- In the navigation pane, choose Data Asset Protection > Document Watermarking.
- Click Create Task in the upper left corner of the task list to create a task.
- Set the parameters shown in Table 1.
Table 1 Task parameters Parameter
Description
Task Name
Enter the watermark ingestion task name. The value can contain only letters, digits, underscores (_), and hyphens (-), and cannot exceed 255 characters.
Select File
Click Add File. In the right pane, select the name of the bucket to which you want to add a watermark. In the left pane, select a file. You can select multiple files.
Watermark Type
Both visible and invisible watermarks are supported. You can select multiple values.
- Visible watermark: Watermarks are visible on documents.
- Invisible watermark: The watermark text is invisible and needs to be extracted using tools. For details about how to extract an invisible watermark, see Extracting Watermarks from Documents.
Target Path
Click selecting a file path, and select the watermarked file.
Configure Visible Watermark
Set the Watermark Type to Visible Watermark. Then, enter the watermark content and drag the slider to set the Text, Font Size, Font Angle, Sparseness, and Transparency.
Configure Invisible Watermark
This parameter is mandatory when Watermark Type is set to Invisible.
Set Text as required.
Figure 1 Inserting Watermarks - Click OK. A message is displayed in the upper right corner, indicating that the watermark injection task is created successfully.
- In the watermark task list, click the task name to view the task running status.
- Running: You can view the progress of the watermark ingestion task.
- Finished: You can click Download in the Operation column to download the watermarked OBS bucket file.
- Failed: The watermark injection task fails to be executed. You can move the cursor to
to view the failure cause.
- If the injected watermark is a visible watermark, click Download to obtain the watermark file.
If you injected an invisible watermark, extract the watermark from the target file using tools. For details, see Extracting Watermarks from Documents.
Creating a Local File Data Injection Task
- Log in to the management console.
- Click
in the upper left corner and select a region or project.
- In the navigation tree on the left, click
. Choose Security & Compliance > Data Security Center .
- In the navigation pane, choose Data Asset Protection > Document Watermarking.
- Click the Local File tab. The Watermark Injection page is displayed.
- Click Select File, and select the file to which the watermark is to be injected.
- After the file is uploaded, configure related parameters. Table 2 describes the related parameters.
Table 2 Watermarking parameters Parameter
Description
Watermark Type
Both visible and invisible watermarks are supported. You can select multiple values.
- Visible watermark: Watermarks are visible on documents.
- Invisible watermark: The watermark text is invisible and needs to be extracted using tools. For details about how to extract an invisible watermark, see Extracting Watermarks from Documents.
Configure Visible Watermark
Set the Watermark Type to Visible Watermark. Then, enter the watermark content and drag the slider to set the Text, Font Size, Font Angle, Sparseness, and Transparency.
Configure Invisible Watermark
This parameter is mandatory when Watermark Type is set to Invisible.
Set Text as required.
Figure 2 Creating a Local File Data Injection Task - After parameters are configured, click OK. The file with watermark injected is automatically downloaded to the specified path on the local PC.
NOTICE:
- If you injected a visible watermark, open the target file to view the watermark.
- If you injected an invisible watermark, extract the watermark from the target file using tools. For details, see Extracting Watermarks from Documents.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot