[go: up one dir, main page]

CN102945401B - Multi-parameter stride right shift incremental encrypted binary anti-counterfeiting printing method - Google Patents

Multi-parameter stride right shift incremental encrypted binary anti-counterfeiting printing method Download PDF

Info

Publication number
CN102945401B
CN102945401B CN201210401813.2A CN201210401813A CN102945401B CN 102945401 B CN102945401 B CN 102945401B CN 201210401813 A CN201210401813 A CN 201210401813A CN 102945401 B CN102945401 B CN 102945401B
Authority
CN
China
Prior art keywords
group
binary
counterfeiting information
control variable
operator
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201210401813.2A
Other languages
Chinese (zh)
Other versions
CN102945401A (en
Inventor
王明飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN201210401813.2A priority Critical patent/CN102945401B/en
Publication of CN102945401A publication Critical patent/CN102945401A/en
Application granted granted Critical
Publication of CN102945401B publication Critical patent/CN102945401B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Editing Of Facsimile Originals (AREA)

Abstract

一种多参数跨步右移递增加密二进制防伪印刷方法,该方法可将二进制防伪信息通过加密运算和信道编码生成二进制调制信号,并通过循环查表法调制方式将防伪信息以调幅网点的形状的有序改变嵌入在整个页面中,可在印刷品识别时从任意一个碎片里识别防伪信息,可广泛应用于印刷品防伪领域。

A multi-parameter stride right-shifting incremental encryption binary anti-counterfeiting printing method, which can pass binary anti-counterfeiting information through Encryption operations and channel coding generate binary modulation signals, and the anti-counterfeiting information is embedded in the entire page in the orderly change of the shape of the amplitude modulation dots through the modulation method of the circular look-up method, and the anti-counterfeiting information can be identified from any fragment when identifying printed matter. It can be widely used in the anti-counterfeiting field of printed matter.

Description

多参数跨步右移递增加密二进制防伪印刷方法Multi-parameter stride right shift incremental encryption binary anti-counterfeiting printing method

技术领域:Technical field:

本发明涉及一种防伪印刷技术,特别是一种多参数跨步右移递增加密二进制防伪印刷技术,该防伪印刷技术可以用于各种印刷制品的防伪。The invention relates to an anti-counterfeiting printing technology, in particular to a multi-parameter step-right shifting incrementally increasing encryption binary anti-counterfeiting printing technology, which can be used for anti-counterfeiting of various printed products.

背景技术:Background technique:

现有的较为普通的防伪方法有以下几种:第一种是激光防伪标志,用激光隐性油墨萤光油墨印刷技术将产品的标徽或特殊的识别图案印制成产品的防伪标贴,且同一类产品使用同一种标贴,因防伪标贴较容易伪造,而伪造的防伪标贴又被用在假冒产品上,造成产品的真假混淆,因此难于有效防伪。第二种是密码防伪标贴,其所采用的方法是每件产品编一组数码,每件产品的编码都不相同,将此数码印制在标贴上并遮盖起来,同时将此数码存入可供消费者查询的计算机数据库中,消费者购买产品时,将标识上的数码通过电话或入网计算机输入计算机数据库进行比较识别,相同即为真,不同即为假,方法简单,识别容易,不易伪造,但实际使用中,因编码数据是计算机统一生成后印制标贴的。代表产品真假编码数据可能被非法拷贝造假,同时,编码也可回收未查询的产品上的编码造标而贴在假产品上,防伪效果难于保证。第三种是纹理防伪,以其标贴上的纹理特征防伪,虽然较难伪造,但由于只设标贴的序号码,且是明码,每枚标贴可反复查询,造假者可通过仓库保管员或售货员将标贴上的序号及查询时所反映的必要纹理特征即方格中的有无现象抄袭后按此特征批量伪造。综上所述,现有的防伪方法都存在一定的缺点,因而不能从根本防止假冒产品。The existing relatively common anti-counterfeiting methods are as follows: The first is laser anti-counterfeiting marks, which use laser recessive ink fluorescent ink printing technology to print product logos or special identification patterns into product anti-counterfeiting labels. And the same type of product uses the same label, because the anti-counterfeiting label is easier to forge, and the fake anti-counterfeiting label is used on the counterfeit product, causing the product to be confused, so it is difficult to effectively prevent counterfeiting. The second is the password anti-counterfeiting label. The method adopted is to compile a set of numbers for each product, and the codes of each product are different. The numbers are printed on the labels and covered, and the numbers are stored Into the computer database that can be inquired by consumers. When consumers purchase products, they input the numbers on the logo into the computer database through telephone or networked computer for comparison and identification. The same is true, and the difference is false. The method is simple and easy to identify. It is not easy to forge, but in actual use, because the encoded data is uniformly generated by the computer, the label is printed. The coded data representing the authenticity of the product may be illegally copied and forged. At the same time, the code can also be recycled from the code on the product that has not been inquired to make a label and affixed to the fake product. The anti-counterfeiting effect is difficult to guarantee. The third is texture anti-counterfeiting, which uses the texture features on the label to prevent counterfeiting. Although it is difficult to forge, since only the serial number of the label is set, and it is a clear code, each label can be queried repeatedly, and counterfeiters can store it in the warehouse. The clerk or salesperson plagiarizes the serial number on the label and the necessary texture characteristics reflected in the query, that is, the presence or absence of phenomena in the grid, and then forges them in batches according to this characteristic. In summary, the existing anti-counterfeiting methods have certain shortcomings, and thus cannot fundamentally prevent counterfeit products.

发明内容:Invention content:

为了克服现有的各种印刷制品防伪印刷技术存在的缺点,本发明针对现有印刷制品防伪印刷技术存在的不足对现有技术进行了改进,提出了一种二进制加密信号调制印刷品调幅网点的形状的加密防伪印刷技术,该防伪印刷技术通过调幅网点的形状的改变将防伪信息嵌入在整个页面中,可在印刷品识别时从任意一个碎片里识别防伪信息,因此具有很强抗碎性,可从根本上杜绝采用照相、扫描等非法复制行为。In order to overcome the shortcomings of the existing anti-counterfeiting printing technology for various printed products, the present invention improves the existing technology in view of the shortcomings of the existing anti-counterfeiting printing technology for printed products, and proposes a binary encryption signal to modulate the shape of the AM dots of printed products Encrypted anti-counterfeiting printing technology, this anti-counterfeiting printing technology embeds anti-counterfeiting information in the entire page by changing the shape of AM dots, and can identify anti-counterfeiting information from any fragment when identifying printed matter, so it is highly resistant to shattering and can be read from Fundamentally put an end to the use of photography, scanning and other illegal copying.

本发明解决其技术问题所采用的技术方案是:对柔性版印刷混合加网中的调幅网点和调频网点分开进行处理,利用图像信息、文字信息、商标信息等防伪信息生成8位一组的二进制防伪信息表,为防止加密过程中产生信息溢出,将二进制防伪信息表中的8位一组二进制信息扩展为16位一组二进制信息,生成高8位全为0的16位一组二进制防伪信息表,将16位一组二进制防伪信息表中的第i组16位二进制信息记作Ni,i为大于0的正整数,八位二进制加密参数记作C1、C2、C3、C4、C5、C6、C7、C8、C9、C10,加密参数C1、C2、C3、C4、C5、C6、C7、C8、C9、C10为0到255的整数,二位二进制算符和运算顺序控制变量记作k,算符和运算顺序控制变量k为0≦k≦3的整数,算符采用+、-、×、÷四种运算,算符和运算顺序控制变量k=0时定义为+、×、-、÷、+、÷、×、-、÷运算,算符和运算顺序控制变量k=1时定义为÷、+、+、×、-、÷、+、÷、×运算,算符和运算顺序控制变量k=2时定义为-、÷、+、×、+、÷、×、-、÷运算,算符和运算顺序控制变量k=3时定义为+、÷、+、×、-、÷、×、-、÷运算,算符和运算顺序控制变量k=0时变序加密运算定义为算符和运算顺序控制变量k=1时变序加密运算定义为算符和运算顺序控制变量k=2时变序加密运算定义为算符和运算顺序控制变量k=3时变序加密运算定义为设定加密参数C1、C2、C3、C4、C5、C6、C7、C8、C9、C10的初值,因加密参数C1、C2、C3、C4、C5、C6、C7、C8、C9、C10为0到255中的整数,在256个数中任取C1、C2、C3、C4、C5、C6、C7、C8、C9、C10十个不同的数字共有256!/(256-10)!种取法,设定算符和运算顺序控制变量k的初值k=0,设定16位一组二进制防伪信息表中16位二进制信息Ni的位置控制变量i=1,从16位一组二进制防伪信息表中第一组16位二进制信息N1开始,对16位一组二进制防伪信息表中的第一组16位二进制信息进行变序加密运算,并且在对第一组16位二进制信息进行变序加密运算的同时进行i+1和k+1运算,使下一运算指向其中i和k都增加了1,通过对16位一组二进制防伪信息表中的每一组16位二进制信息进行变序加密运算,生成16位一组的二进制加密防伪信息表,调幅网点的形状设置为两种:□和◇,其中□定义为数字0、◇定义为数字1,利用生成的16位一组的二进制加密防伪信息通过循环查表法调制调幅网点,使其有规律的按照上述两种调幅网点的形状改变混合加网中调幅网点的形状,使混合加网中调幅网点的形状有规则的发生改变,调制后相邻16个调幅网点构成一组16位二进制信息,使其携带防伪信息,并使该防伪信息嵌入在整个页面网点中,能更有效地对抗基于照相机、扫描仪、电子文档等非法复制行为。通过在印刷品中非显见地嵌入可提取的防伪信息,能够为真品提供有效证明,同时具有较强的抗伪造能力,且不增加额外的防伪成本。The technical solution adopted by the present invention to solve the technical problem is: separately process the amplitude modulation dots and frequency modulation dots in the mixed screen of flexographic printing, and use image information, text information, trademark information and other anti-counterfeiting information to generate 8-bit binary Anti-counterfeiting information table, in order to prevent information overflow during the encryption process, the 8-bit binary information in the binary anti-counterfeiting information table is expanded to 16-bit binary information, and a 16-bit binary anti-counterfeiting information with all 0s in the upper 8 bits is generated Table, the i-th group of 16-bit binary information in the 16-bit binary anti-counterfeiting information table is recorded as N i , i is a positive integer greater than 0, and the eight-bit binary encryption parameters are recorded as C 1 , C 2 , C 3 , C 4 , C 5 , C 6 , C 7 , C 8 , C 9 , C 10 , encryption parameters C 1 , C 2 , C 3 , C 4 , C 5 , C 6 , C 7 , C 8 , C 9 , C 10 is an integer from 0 to 255, and the two-digit binary operator and the operation order control variable are denoted as k, and the operator and operation order control variable k is an integer of 0≦k≦3, and the operator Four operations of +, -, ×, ÷ are used, and the operator and operation order control variable k=0 Defined as +, ×, -, ÷, +, ÷, ×, -, ÷ operations, operator and operation sequence control variable k=1 Defined as ÷, +, +, ×, -, ÷, +, ÷, × operations, operator and operation sequence control variable k=2 Defined as -, ÷, +, ×, +, ÷, ×, -, ÷ operations, operator and operation order control variable k=3 Defined as +, ÷, +, ×, -, ÷, ×, -, ÷ operations, operator and operation sequence control variable k = 0 time variable sequence encryption operation is defined as The operator and operation sequence control variable k=1 time-varying sequence encryption operation is defined as Operator and operation sequence control variable k=2 time-varying sequence encryption operation is defined as Operator and operation sequence control variable k=3 time-varying sequence encryption operation is defined as Set the initial values of encryption parameters C 1 , C 2 , C 3 , C 4 , C 5 , C 6 , C 7 , C 8 , C 9 , and C 10 , because the encryption parameters C 1 , C 2 , C 3 , and C 4. C 5 , C 6 , C 7 , C 8 , C 9 , and C 10 are integers from 0 to 255, and C 1 , C 2 , C 3 , C 4 , C 5 , and C are any of the 256 numbers. 6 , C 7 , C 8 , C 9 , C 10 ten different numbers have a total of 256! /(256-10)! A kind of method of getting, setting operator and the initial value k=0 of operation sequence control variable k, setting the position control variable i=1 of 16 binary information N i in the binary anti-counterfeiting information table of 16 groups, from 16 groups The first group of 16-bit binary information in the binary anti-counterfeiting information table starts from N 1 , and the first group of 16-bit binary information in the 16-bit group of binary anti-counterfeiting information table is Sequential encryption operation, and in the first group of 16-bit binary information Perform i+1 and k+1 operations at the same time as the variable-order encryption operation, so that the next operation points to Among them, both i and k are increased by 1, and a 16-bit binary encrypted anti-counterfeiting information table is generated by performing a variable-sequence encryption operation on each group of 16-bit binary information in the 16-bit binary anti-counterfeiting information table, and the shape of the AM dot There are two types: □ and ◇, where □ is defined as the number 0, and ◇ is defined as the number 1, and the generated 16-bit binary encrypted anti-counterfeiting information is used to modulate the AM network through the circular look-up table method, so that it can be regularly in accordance with the above The shapes of the two kinds of AM dots change the shape of the AM dots in the hybrid screening, so that the shape of the AM dots in the mixed screening changes regularly. After modulation, 16 adjacent AM dots form a group of 16-bit binary information, which makes it carry Anti-counterfeiting information, and embedding the anti-counterfeiting information in the entire page network, can more effectively combat illegal copying based on cameras, scanners, and electronic documents. By non-obviously embedding extractable anti-counterfeiting information in the printed matter, effective proof can be provided for the genuine product, and at the same time, it has strong anti-counterfeiting ability without adding additional anti-counterfeiting costs.

为解决上述的技术问题,首先对防伪信息进行数字化,生成8位一组的二进制防伪信息表,防伪信息可以是图像信息、文字信息、商标信息等,将二进制防伪信息表中的8位一组二进制信息扩展为16位一组二进制信息,生成高8位全为0的16位一组二进制防伪信息表,对16位一组二进制防伪信息表中的每一组16位二进制信息进行变序加密运算,生成16位一组的二进制加密防伪信息表,利用生成的16位一组二进制加密防伪信息表中的16位二进制信息经过信道编码,生成具有检错和纠错功能的16位一组的二进制调制信号。信道编码可以采用循环编码、卷积编码或Turbo编码等多种形式,将原始连续调图像信号经过栅格化处理(RIP)和混合加网输出半色调混合加网图像信号,其中包括调幅网点和调频网点图像信号,利用生成的16位一组二进制调制信号采用循环查表法调制方式调制半色调混合加网图像信号中调幅网点的形状,使调幅网点的形状按照□和◇有规律的发生改变,使半色调混合加网图像信号中相邻16个调幅网点通过形状的改变携带16位二进制防伪信息,从而生成在整个页面网点中嵌入防伪信息的半色调混合加网图像信号,实现防伪印刷。In order to solve the above-mentioned technical problems, the anti-counterfeiting information is digitized at first, and a binary anti-counterfeiting information table of 8 bits is generated. The anti-counterfeiting information can be image information, text information, trademark information, etc. The binary information is expanded into a group of 16 binary information, and a 16-bit binary anti-counterfeiting information table with all 0s in the upper 8 bits is generated, and each group of 16-bit binary information in the 16-bit binary anti-counterfeiting information table is encrypted in sequence operation to generate a 16-bit binary encrypted anti-counterfeiting information table, and use the 16-bit binary information in the generated 16-bit binary encrypted anti-counterfeiting information table to undergo channel coding to generate a 16-bit group with error detection and error correction functions. Binary modulated signal. Channel coding can adopt various forms such as cyclic coding, convolutional coding or Turbo coding, etc., and the original continuous modulation image signal is rasterized (RIP) and mixed and screened to output a halftone mixed screened image signal, including amplitude modulation dots and The FM dot image signal uses the generated 16-bit binary modulation signal to modulate the shape of the AM dot in the halftone mixed screen image signal by means of a circular look-up table modulation method, so that the shape of the AM dot changes according to □ and ◇ 16 adjacent AM dots in the halftone mixed screen image signal carry 16-bit binary anti-counterfeiting information through shape changes, thereby generating a halftone mixed screen image signal with anti-counterfeit information embedded in the entire page dots to realize anti-counterfeit printing.

在提取防伪信息时,首先采集网点图像信号,经过对调幅网点的形状的模糊识别,分辨调幅网点的形状,提取调幅网点的边沿信号和形状信息,解调调幅网点的形状信息,输出16位一组的二进制调制信号。对解调输出的16位一组的二进制调制信号进行信道解码,信道解码后生成16位一组的二进制解密防伪信息表,将二进制解密防伪信息表中的16位二进制信息记作Hi,通过加密过程可知,When extracting anti-counterfeiting information, first collect the network dot image signal, through the fuzzy recognition of the shape of the AM network dot, distinguish the shape of the AM network dot, extract the edge signal and shape information of the AM network dot, demodulate the shape information of the AM network dot, and output 16-bit one Set of binary modulated signals. Perform channel decoding on the 16-bit binary modulated signal output by demodulation, generate a 16-bit binary decryption anti-counterfeiting information table after channel decoding, record the 16-bit binary information in the binary decryption anti-counterfeiting information table as H i , pass The encryption process shows that,

算符控制变量k=0时 H i = N i K 1 C 2 K 2 C 3 K 3 C 4 K 4 C 5 K 5 C 6 K 6 C 7 K 7 C 8 K 8 C 9 K 9 C 10 , When the operator control variable k=0 h i = N i K 1 C 2 K 2 C 3 K 3 C 4 K 4 C 5 K 5 C 6 K 6 C 7 K 7 C 8 K 8 C 9 K 9 C 10 ,

算符控制变量k=1时 H i = N i K 1 N i K 2 N i K 3 C 4 K 4 C 5 K 5 C 6 K 6 C 7 K 7 C 8 K 8 C 9 K 9 C 10 , When the operator control variable k=1 h i = N i K 1 N i K 2 N i K 3 C 4 K 4 C 5 K 5 C 6 K 6 C 7 K 7 C 8 K 8 C 9 K 9 C 10 ,

算符控制变量k=2时 H i = N i K 1 N i K 2 N i K 3 N i K 4 N i K 5 C 6 K 6 C 7 K 7 C 8 K 8 C 9 K 9 C 10 , When the operator control variable k=2 h i = N i K 1 N i K 2 N i K 3 N i K 4 N i K 5 C 6 K 6 C 7 K 7 C 8 K 8 C 9 K 9 C 10 ,

算符控制变量k=3时 H i = N i K 1 N i K 2 N i K 3 N i K 4 N i K 5 N i K 6 N i K 7 C 8 K 8 C 9 K 9 C 10 , 二进制解密防伪信息表中16位二进制信息Hi的位置控制变量初值设定为i=1,从二进制解密防伪信息表中第一位H1开始,对二进制解密防伪信息表中的每一组16位二进制信息进行解密运算,解出二进制防伪信息Ni,生成高8位全为0的16位一组二进制防伪信息表,去掉高8位,生成8位一组的二进制防伪信息表,恢复防伪信号并输出防伪信息。When the operator control variable k=3 h i = N i K 1 N i K 2 N i K 3 N i K 4 N i K 5 N i K 6 N i K 7 C 8 K 8 C 9 K 9 C 10 , The initial value of the position control variable of 16 binary information H i in the binary decryption anti-counterfeiting information table is set as i=1, starting from the first H 1 in the binary decryption anti-counterfeiting information table, to each group in the binary decryption anti-counterfeiting information table The 16-bit binary information is decrypted, and the binary anti-counterfeiting information N i is solved to generate a 16-bit binary anti-counterfeiting information table whose upper 8 bits are all 0, remove the upper 8 bits, and generate an 8-bit binary anti-counterfeiting information table, restore Anti-counterfeiting signal and output anti-counterfeiting information.

附图说明Description of drawings

下面结合附图对本发明进一步说明。The present invention will be further described below in conjunction with the accompanying drawings.

图1加载防伪信息流程图。Figure 1 is a flow chart of loading anti-counterfeiting information.

图2提取防伪信息流程图。Figure 2 is a flow chart of extracting anti-counterfeiting information.

具体实施方式Detailed ways

在加载防伪信息流程图1中,原始防伪信息(图像、文字、商标)经数字化处理,生成8位一组的二进制防伪信息表,将二进制防伪信息表中的8位一组二进制信息扩展为16位一组二进制信息,生成高8位全为0的16位一组二进制防伪信息表,16位一组二进制防伪信息表中的第i组16位二进制信息记作Ni,i为大于0的正整数,八位二进制加密参数记作C1、C2、C3、C4、C5、C6、C7、C8、C9、C10,加密参数C1、C2、C3、C4、C5、C6、C7、C8、C9、C10为0到255的整数,二位二进制算符和运算顺序控制变量记作k,算符和运算顺序控制变量k为0≦k≦3的整数,算符采用+、-、×、÷四种运算,算符和运算顺序控制变量k=0时定义为+、×、-、÷、+、÷、×、-、÷运算,算符和运算顺序控制变量k=1时定义为÷、+、+、×、-、÷、+、÷、×运算,算符和运算顺序控制变量k=2时定义为-、÷、+、×、+、÷、×、-、÷运算,算符和运算顺序控制变量k=3时定义为+、÷、+、×、-、÷、×、-、÷运算,算符和运算顺序控制变量k=0时变序加密运算定义为算符和运算顺序控制变量k=1时变序加密运算定义为算符和运算顺序控制变量k=2时变序加密运算定义为算符和运算顺序控制变量k=3时变序加密运算定义为设定加密参数C1、C2、C3、C4、C5、C6、C7、C8、C9、C10的初值,因加密参数C1、C2、C3、C4、C5、C6、C7、C8、C9、C10为0到255中的整数,在256个数中任取C1、C2、C3、C4、C5、C6、C7、C8、C9、C10十个不同的数字共有256!/(256-10)!种取法,设定算符和运算顺序控制变量k的初值k=0,设定16位一组二进制防伪信息表中16位二进制信息Ni的位置控制变量i=1,从16位一组二进制防伪信息表中第一组16位二进制信息N1开始,对16位一组二进制防伪信息表中的第一组16位二进制信息进行变序加密运算,并且在对第一组16位二进制信息进行变序加密运算的同时进行i+1和k+1运算,使下一运算指向其中i和k都增加了1,通过对16位一组二进制防伪信息表中的每一组16位二进制信息进行变序加密运算,生成16位一组的二进制加密防伪信息表,调幅网点的形状设置为两种:□和◇,其中□定义为数字0、◇定义为数字1,生成的16位二进制加密防伪信息经过信道编码,生成具有检错和纠错功能的二进制调制信号。信道编码可以采用循环编码、卷积编码或Turbo编码等多种形式。将原始连续调图像信号经过栅格化处理(RIP)和混合加网输出半色调混合加网图像信号,其中包括调幅网点和调频网点图像信号。利用生成的二进制调制信号采用循环查表调制方式,调制半色调混合加网图像信号中调幅网点的形状,使混合加网中调幅网点的形状有规则发生改变,生成嵌入防伪信息的半色调混合加网图像信号,通过循环查表调制方式,使相邻16位调幅网点通过形状的改变生成一个16位二进制数据,使其携带防伪信息,并使该防伪信息嵌入在整个页面网点中,实现防伪印刷。In flow chart 1 of loading anti-counterfeiting information, the original anti-counterfeiting information (image, text, trademark) is digitized to generate an 8-bit binary anti-counterfeiting information table, and the 8-bit binary information in the binary anti-counterfeiting information table is expanded to 16 One set of binary information, generate a 16-bit binary anti-counterfeiting information table whose upper 8 bits are all 0, the i-th group of 16-bit binary information in the 16-bit binary anti-counterfeiting information table is recorded as N i , i is greater than 0 Positive integer, eight-bit binary encryption parameters are recorded as C 1 , C 2 , C 3 , C 4 , C 5 , C 6 , C 7 , C 8 , C 9 , C 10 , encryption parameters C 1 , C 2 , C 3 , C 4 , C 5 , C 6 , C 7 , C 8 , C 9 , and C 10 are integers from 0 to 255, the two-digit binary operator and the control variable of the operation order are denoted as k, and the operator and the operation order control variable k is an integer of 0≦k≦3, the operator Four operations of +, -, ×, ÷ are used, and the operator and operation order control variable k=0 Defined as +, ×, -, ÷, +, ÷, ×, -, ÷ operations, operator and operation sequence control variable k=1 Defined as ÷, +, +, ×, -, ÷, +, ÷, × operations, operator and operation sequence control variable k=2 Defined as -, ÷, +, ×, +, ÷, ×, -, ÷ operations, operator and operation order control variable k=3 Defined as +, ÷, +, ×, -, ÷, ×, -, ÷ operations, operator and operation sequence control variable k = 0 time variable sequence encryption operation is defined as The operator and operation sequence control variable k=1 time-varying sequence encryption operation is defined as Operator and operation sequence control variable k=2 time-varying sequence encryption operation is defined as Operator and operation sequence control variable k=3 time-varying sequence encryption operation is defined as Set the initial values of encryption parameters C 1 , C 2 , C 3 , C 4 , C 5 , C 6 , C 7 , C 8 , C 9 , and C 10 , because the encryption parameters C 1 , C 2 , C 3 , and C 4. C 5 , C 6 , C 7 , C 8 , C 9 , and C 10 are integers from 0 to 255, and C 1 , C 2 , C 3 , C 4 , C 5 , and C are any of the 256 numbers. 6 , C 7 , C 8 , C 9 , C 10 ten different numbers have a total of 256! /(256-10)! A kind of method of getting, setting operator and the initial value k=0 of operation sequence control variable k, setting the position control variable i=1 of 16 binary information N i in the binary anti-counterfeiting information table of 16 groups, from 16 groups The first group of 16-bit binary information in the binary anti-counterfeiting information table starts from N 1 , and the first group of 16-bit binary information in the 16-bit group of binary anti-counterfeiting information table is Sequential encryption operation, and in the first group of 16-bit binary information Perform i+1 and k+1 operations at the same time as the variable-order encryption operation, so that the next operation points to Among them, both i and k are increased by 1, and a 16-bit binary encrypted anti-counterfeiting information table is generated by performing a variable-sequence encryption operation on each group of 16-bit binary information in the 16-bit binary anti-counterfeiting information table, and the shape of the AM dot There are two types: □ and ◇, where □ is defined as the number 0 and ◇ is defined as the number 1. The generated 16-bit binary encrypted anti-counterfeiting information is channel-coded to generate a binary modulated signal with error detection and error correction functions. Channel coding can adopt various forms such as cyclic coding, convolutional coding or Turbo coding. The original continuous tone image signal is rasterized (RIP) and mixed and screened to output a halftone mixed screen image signal, including amplitude modulation dot and frequency modulation dot image signals. Utilize the generated binary modulation signal and use the circular look-up modulation method to modulate the shape of the AM dots in the halftone mixed screen image signal, so that the shape of the AM dots in the mixed screen can be changed regularly, and the halftone mixed screen embedded with anti-counterfeiting information can be generated. The network image signal, through the cyclic look-up table modulation method, makes the adjacent 16-bit AM dots generate a 16-bit binary data through the change of shape, so that it carries anti-counterfeiting information, and makes the anti-counterfeiting information embedded in the entire page dots, realizing anti-counterfeiting printing .

在提取防伪信息流程图2中,首先采集网点图像信号,经过对调幅网点的形状的模糊识别,分辨调幅网点的形状,提取调幅网点的边沿信号和形状信息,解调调幅网点的形状信息,输出16位一组的二进制调制信号。对解调输出的16位一组的二进制调制信号进行信道解码,信道解码后生成16位一组的二进制解密防伪信息表,将二进制解密防伪信息表中的16位二进制信息记作Hi,通过加密过程可知,In the flow chart 2 of extracting anti-counterfeiting information, first collect the dot image signal, through the fuzzy recognition of the shape of the AM dot, distinguish the shape of the AM dot, extract the edge signal and shape information of the AM dot, demodulate the shape information of the AM dot, and output A binary modulation signal of 16 bits. Perform channel decoding on the 16-bit binary modulated signal output by demodulation, generate a 16-bit binary decryption anti-counterfeiting information table after channel decoding, record the 16-bit binary information in the binary decryption anti-counterfeiting information table as H i , pass The encryption process shows that,

算符控制变量k=0时 H i = N i K 1 C 2 K 2 C 3 K 3 C 4 K 4 C 5 K 5 C 6 K 6 C 7 K 7 C 8 K 8 C 9 K 9 C 10 , When the operator control variable k=0 h i = N i K 1 C 2 K 2 C 3 K 3 C 4 K 4 C 5 K 5 C 6 K 6 C 7 K 7 C 8 K 8 C 9 K 9 C 10 ,

算符控制变量k=1时 H i = N i K 1 N i K 2 N i K 3 C 4 K 4 C 5 K 5 C 6 K 6 C 7 K 7 C 8 K 8 C 9 K 9 C 10 , When the operator control variable k=1 h i = N i K 1 N i K 2 N i K 3 C 4 K 4 C 5 K 5 C 6 K 6 C 7 K 7 C 8 K 8 C 9 K 9 C 10 ,

算符控制变量k=2时 H i = N i K 1 N i K 2 N i K 3 N i K 4 N i K 5 C 6 K 6 C 7 K 7 C 8 K 8 C 9 K 9 C 10 , When the operator control variable k=2 h i = N i K 1 N i K 2 N i K 3 N i K 4 N i K 5 C 6 K 6 C 7 K 7 C 8 K 8 C 9 K 9 C 10 ,

算符控制变量k=3时 H i = N i K 1 N i K 2 N i K 3 N i K 4 N i K 5 N i K 6 N i K 7 C 8 K 8 C 9 K 9 C 10 , 二进制解密防伪信息表中16位二进制信息Hi的位置控制变量初值设定为i=1,从二进制解密防伪信息表中第一位H1开始,对二进制解密防伪信息表中的每一组16位二进制信息进行H解密运算,解出二进制防伪信息Ni,生成高8位全为0的16位一组二进制防伪信息表,去掉高8位,生成8位一组的二进制防伪信息表,恢复防伪信号并输出防伪信息。When the operator control variable k=3 h i = N i K 1 N i K 2 N i K 3 N i K 4 N i K 5 N i K 6 N i K 7 C 8 K 8 C 9 K 9 C 10 , The initial value of the position control variable of 16 binary information H i in the binary decryption anti-counterfeiting information table is set as i=1, starting from the first H 1 in the binary decryption anti-counterfeiting information table, to each group in the binary decryption anti-counterfeiting information table Perform H decryption operation on the 16-bit binary information to solve the binary anti-counterfeiting information N i , generate a 16-bit binary anti-counterfeiting information table whose upper 8 bits are all 0, remove the upper 8 bits, and generate an 8-bit binary anti-counterfeiting information table, Recover the anti-counterfeiting signal and output the anti-counterfeiting information.

Claims (1)

1. anti-counterfeiting information is generated binary modulated signal by cryptographic calculation and chnnel coding by one kind, and anti-counterfeiting information is embedded in the Multi-parameter stride right shift increment encryption scale-of-two antiforging printing method in full page by modulation system of tabling look-up by circulating, it is characterized in that: digitizing is carried out to anti-counterfeiting information, generate the scale-of-two anti-counterfeiting information table of 8 group, anti-counterfeiting information is image information, Word message or trademark information, for preventing producing information spillover in ciphering process, in scale-of-two anti-counterfeiting information table 8 one group of binary message is expanded to 16 one group of binary messages, generate 16 the one group scale-of-two anti-counterfeiting information table that most-significant byte is 0 entirely, i-th group of 16 binary message in 16 one group scale-of-two anti-counterfeiting information table are denoted as N i, i be greater than 0 positive integer, eight-digit binary number encryption parameter is denoted as C 1, C 2, C 3, C 4, C 5, C 6, C 7, C 8, C 9, C 10, encryption parameter C 1, C 2, C 3, C 4, C 5, C 6, C 7, C 8, C 9, C 10be the integer of 0 to 255, two binary operators and order of operation control variable are denoted as k, and operator and order of operation control variable k are the integer of 0≤k≤3, operator adopt+,-, ×, ÷ tetra-kinds of computings, when operator and order of operation control variable k=0 be defined as+, × ,-, ÷ ,+, ÷, × ,-, ÷ computing, when operator and order of operation control variable k=1 be defined as ÷ ,+,+, × ,-, ÷ ,+, ÷, × computing, when operator and order of operation control variable k=2 be defined as-, ÷ ,+, × ,+, ÷, × ,-, ÷ computing, when operator and order of operation control variable k=3 be defined as+, ÷ ,+, × ,-, ÷, × ,-, ÷ computing, become sequence cryptographic calculation when operator and order of operation control variable k=0 and be defined as become sequence cryptographic calculation when operator and order of operation control variable k=1 to be defined as become sequence cryptographic calculation when operator and order of operation control variable k=2 to be defined as become sequence cryptographic calculation when operator and order of operation control variable k=3 to be defined as setting encryption parameter C 1, C 2, C 3, C 4, C 5, C 6, C 7, C 8, C 9, C 10initial value, because of encryption parameter C 1, C 2, C 3, C 4, C 5, C 6, C 7, C 8, C 9, C 10be the integer in 0 to 255, appoint in 256 numbers and get C 1, C 2, C 3, C 4, C 5, C 6, C 7, C 8, C 9, C 10ten different numerals have 256! / (256-10)! plant and follow the example of, the initial value k=0 of setting operator and order of operation control variable k, sets 16 binary message N in 16 one group scale-of-two anti-counterfeiting information table iposition control variable i=1, first group of 16 binary message N from 16 one group scale-of-two anti-counterfeiting information table 1start, first group of 16 binary message in 16 one group scale-of-two anti-counterfeiting information table are carried out become sequence cryptographic calculation, and first group of 16 binary message is being carried out carry out i+1 and k+1 computing while becoming sequence cryptographic calculation, next computing is pointed to wherein i and k both increases 1, by carrying out change sequence cryptographic calculation to each group 16 binary messages in 16 one group scale-of-two anti-counterfeiting information table, generate the scale-of-two encryption anti-fake information table of 16 group, the shape of amplitude is set to two kinds: and ◇, wherein is defined as numeral 0, ◇ is defined as numeral 1, utilize the scale-of-two encryption anti-fake information of 16 group generated through chnnel coding, generate 16 one group of binary modulated signals with error detecting and error correcting function, image signal of original continuous being changed the line map exports shadow tone hybrid screening picture signal through rasterizing process (RIP) and hybrid screening, comprising amplitude and FM screened image signal, 16 the one group of binary modulated signals generated are utilized to adopt the shape of amplitude in circulation look-up table modulation system modulation shadow tone, the shape of amplitude is changed according to and ◇ is regular, adjacent 16 amplitudes in shadow tone hybrid screening picture signal are made to carry 16 scale-of-two encryption anti-fake information by the change of shape, thus be created on the shadow tone hybrid screening picture signal embedding anti-counterfeiting information in full page site, realize anti-counterfeit printing.
CN201210401813.2A 2012-10-22 2012-10-22 Multi-parameter stride right shift incremental encrypted binary anti-counterfeiting printing method Expired - Fee Related CN102945401B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210401813.2A CN102945401B (en) 2012-10-22 2012-10-22 Multi-parameter stride right shift incremental encrypted binary anti-counterfeiting printing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210401813.2A CN102945401B (en) 2012-10-22 2012-10-22 Multi-parameter stride right shift incremental encrypted binary anti-counterfeiting printing method

Publications (2)

Publication Number Publication Date
CN102945401A CN102945401A (en) 2013-02-27
CN102945401B true CN102945401B (en) 2015-05-20

Family

ID=47728340

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210401813.2A Expired - Fee Related CN102945401B (en) 2012-10-22 2012-10-22 Multi-parameter stride right shift incremental encrypted binary anti-counterfeiting printing method

Country Status (1)

Country Link
CN (1) CN102945401B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101699845A (en) * 2009-10-20 2010-04-28 北京印刷学院 Encryption counterfeit printing technology of frequency modulated halftone dot space position for pseudo random signal modulation printed matter
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102194137A (en) * 2011-04-25 2011-09-21 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on shape of amplitude modified screen
CN102225671A (en) * 2011-04-14 2011-10-26 北京印刷学院 Encrypted Anti-counterfeiting Printing Technology Using Double Encrypted Signals to Modulate the Shape of AM Dots in Printed Matters
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101699845A (en) * 2009-10-20 2010-04-28 北京印刷学院 Encryption counterfeit printing technology of frequency modulated halftone dot space position for pseudo random signal modulation printed matter
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102225671A (en) * 2011-04-14 2011-10-26 北京印刷学院 Encrypted Anti-counterfeiting Printing Technology Using Double Encrypted Signals to Modulate the Shape of AM Dots in Printed Matters
CN102194137A (en) * 2011-04-25 2011-09-21 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on shape of amplitude modified screen
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于身份的十进制加密技术研究;刘连浩;《计算机工程与应用》;20061201(第24期);154页左栏第2段 *

Also Published As

Publication number Publication date
CN102945401A (en) 2013-02-27

Similar Documents

Publication Publication Date Title
CN102945467B (en) One-parameter univariate incremental circulation encrypted binary antiforging printing method
CN102945418B (en) The synchronous in the same way increment encryption scale-of-two antiforging printing method of Double-variant multi-parameter
CN102945490B (en) Single-parameter and double-variable-sequence encryption type binary anti-counterfeit printing method
CN102945401B (en) Multi-parameter stride right shift incremental encrypted binary anti-counterfeiting printing method
CN102945479B (en) Multi-parameter bivariate left shift displacement stride progressive encrypted binary anti-counterfeiting printing method
CN102945464B (en) Single-parameter, gradient, same-direction, synchronous and increasing encryption type binary anti-counterfeit printing method
CN102945408B (en) Double-variant multi-parameter left-shifting stepping gradually-increased encryption binary anti-counterfeiting printing method
CN102945429B (en) Multi-parameter three-dimensional encrypted binary antiforging printing method
CN102955961B (en) Single-parameter gradual phase-to-synchronous progressive encrypted binary anti-counterfeiting printing method
CN102945441B (en) The displacement that moves to left of one-parameter alternation strides the encrypted binary antiforging printing method that goes forward one by one
CN102945444B (en) Shift left displacement stepping increasing encryption binary anti-counterfeit printing method
CN102945488B (en) The synchronous in the same way increment encryption scale-of-two antiforging printing method of multiparameter
CN102945393B (en) Multi-parameter bivariate homodromous synchronous progressive encrypted binary anti-counterfeiting printing method
CN102945481B (en) Binary anti-fake printing method by multiparameter left-shift deflection stepped ascending encryption
CN102945409B (en) The double encrypted binary antiforging printing method of Multi-parameter displacement
CN102955963B (en) Multiparameter bivariate synchronously goes forward one by one encrypted binary antiforging printing method in opposite directions
CN102945465B (en) Double-variant multi-parameter stride right shift increment encryption scale-of-two antiforging printing method
CN102945436B (en) Multiparameter relative synchronization increment encryption scale-of-two antiforging printing method
CN102945460B (en) Multi-parameter three-dimensional increment encryption scale-of-two antiforging printing method
CN102955966B (en) Binary anti-counterfeit printing method by reverse synchronous increasing encryption
CN102945413B (en) Single-variable and double-progressive encryption type binary anti-counterfeit printing method
CN102945435B (en) Multi-parameter transposition increment encryption scale-of-two antiforging printing method
CN102945423B (en) Single-parameter displacement variable-sequence encrypted binary anti-counterfeiting printing method
CN102955965B (en) Binary anti-counterfeit printing method by single-parameter gradient and opposite synchronous-increasing encryption
CN102945451B (en) One-parameter circulates double encrypted binary antiforging printing method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent for invention or patent application
CB03 Change of inventor or designer information

Inventor after: Wang Mingfei

Inventor before: Wang Mingfei

C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150520

Termination date: 20151022

EXPY Termination of patent right or utility model