CN102945423B - Single-parameter displacement variable-sequence encrypted binary anti-counterfeiting printing method - Google Patents
Single-parameter displacement variable-sequence encrypted binary anti-counterfeiting printing method Download PDFInfo
- Publication number
- CN102945423B CN102945423B CN201210402208.7A CN201210402208A CN102945423B CN 102945423 B CN102945423 B CN 102945423B CN 201210402208 A CN201210402208 A CN 201210402208A CN 102945423 B CN102945423 B CN 102945423B
- Authority
- CN
- China
- Prior art keywords
- binary
- group
- control variable
- counterfeiting information
- counterfeiting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 20
- 238000006073 displacement reaction Methods 0.000 title claims abstract description 4
- 238000003165 hybrid screening Methods 0.000 claims 5
- 230000005574 cross-species transmission Effects 0.000 claims 1
- 239000012634 fragment Substances 0.000 abstract description 2
- 238000005516 engineering process Methods 0.000 description 8
- 125000004122 cyclic group Chemical group 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 1
Landscapes
- Editing Of Facsimile Originals (AREA)
Abstract
一种单参数位移变序加密二进制防伪印刷方法,该方法可将二进制防伪信息通过 加密运算和信道编码生成二进制调制信号,并通过循环查表法调制方式将防伪信息以调幅网点的形状的有序改变嵌入在整个页面中,可在印刷品识别时从任意一个碎片里识别防伪信息,可广泛应用于印刷品防伪领域。
A binary anti-counterfeiting printing method with single-parameter displacement sequence encryption, which can pass binary anti-counterfeiting information through Encryption operations and channel coding generate binary modulation signals, and the anti-counterfeiting information is embedded in the entire page in the orderly change of the shape of the amplitude modulation dots through the modulation method of the circular look-up method, and the anti-counterfeiting information can be identified from any fragment when identifying printed matter. It can be widely used in the anti-counterfeiting field of printed matter.
Description
技术领域:Technical field:
本发明涉及一种防伪印刷技术,特别是一种单参数位移变序加密二进制防伪印刷技术,该防伪印刷技术可以用于各种印刷制品的防伪。The invention relates to an anti-counterfeiting printing technology, in particular to a binary anti-counterfeiting printing technology of single-parameter displacement sequence encryption, which can be used for anti-counterfeiting of various printed products.
背景技术:Background technique:
现有的较为普通的防伪方法有以下几种:第一种是激光防伪标志,用激光隐性油墨萤光油墨印刷技术将产品的标徽或特殊的识别图案印制成产品的防伪标贴,且同一类产品使用同一种标贴,因防伪标贴较容易伪造,而伪造的防伪标贴又被用在假冒产品上,造成产品的真假混淆,因此难于有效防伪。第二种是密码防伪标贴,其所采用的方法是每件产品编一组数码,每件产品的编码都不相同,将此数码印制在标贴上并遮盖起来,同时将此数码存入可供消费者查询的计算机数据库中,消费者购买产品时,将标识上的数码通过电话或入网计算机输入计算机数据库进行比较识别,相同即为真,不同即为假,方法简单,识别容易,不易伪造,但实际使用中,因编码数据是计算机统一生成后印制标贴的。代表产品真假编码数据可能被非法拷贝造假,同时,编码也可回收未查询的产品上的编码造标而贴在假产品上,防伪效果难于保证。第三种是纹理防伪,以其标贴上的纹理特征防伪,虽然较难伪造,但由于只设标贴的序号码,且是明码,每枚标贴可反复查询,造假者可通过仓库保管员或售货员将标贴上的序号及查询时所反映的必要纹理特征即方格中的有无现象抄袭后按此特征批量伪造。综上所述,现有的防伪方法都存在一定的缺点,因而不能从根本防止假冒产品。The existing relatively common anti-counterfeiting methods are as follows: The first is laser anti-counterfeiting marks, which use laser recessive ink fluorescent ink printing technology to print product logos or special identification patterns into product anti-counterfeiting labels. And the same type of product uses the same label, because the anti-counterfeiting label is easier to forge, and the fake anti-counterfeiting label is used on the counterfeit product, causing the product to be confused, so it is difficult to effectively prevent counterfeiting. The second is the password anti-counterfeiting label. The method adopted is to compile a set of numbers for each product, and the codes of each product are different. The numbers are printed on the labels and covered, and the numbers are stored Into the computer database that can be inquired by consumers. When consumers purchase products, they input the numbers on the logo into the computer database through telephone or networked computer for comparison and identification. The same is true, and the difference is false. The method is simple and easy to identify. It is not easy to forge, but in actual use, because the encoded data is uniformly generated by the computer, the label is printed. The code data representing the authenticity of the product may be illegally copied and falsified. At the same time, the code can also be recycled from the code on the product that has not been inquired to make a label and affixed to the fake product. The anti-counterfeiting effect is difficult to guarantee. The third is texture anti-counterfeiting, which uses the texture features on the label to prevent counterfeiting. Although it is difficult to forge, since only the serial number of the label is set, and it is a clear code, each label can be queried repeatedly, and counterfeiters can store it in the warehouse. The clerk or salesperson plagiarizes the serial number on the label and the necessary texture characteristics reflected in the query, that is, the presence or absence of phenomena in the grid, and then forges them in batches according to this characteristic. In summary, the existing anti-counterfeiting methods have certain shortcomings, and thus cannot fundamentally prevent counterfeit products.
发明内容:Invention content:
为了克服现有的各种印刷制品防伪印刷技术存在的缺点,本发明针对现有印刷制品防伪印刷技术存在的不足对现有技术进行了改进,提出了一种二进制加密信号调制印刷品调幅网点的形状的加密防伪印刷技术,该防伪印刷技术通过调幅网点的形状的改变将防伪信息嵌入在整个页面中,可在印刷品识别时从任意一个碎片里识别防伪信息,因此具有很强抗碎性,可从根本上杜绝采用照相、扫描等非法复制行为。In order to overcome the shortcomings of the existing anti-counterfeiting printing technology for various printed products, the present invention improves the existing technology in view of the shortcomings of the existing anti-counterfeiting printing technology for printed products, and proposes a binary encryption signal to modulate the shape of the AM dots of printed products Encrypted anti-counterfeiting printing technology, this anti-counterfeiting printing technology embeds anti-counterfeiting information in the entire page by changing the shape of AM dots, and can identify anti-counterfeiting information from any fragment when identifying printed matter, so it is highly resistant to shattering and can be read from Fundamentally put an end to the use of photography, scanning and other illegal copying.
本发明解决其技术问题所采用的技术方案是:对柔性版印刷混合加网中的调幅网点和调频网点分开进行处理,利用图像信息、文字信息、商标信息等防伪信息生成8位一组的二进制防伪信息表,为防止加密过程中产生信息溢出,将二进制防伪信息表中的8位一组二进制信息扩展为16位一组二进制信息,生成高8位全为0的16位一组二进制防伪信息表,将16位一组二进制防伪信息表中的第i组16位二进制信息记作Ni,i为大于0的正整数,八位二进制加密参数记作C,加密参数C为1≦C≦255的整数,二位二进制算符控制变量记作k,算符控制变量k为0≦k≦3的整数,算符@1 k、@2 k、@3 k、@4 k采用+、×、-、÷四种算符,算符控制变量k=0时@1 k、@2 k、@3 k、@4 k分别定义为“+”、“×”、”-”、“÷”运算,算符控制变量k=1时@1 k、@2 k、@3 k、@4 k分别定义为”-”“×”、“+”、“÷”运算,算符控制变量k=2时@1 k、@2 k、@3 k、@4 k分别定义为“-”、“÷”、“+”、“×”运算,算符控制变量k=3时@1 k、@2 k、@3 k、@4 k分别定义为“÷”、“-”、“×”、“+”运算,算符控制变量k=0时加密运算定义为算符控制变量k=1时加密运算定义为算符控制变量k=2时加密运算定义为算符控制变量k=3时加密运算定义为设定加密参数C的初值,设定算符控制变量k的初值k=0,设定16位一组二进制防伪信息表中16位二进制信息Ni的位置控制变量i=1,从16位一组二进制防伪信息表中第一组16位二进制信息N1开始,对16位一组二进制防伪信息表中的每一组16位二进制信息进行加密运算,并且在对每一组16位二进制信息进行加密运算的同时进行i+1和k+1运算,使下一运算指向其中i和k都增加了1,通过对16位一组二进制防伪信息表中的每一组16位二进制信息进行加密运算,生成16位一组的二进制加密防伪信息表,调幅网点的形状设置为两种:□和◇,其中□定义为数字0、◇定义为数字1,利用生成的16位一组的二进制加密防伪信息通过循环查表法调制调幅网点,使其有规律的按照上述两种调幅网点的形状改变混合加网中调幅网点的形状,使混合加网中调幅网点的形状有规则的发生改变,调制后相邻16个调幅网点构成一组16位二进制信息,使其携带防伪信息,并使该防伪信息嵌入在整个页面网点中,能更有效地对抗基于照相机、扫描仪、电子文档等非法复制行为。通过在印刷品中非显见地嵌入可提取的防伪信息,能够为真品提供有效证明,同时具有较强的抗伪造能力,且不增加额外的防伪成本。The technical solution adopted by the present invention to solve the technical problem is: separately process the amplitude modulation dots and frequency modulation dots in the mixed screen of flexographic printing, and use image information, text information, trademark information and other anti-counterfeiting information to generate 8-bit binary Anti-counterfeiting information table, in order to prevent information overflow during the encryption process, the 8-bit binary information in the binary anti-counterfeiting information table is expanded to 16-bit binary information, and a 16-bit binary anti-counterfeiting information with all 0s in the upper 8 bits is generated Table, the i-th group of 16-bit binary information in the 16-bit binary anti-counterfeiting information table is recorded as N i , i is a positive integer greater than 0, the eight-bit binary encryption parameter is recorded as C, and the encryption parameter C is 1≦C≦ An integer of 255, the two-digit binary operator control variable is recorded as k, and the operator control variable k is an integer of 0≦k≦3, and the operators @ 1 k , @ 2 k , @ 3 k , and @ 4 k use +, × , -, ÷ four operators, when the operator control variable k = 0, @ 1 k , @ 2 k , @ 3 k , @ 4 k are respectively defined as "+", "×", "-", "÷" Operation, when the operator control variable k=1, @ 1 k , @ 2 k , @ 3 k , @ 4 k are respectively defined as "-", "×", "+", and "÷" operations, and the operator control variable k= At 2, @ 1 k , @ 2 k , @ 3 k and @ 4 k are respectively defined as "-", "÷", "+" and "×" operations, and when the operator control variable k=3, @ 1 k , @ 2 k , @ 3 k , @ 4 k are defined as “÷”, “-”, “×” and “+” operations respectively. When the operator control variable k=0, the encryption operation is defined as When the operator control variable k=1, the encryption operation is defined as When the operator control variable k=2, the encryption operation is defined as When the operator control variable k=3, the encryption operation is defined as The initial value of setting encryption parameter C, the initial value k=0 of setting operator control variable k, the position control variable i=1 of 16 binary information N i of setting 16 groups of binary anti-counterfeiting information tables, from 16 Starting with the first group of 16-bit binary information N 1 in the first group of binary anti-counterfeiting information table, carry out each group of 16-bit binary information in the 16-bit group of binary anti-counterfeiting information table Encryption operation, and each set of 16-bit binary information Perform i+1 and k+1 operations at the same time as the encryption operation, so that the next operation points to Among them, both i and k have increased by 1, and each set of 16-bit binary information in the 16-bit set of binary anti-counterfeiting information table is carried out Encryption operation, generate a 16-bit binary encrypted anti-counterfeiting information table, the shape of the AM dots is set to two types: □ and ◇, where □ is defined as the number 0, ◇ is defined as the number 1, using the generated 16-bit binary The encrypted anti-counterfeiting information modulates the AM dots through the circular look-up method, so that the shape of the AM dots in the mixed screen can be changed regularly according to the shapes of the above two AM dots, so that the shape of the AM dots in the mixed screen can be changed regularly. After modulation, 16 adjacent AM outlets form a set of 16-bit binary information, which makes it carry anti-counterfeiting information and embeds the anti-counterfeiting information in the entire page outlets, which can more effectively combat illegal copying based on cameras, scanners, and electronic documents. Behavior. By non-obviously embedding extractable anti-counterfeiting information in the printed matter, effective proof can be provided for the genuine product, and at the same time, it has strong anti-counterfeiting ability without adding additional anti-counterfeiting costs.
为解决上述的技术问题,首先对防伪信息进行数字化,生成8位一组的二进制防伪信息表,防伪信息可以是图像信息、文字信息、商标信息等,将二进制防伪信息表中的8位一组二进制信息扩展为16位一组二进制信息,生成高8位全为0的16位一组二进制防伪信息表,对16位一组二进制防伪信息表中的每一组16位二进制信息进行加密运算,生成16位一组的二进制加密防伪信息表,利用生成的16位一组二进制加密防伪信息表中的16位二进制信息经过信道编码,生成具有检错和纠错功能的16位一组的二进制调制信号。信道编码可以采用循环编码、卷积编码或Turbo编码等多种形式,将原始连续调图像信号经过栅格化处理(RIP)和混合加网输出半色调混合加网图像信号,其中包括调幅网点和调频网点图像信号,利用生成的16位一组二进制调制信号采用循环查表法调制方式调制混合加网图像信号中调幅网点的形状,使调幅网点的形状按照□和◇有规律的发生改变,使混合加网图像信号中相邻16个调幅网点通过形状的改变携带16位二进制防伪信息,从而生成在整个页面网点中嵌入防伪信息的混合加网图像信号,实现防伪印刷。In order to solve the above-mentioned technical problems, the anti-counterfeiting information is digitized at first, and a binary anti-counterfeiting information table of 8 bits is generated. The anti-counterfeiting information can be image information, text information, trademark information, etc. The binary information is expanded into a group of 16 binary information, and a 16-bit binary anti-counterfeiting information table with all 0s in the upper 8 bits is generated, and each group of 16-bit binary information in the 16-bit binary anti-counterfeiting information table is processed Encryption operation, generate a 16-bit binary encrypted anti-counterfeiting information table, use the 16-bit binary information in the generated 16-bit binary encrypted anti-counterfeiting information table to undergo channel coding, and generate a 16-bit group with error detection and error correction functions binary modulated signal. Channel coding can adopt various forms such as cyclic coding, convolutional coding or Turbo coding, etc., and the original continuous modulation image signal is rasterized (RIP) and mixed and screened to output a halftone mixed screened image signal, including amplitude modulation dots and The FM dot image signal uses the generated 16-bit binary modulation signal to modulate the shape of the AM dot in the mixed screen image signal by means of a circular look-up table modulation method, so that the shape of the AM dot changes according to □ and ◇ regularly, so that The 16 adjacent AM dots in the mixed screened image signal carry 16-bit binary anti-counterfeiting information through shape changes, thereby generating a mixed screened image signal with anti-counterfeiting information embedded in the entire page dots, realizing anti-counterfeiting printing.
在提取防伪信息时,首先采集网点图像信号,经过对调幅网点的形状的模糊识别,分辨调幅网点的形状,提取调幅网点的边沿信号和形状信息,解调调幅网点的形状信息,输出16位一组的二进制调制信号。对解调输出的16位一组的二进制调制信号进行信道解码,信道解码后生成16位一组的二进制解密防伪信息表,将二进制解密防伪信息表中的16位二进制信息记作Hi,通过加密过程可知,When extracting anti-counterfeiting information, first collect the network dot image signal, through the fuzzy recognition of the shape of the AM network dot, distinguish the shape of the AM network dot, extract the edge signal and shape information of the AM network dot, demodulate the shape information of the AM network dot, and output 16-bit one Set of binary modulated signals. Perform channel decoding on the 16-bit binary modulated signal output by demodulation, generate a 16-bit binary decryption anti-counterfeiting information table after channel decoding, record the 16-bit binary information in the binary decryption anti-counterfeiting information table as H i , pass The encryption process shows that,
算符控制变量k=0时 When the operator control variable k=0
算符控制变量k=1时 When the operator control variable k=1
算符控制变量k=2时 When the operator control variable k=2
算符控制变量k=3时二进制解密防伪信息表中16位二进制信息Hi的位置控制变量初值设定为i=1,从二进制解密防伪信息表中第一组16位二进制信息开始,对二进制解密防伪信息表中的每一组16位二进制信息进行解密运算,解出二进制防伪信息Ni,生成高8位全为0的16位一组二进制防伪信息表,去掉高8位,生成8位一组的二进制防伪信息表,恢复防伪信号并输出防伪信息。When the operator control variable k=3 The initial value of the position control variable of 16 binary information H i in the binary decryption anti-counterfeit information table is set as i=1, from the first group of 16 binary information in the binary decryption anti-counterfeit information table, to each in the binary decryption anti-counterfeit information table A set of 16-bit binary information carried Decryption operation, solve the binary anti-counterfeiting information N i , generate a 16-bit binary anti-counterfeiting information table whose upper 8 bits are all 0, remove the upper 8 bits, generate an 8-bit binary anti-counterfeiting information table, restore the anti-counterfeiting signal and output the anti-counterfeiting information.
附图说明Description of drawings
下面结合附图对本发明进一步说明。The present invention will be further described below in conjunction with the accompanying drawings.
图1加载防伪信息流程图。Figure 1 is a flow chart of loading anti-counterfeiting information.
图2提取防伪信息流程图。Figure 2 is a flow chart of extracting anti-counterfeiting information.
具体实施方式Detailed ways
在加载防伪信息流程图1中,原始防伪信息(图像、文字、商标)经数字化处理,生成8位一组的二进制防伪信息表,将二进制防伪信息表中的8位一组二进制信息扩展为16位一组二进制信息,生成高8位全为0的16位一组二进制防伪信息表,16位一组二进制防伪信息表中的第i组16位二进制信息记作Ni,i为大于0的正整数,八位二进制加密参数记作C,加密参数C为1≦C≦255的整数,二位二进制算符控制变量记作k,算符控制变量k为0≦k≦3的整数,算符@1 k、@2 k、@3 k、@4 k采用+、×、-、÷四种算符,算符控制变量k=0时@1 k、@2 k、@3 k、@4 k分别定义为“+”、“×”、”-”、“÷”运算,算符控制变量k=1时@1 k、@2 k、@3 k、@4 k分别定义为”-”“×”、“+”、“÷”运算,算符控制变量k=2时@1 k、@2 k、@3 k、@4 k分别定义为“-”、“÷”、“+”、“×”运算,算符控制变量k=3时@1 k、@2 k、@3 k、@4 k分别定义为“÷”、“-”、“×”、“+”运算,算符控制变量k=0时加密运算定义为算符控制变量k=1时加密运算定义为算符控制变量k=2时加密运算定义为算符控制变量k=3时加密运算定义为设定加密参数C的初值,设定算符控制变量k的初值k=0,设定16位一组二进制防伪信息表中16位二进制信息Ni的位置控制变量i=1,从16位一组二进制防伪信息表中第一组16位二进制信息N1开始,对16位一组二进制防伪信息表中的每一组16位二进制信息进行加密运算,并且在对每一组16位二进制信息进行加密运算的同时进行i+1和k+1运算,使下一运算指向其中i和k都增加了1,通过对16位一组二进制防伪信息表中的每一组16位二进制信息进行加密运算,生成16位一组的二进制加密防伪信息表,调幅网点的形状设置为两种:□和◇,其中□定义为数字0、◇定义为数字1,生成的16位二进制加密防伪信息经过信道编码,生成具有检错和纠错功能的二进制调制信号。信道编码可以采用循环编码、卷积编码或Turbo编码等多种形式。将原始连续调图像信号经过栅格化处理(RIP)和混合加网输出半色调混合加网图像信号,其中包括调幅网点和调频网点图像信号。利用生成的二进制调制信号采用循环查表调制方式,调制混合加网图像信号中调幅网点的形状,使混合加网中调幅网点的形状有规则发生改变,生成嵌入防伪信息的混合加网图像信号,通过循环查表调制方式,使相邻16位调幅网点通过形状的改变生成一组16位二进制数据,使其携带防伪信息,并使该防伪信息嵌入在整个页面网点中,实现防伪印刷。In flow chart 1 of loading anti-counterfeiting information, the original anti-counterfeiting information (image, text, trademark) is digitized to generate an 8-bit binary anti-counterfeiting information table, and the 8-bit binary information in the binary anti-counterfeiting information table is expanded to 16 One set of binary information, generate a 16-bit binary anti-counterfeiting information table whose upper 8 bits are all 0, the i-th group of 16-bit binary information in the 16-bit binary anti-counterfeiting information table is recorded as N i , i is greater than 0 Positive integer, the eight-digit binary encryption parameter is denoted as C, the encryption parameter C is an integer of 1≦C≦255, the two-digit binary operator control variable is denoted as k, and the operator control variable k is an integer of 0≦k≦3. The symbols @ 1 k , @ 2 k , @ 3 k , @ 4 k adopt +, ×, -, ÷ four operators, and when the operator control variable k=0, @ 1 k , @ 2 k , @ 3 k , @ 4 k are respectively defined as "+", "×", "-" and "÷" operations, and when the operator control variable k=1, @ 1 k , @ 2 k , @ 3 k and @ 4 k are respectively defined as "- """×","+","÷" operations, when the operator control variable k=2, @ 1 k , @ 2 k , @ 3 k , @ 4 k are respectively defined as "-", "÷", "+ ", "×" operation, when the operator control variable k=3, @ 1 k , @ 2 k , @ 3 k , @ 4 k are respectively defined as "÷", "-", "×", "+" operations, When the operator control variable k=0, the encryption operation is defined as When the operator control variable k=1, the encryption operation is defined as When the operator control variable k=2, the encryption operation is defined as When the operator control variable k=3, the encryption operation is defined as The initial value of setting encryption parameter C, the initial value k=0 of setting operator control variable k, the position control variable i=1 of 16 binary information N i in setting 16 groups of binary anti-counterfeiting information table, from 16 Start with the first group of 16-bit binary information N 1 in a group of binary anti-counterfeiting information table, and carry out each group of 16-bit binary information in the 16-bit group of binary anti-counterfeiting information table Encryption operation, and each set of 16-bit binary information Perform i+1 and k+1 operations at the same time as the encryption operation, so that the next operation points to Among them, both i and k have increased by 1, and each set of 16-bit binary information in the 16-bit set of binary anti-counterfeiting information table is carried out Encryption operation to generate a 16-bit binary encrypted anti-counterfeiting information table. The shape of the AM dots is set to two types: □ and ◇, where □ is defined as the number 0 and ◇ is defined as the number 1. The generated 16-bit binary encrypted anti-counterfeiting information is passed through Channel coding, which generates a binary modulated signal with error detection and correction functions. Channel coding can adopt various forms such as cyclic coding, convolutional coding or Turbo coding. The original continuous tone image signal is rasterized (RIP) and mixed and screened to output a halftone mixed screen image signal, including amplitude modulation dot and frequency modulation dot image signals. Utilize the generated binary modulation signal and use the circular look-up modulation method to modulate the shape of the AM dots in the mixed screen image signal, so that the shape of the AM dots in the mixed screen can be changed regularly, and generate a mixed screen image signal embedded with anti-counterfeiting information. Through the circular look-up table modulation method, the adjacent 16-bit AM dots can generate a set of 16-bit binary data through shape changes, so that they carry anti-counterfeiting information, and the anti-counterfeiting information is embedded in the entire page dots to realize anti-counterfeiting printing.
在提取防伪信息流程图2中,在提取防伪信息时,首先采集网点图像信号,经过对调幅网点的形状的模糊识别,分辨调幅网点的形状,提取调幅网点的边沿信号和形状信息,解调调幅网点的形状信息,输出16位一组的二进制调制信号。对解调输出的16位一组的二进制调制信号进行信道解码,信道解码后生成16位一组的二进制解密防伪信息表,将二进制解密防伪信息表中的16位二进制信息记作Hi,通过加密过程可知,In the flow chart 2 of extracting anti-counterfeiting information, when extracting anti-counterfeiting information, first collect the dot image signal, through the fuzzy recognition of the shape of the AM dot, distinguish the shape of the AM dot, extract the edge signal and shape information of the AM dot, and demodulate the AM dot The shape information of the screen dots, output a 16-bit binary modulation signal. Perform channel decoding on the 16-bit binary modulated signal output by demodulation, generate a 16-bit binary decryption anti-counterfeiting information table after channel decoding, record the 16-bit binary information in the binary decryption anti-counterfeiting information table as H i , pass The encryption process shows that,
算符控制变量k=0时 When the operator control variable k=0
算符控制变量k=1时 When the operator control variable k=1
算符控制变量k=2时 When the operator control variable k=2
算符控制变量k=3时二进制解密防伪信息表中16位二进制信息Hi的位置控制变量初值设定为i=1,从二进制解密防伪信息表中第一组16位二进制信息开始,对二进制解密防伪信息表中的每一组16位二进制信息进行解密运算,解出二进制防伪信息Ni,生成高8位全为0的16位一组二进制防伪信息表,去掉高8位,生成8位一组的二进制防伪信息表,恢复防伪信号并输出防伪信息。When the operator control variable k=3 The initial value of the position control variable of 16 binary information H i in the binary decryption anti-counterfeit information table is set as i=1, from the first group of 16 binary information in the binary decryption anti-counterfeit information table, to each in the binary decryption anti-counterfeit information table A set of 16-bit binary information carried Decryption operation, solve the binary anti-counterfeiting information N i , generate a 16-bit binary anti-counterfeiting information table whose upper 8 bits are all 0, remove the upper 8 bits, generate an 8-bit binary anti-counterfeiting information table, restore the anti-counterfeiting signal and output the anti-counterfeiting information.
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210402208.7A CN102945423B (en) | 2012-10-22 | 2012-10-22 | Single-parameter displacement variable-sequence encrypted binary anti-counterfeiting printing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210402208.7A CN102945423B (en) | 2012-10-22 | 2012-10-22 | Single-parameter displacement variable-sequence encrypted binary anti-counterfeiting printing method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102945423A CN102945423A (en) | 2013-02-27 |
CN102945423B true CN102945423B (en) | 2015-07-15 |
Family
ID=47728362
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210402208.7A Expired - Fee Related CN102945423B (en) | 2012-10-22 | 2012-10-22 | Single-parameter displacement variable-sequence encrypted binary anti-counterfeiting printing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102945423B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101777134A (en) * | 2010-03-01 | 2010-07-14 | 北京印刷学院 | Presswork encryption security printing technology based on multi-system quadrature amplitude modulation |
CN102184428A (en) * | 2011-04-14 | 2011-09-14 | 北京印刷学院 | Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal |
CN102225671A (en) * | 2011-04-14 | 2011-10-26 | 北京印刷学院 | Encrypted Anti-counterfeiting Printing Technology Using Double Encrypted Signals to Modulate the Shape of AM Dots in Printed Matters |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2350806A4 (en) * | 2008-10-20 | 2012-08-08 | Hewlett Packard Development Co | Method for enhancing security printing |
-
2012
- 2012-10-22 CN CN201210402208.7A patent/CN102945423B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101777134A (en) * | 2010-03-01 | 2010-07-14 | 北京印刷学院 | Presswork encryption security printing technology based on multi-system quadrature amplitude modulation |
CN102184428A (en) * | 2011-04-14 | 2011-09-14 | 北京印刷学院 | Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal |
CN102225671A (en) * | 2011-04-14 | 2011-10-26 | 北京印刷学院 | Encrypted Anti-counterfeiting Printing Technology Using Double Encrypted Signals to Modulate the Shape of AM Dots in Printed Matters |
Also Published As
Publication number | Publication date |
---|---|
CN102945423A (en) | 2013-02-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102945467B (en) | One-parameter univariate incremental circulation encrypted binary antiforging printing method | |
CN102945423B (en) | Single-parameter displacement variable-sequence encrypted binary anti-counterfeiting printing method | |
CN102945403B (en) | Binary anti-counterfeit printing method based on transposition order-change | |
CN102945445B (en) | Multiparameter single order encrypted binary antiforging printing method | |
CN102945426B (en) | The double encrypted binary antiforging printing method of one-parameter | |
CN102945452B (en) | Bivariate one dimension goes forward one by one encrypted binary antiforging printing method | |
CN102945393B (en) | Multi-parameter bivariate homodromous synchronous progressive encrypted binary anti-counterfeiting printing method | |
CN102945456B (en) | Single-parameter, double-progressive becomes sequence encrypted binary antiforging printing method | |
CN102945459B (en) | Three-dimensional increases progressively and becomes sequence one-parameter encrypted binary antiforging printing method | |
CN102945448B (en) | Single-parameter displacement single argument circulation encrypted binary antiforging printing method | |
CN102945441B (en) | The displacement that moves to left of one-parameter alternation strides the encrypted binary antiforging printing method that goes forward one by one | |
CN102945388B (en) | Dynamic variable-parameter double encrypted binary anti-counterfeiting printing method | |
CN102945409B (en) | The double encrypted binary antiforging printing method of Multi-parameter displacement | |
CN102945449B (en) | Multi-parameter data increment encryption scale-of-two antiforging printing method | |
CN102945421B (en) | Binary anti-fake printing method by reverse synchronous-progressing encryption | |
CN102945451B (en) | One-parameter circulates double encrypted binary antiforging printing method | |
CN102945469B (en) | Double-variant two-dimensional encryption binary anti-counterfeiting printing method | |
CN102955965B (en) | Binary anti-counterfeit printing method by single-parameter gradient and opposite synchronous-increasing encryption | |
CN102955961B (en) | Single-parameter gradual phase-to-synchronous progressive encrypted binary anti-counterfeiting printing method | |
CN102945444B (en) | Shift left displacement stepping increasing encryption binary anti-counterfeit printing method | |
CN102945472B (en) | Single-parameter, gradient, reverse, synchronous and increasing encryption type binary anti-counterfeit printing method | |
CN102945464B (en) | Single-parameter, gradient, same-direction, synchronous and increasing encryption type binary anti-counterfeit printing method | |
CN102945468B (en) | Double-encryption binary anti-counterfeiting printing method | |
CN102945488B (en) | The synchronous in the same way increment encryption scale-of-two antiforging printing method of multiparameter | |
CN102945477B (en) | Binary anti-fake printing method by two-dimensional encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C53 | Correction of patent for invention or patent application | ||
CB03 | Change of inventor or designer information |
Inventor after: Li Yang Inventor before: Zhang Lijun |
|
COR | Change of bibliographic data |
Free format text: CORRECT: INVENTOR; FROM: ZHANG LIJUN TO: LI YANG |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20150715 Termination date: 20161022 |