CN102945429B - Multi-parameter three-dimensional encrypted binary antiforging printing method - Google Patents
Multi-parameter three-dimensional encrypted binary antiforging printing method Download PDFInfo
- Publication number
- CN102945429B CN102945429B CN201210402615.8A CN201210402615A CN102945429B CN 102945429 B CN102945429 B CN 102945429B CN 201210402615 A CN201210402615 A CN 201210402615A CN 102945429 B CN102945429 B CN 102945429B
- Authority
- CN
- China
- Prior art keywords
- group
- binary
- counterfeiting information
- counterfeiting
- information table
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 238000003165 hybrid screening Methods 0.000 claims 5
- 230000005574 cross-species transmission Effects 0.000 claims 1
- 239000012634 fragment Substances 0.000 abstract description 2
- 238000005516 engineering process Methods 0.000 description 8
- 125000004122 cyclic group Chemical group 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
Landscapes
- Editing Of Facsimile Originals (AREA)
Abstract
一种多参数三维加密二进制防伪印刷方法,该方法可将二进制防伪信息通过[+++]加密运算和信道编码生成二进制调制信号,并通过循环查表法调制方式将防伪信息以调幅网点的形状的有序改变嵌入在整个页面中,可在印刷品识别时从任意一个碎片里识别防伪信息,可广泛应用于印刷品防伪领域。
A multi-parameter three-dimensional encrypted binary anti-counterfeiting printing method, which can pass binary anti-counterfeiting information through [ + + + ] Encryption operation and channel coding generate binary modulation signal, and the anti-counterfeiting information is embedded in the whole page with the orderly change of the shape of the amplitude modulation dots through the modulation method of the circular look-up table method, and the anti-counterfeiting information can be identified from any fragment when identifying the printed matter , can be widely used in the field of printed matter anti-counterfeiting.
Description
技术领域:Technical field:
本发明涉及一种防伪印刷技术,特别是一种多参数三维加密二进制防伪印刷技术,该防伪印刷技术可以用于各种印刷制品的防伪。The invention relates to an anti-counterfeiting printing technology, in particular to a multi-parameter three-dimensional encrypted binary anti-counterfeiting printing technology, which can be used for anti-counterfeiting of various printed products.
背景技术:Background technique:
现有的较为普通的防伪方法有以下几种:第一种是激光防伪标志,用激光隐性油墨萤光油墨印刷技术将产品的标徽或特殊的识别图案印制成产品的防伪标贴,且同一类产品使用同一种标贴,因防伪标贴较容易伪造,而伪造的防伪标贴又被用在假冒产品上,造成产品的真假混淆,因此难于有效防伪。第二种是密码防伪标贴,其所采用的方法是每件产品编一组数码,每件产品的编码都不相同,将此数码印制在标贴上并遮盖起来,同时将此数码存入可供消费者查询的计算机数据库中,消费者购买产品时,将标识上的数码通过电话或入网计算机输入计算机数据库进行比较识别,相同即为真,不同即为假,方法简单,识别容易,不易伪造,但实际使用中,因编码数据是计算机统一生成后印制标贴的。代表产品真假编码数据可能被非法拷贝造假,同时,编码也可回收未查询的产品上的编码造标而贴在假产品上,防伪效果难于保证。第三种是纹理防伪,以其标贴上的纹理特征防伪,虽然较难伪造,但由于只设标贴的序号码,且是明码,每枚标贴可反复查询,造假者可通过仓库保管员或售货员将标贴上的序号及查询时所反映的必要纹理特征即方格中的有无现象抄袭后按此特征批量伪造。综上所述,现有的防伪方法都存在一定的缺点,因而不能从根本防止假冒产品。The existing relatively common anti-counterfeiting methods are as follows: The first is laser anti-counterfeiting marks, which use laser recessive ink fluorescent ink printing technology to print product logos or special identification patterns into product anti-counterfeiting labels. And the same type of product uses the same label, because the anti-counterfeiting label is easier to forge, and the fake anti-counterfeiting label is used on the counterfeit product, causing the product to be confused, so it is difficult to effectively prevent counterfeiting. The second is the password anti-counterfeiting label. The method adopted is to compile a set of numbers for each product, and the codes of each product are different. The numbers are printed on the labels and covered, and the numbers are stored Into the computer database that can be inquired by consumers. When consumers purchase products, they input the numbers on the logo into the computer database through telephone or networked computer for comparison and identification. The same is true, and the difference is false. The method is simple and easy to identify. It is not easy to forge, but in actual use, because the encoded data is uniformly generated by the computer, the label is printed. The code data representing the authenticity of the product may be illegally copied and falsified. At the same time, the code can also be recycled from the code on the product that has not been inquired to make a label and affixed to the fake product. The anti-counterfeiting effect is difficult to guarantee. The third is texture anti-counterfeiting, which uses the texture features on the label to prevent counterfeiting. Although it is difficult to forge, since only the serial number of the label is set, and it is a clear code, each label can be queried repeatedly, and counterfeiters can store it in the warehouse. The clerk or salesperson plagiarizes the serial number on the label and the necessary texture characteristics reflected when inquiring, that is, the presence or absence of phenomena in the grid, and then forges them in batches according to this characteristic. In summary, the existing anti-counterfeiting methods have certain shortcomings, and thus cannot fundamentally prevent counterfeit products.
发明内容:Invention content:
为了克服现有的各种印刷制品防伪印刷技术存在的缺点,本发明针对现有印刷制品防伪印刷技术存在的不足对现有技术进行了改进,提出了一种二进制加密信号调制印刷品调幅网点的形状的加密防伪印刷技术,该防伪印刷技术通过调幅网点的形状的改变将防伪信息嵌入在整个页面中,可在印刷品识别时从任意一个碎片里识别防伪信息,因此具有很强抗碎性,可从根本上杜绝采用照相、扫描等非法复制行为。In order to overcome the shortcomings of the existing anti-counterfeiting printing technology for various printed products, the present invention improves the existing technology in view of the shortcomings of the existing anti-counterfeiting printing technology for printed products, and proposes a binary encryption signal to modulate the shape of the AM dots of printed products Encrypted anti-counterfeiting printing technology, this anti-counterfeiting printing technology embeds anti-counterfeiting information in the entire page by changing the shape of AM dots, and can identify anti-counterfeiting information from any fragment when identifying printed matter, so it is highly resistant to shattering and can be read from Fundamentally put an end to the use of photography, scanning and other illegal copying.
本发明解决其技术问题所采用的技术方案是:对柔性版印刷混合加网中的调幅网点和调频网点分开进行处理,利用图像信息、文字信息等防伪信息生成8位一组的二进制防伪信息表,为防止加密过程中产生信息溢出,将二进制防伪信息表中的8位一组二进制信息扩展为16位一组二进制信息,生成高8位全为0的16位一组二进制防伪信息表,将16位一组二进制防伪信息表中的第i组16位二进制信息记作Ni,i为大于0的正整数,八位二进制加密参数记作C、C1、C2、C3、C4、C5、C6、C7、C8、C9,加密参数C、C1、C2、C3、C4、C5、C6、C7、C8、C9为0到255中的整数,二位二进制算符控制变量记作k,算符控制变量k为0≦k≦3的整数,算符采用+、-、×、÷四种算符,算符控制变量k=0时分别定义为+、×、+、÷、-、×、-、÷、+、-,算符控制变量k=1时分别定义为-、×、+、÷、+、×、-、÷、+、-,算符控制变量k=2时分别定义为-、÷、+、÷、-、×、+、×、+、-,算符控制变量k=3时分别定义为+、-、+、÷、-、×、-、÷、+、×,设定加密参数C、C1、C2、C3、C4、C5、C6、C7、C8、C9的初值,因加密参数C、C1、C2、C3、C4、C5、C6、C7、C8、C9为0到255中的整数,在256个数中任取C、C1、C2、C3、C4、C5、C6、C7、C8、C9十个不同的数字共有256!/(256-10)!种取法,设定算符控制变量k的初值k=0,设定16位一组二进制防伪信息表中16位二进制信息Ni的位置控制变量i=1,从16位一组二进制防伪信息表中第一组16位二进制信息N1开始,对16位一组二进制防伪信息表中的每一组16位二进制信息进行加密运算,并且在对每一组16位二进制信息进行加密运算的同时进行i+1和k+1运算,通过对16位一组二进制防伪信息表中的每一组16位二进制信息进行加密运算,生成16位一组的二进制加密防伪信息表,调幅网点的形状设置为两种:□和◇,其中□定义为数字0、◇定义为数字1,利用生成的16位一组的二进制加密防伪信息通过循环查表法调制调幅网点,使其有规律的按照上述两种调幅网点的形状改变混合加网中调幅网点的形状,使混合加网中调幅网点的形状有规则的发生改变,调制后相邻16个调幅网点构成一组16位二进制信息,使其携带防伪信息,并使该防伪信息嵌入在整个页面网点中,能更有效地对抗基于照相机、扫描仪、电子文档等非法复制行为。通过在印刷品中非显见地嵌入可提取的防伪信息,能够为真品提供有效证明,同时具有较强的抗伪造能力,且不增加额外的防伪成本。The technical solution adopted by the present invention to solve the technical problem is: separately process the amplitude modulation dots and frequency modulation dots in the mixed screen of flexographic printing, and use the anti-counterfeiting information such as image information and text information to generate an 8-bit binary anti-counterfeiting information table , in order to prevent information overflow during the encryption process, the 8-bit binary information in the binary anti-counterfeiting information table is expanded into a 16-bit binary information, and a 16-bit binary anti-counterfeiting information table with all 0s in the upper 8 bits is generated. The i-th group of 16-bit binary information in the 16-bit binary anti-counterfeiting information table is recorded as N i , i is a positive integer greater than 0, and the eight-bit binary encryption parameters are recorded as C, C 1 , C 2 , C 3 , C 4 , C 5 , C 6 , C 7 , C 8 , C 9 , encryption parameters C, C 1 , C 2 , C 3 , C 4 , C 5 , C 6 , C 7 , C 8 , C 9 range from 0 to 255 Integer in, the two-digit binary operator control variable is denoted as k, the operator control variable k is an integer of 0≦k≦3, the operator Using +, -, ×, ÷ four operators, operator control variable k = 0 They are respectively defined as +, ×, +, ÷, -, ×, -, ÷, +, -, when the operator control variable k=1 They are respectively defined as -, ×, +, ÷, +, ×, -, ÷, +, -, when the operator control variable k=2 They are respectively defined as -, ÷, +, ÷, -, ×, +, ×, +, -, when the operator control variable k=3 Respectively defined as +, -, +, ÷, -, ×, -, ÷, +, ×, set encryption parameters C, C 1 , C 2 , C 3 , C 4 , C 5 , C 6 , C 7 , The initial values of C 8 and C 9 , because encryption parameters C, C 1 , C 2 , C 3 , C 4 , C 5 , C 6 , C 7 , C 8 , and C 9 are integers from 0 to 255, in 256 Among the numbers, ten different numbers of C, C 1 , C 2 , C 3 , C 4 , C 5 , C 6 , C 7 , C 8 , and C 9 are randomly selected, a total of 256! /(256-10)! A kind of method of taking, the initial value k=0 of operator control variable k is set, the position control variable i=1 of 16 binary information N i in setting 16 groups of binary anti-counterfeiting information table, from 16 groups of binary anti-counterfeiting information The first group of 16-bit binary information in the table starts with N 1 , and each group of 16-bit binary information in the 16-bit group of binary anti-counterfeiting information table is Encryption operation, and each set of 16-bit binary information Perform i+1 and k+1 operations at the same time as the encryption operation, by performing a 16-bit binary information on each group of 16-bit binary anti-counterfeiting information table Encryption operation, generate a 16-bit binary encrypted anti-counterfeiting information table, the shape of the AM dots is set to two types: □ and ◇, where □ is defined as the number 0, ◇ is defined as the number 1, using the generated 16-bit binary The encrypted anti-counterfeiting information modulates the AM dots through the circular look-up method, so that the shape of the AM dots in the mixed screen can be changed regularly according to the shapes of the above two AM dots, so that the shape of the AM dots in the mixed screen can be changed regularly. After modulation, 16 adjacent AM outlets form a set of 16-bit binary information, which makes it carry anti-counterfeiting information and embeds the anti-counterfeiting information in the entire page outlets, which can more effectively combat illegal copying based on cameras, scanners, and electronic documents. Behavior. By non-obviously embedding extractable anti-counterfeiting information in the printed matter, effective proof can be provided for the genuine product, and at the same time, it has strong anti-counterfeiting ability without adding additional anti-counterfeiting costs.
为解决上述的技术问题,首先对防伪信息进行数字化,生成8位一组的二进制防伪信息表,防伪信息可以是图像信息、文字信息,将二进制防伪信息表中的8位一组二进制信息扩展为16位一组二进制信息,生成高8位全为0的16位一组二进制防伪信息表,对16位一组二进制防伪信息表中的每一个16位二进制信息进行加密运算,生成16位一组的二进制加密防伪信息表,利用生成的16位一组二进制加密防伪信息表中的16位二进制信息经过信道编码,生成具有检错和纠错功能的16位一组的二进制调制信号。信道编码可以采用循环编码、卷积编码或Turbo编码等多种形式,将原始连续调图像信号经过栅格化处理(RIP)和混合加网输出半色调混合加网图像信号,其中包括调幅网点和调频网点图像信号,利用生成的16位一组二进制调制信号采用循环查表法调制方式调制半色调混合加网图像信号中调幅网点的形状,使调幅网点的形状按照□和◇有规律的发生改变,使半色调混合加网图像信号中相邻16个调幅网点通过形状的改变携带16位二进制防伪信息,从而生成在整个页面网点中嵌入防伪信息的半色调混合加网图像信号,实现防伪印刷。In order to solve the above-mentioned technical problems, at first the anti-counterfeiting information is digitized to generate an 8-bit binary anti-counterfeiting information table. The anti-counterfeiting information can be image information and text information, and the 8-bit binary information in the binary anti-counterfeiting information table is expanded into 16-bit binary information, generate a 16-bit binary anti-counterfeiting information table whose upper 8 bits are all 0, and carry out each 16-bit binary information in the 16-bit binary anti-counterfeiting information table Encryption operation, generate a 16-bit binary encrypted anti-counterfeiting information table, use the 16-bit binary information in the generated 16-bit binary encrypted anti-counterfeiting information table to undergo channel coding, and generate a 16-bit group with error detection and error correction functions binary modulated signal. Channel coding can adopt various forms such as cyclic coding, convolutional coding or Turbo coding, etc., and the original continuous modulation image signal is rasterized (RIP) and mixed and screened to output a halftone mixed screened image signal, including amplitude modulation dots and The FM dot image signal uses the generated 16-bit binary modulation signal to modulate the shape of the AM dot in the halftone mixed screen image signal by means of a circular look-up table modulation method, so that the shape of the AM dot changes according to □ and ◇ 16 adjacent AM dots in the halftone mixed screen image signal carry 16-bit binary anti-counterfeit information through shape changes, thereby generating a halftone mixed screen image signal with anti-counterfeit information embedded in the entire page dots to realize anti-counterfeit printing.
在提取防伪信息时,首先采集网点图像信号,经过对调幅网点的形状的模糊识别,分辨调幅网点的形状,提取调幅网点的边沿信号和形状信息,解调调幅网点的形状信息,输出16位一组的二进制调制信号。对解调输出的16位一组的二进制调制信号进行信道解码,信道解码后生成16位一组的二进制解密防伪信息表,将二进制解密防伪信息表中的16位二进制信息记作Hi,通过加密过程可知
附图说明Description of drawings
下面结合附图对本发明进一步说明。The present invention will be further described below in conjunction with the accompanying drawings.
图1加载防伪信息流程图。Figure 1 is a flow chart of loading anti-counterfeiting information.
图2提取防伪信息流程图。Figure 2 is a flow chart of extracting anti-counterfeiting information.
具体实施方式detailed description
在加载防伪信息流程图1中,原始防伪信息(图像、文字)经加密,生成8位一组的二进制防伪信息表,将二进制防伪信息表中的8位一组二进制信息扩展为16位一组二进制信息,生成高8位全为0的16位一组二进制防伪信息表,16位一组二进制防伪信息表中的第i组16位二进制信息记作Ni,i为大于0的正整数,八位二进制加密参数记作C、C1、C2、C3、C4、C5、C6、C7、C8、C9,加密参数C、C1、C2、C3、C4、C5、C6、C7、C8、C9为0到255中的整数,二位二进制算符控制变量记作k,算符控制变量k为0≦k≦3的整数,算符采用+、-、×、÷四种算符,算符控制变量k=0时分别定义为+、×、+、÷、-、×、-、÷、+、-,算符控制变量k=1时分别定义为-、×、+、÷、+、×、-、÷、+、-,算符控制变量k=2时分别定义为-、÷、+、÷、-、×、+、×、+、-,算符控制变量k=3时分别定义为+、-、+、÷、-、×、-、÷、+、×,设定加密参数C、C1、C2、C3、C4、C5、C6、C7、C8、C9的初值,因加密参数C、C1、C2、C3、C4、C5、C6、C7、C8、C9为0到255中的整数,在256个数中任取C、C1、C2、C3、C4、C5、C6、C7、C8、C9十个不同的数字共有256!/(256-10)!种取法,设定算符控制变量k的初值k=0,设定16位一组二进制防伪信息表中16位二进制信息Ni的位置控制变量i=1,从16位一组二进制防伪信息表中第一组16位二进制信息N1开始,对16位一组二进制防伪信息表中的每一组16位二进制信息进行加密运算,并且在对每一组16位二进制信息进行加密运算的同时进行i+1和k+1运算,通过对16位一组二进制防伪信息表中的每一组16位二进制信息进行加密运算,生成16位一组的二进制加密防伪信息表,调幅网点的形状设置为两种:□和◇,其中□定义为数字0、◇定义为数字1,生成的16位二进制加密防伪信息经过信道编码,生成具有检错和纠错功能的二进制调制信号。信道编码可以采用循环编码、卷积编码或Turbo编码等多种形式。将原始连续调图像信号经过栅格化处理(RIP)和混合加网输出半色调混合加网图像信号,其中包括调幅网点和调频网点图像信号。利用生成的二进制调制信号采用循环查表调制方式,调制半色调混合加网图像信号中调幅网点的形状,使混合加网中调幅网点的形状有规则发生改变,生成嵌入防伪信息的半色调混合加网图像信号,通过循环查表调制方式,使相邻16位调幅网点通过形状的改变生成一组16位二进制数据,使其携带防伪信息,并使该防伪信息嵌入在整个页面网点中,实现防伪印刷。In flow chart 1 of loading anti-counterfeiting information, the original anti-counterfeiting information (image, text) is encrypted to generate an 8-bit binary anti-counterfeiting information table, and the 8-bit binary information in the binary anti-counterfeiting information table is expanded to a 16-bit group Binary information, generate a 16-bit binary anti-counterfeiting information table whose upper 8 bits are all 0, the i-th group of 16-bit binary information in the 16-bit binary anti-counterfeiting information table is recorded as N i , i is a positive integer greater than 0, The eight-bit binary encryption parameters are denoted as C, C 1 , C 2 , C 3 , C 4 , C 5 , C 6 , C 7 , C 8 , C 9 , and the encryption parameters C, C 1 , C 2 , C 3 , C 4. C 5 , C 6 , C 7 , C 8 , and C 9 are integers from 0 to 255. The two-digit binary operator control variable is denoted as k, and the operator control variable k is an integer of 0≦k≦3. symbol Using +, -, ×, ÷ four operators, operator control variable k = 0 They are respectively defined as +, ×, +, ÷, -, ×, -, ÷, +, -, when the operator control variable k=1 They are respectively defined as -, ×, +, ÷, +, ×, -, ÷, +, -, when the operator control variable k=2 They are respectively defined as -, ÷, +, ÷, -, ×, +, ×, +, -, when the operator control variable k=3 Respectively defined as +, -, +, ÷, -, ×, -, ÷, +, ×, set encryption parameters C, C 1 , C 2 , C 3 , C 4 , C 5 , C 6 , C 7 , The initial values of C 8 and C 9 , because encryption parameters C, C 1 , C 2 , C 3 , C 4 , C 5 , C 6 , C 7 , C 8 , and C 9 are integers from 0 to 255, in 256 Among the numbers, ten different numbers of C, C 1 , C 2 , C 3 , C 4 , C 5 , C 6 , C 7 , C 8 , and C 9 are randomly selected, a total of 256! /(256-10)! A kind of method of taking, the initial value k=0 of operator control variable k is set, the position control variable i=1 of 16 binary information N i in setting 16 groups of binary anti-counterfeiting information table, from 16 groups of binary anti-counterfeiting information The first group of 16-bit binary information in the table starts with N 1 , and each group of 16-bit binary information in the 16-bit group of binary anti-counterfeiting information table is Encryption operation, and each set of 16-bit binary information Perform i+1 and k+1 operations at the same time as the encryption operation, by performing a 16-bit binary information on each group of 16-bit binary anti-counterfeiting information table Encryption operation to generate a 16-bit binary encrypted anti-counterfeiting information table. The shape of the AM dots is set to two types: □ and ◇, where □ is defined as the number 0 and ◇ is defined as the number 1. The generated 16-bit binary encrypted anti-counterfeiting information is passed through Channel coding, which generates a binary modulated signal with error detection and correction functions. Channel coding can adopt various forms such as cyclic coding, convolutional coding or Turbo coding. The original continuous tone image signal is rasterized (RIP) and mixed and screened to output a halftone mixed screen image signal, including amplitude modulation dot and frequency modulation dot image signals. Utilize the generated binary modulation signal and use the circular look-up modulation method to modulate the shape of the AM dots in the halftone mixed screen image signal, so that the shape of the AM dots in the mixed screen can be changed regularly, and the halftone mixed screen embedded with anti-counterfeiting information can be generated. The network image signal, through the circular look-up table modulation method, makes the adjacent 16-bit AM network dots generate a set of 16-bit binary data through shape changes, so that it carries anti-counterfeiting information, and embeds the anti-counterfeiting information in the entire page dots to achieve anti-counterfeiting print.
在提取防伪信息流程图2中,在提取防伪信息时,首先采集网点图像信号,经过对调幅网点的形状的模糊识别,分辨调幅网点的形状,提取调幅网点的边沿信号和形状信息,解调调幅网点的形状信息,输出16位一组的二进制调制信号。对解调输出的16位一组的二进制调制信号进行信道解码,信道解码后生成16位一组的二进制解密防伪信息表,将二进制解密防伪信息表中的16位二进制信息记作Hi,通过加密过程可知
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210402615.8A CN102945429B (en) | 2012-10-22 | 2012-10-22 | Multi-parameter three-dimensional encrypted binary antiforging printing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210402615.8A CN102945429B (en) | 2012-10-22 | 2012-10-22 | Multi-parameter three-dimensional encrypted binary antiforging printing method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102945429A CN102945429A (en) | 2013-02-27 |
CN102945429B true CN102945429B (en) | 2016-03-16 |
Family
ID=47728368
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210402615.8A Expired - Fee Related CN102945429B (en) | 2012-10-22 | 2012-10-22 | Multi-parameter three-dimensional encrypted binary antiforging printing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102945429B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102184428A (en) * | 2011-04-14 | 2011-09-14 | 北京印刷学院 | Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal |
CN102194137A (en) * | 2011-04-25 | 2011-09-21 | 北京印刷学院 | Multi-dimensional encryption anti-counterfeiting printing technology based on shape of amplitude modified screen |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2350806A4 (en) * | 2008-10-20 | 2012-08-08 | Hewlett Packard Development Co | Method for enhancing security printing |
-
2012
- 2012-10-22 CN CN201210402615.8A patent/CN102945429B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102184428A (en) * | 2011-04-14 | 2011-09-14 | 北京印刷学院 | Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal |
CN102194137A (en) * | 2011-04-25 | 2011-09-21 | 北京印刷学院 | Multi-dimensional encryption anti-counterfeiting printing technology based on shape of amplitude modified screen |
Non-Patent Citations (2)
Title |
---|
一种口令加密算法设计;曾云兵;《网络安全技术与应用》;20080831;第92-93页 * |
基于十进制的加密技术研究;刘连浩等;《小型微型计算机系统》;20060731;第27卷(第7期);第1229-1231页 * |
Also Published As
Publication number | Publication date |
---|---|
CN102945429A (en) | 2013-02-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102945467B (en) | One-parameter univariate incremental circulation encrypted binary antiforging printing method | |
CN102945490B (en) | Single-parameter and double-variable-sequence encryption type binary anti-counterfeit printing method | |
CN102945418B (en) | The synchronous in the same way increment encryption scale-of-two antiforging printing method of Double-variant multi-parameter | |
CN102945429B (en) | Multi-parameter three-dimensional encrypted binary antiforging printing method | |
CN102945409B (en) | The double encrypted binary antiforging printing method of Multi-parameter displacement | |
CN102945488B (en) | The synchronous in the same way increment encryption scale-of-two antiforging printing method of multiparameter | |
CN102945436B (en) | Multiparameter relative synchronization increment encryption scale-of-two antiforging printing method | |
CN102945464B (en) | Single-parameter, gradient, same-direction, synchronous and increasing encryption type binary anti-counterfeit printing method | |
CN102945445B (en) | Multiparameter single order encrypted binary antiforging printing method | |
CN102945451B (en) | One-parameter circulates double encrypted binary antiforging printing method | |
CN102945479B (en) | Multi-parameter bivariate left shift displacement stride progressive encrypted binary anti-counterfeiting printing method | |
CN102955963B (en) | Multiparameter bivariate synchronously goes forward one by one encrypted binary antiforging printing method in opposite directions | |
CN102945426B (en) | The double encrypted binary antiforging printing method of one-parameter | |
CN102945435B (en) | Multi-parameter transposition increment encryption scale-of-two antiforging printing method | |
CN102945441B (en) | The displacement that moves to left of one-parameter alternation strides the encrypted binary antiforging printing method that goes forward one by one | |
CN102945393B (en) | Multi-parameter bivariate homodromous synchronous progressive encrypted binary anti-counterfeiting printing method | |
CN102945493B (en) | The double encrypted binary antiforging printing method that goes forward one by one of multiparameter | |
CN102945423B (en) | Single-parameter displacement variable-sequence encrypted binary anti-counterfeiting printing method | |
CN102945462B (en) | Three-dimensional change sequence one-parameter circulation encrypted binary antiforging printing method | |
CN102945460B (en) | Multi-parameter three-dimensional increment encryption scale-of-two antiforging printing method | |
CN102945454B (en) | Single argument three-dimensional is gone forward one by one encrypted binary antiforging printing method | |
CN102955961B (en) | Single-parameter gradual phase-to-synchronous progressive encrypted binary anti-counterfeiting printing method | |
CN102945437B (en) | Parameter-displacement, double-variable and two-dimensional encryption type binary anti-counterfeit printing method | |
CN102945401B (en) | Multi-parameter stride right shift incremental encrypted binary anti-counterfeiting printing method | |
CN102945459B (en) | Three-dimensional increases progressively and becomes sequence one-parameter encrypted binary antiforging printing method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160316 Termination date: 20161022 |
|
CF01 | Termination of patent right due to non-payment of annual fee |