CN102945469B - Double-variant two-dimensional encryption binary anti-counterfeiting printing method - Google Patents
Double-variant two-dimensional encryption binary anti-counterfeiting printing method Download PDFInfo
- Publication number
- CN102945469B CN102945469B CN201210402966.9A CN201210402966A CN102945469B CN 102945469 B CN102945469 B CN 102945469B CN 201210402966 A CN201210402966 A CN 201210402966A CN 102945469 B CN102945469 B CN 102945469B
- Authority
- CN
- China
- Prior art keywords
- binary
- counterfeiting information
- counterfeiting
- group
- control variable
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Editing Of Facsimile Originals (AREA)
Abstract
Description
所属技术领域: Technical field:
本发明涉及一种防伪印刷技术,特别是一种双变量二维加密二进制防伪印刷技术,该防伪印刷技术可以用于各种印刷制品的防伪。 The invention relates to an anti-counterfeiting printing technology, in particular to a double-variable two-dimensional encrypted binary anti-counterfeiting printing technology, which can be used for anti-counterfeiting of various printed products.
背景技术: Background technique:
现有的较为普通的防伪方法有以下几种:第一种是激光防伪标志,用激光隐性油墨萤光油墨印刷技术将产品的标徽或特殊的识别图案印制成产品的防伪标贴,且同一类产品使用同一种标贴,因防伪标贴较容易伪造,而伪造的防伪标贴又被用在假冒产品上,造成产品的真假混淆,因此难于有效防伪。第二种是密码防伪标贴,其所采用的方法是每件产品编一组数码,每件产品的编码都不相同,将此数码印制在标贴上并遮盖起来,同时将此数码存入可供消费者查询的计算机数据库中,消费者购买产品时,将标识上的数码通过电话或入网计算机输入计算机数据库进行比较识别,相同即为真,不同即为假,方法简单,识别容易,不易伪造,但实际使用中,因编码数据是计算机统一生成后印制标贴的。代表产品真假编码数据可能被非法拷贝造假,同时,编码也可回收未查询的产品上的编码造标而贴在假产品上,防伪效果难于保证。第三种是纹理防伪,以其标贴上的纹理特征防伪,虽然较难伪造,但由于只设标贴的序号码,且是明码,每枚标贴可反复查询,造假者可通过仓库保管员或售货员将标贴上的序号及查询时所反映的必要纹理特征即方格中的有无现象抄袭后按此特征批量伪造。综上所述,现有的防伪方法都存在一定的缺点,因而不能从根本防止假冒产品。 The existing relatively common anti-counterfeiting methods are as follows: The first is laser anti-counterfeiting marks, which use laser recessive ink fluorescent ink printing technology to print product logos or special identification patterns into product anti-counterfeiting labels. And the same type of product uses the same label, because the anti-counterfeiting label is easier to forge, and the fake anti-counterfeiting label is used on the counterfeit product, causing the product to be confused, so it is difficult to effectively prevent counterfeiting. The second is the password anti-counterfeiting label. The method adopted is to compile a set of numbers for each product, and the codes of each product are different. The numbers are printed on the labels and covered, and the numbers are stored Into the computer database that can be inquired by consumers. When consumers purchase products, they input the numbers on the logo into the computer database through telephone or networked computer for comparison and identification. The same is true, and the difference is false. The method is simple and easy to identify. It is not easy to forge, but in actual use, because the encoded data is uniformly generated by the computer, the label is printed. The code data representing the authenticity of the product may be illegally copied and falsified. At the same time, the code can also be recycled from the code on the product that has not been inquired to make a label and affixed to the fake product. The anti-counterfeiting effect is difficult to guarantee. The third is texture anti-counterfeiting, which uses the texture features on the label to prevent counterfeiting. Although it is difficult to forge, since only the serial number of the label is set, and it is a clear code, each label can be queried repeatedly, and counterfeiters can store it in the warehouse. The clerk or salesperson plagiarizes the serial number on the label and the necessary texture characteristics reflected when inquiring, that is, the presence or absence of phenomena in the grid, and then forges them in batches according to this characteristic. To sum up, the existing anti-counterfeiting methods have certain shortcomings, and thus cannot fundamentally prevent counterfeit products.
发明内容: Invention content:
为了克服现有的各种印刷制品防伪印刷技术存在的缺点,本发明针对现有印刷制品防伪印刷技术存在的不足对现有技术进行了改进,提出了一种二进制加密信号调制印刷品调幅网点的形状的加密防伪印刷技术,该防伪印刷技术通过调幅网点的形状的改变将防伪信息嵌入在整个页面中,可在印刷品识别时从任意一个碎片里识别防伪信息,因此具有很强抗碎性,可从 根本上杜绝采用照相、扫描等非法复制行为。 In order to overcome the shortcomings of the existing anti-counterfeiting printing technology for various printed products, the present invention improves the existing technology in view of the shortcomings of the existing anti-counterfeiting printing technology for printed products, and proposes a binary encryption signal to modulate the shape of the AM dots of printed products Encrypted anti-counterfeiting printing technology, this anti-counterfeiting printing technology embeds anti-counterfeiting information in the entire page by changing the shape of AM dots, and can identify anti-counterfeiting information from any fragment when identifying printed matter, so it is highly resistant to shattering and can be read from Fundamentally put an end to the use of photography, scanning and other illegal copying.
本发明解决其技术问题所采用的技术方案是:对柔性版印刷混合加网中的调幅网点和调频网点分开进行处理,利用图像信息、文字信息、商标信息等防伪信息生成8位一组的二进制防伪信息表,为防止加密过程中产生信息溢出,将二进制防伪信息表中的8位一组二进制信息扩展为16位一组二进制信息,生成高8位全为0的16位一组二进制防伪信息表,将16位一组二进制防伪信息表中的第i组16位二进制信息记作Ni,i为大于0的正整数,二进制算符控制变量记作k,算符控制变量k为0≦k≦3的整数,八位控制变量记作j,控制变量j为0≦j≦256的整数,算符@1 k、@2 k、@3 k、@4 k、@5 k、@6 k采用+、-、×、÷四种算符,算符控制变量k=0时@1 k、@2 k、@3 k、@4 k、@5 k、@6 k分别定义为+、×、-、÷、+、÷,算符控制变量k=1时@1 k、@2 k、@3 k、@4 k、@5 k、@6 k分别定义为+、÷、-、×、+、÷,算符控制变量k=2时@1 k、@2 k、@3 k、@4 k、@5 k、@6 k分别定义为-、÷、+、×、+、÷,算符控制变量k=3时@1 k、@2 k、@3 k、@4 k、@5 k、@6 k分别定义为+、×、+、÷、-、÷,设定算符控制变量j和k的初值j=0和k=0,设定16位一组二进制防伪信息表中16位二进制信息Ni的位置控制变量i=1,从16位一组二进制防伪信息表中第一个16位二进制信息N1开始,对16位一组二进制防伪信息表中的每一个16位二进制信息进行[(Ni 1 k(j+k+1)2 k(j+k+2))+(Ni 3 k(j+k+3)4 k(j+k+4))+(Ni 5 k(j+k+5)6 k(j+k+6)]加密运算,并且在对每一个16位二进制信息进行[(Ni 1 k(j+k+1)2 k(j+k+2))+(Ni 3 k(j+k+3)4 k(j+k+4))+(Ni 5 k(j+k+5)6 k(j+k+6)]加密运算的同时进行i+1、j+1和k+1运算,使下一运算指向[(Ni 1 k(j+k+1)2 k(j+k+2))+(Ni 3 k(j+k+3)4 k(j+k+4))+(Ni 5 k(j+k+5)6 k(j+k+6)]其中i、j和k都增加了1,通过对16位一组二进制防伪信息表中的每一个16位二进制信息进行[(Ni 1 k(j+k+1)2 k(j+k+2))+(Ni 3 k(j+k+3)4 k(j+k+4))+(Ni 5 k(j+k+5)6 k(j+k+6)]加密运算,生成16位一组的二进制加密防伪信息表,调幅网点的形状设置为两种:□和其中□定义为数字0、 定义为数字1,利用生成的16位一组的二进制加密防伪信息通过循环查表法调制调幅网点,使其有规律的按照上述两种调幅网点的形状改变混合加网中调幅网点的形状,使混合加 网中调幅网点的形状有规则的发生改变,调制后相邻16个调幅网点构成一组16位二进制信息,使其携带防伪信息,并使该防伪信息嵌入在整个页面网点中,能更有效地对抗基于照相机、扫描仪、电子文档等非法复制行为。通过在印刷品中非显见地嵌入可提取的防伪信息,能够为真品提供有效证明,同时具有较强的抗伪造能力,且不增加额外的防伪成本。 The technical solution adopted by the present invention to solve the technical problem is: separately process the amplitude modulation dots and frequency modulation dots in the mixed screen of flexographic printing, and use image information, text information, trademark information and other anti-counterfeiting information to generate 8-bit binary Anti-counterfeiting information table, in order to prevent information overflow during the encryption process, the 8-bit binary information in the binary anti-counterfeiting information table is expanded to 16-bit binary information, and a 16-bit binary anti-counterfeiting information with all 0s in the upper 8 bits is generated Table, the i-th group of 16-bit binary information in the 16-bit binary anti-counterfeiting information table is recorded as N i , i is a positive integer greater than 0, the binary operator control variable is recorded as k, and the operator control variable k is 0≦ An integer of k≦3, an eight-bit control variable is recorded as j, and the control variable j is an integer of 0≦j≦256, and the operators are @ 1 k , @ 2 k , @ 3 k , @ 4 k , @ 5 k , @ 6 k adopts four operators +, -, ×, ÷, when the operator control variable k=0, @ 1 k , @ 2 k , @ 3 k , @ 4 k , @ 5 k , @ 6 k are respectively defined as +, ×, -, ÷, +, ÷, when the operator control variable k = 1, @ 1 k , @ 2 k , @ 3 k , @ 4 k , @ 5 k , @ 6 k are respectively defined as +, ÷, -, ×, +, ÷, when the operator control variable k=2, @ 1 k , @ 2 k , @ 3 k , @ 4 k , @ 5 k , @ 6 k are respectively defined as -, ÷, +, ×, +, ÷, when the operator control variable k=3, @ 1 k , @ 2 k , @ 3 k , @ 4 k , @ 5 k , and @ 6 k are respectively defined as +, ×, +, ÷, -, ÷, set The initial value j=0 and k=0 of operator control variable j and k, the position control variable i=1 of 16 binary information N i in setting 16 groups of binary anti-counterfeiting information tables, from 16 groups of binary anti-counterfeiting Starting with the first 16-bit binary information N 1 in the information table, perform [(N i 1 k (j+k+1) 2 k (j+ k+2))+(N i 3 k (j+k+3) 4 k (j+k+4))+(N i 5 k (j+k+5) 6 k (j+k+6) ] encryption operation, and [(N i 1 k (j+k+1) 2 k (j+k+2))+(N i 3 k (j+k+3) 4 k (j+k+4))+(N i 5 k (j+k+5) 6 k (j+k+6)] Encryption operations are performed simultaneously with i+1, j+1 and k+1 operations , so that the next operation points to [(N i 1 k (j+k+1) 2 k (j+k+2))+(N i 3 k (j+k+3) 4 k (j+k+4 ))+(N i 5 k (j+k+5) 6 k (j+k+6)] wherein i, j and k are all increased by 1, by performing [ (N i 1 k (j+k+1) 2 k (j+k+2))+(N i 3 k (j+k+3) 4 k (j+k+4))+(N i 5 k (j+k+5) 6 k (j+k+6)] encryption operation to generate a 16-bit binary encrypted anti-counterfeiting information table, the shape of the AM dots is set to two types: □ and where □ is defined as the number 0, Defined as the number 1, use the generated 16-bit binary encrypted anti-counterfeiting information to modulate the AM dots through the circular look-up table method, so that it can change the shape of the AM dots in the hybrid screen regularly according to the shape of the above two AM dots, so that The shape of the AM dots in the hybrid screen changes regularly. After modulation, 16 adjacent AM dots form a set of 16-bit binary information, which makes it carry anti-counterfeiting information and embeds the anti-counterfeiting information in the entire page dots, which can be more Effectively fight against illegal copying based on cameras, scanners, electronic documents, etc. By non-obviously embedding extractable anti-counterfeiting information in the printed matter, effective proof can be provided for the genuine product, and at the same time, it has strong anti-counterfeiting ability without adding additional anti-counterfeiting costs.
为解决上述的技术问题,首先对防伪信息进行数字化,生成8位一组的二进制防伪信息表,防伪信息可以是图像信息、文字信息、商标信息等,将二进制防伪信息表中的8位一组二进制信息扩展为16位一组二进制信息,生成高8位全为0的16位一组二进制防伪信息表,对16位一组二进制防伪信息表中的每一个16位二进制信息进行[(Ni 1 k(j+k+1)2 k(j+k+2))+(Ni 3 k(j+k+3)4 k(j+k+4))+(Ni 5 k(j+k+5)6 k(j+k+6)]加密运算,生成16位一组的二进制加密防伪信息表,利用生成的16位一组二进制加密防伪信息表中的16位二进制信息经过信道编码,生成具有检错和纠错功能的16位一组的二进制调制信号。信道编码可以采用循环编码、卷积编码或Turbo编码等多种形式,将原始连续调图像信号经过栅格化处理(RIP)和混合加网输出半色调混合加网图像信号,其中包括调幅网点和调频网点图像信号,利用生成的16位一组二进制调制信号采用循环查表法调制方式调制混合加网图像信号中调幅网点的形状,使调幅网点的形状按照□和有规律的发生改变,使混合加网图像信号中相邻16个调幅网点通过形状的改变携带16位二进制防伪信息,从而生成在整个页面网点中嵌入防伪信息的混合加网图像信号,实现防伪印刷。 In order to solve the above-mentioned technical problems, the anti-counterfeiting information is digitized at first, and a binary anti-counterfeiting information table of 8 bits is generated. The anti-counterfeiting information can be image information, text information, trademark information, etc. The binary information is expanded into a 16-bit group of binary information, and a 16-bit group of binary anti-counterfeiting information table whose upper 8 bits are all 0 is generated, and [(N i 1 k (j+k+1) 2 k (j+k+2))+(N i 3 k (j+k+3) 4 k (j+k+4))+(N i 5 k (j +k+5) 6 k (j+k+6)] encryption operation to generate a 16-bit binary encrypted anti-counterfeiting information table, and use the 16-bit binary information in the generated 16-bit binary encrypted anti-counterfeiting information table to pass through the channel Coding, generating a group of 16 binary modulation signals with error detection and error correction functions. Channel coding can adopt various forms such as cyclic coding, convolution coding or Turbo coding, and the original continuous tone image signal is processed through rasterization ( RIP) and mixed screen output halftone mixed screen image signal, including amplitude modulation dot and frequency modulation dot image signal, using the generated 16-bit binary modulation signal to modulate the amplitude modulation in the mixed screen image signal by using the circular look-up table modulation method The shape of the dots, so that the shape of the AM dots follows □ and Changes occur regularly, so that the adjacent 16 AM dots in the mixed screen image signal carry 16-bit binary anti-counterfeiting information through shape changes, thereby generating a mixed screen image signal with anti-counterfeiting information embedded in the entire page dots, realizing anti-counterfeiting printing .
在提取防伪信息时,首先采集网点图像信号,经过对调幅网点的形状的模糊识别,分辨调幅网点的形状,提取调幅网点的边沿信号和形状信息,解调调幅网点的形状信息,输出16位一组的二进制调制信号。对解调输出的16位一组的二进制调制信号进行信道解码,信道解码后生成16位一组的二进制解密防伪信息表,将二进制解密防伪信息表中的16位二进制信息记作Hi,通过加密过程可知Hi=[(Ni 1 k(j+k+1)2 k(j+k+2))+(Ni 3 k(j+k+3)4 k(j+k+4))+(Ni 5 k(j+k+5)6 k(j+k+6)],二进制解密防伪信息表中16位二进制信息Hi的位置控制变量初值设 定为i=1,从二进制解密防伪信息表中第一位H1开始,对二进制解密防伪信息表中的每一个16位二进制信息进行Hi=[(Ni 1 k(j+k+1)2 k(j+k+2))+(Ni 3 k(j+k+3)4 k(j+k+4))+(Ni 5 k(j+k+5)6 k(j+k+6)]解密运算,解出二进制防伪信息Ni,生成高8位全为0的16位一组二进制防伪信息表,去掉高8位,生成8位一组的二进制防伪信息表,恢复防伪信号并输出防伪信息。 When extracting anti-counterfeiting information, first collect the network dot image signal, through the fuzzy recognition of the shape of the AM network dot, distinguish the shape of the AM network dot, extract the edge signal and shape information of the AM network dot, demodulate the shape information of the AM network dot, and output 16-bit one Set of binary modulated signals. Perform channel decoding on the 16-bit binary modulated signal output by demodulation, generate a 16-bit binary decryption anti-counterfeiting information table after channel decoding, record the 16-bit binary information in the binary decryption anti-counterfeiting information table as H i , pass The encryption process shows that H i = [(N i 1 k (j+k+1) 2 k (j+k+2))+(N i 3 k (j+k+3) 4 k (j+k+4 ))+(N i 5 k (j+k+5) 6 k (j+k+6)], the initial value of the position control variable of 16 binary information Hi in the binary decryption anti-counterfeiting information table is set as i=1, Starting from the first H1 in the binary decryption anti-counterfeiting information table, H i =[(N i 1 k (j+k+1) 2 k (j+ k+2))+(N i 3 k (j+k+3) 4 k (j+k+4))+(N i 5 k (j+k+5) 6 k (j+k+6) ] decryption operation, solve the binary anti-counterfeiting information N i , generate a 16-bit binary anti-counterfeiting information table whose upper 8 bits are all 0, remove the upper 8 bits, generate an 8-bit binary anti-counterfeiting information table, restore the anti-counterfeiting signal and output Anti-counterfeiting information.
附图说明 Description of drawings
下面结合附图对本发明进一步说明。 The present invention will be further described below in conjunction with the accompanying drawings.
图1加载防伪信息流程图。 Figure 1 is a flow chart of loading anti-counterfeiting information.
图2提取防伪信息流程图。 Figure 2 is a flow chart of extracting anti-counterfeiting information.
具体实施方式 Detailed ways
在加载防伪信息流程图1中,原始防伪信息(图像、文字、商标)经数字化处理,生成8位一组的二进制防伪信息表,将二进制防伪信息表中的8位一组二进制信息扩展为16位一组二进制信息,生成高8位全为0的16位一组二进制防伪信息表,16位一组二进制防伪信息表中的第i组16位二进制信息记作Ni,i为大于0的正整数,二进制算符控制变量记作k,算符控制变量k为0≦k≦3的整数,八位控制变量记作j,控制变量j为0≦j≦256的整数,算符@1 k、@2 k、@3 k、@4 k、@5 k、@6 k采用+、-、×、÷四种算符,算符控制变量k=0时@1 k、@2 k、@3 k、@4 k、@5 k、@6 k分别定义为+、×、-、÷、+、÷,算符控制变量k=1时@1 k、@2 k、@3 k、@4 k、@5 k、@6 k分别定义为+、÷、-、×、+、÷,算符控制变量k=2时@1 k、@2 k、@3 k、@4 k、@5 k、@6 k分别定义为-、÷、+、×、+、÷,算符控制变量k=3时@1 k、@2 k、@3 k、@4 k、@5 k、@6 k分别定义为+、×、+、÷、-、÷,设定算符控制变量j和k的初值j=0和k=0,设定16位一组二进制防伪信息表中16位二进制信息Ni的位置控制变量i=1,从16位一组二进制防伪信息表中第一个16位二进制信息N1开始,对16位一组二进制防伪信息表中的每一个16位二进制信息进行[(Ni 1 k(j+k+1)2 k(j+k+2))+(Ni 3 k(j+k+3)4 k(j+k+4))+(Ni 5 k(j+k+5)6 k(j+k+6)]加密运算,并且在对每一个16位二进制信息进行[(Ni 1 k(j+k+1)2 k(j+k+2))+(Ni 3 k(j+k+3)4 k(j+k+4))+(Ni 5 k(j+k+5)6 k(j+k+6)]加密运算的同时进行i+1、j+1和k+1运算,使下一 运算指向[(Ni 1 k(j+k+1)2 k(j+k+2))+(Ni 3 k(j+k+3)4 k(j+k+4))+(Ni 5 k(j+k+5)6 k(j+k+6)]其中i、j和k都增加了1,通过对16位一组二进制防伪信息表中的每一个16位二进制信息进行[(Ni 1 k(j+k+1)2 k(j+k+2))+(Ni 3 k(j+k+3)4 k(j+k+4))+(Ni 5 k(j+k+5)6 k(j+k+6)]加密运算,生成16位一组的二进制加密防伪信息表,调幅网点的形状设置为两种:□和其中□定义为数字0、定义为数字1,生成的16位二进制加密防伪信息经过信道编码,生成具有检错和纠错功能的二进制调制信号。信道编码可以采用循环编码、卷积编码或Turbo编码等多种形式。将原始连续调图像信号经过栅格化处理(RIP)和混合加网输出半色调混合加网图像信号,其中包括调幅网点和调频网点图像信号。利用生成的二进制调制信号采用循环查表调制方式,调制混合加网图像信号中调幅网点的形状,使混合加网中调幅网点的形状有规则发生改变,生成嵌入防伪信息的混合加网图像信号,通过循环查表调制方式,使相邻16位调幅网点通过形状的改变生成一个16位二进制数据,使其携带防伪信息,并使该防伪信息嵌入在整个页面网点中,实现防伪印刷。 In flow chart 1 of loading anti-counterfeiting information, the original anti-counterfeiting information (image, text, trademark) is digitized to generate an 8-bit binary anti-counterfeiting information table, and the 8-bit binary information in the binary anti-counterfeiting information table is expanded to 16 One set of binary information, generate a 16-bit binary anti-counterfeiting information table whose upper 8 bits are all 0, the i-th group of 16-bit binary information in the 16-bit binary anti-counterfeiting information table is recorded as N i , i is greater than 0 Positive integer, binary operator control variable is denoted as k, operator control variable k is an integer of 0≦k≦3, eight-bit control variable is denoted as j, control variable j is an integer of 0≦j≦256, operator@ 1 k , @ 2 k , @ 3 k , @ 4 k , @ 5 k , @ 6 k adopt +, -, ×, ÷ four operators, when the operator control variable k=0, @ 1 k , @ 2 k , @ 3 k , @ 4 k , @ 5 k , @ 6 k are respectively defined as +, ×, -, ÷, +, ÷, when the operator control variable k=1, @ 1 k , @ 2 k , @ 3 k , @ 4 k , @ 5 k , @ 6 k are respectively defined as +, ÷, -, ×, +, ÷, when the operator control variable k=2, @ 1 k , @ 2 k , @ 3 k , @ 4 k , @ 5 k , @ 6 k are respectively defined as -, ÷, +, ×, +, ÷, when the operator control variable k=3, @ 1 k , @ 2 k , @ 3 k , @ 4 k , @ 5 k , @ 6 k are defined as +, ×, +, ÷, -, ÷ respectively, set the initial values j=0 and k=0 of the operator control variables j and k, and set 16 in the 16-bit binary anti-counterfeiting information table The position control variable i=1 of bit binary information N i starts from the first 16-bit binary information N 1 in a group of 16 binary anti-counterfeiting information tables, to each 16-bit binary information in a group of 16 binary anti-counterfeiting information tables Information proceeds [(N i 1 k (j+k+1) 2 k (j+k+2))+(N i 3 k (j+k+3) 4 k (j+k+4))+( N i 5 k (j+k+5) 6 k (j+k+6)] encryption operation, and [(N i 1 k (j+k+1) 2 k ( j+k+2))+(N i 3 k (j+k+3) 4 k (j+k+4))+(N i 5 k (j+k+5) 6 k (j+k+ 6)] Perform i+1, j+1 and k+1 operations at the same time as the encryption operation, so that the next operation points to [(N i 1 k (j+k+1) 2 k (j+k+2))+ (N i 3 k (j+k+3) 4 k (j+k+4))+(N i 5 k (j+k+5) 6 k (j+k+6)] where i, j and k has been increased by 1, by a 16-bit binary [(N i 1 k (j+k+1) 2 k (j+k+2))+(N i 3 k (j+k+3) 4 k (j+k+4))+(N i 5 k (j+k+5) 6 k (j+k+6)] encryption operation to generate a 16-bit binary encrypted anti-counterfeiting information table, the The shape is set to two types: □ and where □ is defined as the number 0, Defined as the number 1, the generated 16-bit binary encrypted anti-counterfeiting information undergoes channel coding to generate a binary modulated signal with error detection and error correction functions. Channel coding can adopt various forms such as cyclic coding, convolutional coding or Turbo coding. The original continuous tone image signal is rasterized (RIP) and mixed and screened to output a halftone mixed screen image signal, including amplitude modulation dot and frequency modulation dot image signals. Using the generated binary modulation signal, the shape of the AM dots in the hybrid screened image signal is modulated by the circular look-up table modulation method, so that the shape of the AM dots in the hybrid screened is changed regularly, and a hybrid screened image signal embedded with anti-counterfeiting information is generated. Through the circular look-up table modulation method, the adjacent 16-bit AM dots can generate a 16-bit binary data through shape changes, so that they can carry anti-counterfeiting information, and the anti-counterfeiting information can be embedded in the entire page dots to realize anti-counterfeiting printing.
在提取防伪信息流程图2中,在提取防伪信息时,首先采集网点图像信号,经过对调幅网点的形状的模糊识别,分辨调幅网点的形状,提取调幅网点的边沿信号和形状信息,解调调幅网点的形状信息,输出16位一组的二进制调制信号。对解调输出的16位一组的二进制调制信号进行信道解码,信道解码后生成16位一组的二进制解密防伪信息表,将二进制解密防伪信息表中的16位二进制信息记作Hi,通过加密过程可知Hi=[(Ni 1 k(j+k+1)2 k(j+k+2))+(Ni 3 k(j+k+3)4 k(j+k+4))+(Ni 5 k(j+k+5)6 k(j+k+6)],二进制解密防伪信息表中16位二进制信息Hi的位置控制变量初值设定为i=1,从二进制解密防伪信息表中第一位H1开始,对二进制解密防伪信息表中的每一个16位二进制信息进行Hi=[(Ni 1 k(j+k+1)2 k(j+k+2))+(Ni 3 k(j+k+3)4 k(j+k+4))+(Ni 5 k(j+k+5)6 k(j+k+6)]解密运算,解出二进制防伪信息Ni,生成高8位全为0的16位一组二进制防伪信息表,去掉高8位,生成8位一组的二进制防伪信息表,恢复防伪信号并输出防伪信息。 In the flow chart 2 of extracting anti-counterfeiting information, when extracting anti-counterfeiting information, first collect the dot image signal, through the fuzzy recognition of the shape of the AM dot, distinguish the shape of the AM dot, extract the edge signal and shape information of the AM dot, and demodulate the AM dot The shape information of the screen dots, output a 16-bit binary modulation signal. Perform channel decoding on the 16-bit binary modulated signal output by demodulation, generate a 16-bit binary decryption anti-counterfeiting information table after channel decoding, record the 16-bit binary information in the binary decryption anti-counterfeiting information table as H i , pass The encryption process shows that H i = [(N i 1 k (j+k+1) 2 k (j+k+2))+(N i 3 k (j+k+3) 4 k (j+k+4 ))+(N i 5 k (j+k+5) 6 k (j+k+6)], the initial value of the position control variable of the 16-bit binary information H i in the binary decryption anti-counterfeiting information table is set as i=1 , starting from the first H 1 in the binary decryption anti-counterfeiting information table, H i =[(N i 1 k (j+k+1) 2 k (j +k+2))+(N i 3 k (j+k+3) 4 k (j+k+4))+(N i 5 k (j+k+5) 6 k (j+k+6 )] decryption operation, solve the binary anti-counterfeiting information N i , generate a 16-bit binary anti-counterfeiting information table whose upper 8 bits are all 0, remove the upper 8 bits, generate an 8-bit binary anti-counterfeiting information table, restore the anti-counterfeiting signal and Output anti-counterfeiting information.
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210402966.9A CN102945469B (en) | 2012-10-22 | 2012-10-22 | Double-variant two-dimensional encryption binary anti-counterfeiting printing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210402966.9A CN102945469B (en) | 2012-10-22 | 2012-10-22 | Double-variant two-dimensional encryption binary anti-counterfeiting printing method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102945469A CN102945469A (en) | 2013-02-27 |
CN102945469B true CN102945469B (en) | 2015-05-20 |
Family
ID=47728408
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210402966.9A Expired - Fee Related CN102945469B (en) | 2012-10-22 | 2012-10-22 | Double-variant two-dimensional encryption binary anti-counterfeiting printing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102945469B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102184428A (en) * | 2011-04-14 | 2011-09-14 | 北京印刷学院 | Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal |
CN102402696A (en) * | 2011-04-25 | 2012-04-04 | 北京印刷学院 | Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2350806A4 (en) * | 2008-10-20 | 2012-08-08 | Hewlett Packard Development Co | Method for enhancing security printing |
-
2012
- 2012-10-22 CN CN201210402966.9A patent/CN102945469B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102184428A (en) * | 2011-04-14 | 2011-09-14 | 北京印刷学院 | Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal |
CN102402696A (en) * | 2011-04-25 | 2012-04-04 | 北京印刷学院 | Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals |
Also Published As
Publication number | Publication date |
---|---|
CN102945469A (en) | 2013-02-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102945467B (en) | One-parameter univariate incremental circulation encrypted binary antiforging printing method | |
CN102945425B (en) | Multiparameter scale-of-two enciphering anti-fake printing method | |
CN102945469B (en) | Double-variant two-dimensional encryption binary anti-counterfeiting printing method | |
CN102945393B (en) | Multi-parameter bivariate homodromous synchronous progressive encrypted binary anti-counterfeiting printing method | |
CN102945403B (en) | Binary anti-counterfeit printing method based on transposition order-change | |
CN102945426B (en) | The double encrypted binary antiforging printing method of one-parameter | |
CN102945388B (en) | Dynamic variable-parameter double encrypted binary anti-counterfeiting printing method | |
CN102945423B (en) | Single-parameter displacement variable-sequence encrypted binary anti-counterfeiting printing method | |
CN102955961B (en) | Single-parameter gradual phase-to-synchronous progressive encrypted binary anti-counterfeiting printing method | |
CN102945421B (en) | Binary anti-fake printing method by reverse synchronous-progressing encryption | |
CN102945477B (en) | Binary anti-fake printing method by two-dimensional encryption | |
CN102945445B (en) | Multiparameter single order encrypted binary antiforging printing method | |
CN102945449B (en) | Multi-parameter data increment encryption scale-of-two antiforging printing method | |
CN102945452B (en) | Bivariate one dimension goes forward one by one encrypted binary antiforging printing method | |
CN102945459B (en) | Three-dimensional increases progressively and becomes sequence one-parameter encrypted binary antiforging printing method | |
CN102945456B (en) | Single-parameter, double-progressive becomes sequence encrypted binary antiforging printing method | |
CN102945472B (en) | Single-parameter, gradient, reverse, synchronous and increasing encryption type binary anti-counterfeit printing method | |
CN102945468B (en) | Double-encryption binary anti-counterfeiting printing method | |
CN102945409B (en) | The double encrypted binary antiforging printing method of Multi-parameter displacement | |
CN102945437B (en) | Parameter-displacement, double-variable and two-dimensional encryption type binary anti-counterfeit printing method | |
CN102945451B (en) | One-parameter circulates double encrypted binary antiforging printing method | |
CN102945441B (en) | The displacement that moves to left of one-parameter alternation strides the encrypted binary antiforging printing method that goes forward one by one | |
CN102945464B (en) | Single-parameter, gradient, same-direction, synchronous and increasing encryption type binary anti-counterfeit printing method | |
CN102945454B (en) | Single argument three-dimensional is gone forward one by one encrypted binary antiforging printing method | |
CN102945412B (en) | Single-parameter, single-variable, three-dimensional, increasing and circulating encryption type binary anti-counterfeit printing method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C53 | Correction of patent for invention or patent application | ||
CB03 | Change of inventor or designer information |
Inventor after: Wang Mingfei Inventor before: Wang Mingfei |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20150520 Termination date: 20151022 |
|
EXPY | Termination of patent right or utility model |