[go: up one dir, main page]

CN102945472B - Single-parameter, gradient, reverse, synchronous and increasing encryption type binary anti-counterfeit printing method - Google Patents

Single-parameter, gradient, reverse, synchronous and increasing encryption type binary anti-counterfeit printing method Download PDF

Info

Publication number
CN102945472B
CN102945472B CN201210403130.0A CN201210403130A CN102945472B CN 102945472 B CN102945472 B CN 102945472B CN 201210403130 A CN201210403130 A CN 201210403130A CN 102945472 B CN102945472 B CN 102945472B
Authority
CN
China
Prior art keywords
binary
counterfeiting information
operator
group
counterfeiting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201210403130.0A
Other languages
Chinese (zh)
Other versions
CN102945472A (en
Inventor
张立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN201210403130.0A priority Critical patent/CN102945472B/en
Publication of CN102945472A publication Critical patent/CN102945472A/en
Application granted granted Critical
Publication of CN102945472B publication Critical patent/CN102945472B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Editing Of Facsimile Originals (AREA)

Abstract

一种单参数递变反向同步递增加密二进制防伪印刷方法,该方法可将二进制防伪信息通过加密运算和信道编码生成二进制调制信号,并通过循环查表法调制方式将防伪信息以调幅网点的形状的有序改变嵌入在整个页面中,可在印刷品识别时从任意一个碎片里识别防伪信息,可广泛应用于印刷品防伪领域。

A method for binary anti-counterfeiting printing with single-parameter gradient reverse synchronous incremental encryption, which can pass binary anti-counterfeiting information through Encryption operations and channel coding generate binary modulation signals, and the anti-counterfeiting information is embedded in the entire page in the orderly change of the shape of the amplitude modulation dots through the modulation method of the circular look-up method, and the anti-counterfeiting information can be identified from any fragment when identifying printed matter. It can be widely used in the anti-counterfeiting field of printed matter.

Description

单参数递变反向同步递增加密二进制防伪印刷方法Single-parameter gradient reverse synchronous incremental encryption binary anti-counterfeiting printing method

所属技术领域: Technical field:

本发明涉及一种防伪印刷技术,特别是一种单参数递变反向同步递增加密二进制防伪印刷技术,该防伪印刷技术可以用于各种印刷制品的防伪。 The invention relates to an anti-counterfeiting printing technology, in particular to a single-parameter gradual change reverse synchronous increasing encryption binary anti-counterfeiting printing technology, and the anti-counterfeiting printing technology can be used for anti-counterfeiting of various printed products.

背景技术: Background technique:

现有的较为普通的防伪方法有以下几种:第一种是激光防伪标志,用激光隐性油墨萤光油墨印刷技术将产品的标徽或特殊的识别图案印制成产品的防伪标贴,且同一类产品使用同一种标贴,因防伪标贴较容易伪造,而伪造的防伪标贴又被用在假冒产品上,造成产品的真假混淆,因此难于有效防伪。第二种是密码防伪标贴,其所采用的方法是每件产品编一组数码,每件产品的编码都不相同,将此数码印制在标贴上并遮盖起来,同时将此数码存入可供消费者查询的计算机数据库中,消费者购买产品时,将标识上的数码通过电话或入网计算机输入计算机数据库进行比较识别,相同即为真,不同即为假,方法简单,识别容易,不易伪造,但实际使用中,因编码数据是计算机统一生成后印制标贴的。代表产品真假编码数据可能被非法拷贝造假,同时,编码也可回收未查询的产品上的编码造标而贴在假产品上,防伪效果难于保证。第三种是纹理防伪,以其标贴上的纹理特征防伪,虽然较难伪造,但由于只设标贴的序号码,且是明码,每枚标贴可反复查询,造假者可通过仓库保管员或售货员将标贴上的序号及查询时所反映的必要纹理特征即方格中的有无现象抄袭后按此特征批量伪造。综上所述,现有的防伪方法都存在一定的缺点,因而不能从根本防止假冒产品。 The existing relatively common anti-counterfeiting methods are as follows: The first is laser anti-counterfeiting marks, which use laser recessive ink fluorescent ink printing technology to print product logos or special identification patterns into product anti-counterfeiting labels. And the same type of product uses the same label, because the anti-counterfeiting label is easier to forge, and the fake anti-counterfeiting label is used on the counterfeit product, causing the product to be confused, so it is difficult to effectively prevent counterfeiting. The second is the password anti-counterfeiting label. The method adopted is to compile a set of numbers for each product, and the codes of each product are different. The numbers are printed on the labels and covered, and the numbers are stored Into the computer database that can be inquired by consumers. When consumers purchase products, they input the numbers on the logo into the computer database through telephone or networked computer for comparison and identification. The same is true, and the difference is false. The method is simple and easy to identify. It is not easy to forge, but in actual use, because the encoded data is uniformly generated by the computer, the label is printed. The code data representing the authenticity of the product may be illegally copied and falsified. At the same time, the code can also be recycled from the code on the product that has not been inquired to make a label and affixed to the fake product. The anti-counterfeiting effect is difficult to guarantee. The third is texture anti-counterfeiting, which uses the texture features on the label to prevent counterfeiting. Although it is difficult to forge, since only the serial number of the label is set, and it is a clear code, each label can be queried repeatedly, and counterfeiters can store it in the warehouse. The clerk or salesperson plagiarizes the serial number on the label and the necessary texture characteristics reflected in the query, that is, the presence or absence of phenomena in the grid, and then forges them in batches according to this characteristic. In summary, the existing anti-counterfeiting methods have certain shortcomings, and thus cannot fundamentally prevent counterfeit products.

发明内容: Invention content:

为了克服现有的各种印刷制品防伪印刷技术存在的缺点,本发明针对现有印刷制品防伪印刷技术存在的不足对现有技术进行了改进,提出了一种二进制加密信号调制印刷品调幅网点的形状的加密防伪印刷技术,该防伪印刷技术通过调幅网点的形状的改变将防伪信息嵌入在整个页面中,可在印刷品识别时从任意一个碎片里识别防伪信息,因此具有很强抗碎性,可从 根本上杜绝采用照相、扫描等非法复制行为。 In order to overcome the shortcomings of the existing anti-counterfeiting printing technology for various printed products, the present invention improves the existing technology in view of the shortcomings of the existing anti-counterfeiting printing technology for printed products, and proposes a binary encryption signal to modulate the shape of the AM dots of printed products Encrypted anti-counterfeiting printing technology, this anti-counterfeiting printing technology embeds anti-counterfeiting information in the entire page by changing the shape of AM dots, and can identify anti-counterfeiting information from any fragment when identifying printed matter, so it is highly resistant to shattering and can be read from Fundamentally put an end to the use of photography, scanning and other illegal copying.

本发明解决其技术问题所采用的技术方案是:对柔性版印刷混合加网中的调幅网点和调频网点分开进行处理,利用图像信息、文字信息、商标信息等防伪信息生成8位一组的二进制防伪信息表,为防止加密过程中产生信息溢出,将二进制防伪信息表中的8位一组二进制信息扩展为16位一组二进制信息,生成高8位全为0的16位一组二进制防伪信息表,将16位一组二进制防伪信息表中的第i组16位二进制信息记作Ni,i为大于0的正整数,八位二进制加密参数记作C,加密参数C为0≦C≦256的整数,二位二进制算符和运算顺序控制变量记作k,算符和运算顺序控制变量k为0≦k≦3的整数,算符1 k2 k3 k4 k5 k6 k7 k8 k9 k采用+、-、×、÷四种运算,算符和运算顺序控制变量k=0时1 k2 k3 k4 k5 k6 k7 k8 k9 k定义为+、×、-、÷、+、÷、×、-、÷运算,算符和运算顺序控制变量k=1时1k 2 k3 k4 k5 k6 k7 k8 k9 k定义为÷、+、+、×、-、÷、+、÷、×运算,算符和运算顺序控制变量k=2时1 k2 k3 k4 k5 k6 k7 k8 k9 k定义为-、÷、+、×、+、÷、×、-、÷运算,算符和运算顺序控制变量k=3时1 k2 k3 k4 k5 k6 k7 k8 k9 k定义为+、÷、+、×、-、÷、×、-、÷运算,算符和运算顺序控制变量k=0时变序加密运算定义为(C+k)1 k(C+k)2 k(C+k)3 kN1 4 k(C+k)5 k(C+k)6 k(C+k)7 k(C+k)8 k(C+k)9 kN1,算符和运算顺序控制变量k=1时变序加密运算定义为(C+k)1 k(C+k)2 kN1 3 kN1 4 k(C+k)5 k(C+k)6 k(C+k)7 k(C+k)8 kN1 9 kN1,算符和运算顺序控制变量k=2时变序加密运算定义为(C+k)1 kN1(C+k)2 kN1 3 kN1 4 k(C+k)5 k(C+k)6 k(C+k)7 kN1 8 kN1 9 kN1,算符和运算顺序控制变量k=3时变序加密运算定义为N1 1 k 2 kN1 3 kN1 4 k(C+k)5 k(C+k)6 kN1 7 kN1 8 kN1 9 kN1,设定加密参数C的初值,设定算符和运算顺序控制变量k的初值k=0,设定16位一组二进制防伪信 息表中16位二进制信息Ni的位置控制变量i=1,从16位一组二进制防伪信息表中第一个16位二进制信息N1开始,对16位一组二进制防伪信息表中的每一个16位二进制信息进行(C+k)1 k(C+k)2 k(C+k)3 kN1 4 k(C+k)5 k(C+k)6 k(C+k)7 k(C+k)8 k(C+k)9 kN1变序加密运算,并且在对每一个16位二进制信息进行(C+k)1 k(C+k)2 k(C+k)3 kN1 4 k(C+k)5 k(C+k)6 k(C+k)7 k(C+k)8 k(C+k)9 kN1加密运算的同时进行i+1和k+1运算,使下一运算指向(C+k)1 k(C+k)2 kN1 3 kN1 4 k(C+k)5 k(C+k)6 k(C+k)7 k(C+k)8 kN1 9 kN1其中i和k都增加了1,通过对16位一组二进制防伪信息表中的每一个16位二进制信息进行(C+k)1 k(C+k)2 k(C+k)3 kN1 4 k(C+k)5 k(C+k)6 k(C+k)7 k(C+k)8 k(C+k)9 kN1变序加密运算,生成16位一组的二进制加密防伪信息表,调幅网点的形状设置为两种:□和◇,其中□定义为数字0、◇定义为数字1,利用生成的16位一组的二进制加密防伪信息通过循环查表法调制调幅网点,使其有规律的按照上述两种调幅网点的形状改变混合加网中调幅网点的形状,使混合加网中调幅网点的形状有规则的发生改变,调制后相邻16个调幅网点构成一组16位二进制信息,使其携带防伪信息,并使该防伪信息嵌入在整个页面网点中,能更有效地对抗基于照相机、扫描仪、电子文档等非法复制行为。通过在印刷品中非显见地嵌入可提取的防伪信息,能够为真品提供有效证明,同时具有较强的抗伪造能力,且不增加额外的防伪成本。 The technical solution adopted by the present invention to solve the technical problem is: separately process the amplitude modulation dots and frequency modulation dots in the mixed screen of flexographic printing, and use image information, text information, trademark information and other anti-counterfeiting information to generate 8-bit binary Anti-counterfeiting information table, in order to prevent information overflow during the encryption process, the 8-bit binary information in the binary anti-counterfeiting information table is expanded to 16-bit binary information, and a 16-bit binary anti-counterfeiting information with all 0s in the upper 8 bits is generated Table, the i-th group of 16-bit binary information in the 16-bit binary anti-counterfeiting information table is recorded as N i , i is a positive integer greater than 0, the eight-bit binary encryption parameter is recorded as C, and the encryption parameter C is 0≦C≦ 256 integers, two-bit binary operator and operation sequence control variable are recorded as k, operator and operation sequence control variable k is an integer of 0≦k≦3, operators 1 k , 2 k , 3 k , 4 k , 5 k , 6 k , 7 k , 8 k , 9 k adopt four operations + , -, ×, ÷, operator and operation order control variable k=0, 1 k , 2 k , 3 k , 4 k , 5 k , 6 k , 7 k , 8 k , 9 k are defined as +, ×, -, ÷, +, ÷, ×, -, ÷ operations, the operator and operation sequence control variable k = 1 when 1 k , 2 k , 3 k , 4 k , 5 k , 6 k , 7 k , 8 k , 9 k are defined as ÷, +, +, ×, -, ÷, +, ÷, × operations, and the operator and operation order control variable k= 2: 1 k , 2 k , 3 k , 4 k , 5 k , 6 k , 7 k , 8 k , 9 k are defined as -, ÷, +, ×, +, ÷, ×, -, ÷ operations. When the operation sequence control variable k=3, 1 k , 2 k , 3 k , 4 k , 5 k , 6 k , 7 k , 8 k , 9 k are defined as +, ÷, +, ×, -, ÷, ×, -, ÷ operation, operator and operation sequence control variable k = 0 time variable sequence encryption operation is defined as (C+k) 1 k (C+k) 2 k (C+k) 3 k N 1 4 k ( C+k) 5 k (C+k) 6 k (C+k) 7 k (C+k) 8 k (C+k) 9 k N 1 , operator and operation sequence control variable k=1 time variable sequence The encryption operation is defined as (C+k) 1 k (C+k) 2 k N 1 3 k N 1 4 k (C+k) 5 k (C+k) 6 k (C+k) 7 k (C+ k) 8 k N 1 9 k N 1 , operator and operation sequence control variable k=2 time-varying sequence encryption operation is defined as (C+k) 1 k N 1 (C+k) 2 k N 1 3 k N 1 4k (C + k ) 5k (C+k) 6 k (C+k) 7 k N 1 8 k N 1 9 k N 1 , operator and operation sequence control variable k=3 time-varying sequence encryption operation is defined as N 1 1 k 2 k N 1 3 k N 1 4 k (C+k) 5 k (C+k) 6 k N 1 7 k N 1 8 k N 1 9 k N 1 , set the initial value of the encryption parameter C, set the operator and operation The initial value k=0 of sequence control variable k, the position control variable i=1 of 16 binary information N i in setting 16 groups of binary anti-counterfeiting information tables, from the first 16 in 16 groups of binary anti-counterfeiting information tables Bit binary information N 1 starts, carry out (C+k) 1 k (C+k) 2 k (C+k) 3 k N 1 4 k for each 16-bit binary information in the 16-bit binary anti-counterfeiting information table (C+k) 5 k (C+k) 6 k (C+k) 7 k (C+k) 8 k (C+k) 9 k N 1 variable order encryption operation, and each 16-bit binary Information progress (C+k) 1 k (C+k) 2 k (C+k) 3 k N 1 4 k (C+k) 5 k (C+k) 6 k (C+k) 7 k (C +k) 8 k (C+k) 9 k N 1 Perform i+1 and k+1 operations at the same time as the encryption operation, so that the next operation points to (C+k) 1 k (C+k) 2 k N 1 3 k N 1 4 k (C+k) 5 k (C+k) 6 k (C+k) 7 k (C+k) 8 k N 1 9 k N 1 where both i and k are incremented by 1, by Each 16-bit binary information in the 16-bit binary anti-counterfeiting information table carries out (C+k) 1 k (C+k) 2 k (C+k) 3 k N 1 4 k (C+k) 5 k ( C+k) 6 k (C+k) 7 k (C+k) 8 k (C+k) 9 k N 1 Sequential encryption operation, generating a 16-bit binary encrypted anti-counterfeiting information table, the shape of the AM dot There are two types: □ and ◇, where □ is defined as the number 0, and ◇ is defined as the number 1, and the generated 16-bit binary encrypted anti-counterfeiting information is used to modulate the AM network through the circular look-up table method, so that it can be regularly in accordance with the above The shapes of the two kinds of AM dots change the shape of the AM dots in the hybrid screening, so that the shape of the AM dots in the mixed screening changes regularly. After modulation, 16 adjacent AM dots form a group of 16-bit binary information, which makes it carry Anti-counterfeiting information, and embedding the anti-counterfeiting information in the entire page network, can more effectively combat illegal copying based on cameras, scanners, and electronic documents. By non-obviously embedding extractable anti-counterfeiting information in the printed matter, effective proof can be provided for the genuine product, and at the same time, it has strong anti-counterfeiting ability without adding additional anti-counterfeiting costs.

为解决上述的技术问题,首先对防伪信息进行数字化,生成8位一组的二进制防伪信息表,防伪信息可以是图像信息、文字信息、商标信息等,将二进制防伪信息表中的8位一组二进制信息扩展为16位一组二进制信息,生成高8位全为0的16位一组二进制防伪信息表,对16位一组二进制防伪信息表中的每一个16位二进制信息进行(C+k)1 k(C+k)2 k(C+k)3 kN1 4 k(C+k)5 k(C+k)6 k(C+k)7 k(C+k)8 k(C+k)9 kN1加密运算,生成16位一组的二进制加密防伪信息表,利用生成的16位一组二进制加密防伪信息表中的 16位二进制信息经过信道编码,生成具有检错和纠错功能的16位一组的二进制调制信号。信道编码可以采用循环编码、卷积编码或Turbo编码等多种形式,将原始连续调图像信号经过栅格化处理(RIP)和混合加网输出半色调混合加网图像信号,其中包括调幅网点和调频网点图像信号,利用生成的16位一组二进制调制信号采用循环查表法调制方式调制混合加网图像信号中调幅网点的形状,使调幅网点的形状按照□和◇有规律的发生改变,使混合加网图像信号中相邻16个调幅网点通过形状的改变携带16位二进制防伪信息,从而生成在整个页面网点中嵌入防伪信息的混合加网图像信号,实现防伪印刷。 In order to solve the above-mentioned technical problems, the anti-counterfeiting information is digitized at first, and a binary anti-counterfeiting information table of 8 bits is generated. The anti-counterfeiting information can be image information, text information, trademark information, etc. The binary information is expanded into a group of 16 binary information, and a 16-bit binary anti-counterfeiting information table with all 0s in the upper 8 bits is generated, and (C+k ) 1 k (C+k) 2 k (C+k) 3 k N 1 4 k (C+k) 5 k (C+k) 6 k (C+k) 7 k (C+k) 8 k ( C+k) 9 k N 1 encryption operation to generate a 16-bit group binary encrypted anti-counterfeiting information table, use the 16-bit binary information in the generated 16-bit binary encrypted anti-counterfeiting information table to undergo channel coding to generate an error detection and anti-counterfeiting information table A 16-bit binary modulation signal for error correction functions. Channel coding can adopt various forms such as cyclic coding, convolutional coding or Turbo coding, etc., and the original continuous modulation image signal is rasterized (RIP) and mixed and screened to output a halftone mixed screened image signal, including amplitude modulation dots and The FM dot image signal uses the generated 16-bit binary modulation signal to modulate the shape of the AM dot in the mixed screen image signal by means of a circular look-up table modulation method, so that the shape of the AM dot changes according to □ and ◇ regularly, so that The 16 adjacent AM dots in the mixed screened image signal carry 16-bit binary anti-counterfeiting information through shape changes, thereby generating a mixed screened image signal with anti-counterfeiting information embedded in the entire page dots, realizing anti-counterfeiting printing.

在提取防伪信息时,首先采集网点图像信号,经过对调幅网点的形状的模糊识别,分辨调幅网点的形状,提取调幅网点的边沿信号和形状信息,解调调幅网点的形状信息,输出16位一组的二进制调制信号。对解调输出的16位一组的二进制调制信号进行信道解码,信道解码后生成16位一组的二进制解密防伪信息表,将二进制解密防伪信息表中的16位二进制信息记作Hi,通过加密过程可知, When extracting anti-counterfeiting information, first collect the network dot image signal, through the fuzzy recognition of the shape of the AM network dot, distinguish the shape of the AM network dot, extract the edge signal and shape information of the AM network dot, demodulate the shape information of the AM network dot, and output 16-bit one Set of binary modulated signals. Perform channel decoding on the 16-bit binary modulated signal output by demodulation, generate a 16-bit binary decryption anti-counterfeiting information table after channel decoding, record the 16-bit binary information in the binary decryption anti-counterfeiting information table as H i , pass The encryption process shows that,

算符控制变量k=0时Hi=(C+k)1 k(C+k)2 k(C+k)3 kN1 4 k(C+k)5 k(C+k)6 k(C+k)7 k(C+k)8 k(C+k)9 kN1,算符控制变量k=1时Hi=(C+k)1 k(C+k)2 kN1 3 kN1 4 k(C+k)5 k(C+k)6 k(C+k)7 k(C+k)8 kN1 9 kN1,算符控制变量k=2时Hi=(C+k)1 kN1 2 kN1 3 kN1 4 k(C+k)5 k(C+k)6 k(C+k)7 kN1 8 kN1 9 kN1,算符控制变量k=3时Hi=N1 1 kN1 2 kN1 3 kN1 4 k(C+k)5 k(C+k)6 kN1 7 kN1 8 kN1 9 kN1,二进制解密防伪信息表中16位二进制信息Hi的位置控制变量初值设定为i=1,从二进制解密防伪信息表中第一位H1开始,对二进制解密防伪信息表中的每一个16位二进制信息进行Hi=(C+k)1 k(C+k)2 k(C+K)3 kN14k(C+k)5 k(C+k)6 k(C+k)7 k(C+k)8 k(C+k)9 kN1解密运算,解出二进制防伪信息Ni,生成高8位全为0的16位一组二进制防伪信息表,去掉高8位,生成8位一组的二进制防伪信息表,恢复防伪信号并输出防伪信息。 When operator control variable k=0, H i =(C+k) 1 k (C+k) 2 k (C+k) 3 k N 1 4 k (C+k) 5 k (C+k) 6 k (C+k) 7 k (C+k) 8 k (C+k) 9 k N 1 , when operator control variable k=1, H i =(C+k) 1 k (C+k) 2 k N 1 3 k N 1 4 k (C+k) 5 k (C+k) 6 k (C+k) 7 k (C+k) 8 k N 1 9 k N 1 , when the operator control variable k=2 H i =(C+k) 1 k N 1 2 k N 1 3 k N 1 4 k (C+k) 5 k (C+k) 6 k (C+k) 7 k N 1 8 k N 1 9 k N 1 , when operator control variable k=3, H i =N 1 1 k N 1 2 k N 1 3 k N 1 4 k (C+k) 5 k (C+k) 6 k N 1 7 k N 1 8 k N 1 9 k N 1 , the initial value of the position control variable of the 16-bit binary information H i in the binary decrypted anti-counterfeiting information table is set to i=1, starting from the first bit H 1 in the binary decrypted anti-counterfeiting information table, for Each 16-bit binary information in the binary decryption anti-counterfeiting information table is H i =(C+k) 1 k (C+k) 2 k (C+K) 3 k N 1 4k(C+k) 5 k (C +k) 6 k (C+k) 7 k (C+k) 8 k (C+k) 9 k N 1 decryption operation, solve the binary anti-counterfeiting information N i , and generate a 16-bit one whose upper 8 bits are all 0 Group binary anti-counterfeiting information table, remove high 8 bits, generate 8-bit binary anti-counterfeiting information table, recover anti-counterfeiting signal and output anti-counterfeiting information.

附图说明 Description of drawings

下面结合附图对本发明进一步说明。 The present invention will be further described below in conjunction with the accompanying drawings.

图1加载防伪信息流程图。 Figure 1 is a flow chart of loading anti-counterfeiting information.

图2提取防伪信息流程图。 Figure 2 is a flow chart of extracting anti-counterfeiting information.

具体实施方式 Detailed ways

在加载防伪信息流程图1中,原始防伪信息(图像、文字、商标)经数字化处理,生成8位一组的二进制防伪信息表,将二进制防伪信息表中的8位一组二进制信息扩展为16位一组二进制信息,生成高8位全为0的16位一组二进制防伪信息表,16位一组二进制防伪信息表中的第i组16位二进制信息记作Ni,i为大于0的正整数,八位二进制加密参数记作C,加密参数C为0≦C≦256的整数,二位二进制算符和运算顺序控制变量记作k,算符和运算顺序控制变量k为0≦k≦3的整数,算符1 k2 k3 k4 k5 k6 k7 k8 k9 k采用+、-、×、÷四种运算,算符和运算顺序控制变量k=0时1 k2 k3 k4 k5 k6 k7 k8 k9 k定义为+、×、-、÷、+、÷、×、-、÷运算,算符和运算顺序控制变量k=1时1 k2 k3 k4 k5 k6 k7 k8 k9 k定义为÷、+、+、×、-、÷、+、÷、×运算,算符和运算顺序控制变量k=2时1 k2 k3 k4 k5 k6 k7 k8 k9 k定义为-、÷、+、×、+、÷、×、-、÷运算,算符和运算顺序控制变量k=3时1 k2 k3 k4 k5 k6 k7 k8 k9 k定义为+、÷、+、×、-、÷、×、-、÷运算,算符和运算顺序控制变量k=0时变序加密运算定义为(C+k)1 k(C+k)2 k(C+k)3 kN1 4 k(C+k)5 k(C+k)6 k(C+k)7 k(C+k)8 k(C+k)9 kN1,算符和运算顺序控制变量k=1时变序加密运算定义为(C+k)1 k(C+k)2 kN1(C+k)3 kN1 4 k(C+k)5 k(C+k)6 k(C+k)7 k(C+k)8 kN1 9 kN1,算符和运算顺序控制变量k=2时变序加密运算定义为(C+k)1 kN1 2 kN1 3 kN1 4 k(C+k)5 k(C+k)6 k(C+k)7 kN1 8 kN1 9 kN1,算符和运算顺序控制变量k=3时变序加密运算定义为N1 1 k 2 kN1 3 kN1 4 k(C+k)5 k(C+k)6 kN1 7 kN1 8 kN1 9 kN1,设定 加密参数C的初值,设定算符和运算顺序控制变量k的初值k=0,设定16位一组二进制防伪信息表中16位二进制信息Ni的位置控制变量i=1,从16位一组二进制防伪信息表中第一个16位二进制信息N1开始,对16位一组二进制防伪信息表中的每一个16位二进制信息进行(C+k)1 k(C+k)2 k(C+k)3 kN1 4 k(C+k)5 k(C+k)6 k(C+k)7 k(C+k)8 k(C+k)9 kN1变序加密运算,并且在对每一个16位二进制信息进行(C+k)1 k(C+k)2 k(C+k)3 kN1 4 k(C+k)5 k(C+k)6 k(C+k)7 k(C+k)8 k(C+k)9 kN1加密运算的同时进行i+1和k+1运算,使下一运算指向(C+k)1 k(C+k)2 kN1 3 kN1 4 k(C+k)5 k(C+k)6 k(C+k)7 k(C+k)8 kN1 9 kN1其中i和k都增加了1,通过对16位一组二进制防伪信息表中的每一个16位二进制信息进行(C+k)1 k(C+k)2 k(C+k)3 kN1 4 k(C+k)5 k(C+k)6 k(C+k)7 k(C+k)8 k(C+k)9 kN1变序加密运算,生成16位一组的二进制加密防伪信息表,调幅网点的形状设置为两种:□和◇,其中□定义为数字0、◇定义为数字1,生成的16位二进制加密防伪信息经过信道编码,生成具有检错和纠错功能的二进制调制信号。信道编码可以采用循环编码、卷积编码或Turbo编码等多种形式。将原始连续调图像信号经过栅格化处理(RIP)和混合加网输出半色调混合加网图像信号,其中包括调幅网点和调频网点图像信号。利用生成的二进制调制信号采用循环查表调制方式,调制混合加网图像信号中调幅网点的形状,使混合加网中调幅网点的形状有规则发生改变,生成嵌入防伪信息的混合加网图像信号,通过循环查表调制方式,使相邻16位调幅网点通过形状的改变生成一个16位二进制数据,使其携带防伪信息,并使该防伪信息嵌入在整个页面网点中,实现防伪印刷。 In flow chart 1 of loading anti-counterfeiting information, the original anti-counterfeiting information (image, text, trademark) is digitized to generate an 8-bit binary anti-counterfeiting information table, and the 8-bit binary information in the binary anti-counterfeiting information table is expanded to 16 One set of binary information, generate a 16-bit binary anti-counterfeiting information table whose upper 8 bits are all 0, the i-th group of 16-bit binary information in the 16-bit binary anti-counterfeiting information table is recorded as N i , i is greater than 0 Positive integer, the eight-digit binary encryption parameter is denoted as C, the encryption parameter C is an integer of 0≦C≦256, the two-digit binary operator and the operation order control variable are denoted as k, and the operator and operation order control variable k is 0≦k Integers ≦3, operators 1 k , 2 k , 3 k , 4 k , 5 k , 6 k , 7 k , 8 k , 9 k use +, -, ×, ÷ four operations, operators and operation order When the control variable k=0, 1 k , 2 k , 3 k , 4 k , 5 k , 6 k , 7 k , 8 k , 9 k are defined as +, ×, -, ÷, +, ÷, ×, -, ÷ operation, operator and operation order control variable k=1 , 1 k , 2 k , 3 k , 4 k , 5 k , 6 k , 7 k , 8 k , 9 k are defined as ÷, +, +, ×, -, ÷, +, ÷, × operation, operator and operation sequence control variable k=2, 1 k , 2 k , 3 k , 4 k , 5 k , 6 k , 7 k , 8 k , 9 k are defined as -, ÷, +, ×, +, ÷, ×, -, ÷ operation, operator and operation sequence control variable k = 3: 1 k , 2 k , 3 k , 4 k , 5 k , 6 k , 7 k , 8 k , 9 k are defined as +, ÷, +, ×, -, ÷, ×, -, ÷ operations, operators and operation sequence control variable k = 0, variable sequence encryption operations are defined as (C+k) 1 k (C+k) 2 k (C+k) 3 k N 1 4 k (C+k) 5 k (C+k) 6 k (C+k) 7 k (C+k) 8 k (C+ k) 9 k N 1 , the operator and operation sequence control variable k=1, the variable sequence encryption operation is defined as (C+k) 1 k (C+k) 2 k N 1 (C+k) 3 k N 1 4 k (C+k) 5 k (C+k) 6 k (C+k) 7 k (C+k) 8 k N 1 9 k N 1 , operator and operation sequence control variable k=2 time-varying sequence encryption The operation is defined as (C+k) 1 k N 1 2 k N 1 3 k N 1 4 k (C+k) 5 k (C+k) 6 k (C+k) 7 k N 1 8 k N 1 9 k N 1 , operator and operation sequence control The variable k = 3 time-varying encryption operation is defined as N 1 1 k 2 k N 1 3 k N 1 4 k (C+k) 5 k (C+k) 6 k N 1 7 k N 1 8 k N 1 9 k N 1 , set the initial value of the encryption parameter C, set the initial value k=0 of the operator and operation order control variable k, set the position of 16 binary information N i in the 16-bit binary anti-counterfeiting information table Control variable i=1, from first 16 binary information N 1 in 16 binary anti-counterfeiting information tables, carry out (C+k) to each 16 binary information in 16 binary anti-counterfeiting information tables 1 k (C+k) 2 k (C+k) 3 k N 1 4 k (C+k) 5 k (C+k) 6 k (C+k) 7 k (C+k) 8 k (C +k) 9 k N 1 variable order encryption operation, and perform (C+k) 1 k (C+k) 2 k (C+k) 3 k N 1 4 k (C+ k) 5 k (C+k) 6 k (C+k) 7 k (C+k) 8 k (C+k) 9 k N 1 Encryption operations are performed simultaneously with i+1 and k+1 operations, so that the following One operation points to (C+k) 1 k (C+k) 2 k N 1 3 k N 1 4 k (C+k) 5 k (C+k) 6 k (C+k) 7 k (C+k ) 8 k N 1 9 k N 1 where both i and k are increased by 1, by performing (C+k) 1 k (C+k) 2 on each 16-bit binary information in the 16-bit binary anti-counterfeiting information table k (C+k) 3 k N 1 4 k (C+k) 5 k (C+k) 6 k (C+k) 7 k (C+k) 8 k (C+k) 9 k N 1 change Sequential encryption operation to generate a 16-bit binary encrypted anti-counterfeiting information table. The shape of the AM dots is set to two types: □ and ◇, where □ is defined as the number 0 and ◇ is defined as the number 1, and the generated 16-bit binary encrypted anti-counterfeiting information After channel coding, a binary modulated signal with error detection and error correction functions is generated. Channel coding can adopt various forms such as cyclic coding, convolutional coding or Turbo coding. The original continuous tone image signal is rasterized (RIP) and mixed and screened to output a halftone mixed screen image signal, including amplitude modulation dot and frequency modulation dot image signals. Using the generated binary modulation signal, the shape of the AM dots in the hybrid screened image signal is modulated by the circular look-up table modulation method, so that the shape of the AM dots in the hybrid screened is changed regularly, and a hybrid screened image signal embedded with anti-counterfeiting information is generated. Through the cyclic look-up table modulation method, the adjacent 16-bit AM dots can generate a 16-bit binary data through shape changes, so that they can carry anti-counterfeiting information, and the anti-counterfeiting information can be embedded in the entire page dots to realize anti-counterfeiting printing.

在提取防伪信息流程图2中,在提取防伪信息时,首先采集网点图像信号,经过对调幅网点的形状的模糊识别,分辨调幅网点的形状,提取调幅网点的边沿信号和形状信息,解调调幅网点的形状信息,输出16位一组的二进制调制信号。对解调输出的16位一组的二进制调制信号进行信道解码,信道解码后生成16位一组的二进制解密防伪信息表,将二进制解 密防伪信息表中的16位二进制信息记作Hi,通过加密过程可知, In the flow chart 2 of extracting anti-counterfeiting information, when extracting anti-counterfeiting information, first collect the dot image signal, through the fuzzy recognition of the shape of the AM dot, distinguish the shape of the AM dot, extract the edge signal and shape information of the AM dot, and demodulate the AM dot The shape information of the screen dots, output a 16-bit binary modulation signal. Perform channel decoding on the 16-bit binary modulation signal output by demodulation, generate a 16-bit binary decryption anti-counterfeiting information table after channel decoding, record the 16-bit binary information in the binary decryption anti-counterfeiting information table as H i , pass The encryption process shows that,

算符控制变量k=0时Hi=(C+k)1 k(C+k)2 k(C+k)3 kN1 4 k(C+k)5 k(C+k)6 k(C+k)7 k(C+k)8 k(C+k)9 kN1,算符控制变量k=1时Hi=(C+k)1 k(C+k)2 kN1 3 kN1 4 k(C+k)5 k(C+k)6 k(C+k)7 k(C+k)8 kN1 9 kN1,算符控制变量k=2时Hi=(C+k)1 kN1 2 kN1 3 kN1 4 k(C+k)5 k(C+k)6 k(C+k)7 kN1 8 kN1 9 kN1,算符控制变量k=3时Hi=N1 1 kN1 2 kN1 3 kN1 4 k(C+k)5 k(C+k)6 kN1 7 kN1 8 kN1 9 kN1,二进制解密防伪信息表中16位二进制信息Hi的位置控制变量初值设定为i=1,从二进制解密防伪信息表中第一位H1开始,对二进制解密防伪信息表中的每一个16位二进制信息进行Hi=(C+k)1 k(C+k)2 k(C+K)3 kN1 4 k(C+k)5 k(C+k)6 k(C+k)7 k(C+k)8 k(C+k)9 kN1解密运算,解出二进制防伪信息Ni,生成高8位全为0的16位一组二进制防伪信息表,去掉高8位,生成8位一组的二进制防伪信息表,恢复防伪信号并输出防伪信息。 When operator control variable k=0, H i =(C+k) 1 k (C+k) 2 k (C+k) 3 k N 1 4 k (C+k) 5 k (C+k) 6 k (C+k) 7 k (C+k) 8 k (C+k) 9 k N 1 , when operator control variable k=1, H i =(C+k) 1 k (C+k) 2 k N 1 3 k N 1 4 k (C+k) 5 k (C+k) 6 k (C+k) 7 k (C+k) 8 k N 1 9 k N 1 , when the operator control variable k=2 H i =(C+k) 1 k N 1 2 k N 1 3 k N 1 4 k (C+k) 5 k (C+k) 6 k (C+k) 7 k N 1 8 k N 1 9 k N 1 , when operator control variable k=3, H i =N 1 1 k N 1 2 k N 1 3 k N 1 4 k (C+k) 5 k (C+k) 6 k N 1 7 k N 1 8 k N 1 9 k N 1 , the initial value of the position control variable of the 16-bit binary information H i in the binary decrypted anti-counterfeiting information table is set to i=1, starting from the first bit H 1 in the binary decrypted anti-counterfeiting information table, for Each 16-bit binary information in the binary decryption anti-counterfeiting information table is performed H i =(C+k) 1 k (C+k) 2 k (C+K) 3 k N 1 4 k (C+k) 5 k ( C+k) 6 k (C+k) 7 k (C+k) 8 k (C+k) 9 k N 1 decryption operation, solve the binary anti-counterfeiting information N i , and generate 16 bits whose upper 8 bits are all 0 A group of binary anti-counterfeiting information tables, remove the high 8 bits, generate a binary anti-counterfeiting information table of 8 bits, restore the anti-counterfeiting signal and output the anti-counterfeiting information.

Claims (1)

1. anti-counterfeiting information is generated binary modulated signal by cryptographic calculation and channel coding by one kind, and the one-parameter alternation reverse sync increment encryption binary system antiforging printing method that anti-counterfeiting information is embedded in full page by modulation system of tabling look-up by circulating, it is characterized in that: anti-counterfeiting information is carried out digitlization, generate the binary system anti-counterfeiting information table of 8 group, anti-counterfeiting information is image information, Word message or trademark information, for preventing from ciphering process produces information spillover, 8 one group of binary messages in binary system anti-counterfeiting information table are expanded to 16 one group of binary messages, generate 16 the one group binary system anti-counterfeiting information table that most-significant byte is 0 entirely, i-th group of 16 binary message in 16 one group binary system anti-counterfeiting information table are denoted as N i, i be greater than 0 positive integer, eight-digit binary number encryption parameter is denoted as C, and encryption parameter C is the integer of 0≤C≤256, and two binary operators and order of operation control variables are denoted as k, and operator and order of operation control variables k are the integer of 0≤k≤3, operator@ 1 k,@ 2 k,@ 3 k,@ 4 k,@ 5 k,@ 6 k,@ 7 k,@ 8 k,@ 9 kadopt+,-, ×, ÷ tetra-kinds of computings ,@when operator and order of operation control variables k=0 1 k,@ 2 k,@ 3 k,@ 4 k,@ 5 k,@ 6 k,@ 7 k,@ 8 k,@ 9 kBe defined as+, × ,-, ÷ ,+, ÷, × ,-, ÷ computing ,@when operator and order of operation control variables k=1 1 k,@ 2 k,@ 3 k,@ 4 k,@ 5 k,@ 6 k,@ 7 k,@ 8 k,@ 9 kBe defined as ÷ ,+,+, × ,-, ÷ ,+, ÷, × computing ,@when operator and order of operation control variables k=2 1 k,@ 2 k,@ 3 k,@ 4 k,@ 5 k,@ 6 k,@ 7 k,@ 8 k,@ 9 kBe defined as-, ÷ ,+, × ,+, ÷, × ,-, ÷ computing ,@when operator and order of operation control variables k=3 1 k,@ 2 k,@ 3 k,@ 4 k,@ 5 k,@ 6 k,@ 7 k,@ 8 k,@ 9 kBe defined as+, ÷ ,+, × ,-, ÷, × ,-, ÷ computing, when operator and order of operation control variables k=0 become sequence cryptographic calculation be defined as (C+k)@ 1 k(C+k)@ 2 k(C+k)@ 3 kN 1@ 4 k(C+k)@ 5 k(C+k)@ 6 k(C+k)@ 7 k(C+k)@ 8 k(C+k)@ 9 kN 1, become sequence cryptographic calculation when operator and order of operation control variables k=1 and it be defined as (C+k)@ 1 k(C+k)@ 2 kN 1@ 3 kN 1@ 4 k(C+k)@ 5 k(C+k)@ 6 k(C+k)@ 7 k(C+k)@ 8 kN 1@ 9 kN 1, become sequence cryptographic calculation when operator and order of operation control variables k=2 and it be defined as (C+k)@ 1 kN 1@ 2 kN 1@ 3 kN 1@ 4 k(C+k)@ 5 k(C+k)@ 6 k(C+k)@ 7 kN 1@ 8 kN 1@ 9 kN 1, become sequence cryptographic calculation when operator and order of operation control variables k=3 and it be defined as N 1@ 1 kN 1@ 2 kN 1@ 3 kN 1@ 4 k(C+k)@ 5 k(C+k)@ 6 kN 1@ 7 kN 1@ 8 kN 1@ 9 kN 1, the initial value of setting encryption parameter C, the initial value k=0 of setting operator and order of operation control variables k, sets 16 binary message N in 16 one group binary system anti-counterfeiting information table iPosition control variable i=1, first 16 binary message N from 16 one group binary system anti-counterfeiting information table 1Start, each 16 binary message in 16 one group binary system anti-counterfeiting information table are carried out (C+k)@ 1 k(C+k)@ 2 k(C+k)@ 3 kN 1@ 4 k(C+k)@ 5 k(C+k)@ 6 k(C+k)@ 7 k(C+k)@ 8 k(C+k)@ 9 kN 1Become sequence cryptographic calculation, and each 16 binary message is being carried out (C+k)@ 1 k(C+k)@ 2 k(C+k)@ 3 kN 1@ 4 k(C+k)@ 5 k(C+k)@ 6 k(C+k)@ 7 k(C+k)@ 8 k(C+k)@ 9 kN 1Cryptographic calculation carry out i+1 and k+1 computing simultaneously, make next computing point to (C+k)@ 1 k(C+k)@ 2 kN 1@ 3 kN 1@ 4 k(C+k)@ 5 k(C+k)@ 6 k(C+k)@ 7 k(C+k)@ 8 kN 1@ 9 kN 1Wherein i and k both increases 1, by each 16 binary message in 16 one group binary system anti-counterfeiting information table are carried out (C+k)@ 1 k(C+k)@ 2 k(C+k)@ 3 kN 1@ 4 k(C+k)@ 5 k(C+k)@ 6 k(C+k)@ 7 k(C+k)@ 8 k(C+k)@ 9 kN 1Becoming sequence cryptographic calculation, generate the binary system encryption anti-fake information table of 16 group, the shape of amplitude is set to two kinds: With Wherein Be defined as numeral 0, It is defined as numeral 1, utilize the binary system encryption anti-fake information of 16 group generated through channel coding, generate 16 one group of binary modulated signals with error detecting and error correcting function, image signal of original continuous being changed the line map processes (RIP) and hybrid screening output halftoning hybrid screening picture signal through rasterizing, comprising amplitude and FM screened image signal, utilize 16 the one group of binary modulated signals generated to adopt the shape of amplitude in circulation look-up table modulation systems modulation hybrid screening picture signals, make the shape of amplitude according to With Regular change, adjacent 16 amplitudes in hybrid screening picture signal are made to carry 16 binary system encryption anti-fake information by the change of shape, thus it is created on the hybrid screening picture signal embedding anti-counterfeiting information in full page site, it is achieved anti-counterfeit printing.
CN201210403130.0A 2012-10-22 2012-10-22 Single-parameter, gradient, reverse, synchronous and increasing encryption type binary anti-counterfeit printing method Expired - Fee Related CN102945472B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210403130.0A CN102945472B (en) 2012-10-22 2012-10-22 Single-parameter, gradient, reverse, synchronous and increasing encryption type binary anti-counterfeit printing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210403130.0A CN102945472B (en) 2012-10-22 2012-10-22 Single-parameter, gradient, reverse, synchronous and increasing encryption type binary anti-counterfeit printing method

Publications (2)

Publication Number Publication Date
CN102945472A CN102945472A (en) 2013-02-27
CN102945472B true CN102945472B (en) 2015-03-11

Family

ID=47728411

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210403130.0A Expired - Fee Related CN102945472B (en) 2012-10-22 2012-10-22 Single-parameter, gradient, reverse, synchronous and increasing encryption type binary anti-counterfeit printing method

Country Status (1)

Country Link
CN (1) CN102945472B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2350806A4 (en) * 2008-10-20 2012-08-08 Hewlett Packard Development Co Method for enhancing security printing

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals

Also Published As

Publication number Publication date
CN102945472A (en) 2013-02-27

Similar Documents

Publication Publication Date Title
CN102945467B (en) One-parameter univariate incremental circulation encrypted binary antiforging printing method
CN102945472B (en) Single-parameter, gradient, reverse, synchronous and increasing encryption type binary anti-counterfeit printing method
CN102955965B (en) Binary anti-counterfeit printing method by single-parameter gradient and opposite synchronous-increasing encryption
CN102945423B (en) Single-parameter displacement variable-sequence encrypted binary anti-counterfeiting printing method
CN102945408B (en) Double-variant multi-parameter left-shifting stepping gradually-increased encryption binary anti-counterfeiting printing method
CN102945456B (en) Single-parameter, double-progressive becomes sequence encrypted binary antiforging printing method
CN102945403B (en) Binary anti-counterfeit printing method based on transposition order-change
CN102945441B (en) The displacement that moves to left of one-parameter alternation strides the encrypted binary antiforging printing method that goes forward one by one
CN102955961B (en) Single-parameter gradual phase-to-synchronous progressive encrypted binary anti-counterfeiting printing method
CN102945469B (en) Double-variant two-dimensional encryption binary anti-counterfeiting printing method
CN102945393B (en) Multi-parameter bivariate homodromous synchronous progressive encrypted binary anti-counterfeiting printing method
CN102945421B (en) Binary anti-fake printing method by reverse synchronous-progressing encryption
CN102945444B (en) Shift left displacement stepping increasing encryption binary anti-counterfeit printing method
CN102945459B (en) Three-dimensional increases progressively and becomes sequence one-parameter encrypted binary antiforging printing method
CN102945493B (en) The double encrypted binary antiforging printing method that goes forward one by one of multiparameter
CN102945426B (en) The double encrypted binary antiforging printing method of one-parameter
CN102945464B (en) Single-parameter, gradient, same-direction, synchronous and increasing encryption type binary anti-counterfeit printing method
CN102945479B (en) Multi-parameter bivariate left shift displacement stride progressive encrypted binary anti-counterfeiting printing method
CN102945451B (en) One-parameter circulates double encrypted binary antiforging printing method
CN102945412B (en) Single-parameter, single-variable, three-dimensional, increasing and circulating encryption type binary anti-counterfeit printing method
CN102945460B (en) Multi-parameter three-dimensional increment encryption scale-of-two antiforging printing method
CN102945409B (en) The double encrypted binary antiforging printing method of Multi-parameter displacement
CN102945462B (en) Three-dimensional change sequence one-parameter circulation encrypted binary antiforging printing method
CN102945468B (en) Double-encryption binary anti-counterfeiting printing method
CN102955963B (en) Multiparameter bivariate synchronously goes forward one by one encrypted binary antiforging printing method in opposite directions

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150311

Termination date: 20181022