[go: up one dir, main page]

CN113467727A - Printing encryption method, printer data acquisition and analysis method and printing scanning device - Google Patents

Printing encryption method, printer data acquisition and analysis method and printing scanning device Download PDF

Info

Publication number
CN113467727A
CN113467727A CN202111020205.2A CN202111020205A CN113467727A CN 113467727 A CN113467727 A CN 113467727A CN 202111020205 A CN202111020205 A CN 202111020205A CN 113467727 A CN113467727 A CN 113467727A
Authority
CN
China
Prior art keywords
password
encryption
symbols
symbol
square
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111020205.2A
Other languages
Chinese (zh)
Other versions
CN113467727B (en
Inventor
杨香玉
颜志鑫
李�远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Chenguang Rongxin Technology Co ltd
Original Assignee
Beijing Chenguang Xin'an Electronics Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Chenguang Xin'an Electronics Co ltd filed Critical Beijing Chenguang Xin'an Electronics Co ltd
Priority to CN202111020205.2A priority Critical patent/CN113467727B/en
Publication of CN113467727A publication Critical patent/CN113467727A/en
Application granted granted Critical
Publication of CN113467727B publication Critical patent/CN113467727B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1222Increasing security of the print job
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1223Dedicated interfaces to print systems specifically adapted to use a particular technique
    • G06F3/1237Print job management
    • G06F3/1238Secure printing, e.g. user identification, user rights for device usage, unallowed content, blanking portions or fields of a page, releasing held jobs

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Accessory Devices And Overall Control Thereof (AREA)

Abstract

The invention belongs to the technical field of printing encryption, and particularly relates to a printing encryption method, a printer data acquisition and analysis method and a printing scanning device. The printing encryption method comprises the steps of setting encryption symbols, interference symbols and the number of the encryption symbols according to an input password and a preset password arrangement rule; and generating the electronic document to be printed according to the digit number of the input password, a preset symbol layout rule and the like. The printer data acquisition and analysis method comprises the following steps: identifying symbols in the image to be decrypted, and determining the digit of the password according to the identified symbols and a preset symbol layout rule; determining an encrypted symbol in the identified symbol according to the determined digit of the password, and counting the number of the encrypted symbols to obtain the password; the method and the device can realize encryption or document decryption through the printer, have the characteristics of simple encryption method and no need of increasing extra printing cost, and can be effectively applied to encryption and interpretation of a large number of files.

Description

Printing encryption method, printer data acquisition and analysis method and printing scanning device
Technical Field
The invention belongs to the technical field of printing encryption, and particularly relates to a printing encryption method, a printer data acquisition and analysis method and a printing scanning device.
Background
The prior document encryption methods include two types, one type is a distinguishable anti-counterfeiting mark prefabricated on paper, such as ultraviolet fiber on a passport and a safety line on a RMB, and the other type is an MRZ code on the passport, an encrypted two-dimensional code and the like, although the shape of the mark can be seen, the anti-counterfeiting code of the content represented by the mark cannot be read. The two passwords have high security, but are not suitable for daily use, particularly for files with many encrypted pages, the encryption cost is high due to the encryption mode that ultraviolet fibers and the like are prefabricated on paper, and the encryption mode cannot be widely used due to the modes with high reading difficulty such as MRZ codes and two-dimensional codes.
Therefore, it is urgently needed to provide an encryption method with a relatively simple encryption and decryption method so as to encrypt documents which need to be tamper-proof in daily life or encrypt documents such as contracts in civil and commercial activities. So as to identify and inform the relevant personnel whether the target file is replaced by the encryption and interpretation method.
The application provides an encryption mode which can be used daily; the technical scheme has the advantages that the encryption or document decryption can be realized through the printer without learning a special encryption password, the encryption system has the characteristic of simple encryption method, can be arranged on a special printer and can also be directly connected to an expansion interface of the printer, and the encryption is more suitable for daily use.
Disclosure of Invention
The applicant finds that the existing encryption mode is high in encryption cost or high in interpretation difficulty, so that the application field of the existing encryption mode is greatly limited, and the existing encryption mode cannot be particularly suitable for files with large encryption quantity such as medical orders and testimony orders.
In order to solve the technical problems, the application aims to provide a printing encryption method, a printer data acquisition and analysis method and a printing scanning device.
The technical scheme of the invention is as follows:
in one aspect of the present invention, there is provided a print encryption method, including the steps of: inputting a password and an electronic document to be encrypted; setting encryption symbols and the number thereof, interference symbols and the number thereof according to the input password and a preset password arrangement rule; adding each encrypted symbol and each interference symbol into the electronic document to be encrypted according to the digit of the input password, a preset symbol layout rule, the number of the encrypted symbols and the number of the interference symbols, and generating the electronic document to be printed; and outputting the electronic document to be printed.
Further, the encrypted symbol includes a shuttle shape, an equilateral triangle, and a circle; the interference symbols comprise fusiform, equilateral triangle, circle and S shape; the external rectangle of the fusiform is a square, and two tips of the fusiform are positioned on two opposite angular points of the external square; the external rectangle of the equilateral triangle is a square, the vertex of one corner of the equilateral triangle is positioned on one corner point of the square externally connected with the equilateral triangle, and the vertexes of the other two corners are respectively positioned on two edges of the externally connected square; the S-shaped external rectangle is non-square; the fusiform shape is a shape with two sharp ends and a wide middle part, and can also be understood as a three-dimensional effect formed by combining two cones together by using the bottom surfaces; setting encryption symbols and quantity, interference symbols and quantity according to the input password and a preset password arrangement rule, and specifically comprising the following steps: when the input password is a one-digit number, selecting an equilateral triangle as an encryption symbol, and S-shaped, shuttle-shaped and circular as interference symbols; when the input password is a two-digit number, selecting a shuttle shape and an equilateral triangle as encryption symbols, wherein the quantity of the equilateral triangle is the unit of the password, the quantity of the shuttle shape is the ten bits of the password, and the S shape and the circle are interference symbols; when the input password is three digits, selecting a shuttle shape, an equilateral triangle and a circle as encryption symbols, selecting the equilateral triangle as the unit of the encryption symbols, and selecting the circle as ten bits of the encryption symbols and the shuttle shape as hundred bits of the password; s-shaped is an interference symbol; the total number of the interference symbols is 0.5-1.2 times of the total number of the encryption symbols; wherein the password is greater than 2.
Further, the electronic document to be printed comprises an encryption area and a text area, and the text area and the encryption area are not overlapped.
Further, the preset symbol layout rule includes: determining the ratio of the distance between the two equilateral triangles with the largest distance in the transverse direction to the distance between the two equilateral triangles with the largest distance in the longitudinal direction according to the digit number of the password; when the password is a single digit, the ratio is between 0.8 and 1.2; when the password is a two-digit number, the ratio is between 1.8 and 2.2; when the password is three-digit, the ratio is between 2.8 and 3.2.
In another aspect of the present invention, a method for collecting and analyzing data of a printer is provided, including: acquiring an image of a document to be decrypted to obtain the image to be decrypted; identifying symbols in the image to be decrypted, and determining the digit of the password according to the identified symbols and a preset symbol layout rule; determining an encrypted symbol in the identified symbol according to the determined digit of the password, and counting the number of the encrypted symbols to obtain the password; and outputting the password and the image of the document part to be decrypted.
Further, determining an encrypted symbol in the identified symbol according to the determined digit of the password, and counting the number of the encrypted symbols to obtain the password, specifically comprising: when the determined password is a one-digit number, determining the equilateral triangle as an encryption symbol; counting the number of triangles with medium edges in the identified symbols to obtain a password; when the determined password is a two-digit number, determining that the shuttle shape and the equilateral triangles are encryption symbols, wherein the number of the equilateral triangles is the unit number of the password, and the number of the shuttle shape is the ten-digit number of the password; counting the number of triangles with equal edges in the identified symbols and the number of fusiform triangles to obtain a password; when the determined password is three digits, determining that a shuttle shape, an equilateral triangle and a circle are encryption symbols, wherein the equilateral triangle is the unit of the encryption symbols, the circle is ten bits of the encryption symbols, and the shuttle shape is hundred bits of the password; and counting the number of triangles with equal edges in the identified symbols, the number of circles and the number of shuttles to obtain the password.
Furthermore, an encryption area and a text area are arranged on the image to be decrypted, and the encrypted text area is not overlapped with the encryption area; identifying the symbol in the image to be decrypted specifically comprises: positioning an encryption area of the image to be decrypted; and identifying the encryption area of the image to be decrypted, and acquiring all symbols in the encryption area.
Further, determining the digit of the password according to the recognized symbol and a preset symbol layout rule specifically includes: determining the equilateral triangles closest to the upper, lower, left and right edges of the encryption area in the encryption area, and calculating the ratio of the distance between the left and right equilateral triangles to the distance between the upper and lower equilateral triangles; when the ratio is between 0.8 and 1.2, the password is a single digit; when the ratio is between 1.8 and 2.2, the password is a two-digit number; when the ratio is between 2.8 and 3.2, the password is three digits.
Further, identifying the symbol in the image to be decrypted further includes: acquiring the minimum circumscribed rectangle of each symbol, and judging whether each minimum circumscribed rectangle is a square or not; when the minimum circumscribed rectangle is not square, the symbol is S-shaped; when the minimum circumscribed rectangle is a square and the edge points of the symbol are positioned on two opposite corner points of the square, the symbol is in a fusiform shape; when the minimum circumscribed rectangle is a square, the symbol has three edge points positioned on the sides of the square, one edge point is positioned on one corner point of the square, and the other two edge points are respectively positioned on two sides of the square, the symbol is an equilateral triangle; when the minimum circumscribed rectangle is a square and the four edge points of the symbol are respectively located in the middle of the four sides of the square, the symbol is circular. When an edge point is located at the intersection of two sides of a square, that is, the edge point can be considered to be located on two sides at the same time, that is, the edge point is determined to be located on the corner point, and since the corner point is an end point of a side of the square, the edge point is located on the corner point and also located on the side of the square.
In a further aspect of the present invention, there is provided a print scanning apparatus comprising a processor and a memory, the memory having stored therein computer instructions for executing computer instructions stored in the memory, the apparatus implementing the steps of the method as claimed in any one of the above when the computer instructions are executed by the processor.
The invention relates to a text line positioning method, a character recognition method based on layout analysis, a device and a storage medium, aiming at the condition that when the existing character recognition method is used for recognition, the image only with a reverse color area needs to be subjected to reverse color processing and then recognized, and the image with a complex layout and both a positive color area and a reverse color area needs to be subjected to twice recognition to obtain all character information of the image, the prior art is improved, the improved technical scheme can determine the position information of the positive color text line in the layout according to requirements, can also determine the position information of the reverse color text line in the layout according to requirements, can also determine the position information of the positive color text line in the layout and the position information of the reverse color text line in the layout according to requirements, and when the determined position information of the positive color text line and/or the reverse color text line is used for character recognition, the method can identify according to the color of the position information of the positive color text line and/or the negative color text line, improves the identification accuracy and efficiency, and particularly improves the accuracy and efficiency of the image character identification with complex layout.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the principles of the invention.
FIG. 1 shows a flow diagram of one embodiment of a print encryption method of the present invention.
FIG. 2 is a flow chart illustrating one embodiment of a printer data collection and analysis method of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the following embodiments and accompanying drawings. The exemplary embodiments and descriptions of the present invention are provided to explain the present invention, but not to limit the present invention.
It should be noted that, in order to avoid obscuring the present invention with unnecessary details, only the structures and/or processing steps closely related to the scheme according to the present invention are shown in the drawings, and other details not so relevant to the present invention are omitted.
It should be emphasized that the term "comprises/comprising" when used herein, is taken to specify the presence of stated features, elements, steps or components, but does not preclude the presence or addition of one or more other features, elements, steps or components.
It should be noted that, in the present application, the embodiments and features of the embodiments may be combined with each other without conflict.
Fig. 1 is an exemplary flowchart of a print encryption method of the present application.
The application provides a printing encryption method, which comprises the following steps:
s11, inputting a password and the electronic document to be encrypted;
s12, setting encryption symbols and the number thereof, interference symbols and the number thereof according to the input password and a preset password arrangement rule;
s13, adding each encrypted symbol and each interference symbol into the electronic document to be encrypted according to the digit of the input password, a preset symbol layout rule, the number of the encrypted symbols and the number of the interference symbols, and generating the electronic document to be printed;
and S14, outputting the electronic document to be printed.
The electronic document to be encrypted can be an electronic document such as word and PDF obtained by directly editing the document by document editing software, or an electronic picture of the document obtained by photographing or scanning a document picture.
The printing encryption method provided by the invention converts the input password according to the preset symbol and rule into the encryption symbol and the interference symbol, attaches the converted encryption symbol and the interference symbol to the electronic document to be encrypted to form the encrypted electronic document to be printed, and prints the encrypted electronic document to be printed to obtain the encrypted paper document. The setting of the encryption symbol and the interference symbol increases the difficulty of deciphering, and effectively ensures the security of the file encrypted by the password. The encryption method does not destroy the substantial content of the document, the content in the electronic document to be encrypted is still displayed in the printed file in the state before encryption, and people cannot be influenced to look up the content on the paper document at any time. For the encrypted part, the encrypted file can display the corresponding password after being decoded, and an encrypter can know whether the document of the paper is replaced or not by judging whether the decoded password is consistent with the password during encryption or not. The method provided by the invention can realize the encryption of the document through the printer, and can effectively realize the encryption of the document for medical advice, will advice and the like which need to display the content of the document for people to read and prevent people from maliciously tampering with the replaced document.
In order to implement the above encryption method, it is necessary to select appropriate encryption symbols and interference symbols, and to set corresponding encryption rules according to the encryption symbols and the interference symbols. Any plane symbol which can be printed by the printer can be used as an encryption symbol or an interference symbol, and a plurality of preset password arrangement rules can be selected according to the selection of the encryption symbol and the interference symbol.
A set of encryption symbols, interference symbols and preset cipher arrangement rules that can implement the above encryption method are introduced below.
In this embodiment, the encrypted symbols include a shuttle shape, an equilateral triangle, and a circle; the interference symbols comprise fusiform, equilateral triangle, circle and S shape; the external rectangle of the fusiform is a square, and two tips of the fusiform are positioned on two opposite angular points of the external square; the external rectangle of the equilateral triangle is a square, the vertex of one corner of the equilateral triangle is positioned on one corner point of the square externally connected with the equilateral triangle, and the vertexes of the other two corners are respectively positioned on two edges of the externally connected square; the S-shaped external rectangle is non-square; the fusiform shape is a shape with two sharp ends and a wide middle part, and can also be understood as a three-dimensional effect formed by combining two cones together by using the bottom surfaces;
setting encryption symbols and quantity, interference symbols and quantity according to the input password and a preset password arrangement rule, and specifically comprising the following steps:
when the input password is a one-digit number, selecting an equilateral triangle as an encryption symbol, and S-shaped, shuttle-shaped and circular as interference symbols;
when the input password is a two-digit number, selecting a shuttle shape and an equilateral triangle as encryption symbols, wherein the quantity of the equilateral triangle is the unit of the password, the quantity of the shuttle shape is the ten bits of the password, and the S shape and the circle are interference symbols;
when the input password is three digits, selecting a shuttle shape, an equilateral triangle and a circle as encryption symbols, selecting the equilateral triangle as the unit of the encryption symbols, and selecting the circle as ten bits of the encryption symbols and the shuttle shape as hundred bits of the password; s-shaped is an interference symbol;
the total number of the interference symbols is 0.5-1.2 times of the total number of the encryption symbols;
wherein the password is greater than 2.
The fusiform shape is a shape with two sharp ends and a wide middle part, and can also be understood as an orthographic projection effect of a three-dimensional shape formed by combining two cones together by using a bottom surface.
The invention limits the length-width ratio of each encrypted symbol, the arrangement mode in the external rectangle, and the like, so that the difference among the symbols is large, the difficulty in reading the shape of the symbol is reduced, and the shape of the symbol can be analyzed quickly and accurately.
The ranges of the selected encryption symbols and the interference symbols are crossed, and the password content can be accurately determined by combining with the corresponding preset password arrangement rule, so that the accuracy of the password is ensured. Meanwhile, the encryption symbol and the interference symbol are matched with the preset password arrangement rule, if the person who comprehensively knows the preset password arrangement rule cannot accurately determine the password, the deciphering difficulty of the encryption mode is increased, and the safety of the password-protected document is improved.
Of course, the interference symbol, the encryption symbol, and the preset password arrangement rule provided herein are only one selectable encryption manner, and other shapes may be selected as the encryption password or the interference password in practical use, and the corresponding preset password arrangement rule may also be freely combined, for example, when the input password is a one-digit number, a circle is used as the encryption symbol, and other symbols are used as the interference symbol, and a person skilled in the art may select the shape of the interference symbol, the shape of the encryption symbol, and the preset password arrangement rule according to actual needs, and details are not described here.
In the printing encryption method provided by the invention, in the encryption process of the document to be printed, the electronic document to be printed comprises an encryption area and a text area, and the text area is not overlapped with the encryption area. The text area is separated from the encryption area, and the reading of the encrypted printing file is not influenced.
In this embodiment, the above interference symbols, encryption symbols, and preset cipher arrangement rules are determined, and it is also necessary to determine how to arrange each symbol, and the preset symbol arrangement rules provided in this embodiment are described below, and include:
determining the ratio of the distance between the two equilateral triangles with the largest distance in the transverse direction to the distance between the two equilateral triangles with the largest distance in the longitudinal direction according to the digit number of the password;
when the password is a single digit, the ratio is between 0.8 and 1.2;
when the password is a two-digit number, the ratio is between 1.8 and 2.2;
when the password is three-digit, the ratio is between 2.8 and 3.2.
In this embodiment, the ratio of the distances refers to a maximum value of differences between abscissa values of right midpoints of minimum circumscribed rectangles in any two equilateral triangles, and a maximum value of differences between ordinate values of upper midpoints of minimum circumscribed rectangles in any two equilateral triangles.
The method for determining the number of the password bits according to the transverse-longitudinal distance ratio between the two symbols increases the applicability of the password, facilitates setting different symbol arrangement density degrees according to the complexity degree (number) of the password, and avoids the problem that the symbols cannot be accurately distinguished when being superposed together or the problem that all symbols are easily found due to overlarge symbol distribution range; meanwhile, the method for determining the number of the password according to the distance increases the difficulty of password decryption to a certain extent and increases the security of the password. The mode of determining the number of the password bits according to the specific symbol distance is matched with the encryption symbol, the encryption symbol and the preset password arrangement rule, so that the difficulty of password decryption is effectively increased, and the security of the encrypted file is improved; the matched encryption mode is matched with printing, and the set encryption area and the text area are printed on paper, so that malicious tampering or file replacement by others can be effectively prevented; and the common printing can realize the encryption of the document and the quick password reading and reading of the person who knows the encryption rule, thereby reducing the printing cost, reducing the password reading cost and effectively ensuring the applicability of the printing encryption method.
In order to further increase the security of the encryption mode and prevent the content from being added or deleted at the edge of the page after someone copies the encrypted printed document, the invention adopts the scheme that a plurality of encryption areas are arranged in the document, each encryption area is respectively positioned at the upper, lower, left and right edges of a text area, and the minimum distance between each encryption area and the edge of the text area corresponding to the encryption area is less than one character. In order to find the encryption area quickly to realize quick decryption, the size of the encryption symbol can be set according to the size of the main font in the text body, for example, for the font mainly including four, the size of the font with five or even smaller sizes can be used, the larger the size difference is, the more favorable the quick determination of the encryption area is, certainly, the encryption area can be completely printed, so that the maximum printing range of the printer is met when the encryption area is set, when the mark is added at the edge of the document, the mark needs to be set in the printing range of the printer, for example, the mark which needs A3 paper to be completely printed cannot be set at the edge of the A4 paper. This is the prior art and will not be described in detail herein.
In order to avoid that a plurality of passwords are read in an encrypted file and that the encrypted file is not determined to be the document encrypted password, the invention selects each encryption area to adopt the same password. In order to further increase the security of the encryption mode, the layout and placement modes of the encryption symbols and the interference symbols in each encryption area are not completely the same.
In order to make the arrangement of the encrypted symbols more regular and to facilitate reading, the encrypted symbols and the interference symbols may be selectively distributed in the encryption region in a row.
As shown in fig. 2, an exemplary flowchart of a printer data collection and analysis method provided by the present invention is provided, and the printer data analysis method can analyze a document with encrypted symbols. Especially, the document encrypted by the printing encryption method can be analyzed, and the document content and the password in the document can be rapidly identified by the printer data acquisition and analysis method provided by the invention, so that people can rapidly acquire the password in the encrypted document.
The invention also provides a printer data acquisition and analysis method, which comprises the following steps:
s21, acquiring the image of the document to be decrypted to obtain the image to be decrypted;
s22, identifying the symbol in the image to be decrypted, and determining the digit of the password according to the identified symbol and a preset symbol layout rule;
s23, determining the encrypted symbols in the identified symbols according to the determined digit of the password, and counting the number of the encrypted symbols to obtain the password;
s24, the password and the image of the document portion to be decrypted are output.
According to the printer data acquisition and analysis method provided by the invention, the document to be decrypted is scanned to obtain the image to be decrypted, and then the image to be decrypted is analyzed, so that the password of the document to be decrypted can be identified and analyzed.
In this embodiment, determining an encrypted symbol in the identified symbol according to the determined bit number of the password, and counting the number of the encrypted symbols to obtain the password specifically includes:
when the determined password is a one-digit number, determining the equilateral triangle as an encryption symbol; counting the number of triangles with medium edges in the identified symbols to obtain a password;
when the determined password is a two-digit number, determining that the shuttle shape and the equilateral triangles are encryption symbols, wherein the number of the equilateral triangles is the unit number of the password, and the number of the shuttle shape is the ten-digit number of the password; counting the number of triangles with equal edges in the identified symbols and the number of fusiform triangles to obtain a password;
when the determined password is three digits, determining that a shuttle shape, an equilateral triangle and a circle are encryption symbols, wherein the equilateral triangle is the unit of the encryption symbols, the circle is ten bits of the encryption symbols, and the shuttle shape is hundred bits of the password; and counting the number of triangles with equal edges in the identified symbols, the number of circles and the number of shuttles to obtain the password.
In this embodiment, an encryption region and a text region are arranged on the image to be decrypted, and the encryption region and the text region are not overlapped;
identifying the symbol in the image to be decrypted specifically comprises: positioning an encryption area of the image to be decrypted; and identifying the encryption area of the image to be decrypted, and acquiring all symbols in the encryption area.
In this embodiment, determining the digit of the password according to the recognized symbol and the preset symbol layout rule specifically includes:
determining the equilateral triangles closest to the edges of the encryption region, and calculating the ratio of the distance between the left and right equilateral triangles to the distance between the upper and lower equilateral triangles;
when the ratio is between 0.8 and 1.2, the password is a single digit;
when the ratio is between 1.8 and 2.2, the password is a two-digit number;
when the ratio is between 2.8 and 3.2, the password is three digits.
In practical implementation, the distance between the left and right equilateral triangles is the difference between the horizontal coordinates of the right middle points of the minimum circumscribed rectangles of the two equilateral triangles, and the distance between the upper and lower equilateral triangles is the difference between the vertical coordinates of the upper middle points of the minimum circumscribed rectangles of the two equilateral triangles.
The number of the cipher bits is determined according to the ratio of the distances during recognition, the method has the characteristics of accurate determined number of bits and small interference, and the accuracy of a recognition result is effectively guaranteed.
In this embodiment, identifying the symbol in the image to be decrypted further includes:
acquiring the minimum circumscribed rectangle of each symbol, and judging whether each minimum circumscribed rectangle is a square or not;
when the minimum circumscribed rectangle is not square, the symbol is S-shaped;
when the minimum circumscribed rectangle is a square and the edge points of the symbol are positioned on two opposite corner points of the square, the symbol is in a fusiform shape;
when the minimum circumscribed rectangle is a square, the symbol has three edge points positioned on the sides of the square, one edge point is positioned on one corner point of the square, and the other two edge points are respectively positioned on two sides of the square, the symbol is an equilateral triangle; when an edge point is located at the intersection point of two intersected sides of the square, namely the edge point can be regarded as being located on two sides at the same time, the edge point is determined to be located on an angular point, and the angular point is an end point of the side of the square, so that the edge point is located on the angular point and is also located on the side of the square;
when the minimum circumscribed rectangle is a square and the four edge points of the symbol are respectively located in the middle of the four sides of the square, the symbol is circular.
Further, in this embodiment, whether the minimum circumscribed rectangle is a square is determined by comparing the numbers of the pixel points on the two adjacent sides of the minimum circumscribed rectangle, and when the difference between the numbers of the pixel points on the two adjacent sides of the minimum circumscribed rectangle is within a certain range (for example, less than 3 pixel points), it can be determined that the minimum circumscribed rectangle is a square, and then it is determined whether the symbol is S-shaped. For the symbol with the square minimum circumscribed rectangle, the symbol can be determined to be in a fusiform shape, an equilateral triangle shape or a circular shape by judging the placing mode of the symbol in the minimum circumscribed rectangle, and the method has the characteristics that the difference between the judgment standards of the symbols is large and the symbols are not easy to be confused, and effectively ensures the accuracy of the analysis result.
The invention can read the symbol with specific length-width ratio, with low identification difficulty, and rapid and accurate analysis of the shape of the symbol.
The printing encryption method and the printer data acquisition and analysis method provided by the invention can quickly encrypt the document, can also quickly acquire the password of the encrypted file through the printer, and can judge whether the encrypted file is falsified or replaced according to whether the analyzed password is consistent with the pre-stored password or not for the file in which the password is pre-stored. The file true and false auditor can realize encryption or document decryption through the functions of scanning, analyzing and the like of the printer without learning a special password reading mode, has the characteristic of simple encryption method, can set a software program for realizing the encryption or decryption analysis method on a special printer and can also be directly connected to an expansion interface of the printer, so that the encryption is more suitable for daily use.
When the printing encryption method and the printer data acquisition and analysis method provided by the invention are applied, a unique password can be set for each document to be printed, and when the decrypted password corresponds to the password of the prestored document, the document content is judged to be true; a password threshold value can also be set for a class of documents, and when the documents are in the class and the decrypted password is within the password threshold value, the document content is judged to be true. The encryption mode of the unique password is suitable for files with higher encryption requirements, and the encryption mode of the category and the password threshold is more suitable for the condition that the number of files to be encrypted is large.
Correspondingly, the invention also discloses a printing and scanning device, which comprises a processor and a memory, wherein the memory is stored with computer instructions, the processor is used for executing the computer instructions stored in the memory, and the device realizes the steps of the method when the computer instructions are executed by the processor.
The present invention also relates to a storage medium having stored thereon computer program code which, when executed, may implement various embodiments of the method of the present invention, which may be a tangible storage medium such as an optical disk, a U-disk, a floppy disk, a hard disk, etc.
Those of skill in the art will appreciate that the various illustrative components, systems, and methods described in connection with the embodiments disclosed herein may be implemented as hardware, software, or combinations of both. Whether this is done in hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention. When implemented in hardware, it may be, for example, an electronic circuit, an Application Specific Integrated Circuit (ASIC), suitable firmware, plug-in, function card, or the like. When implemented in software, the elements of the invention are the programs or code segments used to perform the required tasks. The program or code segments may be stored in a machine-readable medium or transmitted by a data signal carried in a carrier wave over a transmission medium or a communication link. A "machine-readable medium" may include any medium that can store or transfer information. Examples of a machine-readable medium include electronic circuits, semiconductor memory devices, ROM, flash memory, Erasable ROM (EROM), floppy disks, CD-ROMs, optical disks, hard disks, fiber optic media, Radio Frequency (RF) links, and so forth. The code segments may be downloaded via computer networks such as the internet, intranet, etc.
It should also be noted that the exemplary embodiments mentioned in this patent describe some methods or systems based on a series of steps or devices. However, the present invention is not limited to the order of the above-described steps, that is, the steps may be performed in the order mentioned in the embodiments, may be performed in an order different from the order in the embodiments, or may be performed simultaneously.
Features that are described and/or illustrated with respect to one embodiment may be used in the same way or in a similar way in one or more other embodiments and/or in combination with or instead of the features of the other embodiments in the present invention.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes may be made to the embodiment of the present invention by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A print encryption method, comprising the steps of:
inputting a password and an electronic document to be encrypted;
setting encryption symbols and the number thereof, interference symbols and the number thereof according to the input password and a preset password arrangement rule;
adding each encrypted symbol and each interference symbol into the electronic document to be encrypted according to the digit of the input password, a preset symbol layout rule, the number of the encrypted symbols and the number of the interference symbols, and generating the electronic document to be printed;
and outputting the electronic document to be printed.
2. The print encryption method of claim 1, wherein the encryption symbol includes a shuttle shape, an equilateral triangle, and a circle; the interference symbols comprise fusiform, equilateral triangle, circle and S shape; the external rectangle of the fusiform is a square, and two tips of the fusiform are positioned on two opposite angular points of the external square; the external rectangle of the equilateral triangle is a square, the vertex of one corner of the equilateral triangle is positioned on one corner point of the square externally connected with the equilateral triangle, and the vertexes of the other two corners are respectively positioned on two edges of the externally connected square; the S-shaped external rectangle is non-square; the fusiform shape is a shape with two sharp ends and a wide middle part;
setting encryption symbols and the number thereof, interference symbols and the number thereof according to the input password and a preset password arrangement rule, and specifically comprising the following steps:
when the input password is a one-digit number, selecting an equilateral triangle as an encryption symbol, and S-shaped, shuttle-shaped and circular as interference symbols;
when the input password is a two-digit number, selecting a shuttle shape and an equilateral triangle as encryption symbols, wherein the quantity of the equilateral triangle is the unit of the password, the quantity of the shuttle shape is ten bits of the password, and the quantity of the S shape and the circular shape is interference symbols;
when the input password is three-digit, selecting a shuttle shape, an equilateral triangle and a circle as encryption symbols, selecting the number of the equilateral triangles as units of the encryption symbols, the number of the circle as tens of the encryption symbols and the number of the shuttle shape as hundreds of the password; s-shaped is an interference symbol;
the total number of the interference symbols is 0.5-1.2 times of the total number of the encryption symbols;
wherein the password is greater than 2.
3. The printing encryption method of claim 2, wherein the electronic document to be printed includes an encryption region and a text region, and the text region does not overlap with the encryption region.
4. The print encryption method according to claim 3, wherein the preset symbol layout rule includes:
determining the ratio of the distance between the two equilateral triangles with the largest distance in the transverse direction to the distance between the two equilateral triangles with the largest distance in the longitudinal direction according to the digit number of the password;
when the password is a single digit, the ratio is between 0.8 and 1.2;
when the password is a two-digit number, the ratio is between 1.8 and 2.2;
when the password is three-digit, the ratio is between 2.8 and 3.2.
5. A printer data acquisition and analysis method is characterized by comprising the following steps:
acquiring an image of a document to be decrypted to obtain the image to be decrypted;
identifying symbols in the image to be decrypted, and determining the digit of the password according to the identified symbols and a preset symbol layout rule;
determining an encrypted symbol in the identified symbol according to the determined digit of the password, and counting the number of the encrypted symbols to obtain the password;
and outputting the password and the image of the document part to be decrypted.
6. The printer data acquisition and analysis method according to claim 5, wherein the steps of determining the encrypted symbols in the recognized symbols according to the determined digits of the password, and counting the number of the encrypted symbols to obtain the password comprise:
when the determined password is a one-digit number, determining the equilateral triangle as an encryption symbol; counting the number of triangles with medium edges in the identified symbols to obtain a password;
when the determined password is a two-digit number, determining that the shuttle shape and the equilateral triangles are encryption symbols, wherein the number of the equilateral triangles is the unit number of the password, and the number of the shuttle shape is the ten-digit number of the password; counting the number of triangles with equal edges in the identified symbols and the number of fusiform triangles to obtain a password;
when the determined password is three digits, determining shuttle shapes, equilateral triangles and circles as encryption symbols, wherein the number of the equilateral triangles is the unit number of the encryption symbols, the number of the circles is ten bits of the encryption symbols, and the number of the shuttle shapes is hundred bits of the password; and counting the number of triangles with equal edges in the identified symbols, the number of circles and the number of shuttles to obtain the password.
7. The printer data acquisition and analysis method according to claim 6, wherein an encrypted region and a text region are provided on the image to be decrypted, the text region not overlapping the encrypted region;
identifying the symbol in the image to be decrypted specifically comprises: positioning an encryption area of the image to be decrypted; and identifying the encryption area of the image to be decrypted, and acquiring all symbols in the encryption area.
8. The printer data collecting and analyzing method of claim 7, wherein determining the number of bits of the password according to the recognized symbol and a preset symbol layout rule specifically comprises:
determining the equilateral triangles closest to the edges of the encryption region, and calculating the ratio of the distance between the left and right equilateral triangles to the distance between the upper and lower equilateral triangles;
when the ratio is between 0.8 and 1.2, the password is a single digit;
when the ratio is between 1.8 and 2.2, the password is a two-digit number;
when the ratio is between 2.8 and 3.2, the password is three digits.
9. The printer data collection analysis method of claim 8, wherein identifying the symbol in the image to be decrypted further comprises:
acquiring the minimum circumscribed rectangle of each symbol, and judging whether each minimum circumscribed rectangle is a square or not;
when the minimum circumscribed rectangle is not square, the symbol is S-shaped;
when the minimum circumscribed rectangle is a square and the edge points of the symbol are positioned on two opposite corner points of the square, the symbol is in a fusiform shape;
when the minimum circumscribed rectangle is a square, the symbol has three edge points positioned on the sides of the square, one edge point is positioned on one corner point of the square, and the other two edge points are respectively positioned on two sides of the square, the symbol is an equilateral triangle;
when the minimum circumscribed rectangle is a square and the four edge points of the symbol are respectively located in the middle of the four sides of the square, the symbol is circular.
10. A print scanning apparatus comprising a processor and a memory, the memory having stored therein computer instructions for executing computer instructions stored in the memory, the apparatus, when executed by the processor, performing the steps of the method as claimed in any one of claims 1 to 9.
CN202111020205.2A 2021-09-01 2021-09-01 Printing encryption method, printer data acquisition and analysis method and printing scanning device Active CN113467727B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111020205.2A CN113467727B (en) 2021-09-01 2021-09-01 Printing encryption method, printer data acquisition and analysis method and printing scanning device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111020205.2A CN113467727B (en) 2021-09-01 2021-09-01 Printing encryption method, printer data acquisition and analysis method and printing scanning device

Publications (2)

Publication Number Publication Date
CN113467727A true CN113467727A (en) 2021-10-01
CN113467727B CN113467727B (en) 2021-11-30

Family

ID=77867098

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111020205.2A Active CN113467727B (en) 2021-09-01 2021-09-01 Printing encryption method, printer data acquisition and analysis method and printing scanning device

Country Status (1)

Country Link
CN (1) CN113467727B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116524852A (en) * 2023-07-05 2023-08-01 禹创半导体(深圳)有限公司 LED display panel and pixel color display method and device thereof

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040061326A1 (en) * 2001-02-09 2004-04-01 David Hilton Document printed with graphical symbols which encode information
CN1790420A (en) * 2005-12-01 2006-06-21 北京北大方正电子有限公司 Method and apparatus for embedding and detecting digital watermark in text file
CN104143068A (en) * 2014-07-16 2014-11-12 宇龙计算机通信科技(深圳)有限公司 Password authentication method and system
CN207234821U (en) * 2017-09-05 2018-04-13 北京立思辰计算机技术有限公司 One kind printing safety control system
CN109614805A (en) * 2018-11-30 2019-04-12 南京林业大学 A document anti-counterfeiting generation and identification method and print driver and system
CN112463080A (en) * 2020-11-25 2021-03-09 平安信托有限责任公司 Printed file anti-forgetting method and system, electronic device and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040061326A1 (en) * 2001-02-09 2004-04-01 David Hilton Document printed with graphical symbols which encode information
CN1790420A (en) * 2005-12-01 2006-06-21 北京北大方正电子有限公司 Method and apparatus for embedding and detecting digital watermark in text file
CN104143068A (en) * 2014-07-16 2014-11-12 宇龙计算机通信科技(深圳)有限公司 Password authentication method and system
CN207234821U (en) * 2017-09-05 2018-04-13 北京立思辰计算机技术有限公司 One kind printing safety control system
CN109614805A (en) * 2018-11-30 2019-04-12 南京林业大学 A document anti-counterfeiting generation and identification method and print driver and system
CN112463080A (en) * 2020-11-25 2021-03-09 平安信托有限责任公司 Printed file anti-forgetting method and system, electronic device and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116524852A (en) * 2023-07-05 2023-08-01 禹创半导体(深圳)有限公司 LED display panel and pixel color display method and device thereof

Also Published As

Publication number Publication date
CN113467727B (en) 2021-11-30

Similar Documents

Publication Publication Date Title
US10373033B2 (en) Two dimensional barcode and method of authentication of such barcode
RU2606056C2 (en) Documents protection and authentication method and device
KR100653886B1 (en) Mixed code and mixed code encoding method and apparatus
US6742708B2 (en) Fiducial mark patterns for graphical bar codes
EP2058712B1 (en) Print control apparatus, print control method, and program therefor
CN101529888A (en) Image encryption/decryption device, method, and program
US7949175B2 (en) Counterfeit deterrence using dispersed miniature security marks
MX2010008335A (en) Two-dimensional symbol and method for reading same.
CN113467727B (en) Printing encryption method, printer data acquisition and analysis method and printing scanning device
JP4871794B2 (en) Printing apparatus and printing method
JP2009004990A (en) Image forming apparatus and image forming method
KR20150116083A (en) A Printed Document Having Function Of Preventing From Forging/Manipulating, The Method Thereof and The Inspecting Method Of The Printed Document
RU2446464C2 (en) Method and system for embedding and extracting hidden data in printed documents
US8310729B2 (en) Device capable of adjusting two-dimensional code
JPH10307886A (en) Optical information reader, information processor, document, and recording medium
EP1901226A2 (en) Hierarchical miniature security marks
US20040123100A1 (en) Certificate issuing method and certificate verifying method
JP4557875B2 (en) Image processing method and apparatus
JP4842872B2 (en) Form processing device
EP3843053B1 (en) System and method for automatic identification of photocopied documents
Li et al. An improvement for PDF417 code authentication on mobile phone terminals based on code feature analysis and watermarking
JP6420840B2 (en) Simple encoding, authentication and copy detection system for printed documents
KR101642707B1 (en) A Securities Having Function Of Preventing From Forging/Manipulating, The Method Thereof And The Inspecting Method Of The Securities
KR100860110B1 (en) Information input / output method using dot pattern
JPH0388085A (en) Optical character reader

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240410

Address after: 102600 room s1123, 1st floor, building 1, No.9 Keyuan Road, economic development zone, Daxing District, Beijing

Patentee after: Beijing Chenguang Rongxin Technology Co.,Ltd.

Country or region after: China

Address before: 3a, block B, science and technology wealth center, No. 8 Xueqing Road, Haidian District, Beijing 100086

Patentee before: Beijing Chenguang Xin'an Electronics Co.,Ltd.

Country or region before: China

TR01 Transfer of patent right