WO2019095172A1 - Qr code generating and decoding method and apparatus in qr code copying process - Google Patents
Qr code generating and decoding method and apparatus in qr code copying process Download PDFInfo
- Publication number
- WO2019095172A1 WO2019095172A1 PCT/CN2017/111213 CN2017111213W WO2019095172A1 WO 2019095172 A1 WO2019095172 A1 WO 2019095172A1 CN 2017111213 W CN2017111213 W CN 2017111213W WO 2019095172 A1 WO2019095172 A1 WO 2019095172A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- image
- dimensional code
- authentication information
- gradation value
- information
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
Definitions
- the invention relates to a method and a device for generating and decoding in a two-dimensional code copying process.
- QR code has become a universal information carrier, which has the characteristics of large amount of stored information, wide application range, strong anti-noise and anti-interference ability, and is popularized with the promotion of smart phones, especially in identity verification.
- Network transmission, e-Cert and bills have been widely used.
- QR codes which are easy to be cracked, counterfeited, and abused. Therefore, how to improve the security of QR codes, especially in the process of copying Sex has become the focus of current attention.
- the generation and replication of QR codes mainly have the following methods to improve security.
- the special printed material in the printing process can be used to print the two-dimensional code to prevent it from being copied.
- Special printing inks can also be applied to the printing of two-dimensional codes. For example, ultraviolet fluorescent inks make the printed two-dimensional code invisible under visible light to prevent it from being copied.
- Special production processes can also be used to enhance the security of QR codes. For example, special halftone printing technology can generate two-dimensional codes hidden under visible light.
- the encryption algorithm and the security protocol are used to control the generation and reading of the two-dimensional code.
- An asymmetric key encryption algorithm for example, RSA algorithm
- a PKI public key encryption system can be used to control the generation of a two-dimensional code and verify the authenticity of its information, such as Chinese patent CN201110054417.2 and CN201410520353.4 in two-dimensional code transmission or
- An asymmetric key encryption algorithm is used in the production process, and Wang et al. applied such encryption-protected system to the construction of the anti-counterfeiting platform in Using Modified Digital Halftoning Technique to Design Invisible 2D Barcode by Infrared Detection.
- the Chaotic Equation can be used to generate the QR code identity number to ensure its uniqueness and the random string cannot be copied in batches, thus effectively controlling the generation of the QR code.
- AuthPaper The ECDSA digital signature algorithm is applied within the system to prevent document counterfeiters from tampering with the content.
- the researchers also proposed some security protocols based on the communication architecture to enhance the security of the displayed two-dimensional code. For example, the researcher proposed a communication protocol called "all or nothing" based on the duplex communication system of the mobile device front camera device and the display screen. Only when the receiver can acquire the transmitted and received signals at the same time can the information of the two-dimensional code in the channel be decoded, thereby enhancing the confidentiality of the information.
- the digital watermarking technique can embed information related to the two-dimensional code in the two-dimensional code image. For example, directly using DCT and DFT to decompose the image frequency information of the two-dimensional code, it is possible to embed watermark information that is not easily perceptible to the naked eye. After the two-dimensional code image is taken, it can be decoded and the authenticity of the digital watermark information can be evaluated at the same time. Similarly, digital watermarks can also be stored in the DWT domain. For example, Chinese patent CN201710187615.3 embeds watermark information in the logo image of the two-dimensional code, Two-Level QR Code for Private Message Sharing and Document Authenticatio by Tkachenko et al.
- the generation and copying of the two-dimensional code is controlled using a pattern pattern having a copy detection feature or a physical non-cloning feature.
- the conventional two-dimensional code is composed of a large black and white block unit.
- this design is easy to copy.
- Some pattern patterns with more detail features can be used in the design of two-dimensional codes to resist the most direct scan-print form reproduction. Dirik et al.'s Copy Detection Pattern-based Document Protection for Variable Media and Gaubatz et al's Distortion Metrics for Predicting Authentication Functionality of Printed Security Deterrents use high-density black-and-white cells to form graphics in copy detection, and apply the same in the detection process.
- grayscale images can also be used in copy detection patterns.
- the decision of copy detection may be based on a variation feature of the grayscale image in the print-scan channel, mainly including high frequency features of the image, such as Gaubatz et al. extract a feature set based on the sharpness of the image in the Towards a Feature Set for Robust Printing-Imaging Cycle Device Identification using Structured Printed Markings.
- the color pattern contains information on four channels of CMYK. After copying, the characteristics of the colors (color mean, variance, entropy, etc. within the module) will make a significant difference.
- the physical unclonable function in the printed document is also used to identify illegal copying of the printed document.
- the Physical Unclonable Function is a random change produced by printing equipment and paper. Its features are easy to extract and analyze but are not easily copied and forged. For example, Wong et al.'s Counterfeit Detection using Paper PUF and Mobile Cameras and Khanna et al.'s A Survey of Forensic Characterization Methods for Physical Devices, mentioned random variations in print toner and paper, and Chiang et al., Printer and Scanner Forensics The microscopic roughness of the paper.
- the ciphertext is stored by using specific information, for example, the Chinese patent CN201110113881.X stores the ciphertext separately as the error correction code information, avoids the data area of the two-dimensional code, and has an independent ciphertext transmission function; the Chinese patent CN201610945368.4 encrypts the information.
- the storage is the mask information with the identification function, and the binary operation related to the information of the two-dimensional code, thereby covering the data of the original two-dimensional code, thereby improving the security of transmission; US Patent US201514662377A converts the encrypted information into picture information. And embedded in the two-dimensional code, combined with the two-dimensional code graphic to become a pair of pictures for transmission.
- the complexity of use Compared with the traditional two-dimensional code, the introduction of algorithms based on encryption and digital watermarking or security protocols can control the unauthorized generation of the two-dimensional code and The illegal tampering of the data, but increased the complexity of the system.
- the encryption and watermarking algorithms as an example, the complexity is mainly reflected in the following two aspects: First, in the process of generating and controlling the two-dimensional code by using the asymmetric encryption algorithm and the digital signature technology, the public key infrastructure needs to be arranged (Public) Key Infrastructure, PKI). The security of each user's private key must be guaranteed and the corresponding public key distributed through a secure communication channel. Secondly, in the process of using the information, the steps of decrypting or extracting the two-dimensional code are additionally added.
- Public Public
- the above security algorithm only guarantees the reliability of the information in the two-dimensional code in terms of information encryption, and cannot change the visibility of the information in the two-dimensional code, it is also difficult to effectively resist illegal copying.
- the copy detection pattern usually determines the authenticity of the image based on the attenuation of the high frequency information
- the copying device high-precision scanner, copying machine, etc.
- the reservation is more complete. Therefore, it is difficult to prevent the counterfeiter from copying it while ensuring the general type of the verification device.
- the encrypted information or the encrypted data occupying the storage space of the two-dimensional code means that the number of codes of the two-dimensional code is reduced, and the number of codes is reduced.
- the application range of the dimension code In addition, other information spaces also need sufficient information to effectively complete data processing, such as error correction information areas, etc., occupying these data areas will result in insufficient control of these control information, thereby indirectly reducing the code of the two-dimensional code. Quantity.
- the present invention proposes the following technical solutions.
- a first aspect of the present invention relates to a method for generating a two-dimensional code in a two-dimensional code copying process, the steps of which are: converting original information into a bit stream by an encoding method; converting the bit stream into an image of the original information a gray value; loading the authentication information, and generating an image gray value of the authentication information; superimposing the image gray value of the authentication information on the image gray value of the original data to form a superimposed gray image Adding a finder pattern to the superimposed image gradation to generate a two-dimensional code.
- the loading authentication information includes the authentication information as authentication information having a white noise characteristic.
- the generated two-dimensional code is mixed with channel noise during transmission.
- the superimposing the image gradation value of the authentication information onto the image gradation value of the original data includes the image gradation value of the original information and the The image gray value of the authentication information is superimposed in a center-aligned manner.
- the superimposing the image gradation value of the authentication information onto the image gradation value of the original data includes the image gradation value of the original information and the The superimposed position of the image gradation value of the authentication information may be in a dispersed form.
- the superimposing the image gradation value of the authentication information onto the image gradation value of the original data includes the image gradation value of the original information and the The superimposed position of the image gradation value of the authentication information is set by the mutual understanding, or by mutual agreement, or by mutual agreement, and is not disclosed.
- the superimposing the image gradation value of the authentication information onto the image gradation value of the original data includes, the original information The image gradation value and the image gradation value of the authentication information are superimposed in a specified pattern.
- the superimposing the image gradation value of the authentication information onto the image gradation value of the original data includes the image gradation value of the original information and the The image gradation value of the authentication information is superimposed with a specified gradation value.
- a second aspect of the present invention relates to a two-dimensional code decoding method in a two-dimensional code copying process, the steps of which are as follows: acquiring a two-dimensional code; and acquiring the acquired two-dimensional code image, and performing an image restoration step to restore the second
- the shape grayscale image is subjected to shape distortion, color and/or brightness distortion in the communication channel to obtain a first grayscale image of the two-dimensional code; and the first grayscale image is generated according to the signal in the two-dimensional code generation step
- Demodulating the modulation method removing the channel noise and the authentication information, obtaining a second grayscale image of the two-dimensional code, obtaining the authentication information by using the first grayscale image and the second grayscale image;
- the second grayscale image is subjected to a source decoding operation to obtain a noiseless original bitstream; the noiseless original bit data is converted into a noiseless two-dimensional code grayscale value by secondary encoding and secondary modulation.
- the first grayscale image of the two-dimensional code is demodulated according to a signal modulation method in the two-dimensional code generating step to remove channel noise and authentication information, and further includes the following steps:
- the error introduced by the channel is corrected by decoding.
- the method further includes the following steps: performing a difference operation between the first grayscale image before decoding and the second grayscale image after decoding to obtain the channel noise. And the authentication information.
- the method further includes the step of separating the authentication information from the channel noise by using a BCH decoding method.
- a third aspect of the present invention relates to a two-dimensional code generating apparatus in a two-dimensional code copying process, including: a bit stream generating module: converting original information into a bit stream by an encoding method; and an image converting module: the bit stream Converting to the image gray value of the original information; the authentication information loading module: loading the authentication information, and generating the image gray value of the authentication information; and the image superimposing module: superimposing the image gray value of the authentication information to the The superimposed grayscale image is formed on the image gray value of the original data; the two-dimensional code generating module adds a finder pattern to the superimposed image grayscale to generate a two-dimensional code.
- a fourth aspect of the present invention relates to a two-dimensional code decoding apparatus in a two-dimensional code copying process, comprising: an acquiring module: acquiring a two-dimensional code; and recovering an image module: the acquired two-dimensional code image is passed through an image a recovery step of restoring the grayscale image of the two-dimensional code in a communication letter Distortion of shape, color and/or brightness received in the track to obtain a first grayscale image of the two-dimensional code; demodulating the first grayscale image according to a signal modulation method in the two-dimensional code generating step to remove channel noise And the authentication information, obtaining a second grayscale image of the two-dimensional code, obtaining the authentication information by using the first grayscale image and the second grayscale image; and decoding the demodulation module: the demodulated second gray The degree image is subjected to a source decoding operation to obtain a noiseless original bit stream; the secondary code modulation module converts the noiseless original bit data into a noiseless two-dimensional code gray value by secondary encoding
- the two-dimensional code decoding apparatus further includes a noise separation module that separates the authentication information from the channel noise by using a BCH decoding method.
- the invention combines the communication channel model of the two-dimensional code and the characteristics of the physical device (scanning and printing device) in the scanning-printing process, and after the original two-dimensional code information is encoded and modulated, before the communication channel is transmitted, the authentication information is artificially The form of the noise is superimposed on the original information and transmitted into the communication channel together.
- the authentication information can be extracted from the receiving end, and the agreed secret is used.
- the key and decoding technology completes the decoding of the authentication information, thereby completing the authentication of the two-dimensional code and improving its security in the communication process.
- FIG. 1 is a schematic block diagram showing generation and decoding of a two-dimensional code in a two-dimensional code copying process of the present invention
- FIG. 2 is a flow chart showing a method of generating a two-dimensional code in the process of copying a two-dimensional code of the present invention
- FIG. 3 is a flow chart showing a two-dimensional code decoding method in the two-dimensional code copying process of the present invention
- FIG. 4 is a structural diagram showing a two-dimensional code generating apparatus in a two-dimensional code copying process of the present invention
- Figure 5 is a block diagram showing a two-dimensional code decoding apparatus in the two-dimensional code copying process of the present invention.
- FIG. 1 is a schematic block diagram showing two-dimensional code generation and decoding in a two-dimensional code copying process of the present invention
- FIG. 2 is a flow chart showing a two-dimensional code generating method in a two-dimensional code copying process of the present invention
- the two-dimensional code generation method and the decoding principle in the two-dimensional code copying process include encoding, modulation, authentication, de-authentication, demodulation, decoding, and the like, and the figure also shows Generate and acquire channels in the process.
- the two-dimensional code generating method and the decoding method in the two-dimensional code copying process may include the following steps: a bit stream generating step 201: converting the original information into a bit stream by using an encoding method.
- the original information input by the user may have many types, including characters, a web address, a picture, a business card, and the like, and the above information may be converted into a bit stream by encoding.
- the bit stream can be processed by using source coding, and channel coding is also needed to improve the reliability of data transmission.
- an image conversion step 202 is further included: converting the bit stream into an image gray value of the original information.
- the authentication information loading step 203 loading the authentication information and generating an image gray value of the authentication information.
- the authentication information may adopt various types of methods, such as a common ciphertext form, watermark information, and the like, and may also generate noise with white noise characteristics, especially white noise with statistically independent characteristics, thereby In this way, not only can the hidden authentication information be added to the original data with minimal interference, but also the acquisition party can separate the authentication information.
- the image superimposing step 204 is further included: superimposing the image gradation value of the authentication information on the image gradation value of the original data to form the superimposed gradation image.
- the process of loading the authentication information is generally performed by superposition, or other types of operations, such as XOR, same OR, phase, and splicing operations.
- the image gradation value of the authentication information is superimposed on the image gradation value of the original data to form a superimposed gradation image.
- a two-dimensional code generating step 205 is further included: a finder pattern is added next to the superimposed image gradation to generate a two-dimensional code.
- the channel is schematic, and as a two-dimensional code, the data channel that passes through is generated from acquisition to acquisition.
- channels are transport type, but can also represent the process between generation and acquisition.
- the user presents the two-dimensional code on the paper medium by printing, for example, on the billboard, and other authorized users can obtain the two-dimensional code by shooting or scanning.
- ⁇ Printing ⁇ Scanning process can be considered as passing the channel.
- the two-dimensional code passing through the channel inevitably incorporates channel noise, which may include light, shading, shading, refraction, distortion, blurring, sharpening, missing, and the like.
- channel noise may include light, shading, shading, refraction, distortion, blurring, sharpening, missing, and the like.
- the two-dimensional code itself has strong error correction capability, but after acquiring the two-dimensional code, the noise on the image can be removed by filtering, or modulation, or demodulation, and the noise is often channel noise.
- the loading in the process of loading the authentication information, the loading may be performed by superimposing.
- the present invention considers selecting a superimposed position, selecting a superimposed angle, or selecting another superimposing manner as a way to avoid illegal copying.
- the following methods can be used for superposition.
- the image gradation value of the original information and the image gradation value of the authentication information may be superimposed in a center-aligned manner; the authentication information may be dispersed while being in the image The corners are superimposed; the authentication information can also be lengthened and superimposed along the edges of the QR code.
- the location of the overlay may not be disclosed to the public, and the location of the overlay may be set up and obtained by mutual agreement or by mutual agreement, thereby further preventing malicious third parties from copying and improving the security of the authentication information. .
- the authentication information may be formed into a designated pattern and then superimposed; or the superimposition may be performed according to the specified pattern.
- the authentication information may be performed using a pattern of "rings".
- Superimposed In particular, the superimposed pattern may not be disclosed to the public, and may be set up and acquired by using mutual understanding, or by mutual agreement, or by mutual agreement, thereby further preventing malicious third parties from copying and improving the security of the authentication information. .
- the angle of superposition may not be disclosed to the public, either by the parties, or by mutual agreement or by mutual agreement. The way to set up and obtain the angle of the overlay, thereby further avoiding the malicious third party to copy and improve the security of the authentication information.
- the superimposition may be performed according to the specified gradation value, for example, superimposed on all modules having a gradation value of 100.
- the superimposed gradation may not be disclosed to the public, and the gradation of the superimposed gradation may be set by using the mutual understanding or the agreement between the two parties or the two parties to negotiate, thereby further preventing the malicious third party from copying and improving the authentication information. safety.
- processing may be simultaneously considered from the superimposed position and the superimposed pattern.
- the superimposed position may select, for example, a corner
- the superimposed pattern may select, for example, a square, Round, or a specific pattern.
- FIG. 3 is a flow chart showing a two-dimensional code decoding method in the two-dimensional code copying process of the present invention.
- Step 208 is obtained to obtain a two-dimensional code.
- the two-dimensional code can be acquired in various possible ways. For example, by acquiring or scanning a two-dimensional code, a two-dimensional code picture can also be obtained by pre-storing, downloading, instant transmission, mail receiving, etc., and then extracting the two-dimensional code therein by using a picture processing program.
- a recovery step 209 is further included, and the acquired two-dimensional code image is subjected to an image restoration step to restore distortion, color, and/or brightness distortion of the two-dimensional code gray image received in the communication channel.
- the first grayscale image of the two-dimensional code is further included, and the acquired two-dimensional code image is subjected to an image restoration step to restore distortion, color, and/or brightness distortion of the two-dimensional code gray image received in the communication channel.
- the method further includes the removing step 210: after the acquired two-dimensional code image is subjected to an image restoration step, the shape distortion, color, and/or brightness distortion received by the two-dimensional code gray image in the communication channel is restored.
- the first grayscale image of the two-dimensional code In the middle of generating a two-dimensional code to obtain a two-dimensional code, the channel may cause some errors, which need to be corrected by decoding.
- the second grayscale image corresponds to the image data before the authentication information is loaded during the generation process, and therefore, the difference between the first grayscale image before decoding and the decoded grayscale image is performed. That is, channel noise and authentication information can be obtained.
- the BCH decoding method is required to separate the authentication information from the channel noise.
- a decoding and demodulating step 211 is further included: the demodulated second grayscale image is subjected to a source decoding operation to obtain a noiseless original bitstream.
- a secondary decoding modulation step 212 is further included: converting the noiseless original bit data into a noiseless two-dimensional code gray value by secondary encoding and secondary modulation.
- the encryption and authentication of the information encoded by the user is completed by decoding the authentication information.
- Fig. 4 is a block diagram showing a two-dimensional code generating apparatus in the two-dimensional code copying process of the present invention.
- the method includes a bit stream generating module 301: converting the original information into a bit stream by using an encoding method;
- the original information can have many types, including characters, URLs, pictures, business cards, etc., and the above information can be converted into a bit stream by encoding.
- the bit stream can be processed by using source coding, and channel coding is also needed to improve the reliability of data transmission.
- an image conversion module 302 is further included that converts the bit stream into an image gray value of the original information.
- an authentication information loading module 303 is further included, which loads the authentication information and generates an image gray value of the authentication information.
- the authentication information can be in various types, such as common ciphertext forms, watermark information, etc., and can also generate noise with white noise characteristics, especially white noise with statistically independent characteristics, so that this method can not only maximize The local authentication data is added to the original data with less interference, and the acquisition party is separated from the authentication information.
- an image superimposition module 304 is further included, which superimposes the image gradation value of the authentication information on the image gradation value of the original data to form a superimposed gradation image.
- the process of loading the authentication information is generally performed by superposition, or other types of operations, such as XOR, same OR, phase, and splicing operations.
- the image gradation value of the authentication information is superimposed on the image gradation value of the original data to form a superimposed gradation image.
- a two-dimensional code generation module 305 is further included, which adds a finder pattern to the superimposed image gradation to generate a two-dimensional code.
- the channel in the two-dimensional code copying process is of a transmission type, but may also represent a process between generation and acquisition.
- the two-dimensional code is displayed on the paper medium by printing, for example, on the billboard, and other authorized users can obtain the two-dimensional code by shooting or scanning.
- the process of generating ⁇ printing ⁇ scanning can be considered as passing The channel.
- the two-dimensional code passing through the channel inevitably incorporates channel noise, which may include light, shading, shading, refraction, distortion, blurring, sharpening, missing, and the like.
- channel noise may include light, shading, shading, refraction, distortion, blurring, sharpening, missing, and the like.
- the two-dimensional code itself has strong error correction capability, but after acquiring the two-dimensional code, the noise on the image can be removed by filtering, or modulation, or demodulation, and the noise is often channel noise.
- the loading in the process of loading the authentication information, the loading may be performed by superimposing.
- the present invention considers selecting a superimposed position, selecting a superimposed angle, or selecting another superimposing manner as a way to avoid illegal copying.
- the following methods can be used for superposition.
- the image gradation value of the original information and the image gradation value of the authentication information may be superimposed in a center-aligned manner; the authentication information may be dispersed while being in the image The corners are superimposed; the authentication information can also be lengthened and superimposed along the edges of the QR code.
- the location of the overlay may not be disclosed to the public, and the location of the overlay may be set up and obtained by mutual agreement or by mutual agreement, thereby further preventing malicious third parties from copying and improving the security of the authentication information. .
- the authentication information may be formed into a designated pattern and then superimposed; or the superimposition may be performed according to the specified pattern.
- the authentication information may be performed using a pattern of "rings".
- Superimposed In particular, the superimposed pattern may not be disclosed to the public, and may be set up and acquired by using mutual understanding, or by mutual agreement, or by mutual agreement, thereby further preventing malicious third parties from copying and improving the security of the authentication information. .
- the angle of superposition may not be disclosed to the public, and the use of both parties to know, or the agreement between the two parties, or the two parties to negotiate and obtain the superposition angle, thereby further avoiding the malicious third party to copy and improve the security of the authentication information. .
- the superimposition may be performed according to the specified gradation value, for example, superimposed on all modules having a gradation value of 100.
- the superimposed gradation may not be disclosed to the public, and the gradation of the superimposed gradation may be set by using the mutual understanding or the agreement between the two parties or the two parties to negotiate, thereby further preventing the malicious third party from copying and improving the authentication information. safety.
- processing may be simultaneously considered from the superimposed position and the superimposed pattern.
- the superimposed position may select, for example, a corner
- the superimposed pattern may select, for example, a square, Round, or a specific pattern.
- Figure 5 is a block diagram showing a two-dimensional code decoding apparatus in the two-dimensional code copying process of the present invention.
- the two-dimensional code needs to be decoded, which corresponds to the steps in the process of generating the two-dimensional code
- the present embodiment provides a A two-dimensional code decoding device in the process of copying a two-dimensional code. It includes obtaining a two-dimensional code by the acquisition module 401.
- the two-dimensional code is obtained by shooting or scanning, and the two-dimensional code picture can also be obtained by pre-storing, downloading, instant transmission, mail receiving, etc., and then extracting the two-dimensional code by using the image processing program.
- the image recovery module 402 is further included: the acquired two-dimensional code image is subjected to an image restoration step to restore shape distortion, color and/or brightness distortion received by the two-dimensional code gray image in the communication channel. A first grayscale image of the two-dimensional code is obtained.
- the method further includes a noise removal and authentication information module 403: demodulating the first grayscale image according to a signal modulation method in the two-dimensional code generating step, removing channel noise and authentication information, and obtaining a second of the two-dimensional code.
- the grayscale image, the authentication information is obtained by the first grayscale image and the second grayscale image.
- the channel may cause some errors, which need to be corrected by decoding.
- the second grayscale image corresponds to the image data before the authentication information is loaded during the generation process, and therefore, the difference between the first grayscale image before decoding and the second grayscale image after decoding is performed. Operation, that is, channel noise and authentication information can be obtained. In this case, the BCH decoding method is required to separate the authentication information from the channel noise.
- the authentication information after the authentication information is loaded on the two-dimensional code, it can be separated in various ways. Generally, the following information can be separated from the image. In the manner, for example, edge sharpening method, gradient descent method, pixel difference method, etc., by these methods, the loaded authentication information can be separated from the image, and finally the corresponding authentication information is obtained.
- the authentication information is noise with white noise characteristics, it is necessary to separate the authentication information and the channel noise from the two-dimensional code by means of filtering, modulation or demodulation, but in this case, the authentication information and the channel noise It is separated as a whole, so it is necessary to further separate the authentication information and channel noise.
- the authentication information can be separated using BCH decoding techniques to obtain separate authentication information.
- the decoding and demodulation module 404 is further included: the decoded second grayscale image is subjected to a source decoding operation to obtain a noiseless original bitstream.
- the secondary decoding modulation module 405 converts the noiseless original bit data into a noiseless two-dimensional code gray value by secondary encoding and secondary modulation. Finally, the encryption and authentication of the information encoded by the user is completed by decoding the authentication information.
- the following module is further included: the error correction module 406: the error introduced by the channel will be corrected by decoding.
- the difference operation module 407 performs a difference operation between the first grayscale image before decoding and the second grayscale image after decoding to obtain channel noise and authentication information.
- the noise separation module 408 separates the authentication information from the channel noise by using the BCH decoding method, and the authentication module 409: completes encryption and authentication of the information encoded by the user by decoding the authentication information.
- the invention combines the communication channel model of the two-dimensional code and the characteristics of the physical device (scanning and printing device) in the scanning-printing process, and after the original two-dimensional code information is encoded and modulated, before the communication channel is transmitted, the authentication information is artificially The form of the noise is superimposed on the original information and transmitted into the communication channel together.
- the authentication information can be extracted from the receiving end, and the agreed secret is used.
- the key and decoding technology completes the decoding of the authentication information, thereby completing the authentication of the two-dimensional code and improving its security in the communication process.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
A generating and decoding method in a QR code copying process. In combination with a QR code communication channel model and physical device features in a scanning-printing process, after original QR code information is encoded and modulated and before the information enters a communication channel for transmission, authentication information is superposed onto the original information in the form of artificial noise to be transmitted into the communication channel together; the authentication information can be extracted from a receiving terminal by comparing and analyzing a QR code subjected to image restoration and the QR code subjected to noise removal; the authentication information is decoded by using an agreed key and a decoding technology. Therefore, the QR code is authenticated and the security of the QR code in a communication process is improved.
Description
本发明涉及一种二维码复制过程中生成、解码方法及装置。The invention relates to a method and a device for generating and decoding in a two-dimensional code copying process.
近年来,二维码已经成为通用的信息载体,具有存储信息量大、应用范围广、抗噪抗干扰能力强等特点,并且随着智能手机的推广而不断地普及,特别是在身份验证、网络传输、电子证书及票据等方面得到了广泛的应用。然而,二维码的生成、复制、传输、接收等操作存在着比较多的漏洞,容易被人破解、制伪及滥用,因此,如何提高二维码的安全性,特别在复制过程中的安全性成为目前关注的重点。如今,二维码的生成和复制主要有以下一些提高安全性的方法。In recent years, QR code has become a universal information carrier, which has the characteristics of large amount of stored information, wide application range, strong anti-noise and anti-interference ability, and is popularized with the promotion of smart phones, especially in identity verification. Network transmission, e-Cert and bills have been widely used. However, there are many loopholes in the generation, copying, transmission, and receiving of QR codes, which are easy to be cracked, counterfeited, and abused. Therefore, how to improve the security of QR codes, especially in the process of copying Sex has become the focus of current attention. Nowadays, the generation and replication of QR codes mainly have the following methods to improve security.
使用特殊的打印材料或工艺,控制二维码的生成与复制。通过在打印过程的特殊打印材料,例如全息(holographic)材料与具有独特光学特征的聚合液晶材料可被用于印制二维码以防止其被复制。特殊的打印墨水也可以被应用于二维码的印制上,例如紫外荧光油墨使所印制的二维码在可见光下不可见,以防止其被复制。特殊的生产工艺亦可用于加强二维码的安全性,例如特殊的半色调打印技术可生成在可见光下隐藏的二维码。Control the generation and copying of QR codes using special printed materials or processes. The special printed material in the printing process, such as holographic materials and polymeric liquid crystal materials having unique optical characteristics, can be used to print the two-dimensional code to prevent it from being copied. Special printing inks can also be applied to the printing of two-dimensional codes. For example, ultraviolet fluorescent inks make the printed two-dimensional code invisible under visible light to prevent it from being copied. Special production processes can also be used to enhance the security of QR codes. For example, special halftone printing technology can generate two-dimensional codes hidden under visible light.
使用加密算法与安全协议,控制二维码的生成与读取。非对称密钥的加密算法(例如,RSA算法)与PKI公钥加密体系可用于控制二维码生成并验证其信息的真伪,例如中国专利CN201110054417.2以及CN201410520353.4在二维码传送或者制作过程中采用了非对称密钥的加密算法,并且Wang等人在Using Modified Digital Halftoning Technique to Design Invisible 2D Barcode by Infrared Detection将此类具有加密保护的系统应用于防伪平台的构建。混沌方程(Chaotic Equation)可被用于二维码身份编号的生成过程,以保证其唯一性且随机字符串无法被批量复制,从而最终有效控制二维码的生成。类似地,AuthPaper
系统内应用了ECDSA数字签名算法,以防止文档伪造者对其中内容进行篡改。除了加密算法外,研究者也提出了一些基于通信架构的安全协议增强所显示二维码的安全性。例如,研究者基于移动设备前置摄像设备与显示屏的双工通信系统,提出了一种称为“all or nothing”的通信协议。只有当接收者可同时获取所传输及接收的信号时,才能对信道中二维码的信息进行解码,进而增强了信息的保密性。The encryption algorithm and the security protocol are used to control the generation and reading of the two-dimensional code. An asymmetric key encryption algorithm (for example, RSA algorithm) and a PKI public key encryption system can be used to control the generation of a two-dimensional code and verify the authenticity of its information, such as Chinese patent CN201110054417.2 and CN201410520353.4 in two-dimensional code transmission or An asymmetric key encryption algorithm is used in the production process, and Wang et al. applied such encryption-protected system to the construction of the anti-counterfeiting platform in Using Modified Digital Halftoning Technique to Design Invisible 2D Barcode by Infrared Detection. The Chaotic Equation can be used to generate the QR code identity number to ensure its uniqueness and the random string cannot be copied in batches, thus effectively controlling the generation of the QR code. Similarly, AuthPaper
The ECDSA digital signature algorithm is applied within the system to prevent document counterfeiters from tampering with the content. In addition to the encryption algorithm, the researchers also proposed some security protocols based on the communication architecture to enhance the security of the displayed two-dimensional code. For example, the researcher proposed a communication protocol called "all or nothing" based on the duplex communication system of the mobile device front camera device and the display screen. Only when the receiver can acquire the transmitted and received signals at the same time can the information of the two-dimensional code in the channel be decoded, thereby enhancing the confidentiality of the information.
使用数字水印技术,控制二维码的生成。数字水印技术可将与二维码相关的信息嵌入在二维码图像中。例如,直接利用DCT和DFT分解二维码的图像频率信息,可在当中嵌入肉眼不易察觉的水印信息。在拍摄二维码图像后,可对其进行解码并同时评估数字水印信息的真实性。类似地,数字水印也可储存于DWT域内。例如中国专利CN201710187615.3在二维码的logo图像中嵌入了水印信息,Tkachenko等人的Two-Level QR Code for Private Message Sharing and Document Authenticatio以及Baras等人的Towards a Realistic Channel Model for Security Analysis of Authentication using Graphical Codes都提出了一种保证水印信息更鲁棒的方法,利用二维码的信息冗余度,修改部分模块的整体亮度以储存二维码内容的数字签名。Tkachenko等人在Centrality Bias Measure for High Density QR Code Module Recognition中综合考虑水印信息的鲁棒程度及容量,利用二维码解码过程中对每个模块的失真容忍度,修改模块的样式以储存水印信息。Use digital watermarking technology to control the generation of QR codes. The digital watermarking technique can embed information related to the two-dimensional code in the two-dimensional code image. For example, directly using DCT and DFT to decompose the image frequency information of the two-dimensional code, it is possible to embed watermark information that is not easily perceptible to the naked eye. After the two-dimensional code image is taken, it can be decoded and the authenticity of the digital watermark information can be evaluated at the same time. Similarly, digital watermarks can also be stored in the DWT domain. For example, Chinese patent CN201710187615.3 embeds watermark information in the logo image of the two-dimensional code, Two-Level QR Code for Private Message Sharing and Document Authenticatio by Tkachenko et al. and Towards a Realistic Channel Model for Security Analysis of Authentication by Baras et al. Using Graphical Codes has proposed a method to ensure more robust watermark information. Using the information redundancy of the two-dimensional code, the overall brightness of some modules is modified to store the digital signature of the two-dimensional code content. Tkachenko et al. comprehensively consider the robustness and capacity of watermark information in Centrality Bias Measure for High Density QR Code Module Recognition, and use the distortion tolerance of each module in the process of decoding QR code to modify the module's style to store watermark information. .
使用具有拷贝检测特征的图案样式或物理不可克隆特征,控制二维码的生成与复制。出于对解码稳定性的考虑,传统二维码由足够大的黑白块状单元组成。然而,这种设计易于被拷贝。一些具有更多细节特征图案样式可被用于二维码的设计中,以抵抗最直接的扫描-打印形式复制。Dirik等人的Copy Detection Pattern-based Document Protection for Variable Media以及Gaubatz等人的Distortion Metrics for Predicting Authentication Functionality of Printed Security Deterrents在拷贝检测中采用高密度的黑白单元组成图形的图形,并在检测过程运用对数正态分布作为打印-扫描信道的关键模型。除了黑白二值图像,灰度图像也可被用于拷贝检测图案中。其中,拷贝检测的决策可基于灰度图像在打印-扫描信道中的变化特征,主要包括图像的高频特征,如
Gaubatz等人在Towards a Feature Set for Robust Printing-Imaging Cycle Device Identification using Structured Printed Markings基于图像的锐利度来提取特征集合。与灰度图像相比,彩色图案包含了CMYK四个通道的信息。经过拷贝后,其中的颜色的特征(模块内的颜色均值,方差,熵等)会产生明显的区别。除了上述细节图案特征外,在打印文档中的物理不可克隆函数也被运用于识别对打印文档的非法复制。其中的物理不可克隆函数(Physical Unclonable Function,PUF)是由打印设备和纸张所产生的随机变化,其特征易于提取及分析但却不容易被复制伪造。例如,Wong等人的Counterfeit Detection using Paper PUF and Mobile Cameras以及Khanna等人的A Survey of Forensic Characterization Methods for Physical Devices提到的打印碳粉和纸张的随机变化,以及Chiang等人的Printer and Scanner Forensics提到的纸张的微观粗糙程度。The generation and copying of the two-dimensional code is controlled using a pattern pattern having a copy detection feature or a physical non-cloning feature. For the sake of decoding stability, the conventional two-dimensional code is composed of a large black and white block unit. However, this design is easy to copy. Some pattern patterns with more detail features can be used in the design of two-dimensional codes to resist the most direct scan-print form reproduction. Dirik et al.'s Copy Detection Pattern-based Document Protection for Variable Media and Gaubatz et al's Distortion Metrics for Predicting Authentication Functionality of Printed Security Deterrents use high-density black-and-white cells to form graphics in copy detection, and apply the same in the detection process. The number normal distribution is used as a key model for the print-scan channel. In addition to black and white binary images, grayscale images can also be used in copy detection patterns. Wherein, the decision of copy detection may be based on a variation feature of the grayscale image in the print-scan channel, mainly including high frequency features of the image, such as
Gaubatz et al. extract a feature set based on the sharpness of the image in the Towards a Feature Set for Robust Printing-Imaging Cycle Device Identification using Structured Printed Markings. Compared to grayscale images, the color pattern contains information on four channels of CMYK. After copying, the characteristics of the colors (color mean, variance, entropy, etc. within the module) will make a significant difference. In addition to the above detailed pattern features, the physical unclonable function in the printed document is also used to identify illegal copying of the printed document. The Physical Unclonable Function (PUF) is a random change produced by printing equipment and paper. Its features are easy to extract and analyze but are not easily copied and forged. For example, Wong et al.'s Counterfeit Detection using Paper PUF and Mobile Cameras and Khanna et al.'s A Survey of Forensic Characterization Methods for Physical Devices, mentioned random variations in print toner and paper, and Chiang et al., Printer and Scanner Forensics The microscopic roughness of the paper.
使用特定信息存储密文,例如中国专利CN201110113881.X将密文单独存储为纠错码信息,避开了二维码的数据区,具有独立的密文传输功能;中国专利CN201610945368.4将加密信息存储为具有标识作用的掩码信息,和二维码的信息进行相关的二进制运算,从而覆盖了原来二维码的数据,提高了传输的安全性;美国专利US201514662377A将加密信息转换为图片信息,并且嵌入到二维码中,与二维码图形结合成为一副图片进行传输。The ciphertext is stored by using specific information, for example, the Chinese patent CN201110113881.X stores the ciphertext separately as the error correction code information, avoids the data area of the two-dimensional code, and has an independent ciphertext transmission function; the Chinese patent CN201610945368.4 encrypts the information. The storage is the mask information with the identification function, and the binary operation related to the information of the two-dimensional code, thereby covering the data of the original two-dimensional code, thereby improving the security of transmission; US Patent US201514662377A converts the encrypted information into picture information. And embedded in the two-dimensional code, combined with the two-dimensional code graphic to become a pair of pictures for transmission.
上述几类方法,能不同程度地增强二维码安全性,但是也带来了一些问题。The above types of methods can enhance the security of the two-dimensional code to varying degrees, but also bring some problems.
一方面降低二维码在通用性上的优势。以特殊的打印材料或工艺制作二维码,可加强对生成过程的控制以抵御对二维码的非法复制,但却无可避免地降低了二维码的通用性(增加了二维码的生产成本以及对特殊设备的依赖性)。与同类技术(如,RFID与智能传感器)相比,二维码的主要优势在于其极低的成本以及不依赖于特殊硬件的灵活性。因此,这类基于特殊的打印材料或工艺的方法将大大地降低二维码在物联网中大规模应用的竞争力。On the one hand, it reduces the advantage of the two-dimensional code in versatility. Making a two-dimensional code with a special printing material or process can strengthen the control of the generation process to resist the illegal copying of the two-dimensional code, but inevitably reduces the versatility of the two-dimensional code (adding the two-dimensional code Production costs and dependence on special equipment). Compared with similar technologies (such as RFID and smart sensors), the main advantages of QR codes are their extremely low cost and flexibility that does not depend on special hardware. Therefore, such methods based on special printed materials or processes will greatly reduce the competitiveness of two-dimensional codes for large-scale applications in the Internet of Things.
一方面增加使用复杂度。与传统二维码相比,引入基于加密与数字水印等算法或安全协议的方案可控制二维码未经授权的生成以及对
当中数据的非法篡改,但却增加了系统的复杂度。以加密与水印算法为例,其复杂度主要体现在以下两个方面:首先,在利用非对称加密算法以及数字签名技术对二维码进行生成控制的过程中,需要布置公钥基础设施(Public Key Infrastructure,PKI)。须保证每个用户私钥的安全性,及通过安全的通信渠道分发相应的公钥。其次,在信息使用的过程中,额外增加了对二维码的解密或信息提取步骤。On the one hand, increase the complexity of use. Compared with the traditional two-dimensional code, the introduction of algorithms based on encryption and digital watermarking or security protocols can control the unauthorized generation of the two-dimensional code and
The illegal tampering of the data, but increased the complexity of the system. Taking the encryption and watermarking algorithms as an example, the complexity is mainly reflected in the following two aspects: First, in the process of generating and controlling the two-dimensional code by using the asymmetric encryption algorithm and the digital signature technology, the public key infrastructure needs to be arranged (Public) Key Infrastructure, PKI). The security of each user's private key must be guaranteed and the corresponding public key distributed through a secure communication channel. Secondly, in the process of using the information, the steps of decrypting or extracting the two-dimensional code are additionally added.
一方面无法有效解决抵御非法复制与普遍适用性的矛盾。最重要的是,即使二维码应用了拷贝检测图案与物理不可克隆函数,或者是上述安全(加密与数字水印)算法,也难以在物联网的系统框架下防止伪造者复制该二维码。基于物理不可克隆函数所提取的图像特征涉及打印输出图像中的细节。为了准确抓取此类特征,需对二维码的验证环境有一定的限制,这不符合物联网的普遍适用性主旨。例如,将所验证的文档置于相对固定的距离与光照环境中。另一方面,由于上述的安全算法只在信息加密方面保证了二维码当中信息的可靠性,无法改变二维码中信息的可视性,因此也难以有效抵抗非法复制。此外,由于拷贝检测图案通常基于高频信息的衰减来判断该图像的真伪,而攻击者所使用的复制设备(高精度扫描仪、复印机等)往往具有更高的分辨率且对高频信息的保留更完整。因此,难以在保证验证设备通用型的前提下防止伪造者对其进行复制。On the one hand, it is impossible to effectively resolve the contradiction between resisting illegal copying and universal applicability. Most importantly, even if the two-dimensional code applies a copy detection pattern and a physical unclonable function, or the above-mentioned security (encryption and digital watermark) algorithm, it is difficult to prevent the counterfeiter from copying the two-dimensional code under the system framework of the Internet of Things. Image features extracted based on physical unclonable functions relate to details in the printed output image. In order to accurately capture such features, there is a certain limit to the verification environment of the two-dimensional code, which does not meet the general applicability of the Internet of Things. For example, placing the verified document in a relatively fixed distance and lighting environment. On the other hand, since the above security algorithm only guarantees the reliability of the information in the two-dimensional code in terms of information encryption, and cannot change the visibility of the information in the two-dimensional code, it is also difficult to effectively resist illegal copying. In addition, since the copy detection pattern usually determines the authenticity of the image based on the attenuation of the high frequency information, the copying device (high-precision scanner, copying machine, etc.) used by the attacker tends to have higher resolution and high-frequency information. The reservation is more complete. Therefore, it is difficult to prevent the counterfeiter from copying it while ensuring the general type of the verification device.
一方面侵占了其他数据的存储和操作空间。特别是占据二维码本身的存储空间,由于二维码携带的数据量是一定的,因此加密信息或者加密数据占据二维码的存储空间就意味二维码的成码数量减少,缩小了二维码的应用范围。此外,其他信息空间也需要足够的信息量才能有效地完成数据处理,例如纠错信息区域等,占据这些数据区域会导致这些控制信息的保有量不足,从而间接地减少了二维码的成码数量。On the one hand, it encroaches on the storage and operation space of other data. In particular, occupying the storage space of the two-dimensional code itself, since the amount of data carried by the two-dimensional code is constant, the encrypted information or the encrypted data occupying the storage space of the two-dimensional code means that the number of codes of the two-dimensional code is reduced, and the number of codes is reduced. The application range of the dimension code. In addition, other information spaces also need sufficient information to effectively complete data processing, such as error correction information areas, etc., occupying these data areas will result in insufficient control of these control information, thereby indirectly reducing the code of the two-dimensional code. Quantity.
综上所述,近年来人们已经意识到二维码在生成以及复制控制方面问题,并提出了一些解决方案,且对生成控制方面带来了有效的控制。然而这些方法在保证二维码的唯一性,即抵御非法复制方面的综合表现仍有待进一步提高。面对日益严重的产品仿冒以及相对初步的二维码溯源防伪系统框架,需要积极探索提高二维码安全性以抵御非
法复制的新理论与技术方案。In summary, in recent years, people have realized the problems of QR code generation and copy control, and proposed some solutions, and brought effective control to the generation control. However, the comprehensive performance of these methods in ensuring the uniqueness of the two-dimensional code, that is, resisting illegal copying, needs to be further improved. In the face of increasingly serious product counterfeiting and relatively preliminary two-dimensional code traceability anti-counterfeiting system framework, it is necessary to actively explore and improve the security of QR code to resist non-
New theory and technical solutions for legal reproduction.
发明内容Summary of the invention
由于现阶段人们对于二维码的使用已经不仅局限于公众号的添加和商品费用的支付,在广泛使用的同时,人们越来越关注二维码的安全性问题。为提高二维码在复制过程中的安全性,本发明提出了以下技术方案。Since the use of two-dimensional codes by people at this stage is not limited to the addition of public numbers and the payment of commodity fees, people are paying more and more attention to the security of two-dimensional codes while widely used. In order to improve the security of the two-dimensional code in the copying process, the present invention proposes the following technical solutions.
本发明第一方面涉及了一种二维码复制过程中的二维码生成方法,其步骤如下:将原始信息通过编码方式转换成比特流;将所述比特流转换为所述原始信息的图像灰度值;加载认证信息,并生成所述认证信息的图像灰度值;将所述认证信息的图像灰度值叠加到所述原始数据的图像灰度值上,形成叠加后的灰度图像;在所述叠加后的图像灰度旁加上寻像图案,生成二维码。A first aspect of the present invention relates to a method for generating a two-dimensional code in a two-dimensional code copying process, the steps of which are: converting original information into a bit stream by an encoding method; converting the bit stream into an image of the original information a gray value; loading the authentication information, and generating an image gray value of the authentication information; superimposing the image gray value of the authentication information on the image gray value of the original data to form a superimposed gray image Adding a finder pattern to the superimposed image gradation to generate a two-dimensional code.
在本发明所涉及的二维码生成方法中,所述加载认证信息包括所述认证信息为具有白噪声特征的认证信息。In the two-dimensional code generating method according to the present invention, the loading authentication information includes the authentication information as authentication information having a white noise characteristic.
在本发明所涉及的二维码生成方法中,生成后的所述二维码在传输过程中将混入信道噪声。In the two-dimensional code generating method according to the present invention, the generated two-dimensional code is mixed with channel noise during transmission.
在本发明所涉及的二维码生成方法中,所述将所述认证信息的图像灰度值叠加到所述原始数据的图像灰度值上包括,所述原始信息的图像灰度值和所述认证信息的图像灰度值采用中心对齐的方式进行叠加。In the two-dimensional code generating method of the present invention, the superimposing the image gradation value of the authentication information onto the image gradation value of the original data includes the image gradation value of the original information and the The image gray value of the authentication information is superimposed in a center-aligned manner.
在本发明所涉及的二维码生成方法中,所述将所述认证信息的图像灰度值叠加到所述原始数据的图像灰度值上包括,所述原始信息的图像灰度值和所述认证信息的图像灰度值的叠加位置可以是分散的形式。In the two-dimensional code generating method of the present invention, the superimposing the image gradation value of the authentication information onto the image gradation value of the original data includes the image gradation value of the original information and the The superimposed position of the image gradation value of the authentication information may be in a dispersed form.
在本发明所涉及的二维码生成方法中,所述将所述认证信息的图像灰度值叠加到所述原始数据的图像灰度值上包括,所述原始信息的图像灰度值和所述认证信息的图像灰度值的叠加位置采用双方知晓、或者双方约定、或者双方协商的方式进行设置,并且不对外公开。In the two-dimensional code generating method of the present invention, the superimposing the image gradation value of the authentication information onto the image gradation value of the original data includes the image gradation value of the original information and the The superimposed position of the image gradation value of the authentication information is set by the mutual understanding, or by mutual agreement, or by mutual agreement, and is not disclosed.
在本发明所涉及的二维码生成方法中,所述将所述认证信息的图像灰度值叠加到所述原始数据的图像灰度值上包括,所述原始信息的
图像灰度值和所述认证信息的图像灰度值以指定图案进行叠加。In the two-dimensional code generating method of the present invention, the superimposing the image gradation value of the authentication information onto the image gradation value of the original data includes, the original information
The image gradation value and the image gradation value of the authentication information are superimposed in a specified pattern.
在本发明所涉及的二维码生成方法中,所述将所述认证信息的图像灰度值叠加到所述原始数据的图像灰度值上包括,所述原始信息的图像灰度值和所述认证信息的图像灰度值以指定灰度值进行叠加。In the two-dimensional code generating method of the present invention, the superimposing the image gradation value of the authentication information onto the image gradation value of the original data includes the image gradation value of the original information and the The image gradation value of the authentication information is superimposed with a specified gradation value.
本发明第二方面涉及了一种二维码复制过程中的二维码解码方法,其步骤如下:获取二维码;将获取的所述二维码图像,经过图像恢复步骤,还原所述二维码灰度图像在通信信道中所受到的形状畸变、颜色和/或亮度失真,得到二维码的第一灰度图像;将所述第一灰度图像根据二维码生成步骤中的信号调制方法解调,去除信道噪声和认证信息,得到二维码的第二灰度图像,通过所述第一灰度图像和所述第二灰度图像得到认证信息;将解调后的所述第二灰度图像经过信源解码操作,得到无噪声的原始比特流;通过二次编码和二次调制将所述无噪声原始比特数据转换成无噪声的二维码灰度值。A second aspect of the present invention relates to a two-dimensional code decoding method in a two-dimensional code copying process, the steps of which are as follows: acquiring a two-dimensional code; and acquiring the acquired two-dimensional code image, and performing an image restoration step to restore the second The shape grayscale image is subjected to shape distortion, color and/or brightness distortion in the communication channel to obtain a first grayscale image of the two-dimensional code; and the first grayscale image is generated according to the signal in the two-dimensional code generation step Demodulating the modulation method, removing the channel noise and the authentication information, obtaining a second grayscale image of the two-dimensional code, obtaining the authentication information by using the first grayscale image and the second grayscale image; The second grayscale image is subjected to a source decoding operation to obtain a noiseless original bitstream; the noiseless original bit data is converted into a noiseless two-dimensional code grayscale value by secondary encoding and secondary modulation.
在本发明所涉及的二维码解码方法中,将所述二维码第一灰度图像根据二维码生成步骤中的信号调制方法解调,去除信道噪声和认证信息,还包括以下步骤,将信道引入的误码通过解码的方式进行纠正。In the two-dimensional code decoding method according to the present invention, the first grayscale image of the two-dimensional code is demodulated according to a signal modulation method in the two-dimensional code generating step to remove channel noise and authentication information, and further includes the following steps: The error introduced by the channel is corrected by decoding.
在本发明所涉及的二维码解码方法中,还包括以下步骤,将解码前的所述第一灰度图像与解码后的所述第二灰度图像进行差值运算,获得所述信道噪声与所述认证信息。In the method for decoding a two-dimensional code according to the present invention, the method further includes the following steps: performing a difference operation between the first grayscale image before decoding and the second grayscale image after decoding to obtain the channel noise. And the authentication information.
在本发明所涉及的二维码解码方法中,还包括以下步骤,采用BCH解码方法将所述认证信息与所述信道噪声分离。In the two-dimensional code decoding method according to the present invention, the method further includes the step of separating the authentication information from the channel noise by using a BCH decoding method.
本发明第三方面涉及了一种二维码复制过程中的二维码生成装置,其包括:比特流生成模块:将原始信息通过编码方式转换成比特流;图像转换模块:将所述比特流转换为所述原始信息的图像灰度值;认证信息加载模块:加载认证信息,并生成所述认证信息的图像灰度值;图像叠加模块:将所述认证信息的图像灰度值叠加到所述原始数据的图像灰度值上,形成叠加后的灰度图像;二维码生成模块:在所述叠加后的图像灰度旁加上寻像图案,生成二维码。A third aspect of the present invention relates to a two-dimensional code generating apparatus in a two-dimensional code copying process, including: a bit stream generating module: converting original information into a bit stream by an encoding method; and an image converting module: the bit stream Converting to the image gray value of the original information; the authentication information loading module: loading the authentication information, and generating the image gray value of the authentication information; and the image superimposing module: superimposing the image gray value of the authentication information to the The superimposed grayscale image is formed on the image gray value of the original data; the two-dimensional code generating module adds a finder pattern to the superimposed image grayscale to generate a two-dimensional code.
本发明第四方面涉及了一种二维码复制过程中的二维码解码装置中,其包括:获取模块:获取二维码;恢复图像模块:将获取的所述二维码图像,经过图像恢复步骤,还原所述二维码灰度图像在通信信
道中所受到的形状畸变、颜色和/或亮度失真,得到二维码的第一灰度图像;将所述第一灰度图像根据二维码生成步骤中的信号调制方法解调,去除信道噪声和认证信息,得到二维码的第二灰度图像,通过所述第一灰度图像和所述第二灰度图像得到认证信息;解码解调模块:将解调后的所述第二灰度图像经过信源解码操作,得到无噪声的原始比特流;二次编码调制模块:通过二次编码和二次调制将所述无噪声原始比特数据转换成无噪声的二维码灰度值。A fourth aspect of the present invention relates to a two-dimensional code decoding apparatus in a two-dimensional code copying process, comprising: an acquiring module: acquiring a two-dimensional code; and recovering an image module: the acquired two-dimensional code image is passed through an image a recovery step of restoring the grayscale image of the two-dimensional code in a communication letter
Distortion of shape, color and/or brightness received in the track to obtain a first grayscale image of the two-dimensional code; demodulating the first grayscale image according to a signal modulation method in the two-dimensional code generating step to remove channel noise And the authentication information, obtaining a second grayscale image of the two-dimensional code, obtaining the authentication information by using the first grayscale image and the second grayscale image; and decoding the demodulation module: the demodulated second gray The degree image is subjected to a source decoding operation to obtain a noiseless original bit stream; the secondary code modulation module converts the noiseless original bit data into a noiseless two-dimensional code gray value by secondary encoding and secondary modulation.
在本发明所涉及的二维码解码装置中,还包括噪声分离模块:采用BCH解码方法将所述认证信息与所述信道噪声分离。The two-dimensional code decoding apparatus according to the present invention further includes a noise separation module that separates the authentication information from the channel noise by using a BCH decoding method.
本发明结合在扫描-打印过程中二维码的通信信道模型和物理设备(扫描、打印设备)特征,在原始二维码信息经过编码和调制之后,进入通信信道传输之前,将认证信息以人工噪声的形式叠加到原始信息上并一起传送进通信信道中,通过比较分析图像修复后的二维码与去除噪声之后的二维码,可以将认证信息从接收端提取出来,利用约定好的密钥与解码技术完成对认证信息的解码,从而完成了对此二维码的认证,提高了其在通信过程中的安全性。The invention combines the communication channel model of the two-dimensional code and the characteristics of the physical device (scanning and printing device) in the scanning-printing process, and after the original two-dimensional code information is encoded and modulated, before the communication channel is transmitted, the authentication information is artificially The form of the noise is superimposed on the original information and transmitted into the communication channel together. By comparing and analyzing the two-dimensional code after the image is repaired and the two-dimensional code after the noise is removed, the authentication information can be extracted from the receiving end, and the agreed secret is used. The key and decoding technology completes the decoding of the authentication information, thereby completing the authentication of the two-dimensional code and improving its security in the communication process.
图1是示出了本发明的二维码复制过程中的二维码生成及解码的原理框图;1 is a schematic block diagram showing generation and decoding of a two-dimensional code in a two-dimensional code copying process of the present invention;
图2是示出了本发明的二维码复制过程中的二维码生成方法的流程图;2 is a flow chart showing a method of generating a two-dimensional code in the process of copying a two-dimensional code of the present invention;
图3是示出了本发明的二维码复制过程中的二维码解码方法的流程图;3 is a flow chart showing a two-dimensional code decoding method in the two-dimensional code copying process of the present invention;
图4是示出了本发明的二维码复制过程中的二维码生成装置的结构图;4 is a structural diagram showing a two-dimensional code generating apparatus in a two-dimensional code copying process of the present invention;
图5是示出了本发明的二维码复制过程中的二维码解码装置的结构图。Figure 5 is a block diagram showing a two-dimensional code decoding apparatus in the two-dimensional code copying process of the present invention.
以下,参考附图,详细地说明本发明的优选实施方式。在下面的
说明中,对于相同的部件赋予相同的符号,省略重复的说明。另外,附图只是示意性的图,部件相互之间的尺寸的比例或者部件的形状等可以与实际的不同。Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings. In the following
In the description, the same components are denoted by the same reference numerals, and the description thereof will not be repeated. In addition, the drawings are merely schematic views, and the ratio of the dimensions of the components to each other or the shape of the components may be different from the actual ones.
图1是示出了本发明的二维码复制过程中的二维码生成及解码的原理框图;图2是示出了本发明的二维码复制过程中的二维码生成方法的流程图。1 is a schematic block diagram showing two-dimensional code generation and decoding in a two-dimensional code copying process of the present invention; FIG. 2 is a flow chart showing a two-dimensional code generating method in a two-dimensional code copying process of the present invention; .
在本实施方式中,如图1所示,二维码复制过程中的二维码生成方法及解码的原理包括编码、调制、认证、去认证、解调、解码等过程,图中还显示了生成和获取过程中的信道。In the present embodiment, as shown in FIG. 1, the two-dimensional code generation method and the decoding principle in the two-dimensional code copying process include encoding, modulation, authentication, de-authentication, demodulation, decoding, and the like, and the figure also shows Generate and acquire channels in the process.
在本实施方式中,如图2所示,二维码复制过程中的二维码生成方法及解码方法可以包括以下步骤:比特流生成步骤201:将原始信息通过编码方式转换成比特流。在本实施方式中,用户输入的原始信息可以有很多类型,包括字符、网址、图片、名片等等信息,通过编码,可以将以上信息转变为比特流。为了进一步压缩数据,提高传输效率,可以采用信源编码对比特流进行处理,另外还需要进行信道编码,提高数据传输的可靠性。In this embodiment, as shown in FIG. 2, the two-dimensional code generating method and the decoding method in the two-dimensional code copying process may include the following steps: a bit stream generating step 201: converting the original information into a bit stream by using an encoding method. In this embodiment, the original information input by the user may have many types, including characters, a web address, a picture, a business card, and the like, and the above information may be converted into a bit stream by encoding. In order to further compress the data and improve the transmission efficiency, the bit stream can be processed by using source coding, and channel coding is also needed to improve the reliability of data transmission.
在本实施方式中,还包括图像转换步骤202:将比特流转换为原始信息的图像灰度值。认证信息加载步骤203:加载认证信息,并生成认证信息的图像灰度值。In the present embodiment, an image conversion step 202 is further included: converting the bit stream into an image gray value of the original information. The authentication information loading step 203: loading the authentication information and generating an image gray value of the authentication information.
在本实施方式中,认证信息可以采用多种类型的方式,例如常见的密文形式、水印信息等等,还可以生成有白噪声特征的噪声,特别是具有统计独立特性的白噪声,从而这种方式不仅能够最大限度地以较小的干扰将需要隐藏的认证信息加到原始数据中去,而且便于获取方分离认证信息。In this embodiment, the authentication information may adopt various types of methods, such as a common ciphertext form, watermark information, and the like, and may also generate noise with white noise characteristics, especially white noise with statistically independent characteristics, thereby In this way, not only can the hidden authentication information be added to the original data with minimal interference, but also the acquisition party can separate the authentication information.
在本实施方式中,还包括图像叠加步骤204:将认证信息的图像灰度值叠加到原始数据的图像灰度值上,形成叠加后的灰度图像。加载认证信息的过程一般通过叠加的方式,也可以采用其他类型的运算,例如,异或、同或、相与、拼接运算等。将认证信息的图像灰度值叠加到原始数据的图像灰度值上,形成叠加后的灰度图像。In the embodiment, the image superimposing step 204 is further included: superimposing the image gradation value of the authentication information on the image gradation value of the original data to form the superimposed gradation image. The process of loading the authentication information is generally performed by superposition, or other types of operations, such as XOR, same OR, phase, and splicing operations. The image gradation value of the authentication information is superimposed on the image gradation value of the original data to form a superimposed gradation image.
在本实施方式中,还包括二维码生成步骤205:在叠加后的图像灰度旁加上寻像图案,生成二维码。
In the present embodiment, a two-dimensional code generating step 205 is further included: a finder pattern is added next to the superimposed image gradation to generate a two-dimensional code.
在本实施方式中,如图1所示,信道为示意性的,作为二维码在复制过程中,从生成到获取所经过的数据通道。通常地,这种信道是传输型的,但也可以表示生成到获取之间的过程。例如,用户在二维码生成之后,通过打印的方式将二维码呈现在纸质媒介上,例如打印在广告牌上,其他授权用户可以通过拍摄或者扫描的方式获取二维码,这种生成→打印→扫描的过程可以认为是通过了信道。In the present embodiment, as shown in FIG. 1, the channel is schematic, and as a two-dimensional code, the data channel that passes through is generated from acquisition to acquisition. Typically, such channels are transport type, but can also represent the process between generation and acquisition. For example, after the two-dimensional code is generated, the user presents the two-dimensional code on the paper medium by printing, for example, on the billboard, and other authorized users can obtain the two-dimensional code by shooting or scanning. →Printing→Scanning process can be considered as passing the channel.
在本实施方式中,经过信道后的二维码不可避免地混入了信道噪声,这种噪声可以包括光线、明暗、阴影、折射、扭曲、模糊、锐化、缺失等原因带来的。一般地,二维码本身有很强的纠错能力,但获取二维码之后还可以通过滤波、或者调制、或者解调的方式去除图像上的噪声,而这些噪声往往是信道噪声。In the present embodiment, the two-dimensional code passing through the channel inevitably incorporates channel noise, which may include light, shading, shading, refraction, distortion, blurring, sharpening, missing, and the like. Generally, the two-dimensional code itself has strong error correction capability, but after acquiring the two-dimensional code, the noise on the image can be removed by filtering, or modulation, or demodulation, and the noise is often channel noise.
在本实施方式中,在加载认证信息的过程中,可以通过叠加方式加载,本发明考虑将选择叠加位置、选择叠加角度或者选择其他的叠加方式作为避免被非法复制的途径。比如可以采用以下一些方式来进行叠加。In the present embodiment, in the process of loading the authentication information, the loading may be performed by superimposing. The present invention considers selecting a superimposed position, selecting a superimposed angle, or selecting another superimposing manner as a way to avoid illegal copying. For example, the following methods can be used for superposition.
在本实施方式中,从叠加的位置上考虑,可以将原始信息的图像灰度值和认证信息的图像灰度值采用中心对齐的方式进行叠加;还可以将认证信息进行分散,同时在图像的角落处进行叠加;也可以将认证信息进行拉长,沿着二维码的边线进行叠加。特别要提到的,叠加的位置可以不对外公开,使用双方知晓、或者双方约定、或者双方协商的方式设置以及获取叠加的位置,从而进一步避免恶意第三方进行复制,提高了认证信息的安全性。In the present embodiment, from the position of the superposition, the image gradation value of the original information and the image gradation value of the authentication information may be superimposed in a center-aligned manner; the authentication information may be dispersed while being in the image The corners are superimposed; the authentication information can also be lengthened and superimposed along the edges of the QR code. In particular, the location of the overlay may not be disclosed to the public, and the location of the overlay may be set up and obtained by mutual agreement or by mutual agreement, thereby further preventing malicious third parties from copying and improving the security of the authentication information. .
在本实施方式中,从叠加的图案上考虑,可以将认证信息形成指定的图案后,再进行叠加;还可以按照指定的图案来进行叠加,例如可以采用“圆环”的图案将认证信息进行叠加。特别要提到的,叠加的图案可以不对外公开,使用双方知晓、或者双方约定、或者双方协商的方式设置以及获取叠加的图案,从而进一步避免恶意第三方进行复制,提高了认证信息的安全性。In the present embodiment, from the viewpoint of the superimposed pattern, the authentication information may be formed into a designated pattern and then superimposed; or the superimposition may be performed according to the specified pattern. For example, the authentication information may be performed using a pattern of "rings". Superimposed. In particular, the superimposed pattern may not be disclosed to the public, and may be set up and acquired by using mutual understanding, or by mutual agreement, or by mutual agreement, thereby further preventing malicious third parties from copying and improving the security of the authentication information. .
另外,在本实施方式中,从叠加的角度上考虑,可以在认证信息的图案确定之后,旋转不同的角度进行叠加。特别要提到的,叠加的角度可以不对外公开,使用双方知晓、或者双方约定、或者双方协商
的方式设置以及获取叠加的角度,从而进一步避免恶意第三方进行复制,提高了认证信息的安全性。Further, in the present embodiment, from the viewpoint of superimposition, it is possible to perform superimposition by rotating different angles after the pattern of the authentication information is determined. In particular, the angle of superposition may not be disclosed to the public, either by the parties, or by mutual agreement or by mutual agreement.
The way to set up and obtain the angle of the overlay, thereby further avoiding the malicious third party to copy and improve the security of the authentication information.
在本实施方式中,从其他的叠加方式上考虑,可以依据指定灰度值进行叠加,比如,叠加到灰度值为100的所有模块上去。特别要提到的,叠加的灰度可以不对外公开,使用双方知晓、或者双方约定、或者双方协商的方式设置以及获取叠加的灰度,从而进一步避免恶意第三方进行复制,提高了认证信息的安全性。In the present embodiment, from the other superimposing methods, the superimposition may be performed according to the specified gradation value, for example, superimposed on all modules having a gradation value of 100. In particular, the superimposed gradation may not be disclosed to the public, and the gradation of the superimposed gradation may be set by using the mutual understanding or the agreement between the two parties or the two parties to negotiate, thereby further preventing the malicious third party from copying and improving the authentication information. safety.
此外,以上多种叠加的可能性可以进一步地组合,例如,可以同时考虑从叠加的位置和叠加的图案上进行处理,此时,叠加的位置可以选择例如角落,叠加的图案可以选择例如方形、圆形、或者特定的图案。In addition, the above various superimposing possibilities may be further combined. For example, processing may be simultaneously considered from the superimposed position and the superimposed pattern. At this time, the superimposed position may select, for example, a corner, and the superimposed pattern may select, for example, a square, Round, or a specific pattern.
图3是示出了本发明的二维码复制过程中的二维码解码方法的流程图。3 is a flow chart showing a two-dimensional code decoding method in the two-dimensional code copying process of the present invention.
在本实施方式中,如图3所示,在二维码经过信道,并且被获取之后,需要对二维码进行解码,与二维码生成过程中的步骤相对应,解码的步骤包括:在获取步骤208,获取二维码。在本实施方式中,可以通过各种可能的方式来获取二维码。例如,通过拍摄或者扫描获取二维码,也可以通过预存、下载、即时传输、邮件接收等方式获取二维码图片,再利用图片处理程序提取其中的二维码。In this embodiment, as shown in FIG. 3, after the two-dimensional code passes through the channel and is acquired, the two-dimensional code needs to be decoded, corresponding to the steps in the two-dimensional code generation process, and the decoding step includes: Step 208 is obtained to obtain a two-dimensional code. In the present embodiment, the two-dimensional code can be acquired in various possible ways. For example, by acquiring or scanning a two-dimensional code, a two-dimensional code picture can also be obtained by pre-storing, downloading, instant transmission, mail receiving, etc., and then extracting the two-dimensional code therein by using a picture processing program.
在本实施方式中,还包括恢复步骤209,将获取的二维码图像,经过图像恢复步骤,还原二维码灰度图像在通信信道中所受到的形状畸变、颜色和/或亮度失真,得到二维码的第一灰度图像。In this embodiment, a recovery step 209 is further included, and the acquired two-dimensional code image is subjected to an image restoration step to restore distortion, color, and/or brightness distortion of the two-dimensional code gray image received in the communication channel. The first grayscale image of the two-dimensional code.
在本实施方式中,还包括去除步骤210:将获取的二维码图像,经过图像恢复步骤,还原二维码灰度图像在通信信道中所受到的形状畸变、颜色和/或亮度失真,得到二维码的第一灰度图像。在生成二维码到获取二维码的中间过程中,信道可能导致产生一些误码,这种误码需要通过解码来纠正。In this embodiment, the method further includes the removing step 210: after the acquired two-dimensional code image is subjected to an image restoration step, the shape distortion, color, and/or brightness distortion received by the two-dimensional code gray image in the communication channel is restored. The first grayscale image of the two-dimensional code. In the middle of generating a two-dimensional code to obtain a two-dimensional code, the channel may cause some errors, which need to be corrected by decoding.
在本实施方式中,第二灰度图像对应的是在生成过程中,加载认证信息之前的图像数据,因此,将解码前的第一灰度图像与解码后的灰度图像进行差值运算,即可以得到信道噪声与认证信息。在这种情况下,需要采用BCH解码方法将认证信息与信道噪声分离。
In this embodiment, the second grayscale image corresponds to the image data before the authentication information is loaded during the generation process, and therefore, the difference between the first grayscale image before decoding and the decoded grayscale image is performed. That is, channel noise and authentication information can be obtained. In this case, the BCH decoding method is required to separate the authentication information from the channel noise.
在本实施方式中,还包括解码解调步骤211:将解调后的第二灰度图像经过信源解码操作,得到无噪声的原始比特流。In this embodiment, a decoding and demodulating step 211 is further included: the demodulated second grayscale image is subjected to a source decoding operation to obtain a noiseless original bitstream.
在本实施方式中,还包括二次解码调制步骤212:通过二次编码和二次调制将无噪声原始比特数据转换成无噪声的二维码灰度值。最后,通过对认证信息的解码,完成对用户所编码信息的加密与认证。In the present embodiment, a secondary decoding modulation step 212 is further included: converting the noiseless original bit data into a noiseless two-dimensional code gray value by secondary encoding and secondary modulation. Finally, the encryption and authentication of the information encoded by the user is completed by decoding the authentication information.
为了实现上述方法,将以上步骤采用相应的功能模块来实施,并且嵌入到装置中实现。图4是示出了本发明的二维码复制过程中的二维码生成装置的结构图。In order to implement the above method, the above steps are implemented by using corresponding functional modules and embedded in the device. Fig. 4 is a block diagram showing a two-dimensional code generating apparatus in the two-dimensional code copying process of the present invention.
如图4所示,在本实施方式所涉及的一种二维码复制过程中的二维码生成装置中,其包括比特流生成模块301:将原始信息通过编码方式转换成比特流;用户输入的原始信息可以有很多类型,包括字符、网址、图片、名片等等信息,通过编码,可以将以上信息转变为比特流。为了进一步压缩数据,提高传输效率,可以采用信源编码对比特流进行处理,另外还需要进行信道编码,提高数据传输的可靠性。As shown in FIG. 4, in the two-dimensional code generating apparatus in the two-dimensional code copying process according to the present embodiment, the method includes a bit stream generating module 301: converting the original information into a bit stream by using an encoding method; The original information can have many types, including characters, URLs, pictures, business cards, etc., and the above information can be converted into a bit stream by encoding. In order to further compress the data and improve the transmission efficiency, the bit stream can be processed by using source coding, and channel coding is also needed to improve the reliability of data transmission.
在本实施方式中,还包括图像转换模块302,其将比特流转换为原始信息的图像灰度值。In the present embodiment, an image conversion module 302 is further included that converts the bit stream into an image gray value of the original information.
在本实施方式中,还包括认证信息加载模块303,其加载认证信息,并生成认证信息的图像灰度值。认证信息可以采用多种类型的方式,例如常见的密文形式、水印信息等等,还可以生成有白噪声特征的噪声,特别是具有统计独立特性的白噪声,从而这种方式不仅能够最大限度地以较小的干扰将需要隐藏的认证信息加到原始数据中去,而且便于获取方分离认证信息。In this embodiment, an authentication information loading module 303 is further included, which loads the authentication information and generates an image gray value of the authentication information. The authentication information can be in various types, such as common ciphertext forms, watermark information, etc., and can also generate noise with white noise characteristics, especially white noise with statistically independent characteristics, so that this method can not only maximize The local authentication data is added to the original data with less interference, and the acquisition party is separated from the authentication information.
在本实施方式中,还包括图像叠加模块304,其将认证信息的图像灰度值叠加到原始数据的图像灰度值上,形成叠加后的灰度图像。加载认证信息的过程一般通过叠加的方式,也可以采用其他类型的运算,例如,异或、同或、相与、拼接运算等。将认证信息的图像灰度值叠加到原始数据的图像灰度值上,形成叠加后的灰度图像。In this embodiment, an image superimposition module 304 is further included, which superimposes the image gradation value of the authentication information on the image gradation value of the original data to form a superimposed gradation image. The process of loading the authentication information is generally performed by superposition, or other types of operations, such as XOR, same OR, phase, and splicing operations. The image gradation value of the authentication information is superimposed on the image gradation value of the original data to form a superimposed gradation image.
在本实施方式中,还包括二维码生成模块305,其在叠加后的图像灰度旁加上寻像图案,生成二维码。In this embodiment, a two-dimensional code generation module 305 is further included, which adds a finder pattern to the superimposed image gradation to generate a two-dimensional code.
在本实施方式中,通常地,二维码复制过程中的信道是传输型的,但也可以表示生成到获取之间的过程。例如,用户在二维码生成之后,
通过打印的方式将二维码呈现在纸质媒介上,例如打印在广告牌上,其他授权用户可以通过拍摄或者扫描的方式获取二维码,这种生成→打印→扫描的过程可以认为是通过了信道。In the present embodiment, generally, the channel in the two-dimensional code copying process is of a transmission type, but may also represent a process between generation and acquisition. For example, after the user generates the QR code,
The two-dimensional code is displayed on the paper medium by printing, for example, on the billboard, and other authorized users can obtain the two-dimensional code by shooting or scanning. The process of generating → printing → scanning can be considered as passing The channel.
在本实施方式中,经过信道后的二维码不可避免地混入了信道噪声,这种噪声可以包括光线、明暗、阴影、折射、扭曲、模糊、锐化、缺失等原因带来的。一般地,二维码本身有很强的纠错能力,但获取二维码之后还可以通过滤波、或者调制、或者解调的方式去除图像上的噪声,而这些噪声往往是信道噪声。In the present embodiment, the two-dimensional code passing through the channel inevitably incorporates channel noise, which may include light, shading, shading, refraction, distortion, blurring, sharpening, missing, and the like. Generally, the two-dimensional code itself has strong error correction capability, but after acquiring the two-dimensional code, the noise on the image can be removed by filtering, or modulation, or demodulation, and the noise is often channel noise.
在本实施方式中,在加载认证信息的过程中,可以通过叠加方式加载,本发明考虑将选择叠加位置、选择叠加角度或者选择其他的叠加方式作为避免被非法复制的途径。比如可以采用以下一些方式来进行叠加。In the present embodiment, in the process of loading the authentication information, the loading may be performed by superimposing. The present invention considers selecting a superimposed position, selecting a superimposed angle, or selecting another superimposing manner as a way to avoid illegal copying. For example, the following methods can be used for superposition.
在本实施方式中,从叠加的位置上考虑,可以将原始信息的图像灰度值和认证信息的图像灰度值采用中心对齐的方式进行叠加;还可以将认证信息进行分散,同时在图像的角落处进行叠加;也可以将认证信息进行拉长,沿着二维码的边线进行叠加。特别要提到的,叠加的位置可以不对外公开,使用双方知晓、或者双方约定、或者双方协商的方式设置以及获取叠加的位置,从而进一步避免恶意第三方进行复制,提高了认证信息的安全性。In the present embodiment, from the position of the superposition, the image gradation value of the original information and the image gradation value of the authentication information may be superimposed in a center-aligned manner; the authentication information may be dispersed while being in the image The corners are superimposed; the authentication information can also be lengthened and superimposed along the edges of the QR code. In particular, the location of the overlay may not be disclosed to the public, and the location of the overlay may be set up and obtained by mutual agreement or by mutual agreement, thereby further preventing malicious third parties from copying and improving the security of the authentication information. .
在本实施方式中,从叠加的图案上考虑,可以将认证信息形成指定的图案后,再进行叠加;还可以按照指定的图案来进行叠加,例如可以采用“圆环”的图案将认证信息进行叠加。特别要提到的,叠加的图案可以不对外公开,使用双方知晓、或者双方约定、或者双方协商的方式设置以及获取叠加的图案,从而进一步避免恶意第三方进行复制,提高了认证信息的安全性。In the present embodiment, from the viewpoint of the superimposed pattern, the authentication information may be formed into a designated pattern and then superimposed; or the superimposition may be performed according to the specified pattern. For example, the authentication information may be performed using a pattern of "rings". Superimposed. In particular, the superimposed pattern may not be disclosed to the public, and may be set up and acquired by using mutual understanding, or by mutual agreement, or by mutual agreement, thereby further preventing malicious third parties from copying and improving the security of the authentication information. .
在本实施方式中,从叠加的角度上考虑,可以在认证信息的图案确定之后,旋转不同的角度进行叠加。特别要提到的,叠加的角度可以不对外公开,使用双方知晓、或者双方约定、或者双方协商的方式设置以及获取叠加的角度,从而进一步避免恶意第三方进行复制,提高了认证信息的安全性。
In the present embodiment, from the viewpoint of superposition, it is possible to rotate the different angles to perform superimposition after the pattern of the authentication information is determined. In particular, the angle of superposition may not be disclosed to the public, and the use of both parties to know, or the agreement between the two parties, or the two parties to negotiate and obtain the superposition angle, thereby further avoiding the malicious third party to copy and improve the security of the authentication information. .
在本实施方式中,从其他的叠加方式上考虑,可以依据指定灰度值进行叠加,比如,叠加到灰度值为100的所有模块上去。特别要提到的,叠加的灰度可以不对外公开,使用双方知晓、或者双方约定、或者双方协商的方式设置以及获取叠加的灰度,从而进一步避免恶意第三方进行复制,提高了认证信息的安全性。In the present embodiment, from the other superimposing methods, the superimposition may be performed according to the specified gradation value, for example, superimposed on all modules having a gradation value of 100. In particular, the superimposed gradation may not be disclosed to the public, and the gradation of the superimposed gradation may be set by using the mutual understanding or the agreement between the two parties or the two parties to negotiate, thereby further preventing the malicious third party from copying and improving the authentication information. safety.
此外,以上多种叠加的可能性可以进一步地组合,例如,可以同时考虑从叠加的位置和叠加的图案上进行处理,此时,叠加的位置可以选择例如角落,叠加的图案可以选择例如方形、圆形、或者特定的图案。In addition, the above various superimposing possibilities may be further combined. For example, processing may be simultaneously considered from the superimposed position and the superimposed pattern. At this time, the superimposed position may select, for example, a corner, and the superimposed pattern may select, for example, a square, Round, or a specific pattern.
图5是示出了本发明的二维码复制过程中的二维码解码装置的结构图。Figure 5 is a block diagram showing a two-dimensional code decoding apparatus in the two-dimensional code copying process of the present invention.
在本实施方式中,如图5所示,在二维码经过信道,并且被获取之后,需要对二维码进行解码,与二维码生成过程中的步骤相对应,本实施方式提供一种二维码复制过程中的二维码解码装置。其包括通过获取模块401来获取二维码。一般地,通过拍摄或者扫描获取二维码,也可以通过预存、下载、即时传输、邮件接收等方式获取二维码图片,再利用图片处理程序提取其中的二维码。In this embodiment, as shown in FIG. 5, after the two-dimensional code passes through the channel and is acquired, the two-dimensional code needs to be decoded, which corresponds to the steps in the process of generating the two-dimensional code, and the present embodiment provides a A two-dimensional code decoding device in the process of copying a two-dimensional code. It includes obtaining a two-dimensional code by the acquisition module 401. Generally, the two-dimensional code is obtained by shooting or scanning, and the two-dimensional code picture can also be obtained by pre-storing, downloading, instant transmission, mail receiving, etc., and then extracting the two-dimensional code by using the image processing program.
在本实施方式中,还包括恢复图像模块402:将获取的二维码图像,经过图像恢复步骤,还原二维码灰度图像在通信信道中所受到的形状畸变、颜色和/或亮度失真,得到二维码的第一灰度图像。In this embodiment, the image recovery module 402 is further included: the acquired two-dimensional code image is subjected to an image restoration step to restore shape distortion, color and/or brightness distortion received by the two-dimensional code gray image in the communication channel. A first grayscale image of the two-dimensional code is obtained.
在本实施方式中,还包括去除噪音及认证信息模块403:将第一灰度图像根据二维码生成步骤中的信号调制方法解调,去除信道噪声和认证信息,得到二维码的第二灰度图像,通过第一灰度图像和第二灰度图像得到认证信息。在生成二维码到获取二维码的中间过程中,信道可能导致产生一些误码,这种误码需要通过解码来纠正。In this embodiment, the method further includes a noise removal and authentication information module 403: demodulating the first grayscale image according to a signal modulation method in the two-dimensional code generating step, removing channel noise and authentication information, and obtaining a second of the two-dimensional code. The grayscale image, the authentication information is obtained by the first grayscale image and the second grayscale image. In the middle of generating a two-dimensional code to obtain a two-dimensional code, the channel may cause some errors, which need to be corrected by decoding.
在本实施方式中,第二灰度图像对应的是在生成过程中,加载认证信息之前的图像数据,因此,将解码前的第一灰度图像与解码后的第二灰度图像进行差值运算,即可以得到信道噪声与认证信息。在这种情况下,需要采用BCH解码方法将认证信息与信道噪声分离。In this embodiment, the second grayscale image corresponds to the image data before the authentication information is loaded during the generation process, and therefore, the difference between the first grayscale image before decoding and the second grayscale image after decoding is performed. Operation, that is, channel noise and authentication information can be obtained. In this case, the BCH decoding method is required to separate the authentication information from the channel noise.
在本实施方式中,在二维码上加载认证信息之后,可以通过多种方式将其分离出来。通常地,对于从图像上分离信息可以有以下一些
方式,例如,边缘锐化法、梯度下降法、像素差分法等等,通过这些方法,能够将加载的认证信息从图像上分离,最终获得相应的认证信息。In the present embodiment, after the authentication information is loaded on the two-dimensional code, it can be separated in various ways. Generally, the following information can be separated from the image.
In the manner, for example, edge sharpening method, gradient descent method, pixel difference method, etc., by these methods, the loaded authentication information can be separated from the image, and finally the corresponding authentication information is obtained.
如果认证信息是具有白噪声特征的噪声,那么需要采用通过滤波、调制或解调的方式将认证信息和信道噪声一同从二维码上分离出来,但是在这种情况下,认证信息和信道噪声是整体被分离的,因此,还需要将认证信息和信道噪声做进一步的分离运算。通常地,可以使用BCH解码技术将认证信息进行分离,从而获得单独的认证信息。If the authentication information is noise with white noise characteristics, it is necessary to separate the authentication information and the channel noise from the two-dimensional code by means of filtering, modulation or demodulation, but in this case, the authentication information and the channel noise It is separated as a whole, so it is necessary to further separate the authentication information and channel noise. In general, the authentication information can be separated using BCH decoding techniques to obtain separate authentication information.
在本实施方式中,还包括解码解调模块404:将解码后的第二灰度图像经过信源解码操作,得到无噪声的原始比特流。In this embodiment, the decoding and demodulation module 404 is further included: the decoded second grayscale image is subjected to a source decoding operation to obtain a noiseless original bitstream.
二次解码调制模块405:通过二次编码和二次调制将无噪声原始比特数据转换成无噪声的二维码灰度值。最后,通过对认证信息的解码,完成对用户所编码信息的加密与认证。The secondary decoding modulation module 405 converts the noiseless original bit data into a noiseless two-dimensional code gray value by secondary encoding and secondary modulation. Finally, the encryption and authentication of the information encoded by the user is completed by decoding the authentication information.
此外,在本实施方式中,还包括以下模块:误码纠正模块406:将信道引入的误码将通过解码的方式进行纠正。差值运算模块407:将解码前的第一灰度图像与解码后的第二灰度图像进行差值运算,获得信道噪声与认证信息。噪声分离模块408:采用BCH解码方法将认证信息与信道噪声分离,以及认证模块409:通过对认证信息的解码,完成对用户所编码信息的加密与认证。In addition, in the present embodiment, the following module is further included: the error correction module 406: the error introduced by the channel will be corrected by decoding. The difference operation module 407: performs a difference operation between the first grayscale image before decoding and the second grayscale image after decoding to obtain channel noise and authentication information. The noise separation module 408: separates the authentication information from the channel noise by using the BCH decoding method, and the authentication module 409: completes encryption and authentication of the information encoded by the user by decoding the authentication information.
本发明结合在扫描-打印过程中二维码的通信信道模型和物理设备(扫描、打印设备)特征,在原始二维码信息经过编码和调制之后,进入通信信道传输之前,将认证信息以人工噪声的形式叠加到原始信息上并一起传送进通信信道中,通过比较分析图像修复后的二维码与去除噪声之后的二维码,可以将认证信息从接收端提取出来,利用约定好的密钥与解码技术完成对认证信息的解码,从而完成了对此二维码的认证,提高了其在通信过程中的安全性。The invention combines the communication channel model of the two-dimensional code and the characteristics of the physical device (scanning and printing device) in the scanning-printing process, and after the original two-dimensional code information is encoded and modulated, before the communication channel is transmitted, the authentication information is artificially The form of the noise is superimposed on the original information and transmitted into the communication channel together. By comparing and analyzing the two-dimensional code after the image is repaired and the two-dimensional code after the noise is removed, the authentication information can be extracted from the receiving end, and the agreed secret is used. The key and decoding technology completes the decoding of the authentication information, thereby completing the authentication of the two-dimensional code and improving its security in the communication process.
虽然以上结合附图和实施例对本发明进行了具体说明,但是可以理解,上述说明不以任何形式限制本发明。本领域技术人员在不偏离本发明的实质精神和范围的情况下可以根据需要对本发明进行变形和变化,这些变形和变化均落入本发明的范围内。
While the invention has been described in detail with reference to the drawings and embodiments, it is understood that The present invention may be modified and changed as needed by those skilled in the art without departing from the spirit and scope of the invention, and such modifications and variations are within the scope of the invention.
Claims (15)
- 一种二维码防伪过程中的二维码生成方法,其步骤如下:A method for generating a two-dimensional code in a two-dimensional code anti-counterfeiting process, the steps of which are as follows:将原始信息通过编码方式转换成比特流;Converting the original information into a bit stream by encoding;将所述比特流转换为所述原始信息的图像灰度值;Converting the bit stream to an image gray value of the original information;加载认证信息,并生成所述认证信息的图像灰度值;Loading authentication information, and generating an image gray value of the authentication information;将所述认证信息的图像灰度值叠加到所述原始数据的图像灰度值上,形成叠加后的灰度图像;And superimposing the image gray value of the authentication information on the image gray value of the original data to form a superimposed gray image;在所述叠加后的图像灰度旁加上寻像图案,生成二维码。A finder pattern is added next to the superimposed image gradation to generate a two-dimensional code.
- 如权利要求1所述的二维码生成方法,所述加载认证信息包括:The method of generating a two-dimensional code according to claim 1, wherein the loading of the authentication information comprises:所述认证信息为具有白噪声特征的认证信息。The authentication information is authentication information having a white noise characteristic.
- 如权利要求1所述的二维码生成方法,包括:The method of generating a two-dimensional code according to claim 1, comprising:生成后的所述二维码在传输过程中将混入信道噪声。The generated two-dimensional code will be mixed with channel noise during transmission.
- 如权利要求1-3中任意一项所述的二维码生成方法,所述将所述认证信息的图像灰度值叠加到所述原始数据的图像灰度值上包括:The method of generating a two-dimensional code according to any one of claims 1 to 3, wherein the superimposing the image gradation value of the authentication information onto the image gradation value of the original data comprises:所述原始信息的图像灰度值和所述认证信息的图像灰度值采用中心对齐的方式进行叠加。The image gradation value of the original information and the image gradation value of the authentication information are superimposed in a center-aligned manner.
- 如权利要求1-3中任意一项所述的二维码生成方法,所述将所述认证信息的图像灰度值叠加到所述原始数据的图像灰度值上包括:The method of generating a two-dimensional code according to any one of claims 1 to 3, wherein the superimposing the image gradation value of the authentication information onto the image gradation value of the original data comprises:所述原始信息的图像灰度值和所述认证信息的图像灰度值的叠加位置可以是分散的形式。The superimposed position of the image gradation value of the original information and the image gradation value of the authentication information may be in a dispersed form.
- 如权利要求1-3中任意一项所述的二维码生成方法,所述将所述认证信息的图像灰度值叠加到所述原始数据的图像灰度值上包括:The method of generating a two-dimensional code according to any one of claims 1 to 3, wherein the superimposing the image gradation value of the authentication information onto the image gradation value of the original data comprises:所述原始信息的图像灰度值和所述认证信息的图像灰度值的叠加位置采用双方知晓、或者双方约定、或者双方协商的方式进行设置,并且不对外公开。 The superimposed position of the image gradation value of the original information and the image gradation value of the authentication information is set by mutual understanding, or by mutual agreement, or by mutual agreement, and is not disclosed.
- 如权利要求1-3中任意一项所述的二维码生成方法,所述将所述认证信息的图像灰度值叠加到所述原始数据的图像灰度值上包括:The method of generating a two-dimensional code according to any one of claims 1 to 3, wherein the superimposing the image gradation value of the authentication information onto the image gradation value of the original data comprises:所述原始信息的图像灰度值和所述认证信息的图像灰度值以指定图案进行叠加。The image gradation value of the original information and the image gradation value of the authentication information are superimposed in a specified pattern.
- 如权利要求1-3中任意一项所述的二维码生成方法,所述将所述认证信息的图像灰度值叠加到所述原始数据的图像灰度值上包括:The method of generating a two-dimensional code according to any one of claims 1 to 3, wherein the superimposing the image gradation value of the authentication information onto the image gradation value of the original data comprises:所述原始信息的图像灰度值和所述认证信息的图像灰度值以指定灰度值进行叠加。The image gradation value of the original information and the image gradation value of the authentication information are superimposed with a specified gradation value.
- 一种二维码复制过程中的二维码解码方法,其步骤如下:A two-dimensional code decoding method in a two-dimensional code copying process, the steps are as follows:获取二维码;Obtain a QR code;将获取的所述二维码图像,经过图像恢复步骤,还原所述二维码灰度图像在通信信道中所受到的形状畸变、颜色和/或亮度失真,得到二维码的第一灰度图像;The obtained two-dimensional code image is subjected to an image restoration step to restore shape distortion, color and/or brightness distortion of the two-dimensional code gray image received in the communication channel, and obtain a first gray scale of the two-dimensional code. image;将所述第一灰度图像根据二维码生成步骤中的信号调制方法解调,去除信道噪声和认证信息,得到二维码的第二灰度图像,通过所述第一灰度图像和所述第二灰度图像得到认证信息;Demodulating the first grayscale image according to a signal modulation method in the two-dimensional code generating step, removing channel noise and authentication information, and obtaining a second grayscale image of the two-dimensional code, by using the first grayscale image and the Decoding the second grayscale image to obtain authentication information;将解调后的所述第二灰度图像经过信源解码操作,得到无噪声的原始比特流;Performing the demodulated second grayscale image through a source decoding operation to obtain a noiseless original bitstream;通过二次编码和二次调制将所述无噪声原始比特数据转换成无噪声的二维码灰度值。The noiseless original bit data is converted into a noiseless two-dimensional code gray value by secondary encoding and secondary modulation.
- 如权利要求9所述的二维码解码方法,将所述第一灰度图像根据二维码生成步骤中的信号调制方法解调,去除信道噪声和认证信息,还包括以下步骤:The two-dimensional code decoding method according to claim 9, wherein the first grayscale image is demodulated according to a signal modulation method in the two-dimensional code generating step to remove channel noise and authentication information, and further includes the following steps:将信道引入的误码通过解码的方式进行纠正。The error introduced by the channel is corrected by decoding.
- 如权利要求10所述的二维码解码方法,还包括以下步骤:The two-dimensional code decoding method according to claim 10, further comprising the steps of:将解码前的所述第一灰度图像与解码后的所述第二灰度图像进行差值运算,获得所述信道噪声与所述认证信息。 Performing a difference operation between the first grayscale image before decoding and the second grayscale image after decoding to obtain the channel noise and the authentication information.
- 如权利要求11所述的二维码解码方法,还包括以下步骤:The two-dimensional code decoding method according to claim 11, further comprising the steps of:采用BCH解码方法将所述认证信息与所述信道噪声分离。The authentication information is separated from the channel noise using a BCH decoding method.
- 一种二维码复制过程中的二维码生成装置,其包括:A two-dimensional code generating device in a two-dimensional code copying process, comprising:比特流生成模块:将原始信息通过编码方式转换成比特流;a bit stream generation module: converting the original information into a bit stream by encoding;图像转换模块:将所述比特流转换为所述原始信息的图像灰度值;An image conversion module: converting the bit stream into an image gray value of the original information;认证信息加载模块:加载认证信息,并生成所述认证信息的图像灰度值;An authentication information loading module: loading authentication information, and generating an image gray value of the authentication information;图像叠加模块:将所述认证信息的图像灰度值叠加到所述原始数据的图像灰度值上,形成叠加后的灰度图像;An image superimposing module: superimposing an image gray value of the authentication information on an image gray value of the original data to form a superimposed gray image;二维码生成模块:在所述叠加后的图像灰度旁加上寻像图案,生成二维码。The two-dimensional code generating module: adding a finder pattern to the gray level of the superimposed image to generate a two-dimensional code.
- 一种二维码复制过程中的二维码解码装置,其包括:A two-dimensional code decoding device in a two-dimensional code copying process, comprising:获取模块:获取二维码;Get module: Get the QR code;恢复图像模块:将获取的所述二维码图像,经过图像恢复步骤,还原所述二维码灰度图像在通信信道中所受到的形状畸变、颜色和/或亮度失真,得到二维码的第一灰度图像;Restoring the image module: the acquired two-dimensional code image is subjected to an image restoration step to restore shape distortion, color and/or brightness distortion of the two-dimensional code gray image received in the communication channel, and obtain a two-dimensional code First grayscale image;去除噪音及认证信息模块:将所述第一灰度图像根据二维码生成步骤中的信号调制方法解调,去除信道噪声和认证信息,得到二维码的第二灰度图像,通过所述第一灰度图像和所述第二灰度图像得到认证信息;a noise removal and authentication information module: demodulating the first grayscale image according to a signal modulation method in the two-dimensional code generation step, removing channel noise and authentication information, and obtaining a second grayscale image of the two-dimensional code, The first grayscale image and the second grayscale image obtain authentication information;解码解调模块:将解调后的所述第二灰度图像经过信源解码操作,得到无噪声的原始比特流;a decoding and demodulation module: the demodulated second grayscale image is subjected to a source decoding operation to obtain a noiseless original bitstream;二次编码调制模块:通过二次编码和二次调制将所述无噪声原始比特数据转换成无噪声的二维码灰度值。The secondary code modulation module converts the noiseless original bit data into a noiseless two-dimensional code gray value by secondary coding and secondary modulation.
- 如权利要求14所述的二维码解码装置,还包括:The two-dimensional code decoding apparatus according to claim 14, further comprising:噪声分离模块:采用BCH解码方法将所述认证信息与所述信道噪声分离。 The noise separation module: separates the authentication information from the channel noise by using a BCH decoding method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/111213 WO2019095172A1 (en) | 2017-11-15 | 2017-11-15 | Qr code generating and decoding method and apparatus in qr code copying process |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/111213 WO2019095172A1 (en) | 2017-11-15 | 2017-11-15 | Qr code generating and decoding method and apparatus in qr code copying process |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019095172A1 true WO2019095172A1 (en) | 2019-05-23 |
Family
ID=66538377
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/111213 WO2019095172A1 (en) | 2017-11-15 | 2017-11-15 | Qr code generating and decoding method and apparatus in qr code copying process |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2019095172A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20240129131A1 (en) * | 2019-02-13 | 2024-04-18 | Advanced Track & Trace | Method and device for securing an object and method for authenticating an object |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101197004A (en) * | 2007-12-25 | 2008-06-11 | 深圳矽感科技有限公司 | Two-dimension bar code and its coding and decoding method |
CN102819724A (en) * | 2012-08-02 | 2012-12-12 | 广东正迪科技股份有限公司 | Two-dimensional code label anti-counterfeiting identification system and method based on smart phone |
CN105224974A (en) * | 2014-06-30 | 2016-01-06 | 北京大学 | A kind of method hidden Info in matrix two-dimensional code and method for anti-counterfeit |
CN105718981A (en) * | 2016-01-26 | 2016-06-29 | 南京风力舰信息技术有限公司 | Processing method for preparing novel 2D code image holographic anti-counterfeiting label |
CN106529637A (en) * | 2016-10-28 | 2017-03-22 | 深圳大学 | Anti-copy realization method and realization system of two-dimensional code |
-
2017
- 2017-11-15 WO PCT/CN2017/111213 patent/WO2019095172A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101197004A (en) * | 2007-12-25 | 2008-06-11 | 深圳矽感科技有限公司 | Two-dimension bar code and its coding and decoding method |
CN102819724A (en) * | 2012-08-02 | 2012-12-12 | 广东正迪科技股份有限公司 | Two-dimensional code label anti-counterfeiting identification system and method based on smart phone |
CN105224974A (en) * | 2014-06-30 | 2016-01-06 | 北京大学 | A kind of method hidden Info in matrix two-dimensional code and method for anti-counterfeit |
CN105718981A (en) * | 2016-01-26 | 2016-06-29 | 南京风力舰信息技术有限公司 | Processing method for preparing novel 2D code image holographic anti-counterfeiting label |
CN106529637A (en) * | 2016-10-28 | 2017-03-22 | 深圳大学 | Anti-copy realization method and realization system of two-dimensional code |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20240129131A1 (en) * | 2019-02-13 | 2024-04-18 | Advanced Track & Trace | Method and device for securing an object and method for authenticating an object |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107918791B (en) | Two-dimensional code generation and decoding method and device in two-dimensional code copying process | |
Tkachenko et al. | Two-level QR code for private message sharing and document authentication | |
CN106529637B (en) | A kind of the anti-copy implementation method and realization system of two dimensional code | |
JP4137084B2 (en) | Method for processing documents with fraud revealing function and method for validating documents with fraud revealing function | |
Deguillaume et al. | Secure hybrid robust watermarking resistant against tampering and copy attack | |
AU2005241434B2 (en) | System and method for decoding digital encoded images | |
US20050036651A1 (en) | Digital anti&minus forging method | |
KR20030038677A (en) | Authentication watermarks for printed objects and related applications | |
CN107835332B (en) | Method and device for generating two-dimensional code by superimposing artificial noise information | |
Alajmi et al. | Steganography of encrypted messages inside valid QR codes | |
JPH11234264A (en) | Electronic papermarking system, electronic information distribution system using the same and storage medium | |
WO2001015382A1 (en) | Legitimacy protection of electronic document and a printed copy thereof | |
Lu et al. | Lossless information hiding in images | |
CN105760722A (en) | Watermark embedding electronic signature generation method and platform | |
JP2004007442A (en) | Information processing method and device, computer program and computer readable storage medium | |
Zhang et al. | A High‐Quality Authenticatable Visual Secret Sharing Scheme Using SGX | |
Xie et al. | Low-cost anti-copying 2D barcode by exploiting channel noise characteristics | |
WO2019095172A1 (en) | Qr code generating and decoding method and apparatus in qr code copying process | |
Mayer et al. | Fundamentals and Applications of Hardcopy Communication | |
Sun et al. | An optical watermarking solution for authenticating printed documents | |
CN1691087A (en) | System and method for decoding digitally encoded images | |
JP5850370B2 (en) | Printed material production method, printed material and authenticity determination method | |
Srivastava et al. | Security of image using watermarking techniques and visual cryptography | |
Bulan et al. | Content authentication for printed images utilizing high capacity data hiding | |
WO2019095173A1 (en) | Method and device for generating two-dimensional code superimposed with artificial noise information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17931986 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 28/10/2020) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17931986 Country of ref document: EP Kind code of ref document: A1 |