CN100531028C - Image false-proof method based on chaotic characteristic - Google Patents

Image false-proof method based on chaotic characteristic Download PDF

Info

Publication number
CN100531028C
CN100531028C CNB2005100960153A CN200510096015A CN100531028C CN 100531028 C CN100531028 C CN 100531028C CN B2005100960153 A CNB2005100960153 A CN B2005100960153A CN 200510096015 A CN200510096015 A CN 200510096015A CN 100531028 C CN100531028 C CN 100531028C
Authority
CN
China
Prior art keywords
information
dimensional barcode
barcode image
image
carried out
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2005100960153A
Other languages
Chinese (zh)
Other versions
CN1738235A (en
Inventor
田丽华
赵季中
郑南宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Jiaotong University
Original Assignee
Xian Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Jiaotong University filed Critical Xian Jiaotong University
Priority to CNB2005100960153A priority Critical patent/CN100531028C/en
Publication of CN1738235A publication Critical patent/CN1738235A/en
Application granted granted Critical
Publication of CN100531028C publication Critical patent/CN100531028C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Image Processing (AREA)
  • Image Analysis (AREA)

Abstract

The invention discloses a image counterfeit deterrence method based on the chaotic feature, comprising: first, by the chaotic mapping system, using the information needed keep secret and counterfeit deterrence to generate the chaotic sequence which is used to encode the information, then, printing the encoded information to the two-dimension bar code image according to the PDF417 bar code; collecting the two-dimension bar code image by the scanner, and operating the preprocessing of image segmentation, filtration, geometric correction and stratified on collected image, then decoding the bar code according to the decoding rule of national standard PDF417 bar code to attain the chaotic encoded information carried by bar code image. The invention fully utilizes the features of chaotic system and two-dimension bar code technique which are combined for image counterfeit deterrence. The invention has the characters as strong secret-keeping property and large information carried, while it can recognize automatically.

Description

Image false-proof method based on chaotic characteristic
Technical field
The invention belongs to information security, Information Hiding Techniques field, relate to a kind of method for anti-counterfeit of image, particularly a kind of image false-proof method based on chaotic characteristic.
Background technology
Information security, Information hiding are the hot issues that current people pay close attention to, the Information hiding that people often need be crucial with some, and in needs, can take out easily, thereby the information of realization is hiding and false proof.Cryptography is the core of information security, the confidentiality of guarantee information, and accessing to your password to its encryption is the most effective way.Encryption is one of most important technical measures of guaranteeing information security, and it not only can be used for protecting the confidentiality of information, but also can be used for detection of data integrity etc., has purposes widely.But along with cryptographic development, the raising of cryptanalytic technique, some cryptographic algorithms are safety inadequately.
Summary of the invention
The object of the present invention is to provide a kind of image false-proof method based on chaotic characteristic, it is applied to chaos system in the encryption and decryption of information, has solved the existing cryptographic algorithm problem of safety inadequately.
To achieve these goals, the present invention by the following technical solutions, image false-proof method based on chaotic characteristic, comprise Information hiding step and information Recognition step, wherein the Information hiding step comprises that raw information is carried out chaos encryption hides, generates two-dimensional barcode image, the information Recognition step comprises to be discerned the chaos information that obtains carrying in the bar code and chaos information is carried out chaos decode handle and obtain raw information bar code image, and this method is carried out according to the following steps:
Information hiding
The first step, at first selection need be carried out the information of security and antiforge purpose, and the control information capacity is in the range of capacity that two-dimensional bar code is supported;
In second step, adopt Logistic chaotic mapping system x N+1=μ x n(1-x n) carry out chaos encryption,
X wherein n∈ (0,1), BIFURCATION CONTROL parameter μ ∈ (0,4), when 3.5699456<μ≤4, the Logistic mapping is in chaos state, and this moment is through generation chaos sequence x after k iteration k, utilize the chaotic encipher series of this generation to carry out the encryption of information, wherein k equals the length of raw information, X kBe that length is the Logistic chaotic maps sequence of k;
The 3rd step, after the information of acquisition chaos encryption, adopt national standard to generate the PDF417 bar code, determine the size of bar code according to the size of open ended bar code image, and be printed on the position of regulation, generate two-dimensional bar code;
Information Recognition
The first step, gather two-dimensional barcode image with scanner, the two-dimensional barcode image of gathering is carried out the image preliminary treatment, adopt the decoding rule of national standard PDF417 bar code that bar code is carried out decoded operation then, the chaos encryption information that obtains in the bar code image being carried, concrete steps are as follows:
1) gathers two-dimensional barcode image with scanner;
2) two-dimensional barcode image of gathering is carried out the image preliminary treatment;
A imports two-dimensional barcode image, adopts Ostu optimal threshold partitioning algorithm that two-dimensional barcode image is cut apart;
B carries out filtering, geometric correction and layering to bar code image to be handled;
Adopt 5 * 1 templates that bar code image is carried out medium filtering, remove the salt grain formula noise that exists because of scanning in the bar code image;
Adopt Hough conversion ρ=xcos θ+ysin θ to obtain the linear equation and the inclination angle of initial symbol of PDF417 bar code and full stop, the i.e. border, the left and right sides of detecting bar code according to the initial symbol and the full stop of PDF417 bar code, according to the tiltangle that obtains bar code image is rotated, rotate θ ° and be corrected to horizontal level, adopt bilinear interpolation that image pixel is carried out interpolation in the process of rotation;
Employing is got the method for intermediate value each layer PDF417 bar code image is carried out filter shape, at first by layer separately with bar code image, obtain the number of plies of bar code image and the height of each layer, then each layer is carried out Filtering Processing, adopt the Sobel horizontal edge to detect operator, obtain the horizontal edge of bar code image, carry out the projection of horizontal direction then, the peak value of horizontal direction projection just corresponding the level course border of bar code image, obtain the number of plies of bar code image and the height of each layer, each layer is carried out filter shape, the method that intermediate value is got in employing is carried out filtering to each row of each layer, promptly the gray value of each row pixel in each layer of bar code is carried out addition and average, compare with 128, if mean value is greater than 128, think that then this classifies sky as, the grey scale pixel value assignment is 255, otherwise thinks that this classifies bar as, and the grey scale pixel value assignment is 0;
3) according to the PDF417 decoding rule bar code image is discerned and deciphered, obtain the enciphered message of being carried;
Detect the empty number of bar of each sign character, table look-up and determine the information of each sign character representative, just the sign character in the two-dimensional barcode image is become codeword information,
The above-mentioned codeword information that obtains is deciphered the raw information that obtains storing in the bar code according to the PDF417 national standard of formulating;
Second step, to the chaos encryption information that obtains according to decruption key initial value x 0With parameter μ, use
Logistic chaotic mapping system x N+1=μ x n(1-x n) through generating chaos sequence X after k the iteration k, it is carried out chaos decode as stream secrete key to enciphered message, obtain raw information, wherein k equals the length of raw information, X kBe that length is the Logistic chaotic maps sequence of k.
The present invention is applied to information security field with chaology, realizes the encryption and decryption to various information such as digitized image, voice, texts.Because chaos system has good pseudo-randomness, track unpredictability, to the series of characteristics such as extreme sensitivity of initial condition and Control Parameter, these characteristics and cryptographic a lot of requirement coincide, therefore chaos encryption is realized easy, anti-aggressive strong, have very high practical value.
Characteristics of the present invention also are combining of chaos system and two-dimensional bar code, make the information that obtains have homogeneity, be convenient to unified the processing and identification automatically, 2D bar code technology is a kind of automatic identification technology, high input speed, low, the good reliability of cost, be widely used, characteristics such as have the information density height, capacity is big, error correcting capability is strong, can distinguish fast, and two-dimensional bar code self also has certain safety anti-fake ability, and certain security service can be provided.
The present invention has made full use of the characteristics of chaos system and 2D bar code technology, with the two combination, carries out image false-proof, and have strong security, carry the characteristics that contain much information, and can automatically identifying and reading.
Description of drawings
Fig. 1 is the flow process theory diagram of the inventive method;
Fig. 2 is pending raw information figure;
Fig. 3 carries out the chaos hum pattern that obtains behind the chaos encryption with Fig. 2;
Fig. 4 utilizes the final two-dimensional bar code figure that generates of the inventive method.
Embodiment
The present invention is described in further detail below in conjunction with the drawings and specific embodiments.
The present invention is based on the image information method for anti-counterfeit of chaotic characteristic, be divided into the two large divisions, a part is an Information hiding, comprises that raw information is carried out chaos encryption hides, generates two-dimensional barcode image; Another part is an information Recognition, comprises bar code image is discerned the chaos information that obtains carrying in the bar code and chaos information carried out chaos decode handle and obtain raw information, and as shown in Figure 1, this method is carried out according to the following steps:
Information hiding
The first step, at first selection need be carried out the information of security and antiforge purpose, and as literal, image etc., as Fig. 2, and the control information capacity is in the range of capacity that two-dimensional bar code is supported;
If information capacity is bigger, can adopt existing compression algorithm, such as the compression algorithm based on DCT or DWT conversion, common JPEG and JPEG2000 algorithm is compressed in pending information capacity in the range of capacity of two-dimensional bar code support at present.
Second step, utilize chaotic mapping system, mainly be based on the digitlization chaos system of realizing under the limited precision of computer, construct stream cipher or block cipher, and utilize the chaotic encipher series that obtains to carry out the encryption of image, text etc., as shown in Figure 3;
The present invention adopts the Logistic chaotic mapping system
x n+1=μ·x n(1-x n)
X wherein n∈ (0,1), BIFURCATION CONTROL parameter μ ∈ (0,4), when 3.5699456<μ≤4, the Logistic mapping is in chaos state, and this moment is through generation chaos sequence x after k iteration k, k equals the length of raw information, X kBe that length is the Logistic chaotic maps sequence of k.
The adoptable mode 1 of chaos encryption: the chaotic maps sequence that will be obtained by following formula is added to as random noise on the raw information, obtains chaos encryption information, realizes Information hiding.
The specific implementation process is as follows:
A is by initial value x 0With parameter μ as key, substitution Logistic equation iteration produces corresponding chaos sequence x k, wherein k equals the length of raw information, x kBe that length is the Logistic chaotic maps sequence of k;
B is with chaos sequence x kBe added in the raw information as random noise, adopt a position XOR to realize overlap-add operation.
The adoptable mode 2 of chaos encryption: will carry out the scramble operation to raw information by the chaotic maps sequence that following formula obtains, the memory location of upsetting raw information, and then chaos sequence is added on the raw information of scramble as random noise, obtain chaos encryption information, realize Information hiding.
The specific implementation process is as follows:
A is by initial value x 0, y 0With parameter μ 1, μ 2As key, substitution Logistic chaotic mapping system x N+1=μ x n(1-x n) iteration produces corresponding chaos sequence x kAnd y k, wherein k equals the length of raw information;
B according to the length L of raw information to x kCarry out conversion, make each element x i∈ [0, L] carries out the scramble operation to raw information, then with first byte information and x 1The information exchange of individual byte, and the like, with i byte and x iIndividual byte information exchange, thus the information storage order upset;
C is with chaos sequence y kBe added in the information behind the scramble as random noise, carry out an xor operation and realize stack.
For general security and antiforge purpose situation, 1 operation of employing mode gets final product, and mode 2 has higher safety anti-fake ability, is applicable to the demanding occasion of security and antiforge purpose.Specifically be applied in the antifalsification label of (1) valuables, such as household electrical appliances such as air-conditioning, refrigerators, the vehicles such as motor vehicles etc., (2) are applied to the false proof management of certificate, as identity card, passport, driving license etc., (3) are used for the false proof of marketable securities such as ticket, lottery ticket, check.
The 3rd step, after the information of acquisition chaos encryption, adopt national standard to generate the PDF417 bar code, determine the size of bar code according to the size of open ended bar code image, and be printed on the position of regulation, as shown in Figure 4, generate two-dimensional bar code.
Information Recognition
The first step, the identification decoding of bar code image
Gather two-dimensional barcode image with scanner, the two-dimensional barcode image of gathering is carried out the image preliminary treatment, adopt the decoding rule of national standard PDF417 bar code that bar code is carried out decoded operation then, the chaos encryption information that obtains in the bar code image being carried, concrete steps are as follows:
1) gathers two-dimensional barcode image with scanner;
2) two-dimensional barcode image of gathering is carried out the image preliminary treatment;
A imports two-dimensional barcode image, adopts Ostu optimal threshold partitioning algorithm that two-dimensional barcode image is cut apart;
The Ostu algorithm is target and background two parts with image segmentation, and the intra-class variance minimum of this two classes gray value then, and between-group variance maximum are calculated the inter-class variance maximum by search and obtained optimal threshold.
The average gray of target and background is respectively in the image
u o = 1 w o ( T ) &Sigma; 0 < i < T i &times; p ( i )
u b = 1 w b ( T ) &Sigma; 0 < i < T i &times; p ( i )
The grand mean of image is
u=w o(T)u o+w b(T)u b
Inter-class variance between image object and the background is
G(T)=w o(T)(u o-u) 2+w b(T)(u b-u) 2
Then the optimal threshold of image is
g = arg max 0 &le; T &le; 255 [ G ( T ) ]
W wherein o(T) and w b(T) number of pixels of expression target and background, p (i) is the number of pixels of i for pixel value.
B carries out filtering, geometric correction and layering to bar code image to be handled;
Adopt 5 * 1 templates that bar code image is carried out medium filtering, remove the salt grain formula noise that exists because of scanning in the bar code image;
The initial symbol and the full stop of PDF417 bar code have uniqueness, and be non-overlapped, can adopt Hough conversion ρ=xcos θ+ysin θ to obtain their linear equation and inclination angle, the i.e. border, the left and right sides of detecting bar code according to the initial symbol and the full stop of PDF417 bar code, according to the tiltangle that obtains bar code image is rotated, rotate θ ° and be corrected to horizontal level, adopt bilinear interpolation that image pixel is carried out interpolation in the process of rotation;
Multirow architectural characteristic according to the PDF417 bar code adopts the method for getting intermediate value that each layer bar code image carried out filter shape, bar code image is made of multilayer, each layer has nothing in common with each other and certain height is arranged, therefore at first by layer separately with bar code image, obtain the number of plies of bar code image and the height of each layer, then each layer is carried out Filtering Processing, adopt the Sobel horizontal edge to detect operator, obtain the horizontal edge of bar code image, carry out the projection of horizontal direction then, the peak value of horizontal direction projection just corresponding the level course border of bar code image, can obtain the number of plies of bar code image and the height of each layer thus, each layer is carried out filter shape, the method that intermediate value is got in employing is carried out filtering to each row of each layer, promptly the gray value of each row pixel in each layer of bar code is carried out addition and average, compare with 128, if mean value is greater than 128, think that then this classifies sky as, the grey scale pixel value assignment is 255, otherwise thinks that this classifies bar as, and the grey scale pixel value assignment is 0.
3) according to the PDF417 decoding rule bar code image is discerned and deciphered, obtain the enciphered message of being carried;
Each sign character of PDF417 bar code is formed by 4 bars and 4 are empty, and total number of modules is 17, and sign character always begins with bar, and with the sky end, each sign character is represented certain implication.Identifying is exactly that the sign character in the two-dimensional barcode image (bar idle pattern) is become significant codeword information, detects the empty number of bar of each sign character, tables look-up then and determines the information of each sign character representative; Decoding is exactly according to the PDF417 national standard decoding of formulating, the raw information that obtains storing in the bar code with the above-mentioned codeword information that obtains.
Second step, to the chaos encryption information that obtains according to decruption key initial value x 0With parameter μ, with Logistic chaotic mapping system x N+1=μ x n(1-x n) through generating chaos sequence X after k the iteration k, the k value equals to treat the length of decryption information, X kBe that length is the Logistic chaotic maps sequence of k, it is carried out chaos decode as stream secrete key to enciphered message, obtain raw information.

Claims (4)

1. image false-proof method based on chaotic characteristic, comprise Information hiding step and information Recognition step, wherein the Information hiding step comprises that raw information is carried out chaos encryption hides, generates two-dimensional barcode image, the information Recognition step comprises to be discerned the chaos information that obtains carrying in the two-dimensional barcode image and chaos information is carried out chaos decode handle and obtain raw information two-dimensional barcode image, it is characterized in that this method is carried out according to the following steps:
Information hiding
The first step, at first selection need be carried out the information of security and antiforge purpose, and the control information capacity is in the range of capacity that two-dimensional barcode image is supported;
In second step, adopt the Logistic chaotic mapping system
x n+1=μ·x n(1-x n)
X wherein n∈ (0,1), BIFURCATION CONTROL parameter μ ∈ (0,4), when 3.5699456<μ≤4, the Logistic mapping is in chaos state, and this moment is through generation Logistic chaotic maps sequence X after k iteration k, utilize the Logistic chaotic maps sequence of this generation to carry out the encryption of information, wherein k equals the length of raw information, X kBe that length is the Logistic chaotic maps sequence of k;
The 3rd step, after the information of acquisition chaos encryption, adopt national standard to generate the PDF417 bar code, determine the size of two-dimensional barcode image according to the size of open ended bar code image, and be printed on the position of regulation, generate two-dimensional barcode image;
Information Recognition
The first step, gather two-dimensional barcode image with scanner, the two-dimensional barcode image of gathering is carried out the image preliminary treatment, adopt the decoding rule of national standard PDF417 bar code that two-dimensional barcode image is carried out decoded operation then, the chaos encryption information that obtains in the two-dimensional barcode image being carried, concrete steps are as follows:
1) gathers two-dimensional barcode image with scanner;
2) two-dimensional barcode image of gathering is carried out the image preliminary treatment;
A imports two-dimensional barcode image, adopts Ostu optimal threshold partitioning algorithm that two-dimensional barcode image is cut apart;
B carries out filtering, geometric correction and layering to two-dimensional barcode image to be handled:
Adopt 5 * 1 templates that two-dimensional barcode image is carried out medium filtering, remove the salt grain formula noise that exists because of scanning in the two-dimensional barcode image;
Adopt Hough conversion ρ=xcos θ+ysin θ to obtain the linear equation and the inclination angle of initial symbol of PDF417 bar code and full stop, the i.e. border, the left and right sides of detecting two-dimensional barcode image according to the initial symbol and the full stop of PDF417 bar code, according to the tiltangle that obtains two-dimensional barcode image is rotated, rotate θ ° and be corrected to horizontal level, adopt bilinear interpolation that image pixel is carried out interpolation in the process of rotation;
Employing is got the method for intermediate value each layer PDF417 two-dimensional barcode image is carried out filter shape, at first by layer separately with two-dimensional barcode image, obtain the number of plies of two-dimensional barcode image and the height of each layer, then each layer is carried out Filtering Processing, adopt the Sobel horizontal edge to detect operator, obtain the horizontal edge of two-dimensional barcode image, carry out the projection of horizontal direction then, the peak value of horizontal direction projection just corresponding the level course border of two-dimensional barcode image, obtain the number of plies of two-dimensional barcode image and the height of each layer, each layer is carried out filter shape, the method that intermediate value is got in employing is carried out filtering to each row of each layer, promptly the gray value of each row pixel in each layer of two-dimensional barcode image is carried out addition and average, compare with 128, if mean value is greater than 128, think that then this classifies sky as, the grey scale pixel value assignment is 255, otherwise thinks that this classifies bar as, and the grey scale pixel value assignment is 0;
3) according to the PDF417 decoding rule two-dimensional barcode image is discerned and deciphered, obtain the enciphered message of being carried;
Detect the empty number of bar of each sign character, table look-up and determine the information of each sign character representative, just the sign character in the two-dimensional barcode image is become codeword information;
The above-mentioned codeword information that obtains is deciphered the raw information that obtains storing in the two-dimensional barcode image according to the PDF417 national standard of formulating;
Second step, to the chaos encryption information that obtains according to decruption key initial value x 0With parameter μ, with generating Logistic chaotic maps X after k iteration of Logistic chaotic maps process k, it is carried out chaos decode as stream secrete key to enciphered message, obtain raw information.
2. according to the described image false-proof method of claim 1, it is characterized in that, the mode that the described Logistic of utilization chaotic maps sequence is carried out the information encryption employing is, the Logistic chaotic maps sequence that obtains is added on the raw information as random noise, obtain chaos encryption information, realize Information hiding, concrete steps are as follows:
A is by initial value x 0With parameter μ as key, substitution Logistic chaotic mapping system x N+1=μ x n(1-x n) iteration produces corresponding Logistic chaotic maps sequence X k, wherein k equals the length of raw information, X kBe that length is the Logistic chaotic maps sequence of k;
B is with Logistic chaotic maps sequence X kBe added in the raw information as random noise, adopt a position XOR to realize overlap-add operation.
3. according to the described image false-proof method of claim 1, it is characterized in that, the mode that the described Logistic of utilization chaotic encipher series carries out the information encryption employing is, the Logistic chaotic maps sequence that obtains is carried out the scramble operation to raw information, the memory location of upsetting raw information, and then Logistic chaotic maps sequence is added on the raw information of scramble as random noise, chaos encryption information obtained, realize Information hiding, concrete steps are as follows:
A is by initial value x 0, y 0With parameter μ 1, μ 2As key, substitution Logistic chaotic mapping system x N+1=μ x n(1-x n) iteration produces corresponding Logistic chaotic maps sequence x kAnd y k, wherein k equals the length of raw information;
B according to the length L of raw information to x kCarry out conversion, make each element x i∈ [0, L] carries out the scramble operation to raw information, then with first byte information and x 1The information exchange of individual byte, and the like, with i byte and x iIndividual byte information exchange, thus the information storage order upset;
C is with Logistic chaotic maps sequences y kBe added in the information behind the scramble as random noise, carry out an xor operation and realize stack.
4. according to the described image false-proof method of claim 1, it is characterized in that, described employing Ostu optimal threshold partitioning algorithm is cut apart two-dimensional barcode image, concrete steps are, Ostu optimal threshold partitioning algorithm is divided into target and background two parts with two-dimensional barcode image, the intra-class variance minimum of this two classes gray value then, and between-group variance maximum, calculate the inter-class variance maximum by search and obtain optimal threshold, the average gray of target and background is respectively in the two-dimensional barcode image:
u o = 1 w o ( T ) &Sigma; 0 < i < T i &times; p ( i )
u b = 1 w b ( T ) &Sigma; 0 < i < T i &times; p ( i )
The grand mean of two-dimensional barcode image is
u=w o(T)u o+w b(T)u b
Inter-class variance between the two-dimensional barcode image target and background is
G(T)=w o(T)(u o-u) 2+w b(T)(u b-u) 2
Then the optimal threshold of two-dimensional barcode image is
g = arg max 0 &le; T &le; 255 [ G ( T ) ]
W wherein o(T) and w b(T) number of pixels of expression target and background, p (i) is the number of pixels of i for pixel value.
CNB2005100960153A 2005-09-12 2005-09-12 Image false-proof method based on chaotic characteristic Expired - Fee Related CN100531028C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100960153A CN100531028C (en) 2005-09-12 2005-09-12 Image false-proof method based on chaotic characteristic

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100960153A CN100531028C (en) 2005-09-12 2005-09-12 Image false-proof method based on chaotic characteristic

Publications (2)

Publication Number Publication Date
CN1738235A CN1738235A (en) 2006-02-22
CN100531028C true CN100531028C (en) 2009-08-19

Family

ID=36080906

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100960153A Expired - Fee Related CN100531028C (en) 2005-09-12 2005-09-12 Image false-proof method based on chaotic characteristic

Country Status (1)

Country Link
CN (1) CN100531028C (en)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101561922B (en) * 2008-04-14 2011-12-21 哈尔滨理工大学 High-order airspace hiding method for resisting sample pair analysis
CN101706947B (en) * 2009-11-26 2011-11-16 大连大学 Image fusion encryption method based on DNA sequences and multiple chaotic mappings
CN101882296A (en) * 2010-05-07 2010-11-10 邹阿金 Method for hiding Chebyshev neural network chaotic digital watermark information
CN102457652A (en) * 2010-10-18 2012-05-16 江西金格网络科技有限责任公司 Anti-counterfeit detection method and anti-counterfeit overhaul system for document
WO2012108016A1 (en) * 2011-02-09 2012-08-16 富士通株式会社 Information processing device in embedded device, method of processing information and information processing program
CN102184506A (en) * 2011-05-10 2011-09-14 南通大学 Digital anti-counterfeiting method based on chaos password encryption
CN102184518B (en) * 2011-05-16 2013-11-06 重庆大学 DICOM (Digital Imaging and Communications in Medicine) medical image encrypting and decrypting method based on edge detection
CN102546603B (en) * 2011-12-22 2015-01-07 洛阳元煜自控工程有限公司 Communication protocol dynamic encryption method of remote street lamp control system
CN103077498A (en) * 2013-01-04 2013-05-01 东北林业大学 Image encryption algorithm based on shift transformation
CN103150483A (en) * 2013-03-29 2013-06-12 王少夫 Wiener noise-contained two-dimensional chaotic system
CN103427979B (en) * 2013-06-09 2016-12-28 浙江工业大学 A kind of Internet picture transparent safety transmission method based on chaos encryption
CN104182926B (en) * 2014-07-25 2017-11-14 南京邮电大学 Color image encrypting method based on Hilbert conversion and chaos Liu algorithms
CN104657871B (en) * 2015-03-24 2017-11-28 南通大学 A kind of commodity counterfeit prevention code generating method
CN105023163B (en) * 2015-06-23 2018-08-21 杭州沃朴物联科技有限公司 A kind of anti-counterfeiting system and method based on chaos graph label
CN106503497B (en) * 2016-10-21 2019-06-21 国网黑龙江省电力有限公司信息通信公司 Divulgence prevention method and anti-module of divulging a secret based on noise
CN107169912A (en) * 2016-11-29 2017-09-15 黄宗美 A kind of improved method of Image Chaos encryption technology
CN109726786B (en) * 2017-10-31 2023-09-26 北京京东尚科信息技术有限公司 Two-dimensional code information reading and generating method and device
CN108960387B (en) * 2018-07-12 2021-10-12 南京林业大学 Anti-counterfeiting two-dimensional code and generation and identification method thereof
CN112241641B (en) * 2019-07-19 2022-07-05 杭州海康威视数字技术股份有限公司 Decoding method for bar code, terminal device and storage medium
CN111353166B (en) * 2020-02-25 2021-10-26 南通大学 Encryption method for converting picture into Chinese character
CN114697671B (en) * 2022-06-01 2022-09-02 济宁明珠建筑工程有限公司 Building engineering quality management system

Also Published As

Publication number Publication date
CN1738235A (en) 2006-02-22

Similar Documents

Publication Publication Date Title
CN100531028C (en) Image false-proof method based on chaotic characteristic
CN1323371C (en) Fingerprint information hiding and verifying method based on two-dimensional bar code
US10749682B2 (en) Anti-counterfeit method
CN101165726B (en) Method and system for preventing credit card embezzlement
CN1209730C (en) Digital anti-fake method
CN109472338B (en) Batch generation method of commodity anti-counterfeiting two-dimensional codes
CN101061494A (en) Method for making secure a personal portable object
CN105825257A (en) Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof
JP7367277B2 (en) Methods and systems for anti-counterfeiting protection of digital files
CN101295343A (en) Two-dimensional code multi-enciphering anti-fake printing method
CN1158105A (en) Unlaterable self-verifying articles
CN104527535B (en) A kind of automotive license plate of band encryption QR Quick Response Code
CN104809490A (en) Card anti-counterfeiting system based on multidimensional code and authentication method based on card anti-counterfeiting system
Alajmi et al. Steganography of encrypted messages inside valid QR codes
CN101950370A (en) Method for coding combined two-dimensional code
CN103106413A (en) Autograph two-dimension code representing and authentication method
CA2497737A1 (en) Cryptographically secure person identification
CN1444145A (en) Digital bar code watermark and antifalse method
Wan et al. Visual secret sharing scheme with (k, n) threshold based on QR codes
Noore et al. Embedding biometric identifiers in 2D barcodes for improved security
CN1482569A (en) Off-line two-dimension bar code biological identification false-proof method
CN1932852A (en) Tax control machine material characteristic encrypted antifaking method
CN1153402C (en) Methods and systems for creating and authenticating unalterable self-verifying articles
CN201063641Y (en) High safety encryption/decryption device including human information
Tan et al. Visual secret sharing scheme for color qr code

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090819

Termination date: 20120912