CN103106441A - Multi-variable-parameter gradient multi-variant encryption anti-fake information storage brand - Google Patents

Multi-variable-parameter gradient multi-variant encryption anti-fake information storage brand Download PDF

Info

Publication number
CN103106441A
CN103106441A CN2013100224262A CN201310022426A CN103106441A CN 103106441 A CN103106441 A CN 103106441A CN 2013100224262 A CN2013100224262 A CN 2013100224262A CN 201310022426 A CN201310022426 A CN 201310022426A CN 103106441 A CN103106441 A CN 103106441A
Authority
CN
China
Prior art keywords
binary
binary system
group
trade mark
counterfeiting information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100224262A
Other languages
Chinese (zh)
Inventor
张立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN2013100224262A priority Critical patent/CN103106441A/en
Publication of CN103106441A publication Critical patent/CN103106441A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Printing Methods (AREA)

Abstract

Provided is a multi-variable-parameter gradient multi-variant encryption anti-fake information storage brand. According to the brand, binary system anti-fake information can be changed into binary system modulating signals through multi-variant encryption and channel coding. The anti-fake information can be embedded into an entire brand page through orderly changes of conductivity of amplitude-modulated dots through a circulation look-up table modulation type. The anti-fake information can be identified from any arbitrary fragment in the brand identification process, and also can be applied to various anti-fake brands.

Description

Multi-variable-paramgradient gradient multi-variant encryption anti-fake information storage brand
Art:
The present invention relates to a kind of anti-false trademark, particularly a kind of Multi-variable-paramgradient gradient multi-variant encryption anti-fake information storage brand, binary system encryption anti-fake information can be stored on the trade mark page and realize the false proof of trade mark by the trade mark, the trade mark can be used for extensive stock it is false proof in.
Background technology:
Anti-false trademark, also known as antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, are a kind of proof labels discerned the false from the genuine, prevent personation, are mark true and false, that distinguish marketing quality quality of the people for distinguishing merchandise resources during commodity circulation.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and the interests of client.The trade mark of China is audaciously innovated; employ laser anti-counterfeit, core micropore are false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but false proof is high-tech trial of strength with struggle that is faking; advanced anti-counterfeiting technology has certain ageing again; so; trade mark anti-fake technique must constantly be lifted; could be false proof with being maintained the leading position forever in faking, this is also the basic assurance for protecting the interests of businessman and client to maintain commodity circulation safety.
The content of the invention:
In order to improve the reliability and security of trademark anti-counterfeit, the present invention is improved existing trade mark anti-fake technique for the deficiency that existing trademark anti-counterfeit is present, propose a kind of anti-counterfeiting information storage trade mark, the trade mark passes through the change to amplitude electric conductivity in brand printing, encryption anti-fake information is embedded on the whole trade mark page in binary system coded signal form, encryption anti-fake information can be recognized in any one fragment in brand recognition, therefore with very strong disguised and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information stores trade mark, is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, the image and word on trade mark page paper are made up of amplitude,
According to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, and the horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
The horizontal scanning line being printed on trade mark page paper has N bars, the column scan line being printed on trade mark page paper has M bars, the amplitude being printed on trade mark page paper is divided into N rows M row on trade mark paper, amplitude is neat arranged in arrays on trade mark page paper paper, i is allowed to take 1 to arrive N, j is allowed to take 1 to arrive M, j-th strip column scan line on trade mark page paper is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper, i-th horizontal scanning line on trade mark page paper is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper
When the binary message for needing to store the trade mark page is read, the 1st article on trade mark page paper is set to high level successively to the N articles horizontal scanning line,
When the 1st article of horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported with 0,1 code form from the 1st bar of column scan line to the M bars column scan line, the amplitude that the 1st row on trade mark page paper is printed by electrically conductive ink exports binary message 1, the amplitude that the 1st row on trade mark page paper is printed by dielectric ink exports binary message 0, above-mentioned readout is repeated to other rows on trade mark page paper
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 508419DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as respectively
Figure 363243DEST_PATH_IMAGE002
Figure 872808DEST_PATH_IMAGE003
Figure 736859DEST_PATH_IMAGE004
Figure 20072DEST_PATH_IMAGE005
Figure 311376DEST_PATH_IMAGE006
Figure 296519DEST_PATH_IMAGE007
Figure 433102DEST_PATH_IMAGE008
With
Figure 570822DEST_PATH_IMAGE009
, encryption parameter
Figure 282295DEST_PATH_IMAGE002
Figure 505466DEST_PATH_IMAGE003
Figure 711320DEST_PATH_IMAGE004
Figure 703546DEST_PATH_IMAGE005
Figure 851500DEST_PATH_IMAGE006
Figure 561967DEST_PATH_IMAGE007
Figure 305932DEST_PATH_IMAGE008
With
Figure 418245DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, eight-digit binary number encryption variables are denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 138125DEST_PATH_IMAGE011
Figure 901867DEST_PATH_IMAGE013
Figure 142356DEST_PATH_IMAGE014
Figure 631292DEST_PATH_IMAGE016
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 864007DEST_PATH_IMAGE010
Figure 770783DEST_PATH_IMAGE011
Figure 909509DEST_PATH_IMAGE012
Figure 850921DEST_PATH_IMAGE013
Figure 433212DEST_PATH_IMAGE014
Figure 827284DEST_PATH_IMAGE015
Figure 238543DEST_PATH_IMAGE016
Figure 768881DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 522073DEST_PATH_IMAGE010
Figure 652709DEST_PATH_IMAGE011
Figure 149550DEST_PATH_IMAGE012
Figure 799974DEST_PATH_IMAGE013
Figure 458488DEST_PATH_IMAGE014
Figure 76420DEST_PATH_IMAGE015
Figure 111372DEST_PATH_IMAGE016
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 711298DEST_PATH_IMAGE010
Figure 483448DEST_PATH_IMAGE013
Figure 998612DEST_PATH_IMAGE014
Figure 76289DEST_PATH_IMAGE015
Figure 916255DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 353053DEST_PATH_IMAGE010
Figure 918026DEST_PATH_IMAGE011
Figure 98472DEST_PATH_IMAGE012
Figure 681769DEST_PATH_IMAGE013
Figure 289468DEST_PATH_IMAGE014
Figure 341737DEST_PATH_IMAGE015
Figure 60295DEST_PATH_IMAGE016
Figure 763677DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 542277DEST_PATH_IMAGE010
Figure 81843DEST_PATH_IMAGE011
Figure 604091DEST_PATH_IMAGE012
Figure 173699DEST_PATH_IMAGE013
Figure 884483DEST_PATH_IMAGE015
Figure 928532DEST_PATH_IMAGE016
Figure 91660DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 212062DEST_PATH_IMAGE010
Figure 839539DEST_PATH_IMAGE012
Figure 326015DEST_PATH_IMAGE013
Figure 882898DEST_PATH_IMAGE014
Figure 868041DEST_PATH_IMAGE015
Figure 876765DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 853817DEST_PATH_IMAGE010
Figure 282841DEST_PATH_IMAGE012
Figure 275068DEST_PATH_IMAGE013
Figure 423022DEST_PATH_IMAGE014
Figure 877454DEST_PATH_IMAGE016
Figure 989766DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 43042DEST_PATH_IMAGE010
Figure 788461DEST_PATH_IMAGE012
Figure 755280DEST_PATH_IMAGE013
Figure 979457DEST_PATH_IMAGE014
Figure 664516DEST_PATH_IMAGE015
Figure 15863DEST_PATH_IMAGE016
Figure 837188DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, polynary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 966687DEST_PATH_IMAGE018
Figure 873463DEST_PATH_IMAGE010
Figure 481031DEST_PATH_IMAGE019
Figure 422442DEST_PATH_IMAGE011
Figure 739154DEST_PATH_IMAGE018
Figure 75644DEST_PATH_IMAGE020
Figure 224231DEST_PATH_IMAGE014
Figure 455492DEST_PATH_IMAGE021
Figure 105916DEST_PATH_IMAGE015
Figure 30010DEST_PATH_IMAGE018
Figure 647942DEST_PATH_IMAGE016
Figure 682894DEST_PATH_IMAGE022
Figure 187825DEST_PATH_IMAGE017
, polynary cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 388048DEST_PATH_IMAGE018
Figure 961112DEST_PATH_IMAGE010
Figure 54970DEST_PATH_IMAGE023
Figure 647811DEST_PATH_IMAGE018
Figure 758986DEST_PATH_IMAGE012
Figure 487777DEST_PATH_IMAGE024
Figure 924574DEST_PATH_IMAGE013
Figure 489548DEST_PATH_IMAGE018
Figure 404414DEST_PATH_IMAGE014
Figure 733851DEST_PATH_IMAGE025
Figure 393819DEST_PATH_IMAGE018
Figure 361644DEST_PATH_IMAGE016
Figure 815759DEST_PATH_IMAGE026
Figure 133925DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 905441DEST_PATH_IMAGE018
Figure 819356DEST_PATH_IMAGE027
Figure 998589DEST_PATH_IMAGE018
Figure 161717DEST_PATH_IMAGE012
Figure 282119DEST_PATH_IMAGE028
Figure 796277DEST_PATH_IMAGE013
Figure 909596DEST_PATH_IMAGE018
Figure 927230DEST_PATH_IMAGE014
Figure 219988DEST_PATH_IMAGE015
Figure 9139DEST_PATH_IMAGE016
Figure 736923DEST_PATH_IMAGE030
Figure 694515DEST_PATH_IMAGE017
Figure 415215DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 407442DEST_PATH_IMAGE018
Figure 751016DEST_PATH_IMAGE031
Figure 478669DEST_PATH_IMAGE011
Figure 394990DEST_PATH_IMAGE012
Figure 576441DEST_PATH_IMAGE032
Figure 389676DEST_PATH_IMAGE013
Figure 356495DEST_PATH_IMAGE018
Figure 331405DEST_PATH_IMAGE014
Figure 734573DEST_PATH_IMAGE033
Figure 85920DEST_PATH_IMAGE015
Figure 907245DEST_PATH_IMAGE018
Figure 302323DEST_PATH_IMAGE016
Figure 209100DEST_PATH_IMAGE034
Figure 832979DEST_PATH_IMAGE017
Figure 758079DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 734442DEST_PATH_IMAGE010
Figure 157419DEST_PATH_IMAGE035
Figure 953337DEST_PATH_IMAGE011
Figure 706529DEST_PATH_IMAGE018
Figure 322318DEST_PATH_IMAGE012
Figure 68426DEST_PATH_IMAGE036
Figure 718851DEST_PATH_IMAGE013
Figure 642944DEST_PATH_IMAGE018
Figure 11609DEST_PATH_IMAGE014
Figure 764670DEST_PATH_IMAGE037
Figure 269601DEST_PATH_IMAGE015
Figure 391195DEST_PATH_IMAGE016
Figure 229838DEST_PATH_IMAGE038
Figure 104122DEST_PATH_IMAGE017
Figure 370018DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 447696DEST_PATH_IMAGE018
Figure 824450DEST_PATH_IMAGE010
Figure 553241DEST_PATH_IMAGE039
Figure 990039DEST_PATH_IMAGE011
Figure 555012DEST_PATH_IMAGE018
Figure 453567DEST_PATH_IMAGE012
Figure 447565DEST_PATH_IMAGE018
Figure 680969DEST_PATH_IMAGE014
Figure 382526DEST_PATH_IMAGE015
Figure 905780DEST_PATH_IMAGE018
Figure 428028DEST_PATH_IMAGE016
Figure 736649DEST_PATH_IMAGE042
Figure 686151DEST_PATH_IMAGE017
Figure 962280DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 84957DEST_PATH_IMAGE018
Figure 762932DEST_PATH_IMAGE010
Figure 131913DEST_PATH_IMAGE011
Figure 528446DEST_PATH_IMAGE012
Figure 288591DEST_PATH_IMAGE044
Figure 742575DEST_PATH_IMAGE013
Figure 410317DEST_PATH_IMAGE018
Figure 548037DEST_PATH_IMAGE014
Figure 494400DEST_PATH_IMAGE015
Figure 965832DEST_PATH_IMAGE018
Figure 309275DEST_PATH_IMAGE046
Figure 488584DEST_PATH_IMAGE017
Figure 498128DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 594129DEST_PATH_IMAGE018
Figure 663716DEST_PATH_IMAGE010
Figure 595900DEST_PATH_IMAGE047
Figure 409135DEST_PATH_IMAGE011
Figure 359642DEST_PATH_IMAGE018
Figure 600131DEST_PATH_IMAGE012
Figure 488452DEST_PATH_IMAGE048
Figure 89067DEST_PATH_IMAGE013
Figure 790624DEST_PATH_IMAGE014
Figure 946667DEST_PATH_IMAGE049
Figure 101705DEST_PATH_IMAGE015
Figure 472010DEST_PATH_IMAGE050
Figure 961077DEST_PATH_IMAGE018
, set encryption parameter
Figure 697958DEST_PATH_IMAGE002
Figure 48168DEST_PATH_IMAGE003
Figure 545008DEST_PATH_IMAGE004
Figure 444700DEST_PATH_IMAGE005
Figure 368793DEST_PATH_IMAGE006
Figure 471879DEST_PATH_IMAGE007
Figure 506831DEST_PATH_IMAGE008
With
Figure 526608DEST_PATH_IMAGE009
Initial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 621603DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 211984DEST_PATH_IMAGE051
Carry out H1=
Figure 486846DEST_PATH_IMAGE052
Figure 111862DEST_PATH_IMAGE010
Figure 377758DEST_PATH_IMAGE019
Figure 81458DEST_PATH_IMAGE052
Figure 560981DEST_PATH_IMAGE012
Figure 715888DEST_PATH_IMAGE020
Figure 280861DEST_PATH_IMAGE013
Figure 461307DEST_PATH_IMAGE052
Figure 795336DEST_PATH_IMAGE014
Figure 652303DEST_PATH_IMAGE021
Figure 704572DEST_PATH_IMAGE015
Figure 688709DEST_PATH_IMAGE052
Figure 877245DEST_PATH_IMAGE016
Figure 916831DEST_PATH_IMAGE022
Figure 456397DEST_PATH_IMAGE017
Figure 978645DEST_PATH_IMAGE052
Polynary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 287267DEST_PATH_IMAGE051
Carry out H1=
Figure 486036DEST_PATH_IMAGE052
Figure 512898DEST_PATH_IMAGE010
Figure 42099DEST_PATH_IMAGE019
Figure 923336DEST_PATH_IMAGE011
Figure 309318DEST_PATH_IMAGE052
Figure 276006DEST_PATH_IMAGE012
Figure 423271DEST_PATH_IMAGE013
Figure 168559DEST_PATH_IMAGE014
Figure 836300DEST_PATH_IMAGE021
Figure 974021DEST_PATH_IMAGE015
Figure 685494DEST_PATH_IMAGE052
Figure 908665DEST_PATH_IMAGE016
Figure 114518DEST_PATH_IMAGE022
Figure 106745DEST_PATH_IMAGE017
Figure 254698DEST_PATH_IMAGE052
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H2=
Figure 434007DEST_PATH_IMAGE053
Figure 177972DEST_PATH_IMAGE010
Figure 539552DEST_PATH_IMAGE023
Figure 343560DEST_PATH_IMAGE011
Figure 541323DEST_PATH_IMAGE053
Figure 88979DEST_PATH_IMAGE012
Figure 305066DEST_PATH_IMAGE024
Figure 545554DEST_PATH_IMAGE013
Figure 965034DEST_PATH_IMAGE053
Figure 316381DEST_PATH_IMAGE014
Figure 855816DEST_PATH_IMAGE025
Figure 267205DEST_PATH_IMAGE015
Figure 173981DEST_PATH_IMAGE053
Figure 312708DEST_PATH_IMAGE016
Figure 254119DEST_PATH_IMAGE026
Figure 836410DEST_PATH_IMAGE017
Figure 948591DEST_PATH_IMAGE053
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 641741DEST_PATH_IMAGE054
Carry out H2=
Figure 172079DEST_PATH_IMAGE053
Figure 925272DEST_PATH_IMAGE010
Figure 55908DEST_PATH_IMAGE023
Figure 552748DEST_PATH_IMAGE011
Figure 203172DEST_PATH_IMAGE053
Figure 861687DEST_PATH_IMAGE012
Figure 479619DEST_PATH_IMAGE024
Figure 285081DEST_PATH_IMAGE053
Figure 219724DEST_PATH_IMAGE025
Figure 58367DEST_PATH_IMAGE015
Figure 417805DEST_PATH_IMAGE053
Figure 401810DEST_PATH_IMAGE016
Figure 479487DEST_PATH_IMAGE026
Figure 121821DEST_PATH_IMAGE017
Figure 601344DEST_PATH_IMAGE053
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H3=
Figure 767970DEST_PATH_IMAGE055
Figure 332943DEST_PATH_IMAGE010
Figure 513389DEST_PATH_IMAGE027
Figure 96686DEST_PATH_IMAGE011
Figure 704385DEST_PATH_IMAGE055
Figure 756654DEST_PATH_IMAGE012
Figure 193321DEST_PATH_IMAGE028
Figure 647436DEST_PATH_IMAGE013
Figure 426036DEST_PATH_IMAGE055
Figure 808345DEST_PATH_IMAGE014
Figure 108056DEST_PATH_IMAGE015
Figure 306825DEST_PATH_IMAGE055
Figure 68108DEST_PATH_IMAGE016
Figure 394047DEST_PATH_IMAGE030
Figure 557175DEST_PATH_IMAGE017
Figure 926845DEST_PATH_IMAGE055
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this polynary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesCarry out polynary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, valid certificates can be provided for true trade mark, there is stronger anti-forgery ability simultaneously.
To solve above-mentioned technical problem, processing is digitized to image false-proof information and character anti-counterfeiting information first, the binary system anti-counterfeiting information table of 8 one group of generation, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, polynary cryptographic calculation is carried out to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables, the binary system encryption anti-fake information table of 32 one group of generation, pass through channel coding using 32 binary system encryption anti-fake informations in binary system encryption anti-fake information table, 32 one group of binary modulated signal of the generation with error detecting and error correcting function, channel coding can use loop coding, convolutional encoding or Turbo coding diversified forms, picture signal is adjusted to be handled by rasterizing trade mark page original continuous(RIP)Halftoning hybrid screening picture signal is exported with hybrid screening, including amplitude and FM screened image signal, the electric conductivity of amplitude in hybrid screening picture signal is modulated using circulation look-up table modulation system using 32 one group of binary modulated signals of generation, make the electric conductivity of amplitude according to dielectric ink amplitude and electrically conductive ink amplitude is regular changes, adjacent 32 amplitudes in hybrid screening picture signal are made to carry 32 binary system anti-counterfeiting information by the change of electric conductivity, so as to generate the hybrid screening picture signal of the embedded anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, trade mark page site electric conductivity signal is gathered first, by the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding, decrypts i-th group of 32 binary message in anti-counterfeiting information table by binary system and is denoted as Mi
Binary system is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, set encryption parameter
Figure 40798DEST_PATH_IMAGE003
Figure 597681DEST_PATH_IMAGE004
Figure 333556DEST_PATH_IMAGE005
Figure 1297DEST_PATH_IMAGE006
Figure 319332DEST_PATH_IMAGE008
With
Figure 542503DEST_PATH_IMAGE009
Initial value for encryption when initial value, initial value when setting encryption variables j, d, e, f, g, h, r, p and q initial value as encryption, it is k=0 that binary operator, which controls variable k initial value design, by polynary ciphering process, and it is M that binary operator, which controls decryption computing during variable k=0,i=
Figure 997624DEST_PATH_IMAGE018
Figure 989851DEST_PATH_IMAGE010
Figure 888537DEST_PATH_IMAGE019
Figure 333425DEST_PATH_IMAGE011
Figure 592237DEST_PATH_IMAGE018
Figure 706320DEST_PATH_IMAGE013
Figure 503244DEST_PATH_IMAGE018
Figure 470063DEST_PATH_IMAGE014
Figure 444972DEST_PATH_IMAGE021
Figure 199487DEST_PATH_IMAGE018
Figure 20813DEST_PATH_IMAGE016
Figure 432202DEST_PATH_IMAGE022
Figure 588246DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=1,i=
Figure 735828DEST_PATH_IMAGE010
Figure 379168DEST_PATH_IMAGE023
Figure 541159DEST_PATH_IMAGE011
Figure 337076DEST_PATH_IMAGE018
Figure 339536DEST_PATH_IMAGE012
Figure 220905DEST_PATH_IMAGE024
Figure 452166DEST_PATH_IMAGE013
Figure 102590DEST_PATH_IMAGE018
Figure 287670DEST_PATH_IMAGE014
Figure 656334DEST_PATH_IMAGE025
Figure 691287DEST_PATH_IMAGE015
Figure 196217DEST_PATH_IMAGE018
Figure 540480DEST_PATH_IMAGE016
Figure 396440DEST_PATH_IMAGE026
Figure 969504DEST_PATH_IMAGE017
Figure 594521DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=2,i=
Figure 109684DEST_PATH_IMAGE018
Figure 390548DEST_PATH_IMAGE027
Figure 306868DEST_PATH_IMAGE018
Figure 871842DEST_PATH_IMAGE012
Figure 35976DEST_PATH_IMAGE028
Figure 635584DEST_PATH_IMAGE013
Figure 243283DEST_PATH_IMAGE018
Figure 295553DEST_PATH_IMAGE014
Figure 263378DEST_PATH_IMAGE029
Figure 717493DEST_PATH_IMAGE015
Figure 496093DEST_PATH_IMAGE018
Figure 35659DEST_PATH_IMAGE016
Figure 807174DEST_PATH_IMAGE030
Figure 115796DEST_PATH_IMAGE017
Figure 534139DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=3,i=
Figure 544689DEST_PATH_IMAGE018
Figure 339470DEST_PATH_IMAGE010
Figure 502598DEST_PATH_IMAGE031
Figure 872268DEST_PATH_IMAGE011
Figure 855268DEST_PATH_IMAGE018
Figure 986221DEST_PATH_IMAGE032
Figure 543104DEST_PATH_IMAGE013
Figure 278979DEST_PATH_IMAGE018
Figure 681141DEST_PATH_IMAGE014
Figure 68129DEST_PATH_IMAGE033
Figure 795914DEST_PATH_IMAGE015
Figure 224938DEST_PATH_IMAGE016
Figure 99539DEST_PATH_IMAGE017
Figure 810006DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=4,i=
Figure 537660DEST_PATH_IMAGE018
Figure 853234DEST_PATH_IMAGE010
Figure 428492DEST_PATH_IMAGE011
Figure 366361DEST_PATH_IMAGE018
Figure 333180DEST_PATH_IMAGE012
Figure 308089DEST_PATH_IMAGE036
Figure 531446DEST_PATH_IMAGE018
Figure 602039DEST_PATH_IMAGE014
Figure 747850DEST_PATH_IMAGE037
Figure 497369DEST_PATH_IMAGE015
Figure 901674DEST_PATH_IMAGE018
Figure 577506DEST_PATH_IMAGE016
Figure 159797DEST_PATH_IMAGE038
Figure 740820DEST_PATH_IMAGE017
Figure 433969DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=5,i=
Figure 229887DEST_PATH_IMAGE018
Figure 232347DEST_PATH_IMAGE010
Figure 848136DEST_PATH_IMAGE039
Figure 344977DEST_PATH_IMAGE011
Figure 168762DEST_PATH_IMAGE012
Figure 537427DEST_PATH_IMAGE040
Figure 572379DEST_PATH_IMAGE013
Figure 77309DEST_PATH_IMAGE018
Figure 11953DEST_PATH_IMAGE041
Figure 850596DEST_PATH_IMAGE015
Figure 990776DEST_PATH_IMAGE016
Figure 68454DEST_PATH_IMAGE042
Figure 914050DEST_PATH_IMAGE017
Figure 642841DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=6,i=
Figure 79638DEST_PATH_IMAGE018
Figure 673933DEST_PATH_IMAGE011
Figure 281632DEST_PATH_IMAGE018
Figure 52459DEST_PATH_IMAGE044
Figure 755842DEST_PATH_IMAGE013
Figure 534442DEST_PATH_IMAGE018
Figure 330677DEST_PATH_IMAGE045
Figure 900285DEST_PATH_IMAGE015
Figure 849786DEST_PATH_IMAGE018
Figure 876648DEST_PATH_IMAGE016
Figure 937008DEST_PATH_IMAGE046
Figure 614983DEST_PATH_IMAGE017
Figure 735386DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=7,i=
Figure 983964DEST_PATH_IMAGE018
Figure 848015DEST_PATH_IMAGE010
Figure 380496DEST_PATH_IMAGE047
Figure 671800DEST_PATH_IMAGE011
Figure 407675DEST_PATH_IMAGE018
Figure 42794DEST_PATH_IMAGE012
Figure 642719DEST_PATH_IMAGE013
Figure 865890DEST_PATH_IMAGE018
Figure 773541DEST_PATH_IMAGE014
Figure 827451DEST_PATH_IMAGE018
Figure 961629DEST_PATH_IMAGE016
Figure 57630DEST_PATH_IMAGE050
Figure 596058DEST_PATH_IMAGE017
Figure 528242DEST_PATH_IMAGE018
, first M from binary system decryption anti-counterfeiting information table1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiCorresponding decryption computing is carried out, binary system anti-counterfeiting information is solved, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 is the overall structure figure of the present invention.
Fig. 2 is A-A sectional views of the present invention.
Fig. 3 loads anti-counterfeiting information flow chart.
Fig. 4 extracts anti-counterfeiting information flow chart.
Embodiment
As in Fig. 1 and Fig. 2, anti-fake information storage trademark, it is made up of trade mark page paper 7-1, amplitude 6-1 to the 6-150 being printed on trade mark page paper 7-1, horizontal scanning line 1-1 to the 1-15 being printed on trade mark page paper 7-1, column scan line 2-1 to the 2-10 being printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 are made up of amplitude 6-1 to 6-150
According to storage binary system encryption anti-fake information, a part of amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, another part amplitude on trade mark page paper 7-1 is formed by dielectric ink printing, horizontal scanning line 1-1 to 1-15 and column scan line 2-1 to 2-10 on trade mark page paper 7-1 are formed by the printing of electrically conducting transparent ink
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, and the light amplitude on trade mark page paper 7-1 is formed by dielectric ink printing,
The amplitude being printed on trade mark page paper 7-1 is divided into 15 rows 10 on trade mark paper and arranged, amplitude 6-1 to 6-150 is neat arranged in arrays on trade mark page paper 7-1, i is allowed to take 1 to 15, j is allowed to take 1 to 10, j-th strip column scan line on trade mark page paper 7-1 is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper 7-1, i-th horizontal scanning line on trade mark page paper 7-1 is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper 7-1
When the binary system encryption anti-fake information for needing to store the trade mark page is read, the 1st article of horizontal scanning line on trade mark page paper 7-1 is set to high level successively to the 15th article of horizontal scanning line,
When the 1st article of horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary system encryption anti-fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is exported from the 1st bar of column scan line to the 10th bar of column scan line, the 1st row on trade mark page paper 7-1 exports binary message 1 by electrically conductive ink printing into amplitude, the 1st row on trade mark page paper 7-1 exports binary message 0 by dielectric ink printing into amplitude, therefore the binary system encryption anti-fake information 1100001000 that the 1st row is read, above-mentioned readout is repeated to other rows on trade mark page paper 7-1.
In loading anti-counterfeiting information flow chart 3, original anti-counterfeiting information(Image, word)It is digitized into processing, the binary system anti-counterfeiting information table of 8 one group of generation, 8 one group of binary messages in binary system anti-counterfeiting information table are expanded into 32 one group of binary messages, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary message in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 416619DEST_PATH_IMAGE001
, i is the positive integer more than 0, from first 32 binary system encryption anti-fake information in 32 one group of binary system anti-counterfeiting information tables
Figure 657107DEST_PATH_IMAGE051
Start, to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesCarry out polynary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize that trademark anti-counterfeit prints, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, realize trademark anti-counterfeit.
In anti-counterfeiting information flow chart 4 is extracted, when extracting anti-counterfeiting information, the electric conductivity signal of trade mark page halftone dot image is gathered first, by the electric conductivity identification to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding.
The binary system generated after decoding is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting the initial value of encryption parameter as encryption, initial value when setting the initial value of encryption variables as encryption, it is k=0 that binary operator, which controls variable k initial value design, first M from the binary system decryption anti-counterfeiting information table of generation1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiComputing is decrypted, binary system anti-counterfeiting information is solved
Figure 677202DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.

Claims (1)

1. a kind of generate binary modulated signal by anti-counterfeiting information by cryptographic calculation and channel coding, and by circulating the Multi-variable-paramgradient gradient multi-variant encryption anti-fake information storage brand that anti-counterfeiting information is embedded in full page by tabling look-up modulation mode,It is characterized in that:Anti-counterfeiting information stores trade mark, it is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, according to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as respectively
Figure 971183DEST_PATH_IMAGE002
Figure 750921DEST_PATH_IMAGE003
Figure 614971DEST_PATH_IMAGE004
Figure 616294DEST_PATH_IMAGE005
Figure 643473DEST_PATH_IMAGE007
Figure 560483DEST_PATH_IMAGE008
With
Figure 698203DEST_PATH_IMAGE009
, encryption parameter
Figure 629250DEST_PATH_IMAGE002
Figure 101688DEST_PATH_IMAGE003
Figure 307542DEST_PATH_IMAGE004
Figure 916563DEST_PATH_IMAGE006
Figure 370996DEST_PATH_IMAGE008
With
Figure 483308DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, eight-digit binary number encryption variables are denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 203188DEST_PATH_IMAGE011
Figure 966931DEST_PATH_IMAGE013
Figure 676261DEST_PATH_IMAGE014
Figure 696355DEST_PATH_IMAGE016
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 929071DEST_PATH_IMAGE010
Figure 835847DEST_PATH_IMAGE011
Figure 986292DEST_PATH_IMAGE012
Figure 927703DEST_PATH_IMAGE013
Figure 509994DEST_PATH_IMAGE014
Figure 904066DEST_PATH_IMAGE015
Figure 846483DEST_PATH_IMAGE016
Figure 376822DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 130014DEST_PATH_IMAGE010
Figure 226332DEST_PATH_IMAGE012
Figure 876756DEST_PATH_IMAGE013
Figure 535271DEST_PATH_IMAGE014
Figure 622044DEST_PATH_IMAGE015
Figure 656996DEST_PATH_IMAGE016
Figure 427506DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 506189DEST_PATH_IMAGE010
Figure 362150DEST_PATH_IMAGE011
Figure 200793DEST_PATH_IMAGE012
Figure 747181DEST_PATH_IMAGE013
Figure 13077DEST_PATH_IMAGE014
Figure 90755DEST_PATH_IMAGE015
Figure 461879DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 898677DEST_PATH_IMAGE010
Figure 463650DEST_PATH_IMAGE011
Figure 893363DEST_PATH_IMAGE012
Figure 227393DEST_PATH_IMAGE013
Figure 835091DEST_PATH_IMAGE014
Figure 887361DEST_PATH_IMAGE015
Figure 855186DEST_PATH_IMAGE016
Figure 778143DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 867824DEST_PATH_IMAGE012
Figure 645287DEST_PATH_IMAGE013
Figure 844056DEST_PATH_IMAGE014
Figure 605339DEST_PATH_IMAGE015
Figure 400120DEST_PATH_IMAGE016
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 932918DEST_PATH_IMAGE010
Figure 447076DEST_PATH_IMAGE011
Figure 311127DEST_PATH_IMAGE012
Figure 578029DEST_PATH_IMAGE013
Figure 134912DEST_PATH_IMAGE014
Figure 870787DEST_PATH_IMAGE015
Figure 538529DEST_PATH_IMAGE016
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 387722DEST_PATH_IMAGE010
Figure 610893DEST_PATH_IMAGE011
Figure 816746DEST_PATH_IMAGE012
Figure 58241DEST_PATH_IMAGE013
Figure 401815DEST_PATH_IMAGE015
Figure 411359DEST_PATH_IMAGE016
Figure 241780DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 243552DEST_PATH_IMAGE011
Figure 52194DEST_PATH_IMAGE012
Figure 19013DEST_PATH_IMAGE013
Figure 993922DEST_PATH_IMAGE014
Figure 678981DEST_PATH_IMAGE015
Figure 748437DEST_PATH_IMAGE016
Figure 569763DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, polynary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 981153DEST_PATH_IMAGE018
Figure 137196DEST_PATH_IMAGE010
Figure 26655DEST_PATH_IMAGE019
Figure 968066DEST_PATH_IMAGE011
Figure 284778DEST_PATH_IMAGE018
Figure 928118DEST_PATH_IMAGE012
Figure 90109DEST_PATH_IMAGE020
Figure 886027DEST_PATH_IMAGE013
Figure 769855DEST_PATH_IMAGE014
Figure 1116DEST_PATH_IMAGE021
Figure 651540DEST_PATH_IMAGE015
Figure 824901DEST_PATH_IMAGE018
Figure 193566DEST_PATH_IMAGE016
Figure 664736DEST_PATH_IMAGE022
Figure 169667DEST_PATH_IMAGE017
, polynary cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 120622DEST_PATH_IMAGE018
Figure 942954DEST_PATH_IMAGE010
Figure 567970DEST_PATH_IMAGE023
Figure 833866DEST_PATH_IMAGE011
Figure 911544DEST_PATH_IMAGE018
Figure 803145DEST_PATH_IMAGE012
Figure 751510DEST_PATH_IMAGE024
Figure 2549DEST_PATH_IMAGE018
Figure 917415DEST_PATH_IMAGE014
Figure 985865DEST_PATH_IMAGE025
Figure 785883DEST_PATH_IMAGE026
Figure 564483DEST_PATH_IMAGE017
Figure 572890DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 344406DEST_PATH_IMAGE018
Figure 590711DEST_PATH_IMAGE010
Figure 519307DEST_PATH_IMAGE027
Figure 280590DEST_PATH_IMAGE011
Figure 606529DEST_PATH_IMAGE018
Figure 18925DEST_PATH_IMAGE012
Figure 608169DEST_PATH_IMAGE028
Figure 122327DEST_PATH_IMAGE013
Figure 704487DEST_PATH_IMAGE018
Figure 722122DEST_PATH_IMAGE014
Figure 279005DEST_PATH_IMAGE029
Figure 264147DEST_PATH_IMAGE015
Figure 666310DEST_PATH_IMAGE018
Figure 738674DEST_PATH_IMAGE017
Figure 210107DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 202333DEST_PATH_IMAGE018
Figure 835440DEST_PATH_IMAGE010
Figure 264016DEST_PATH_IMAGE031
Figure 273561DEST_PATH_IMAGE011
Figure 439149DEST_PATH_IMAGE012
Figure 371332DEST_PATH_IMAGE032
Figure 151387DEST_PATH_IMAGE018
Figure 375564DEST_PATH_IMAGE014
Figure 411970DEST_PATH_IMAGE015
Figure 233295DEST_PATH_IMAGE018
Figure 628373DEST_PATH_IMAGE016
Figure 535149DEST_PATH_IMAGE034
Figure 690187DEST_PATH_IMAGE017
Figure 84128DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 666419DEST_PATH_IMAGE018
Figure 60492DEST_PATH_IMAGE010
Figure 753641DEST_PATH_IMAGE035
Figure 798826DEST_PATH_IMAGE011
Figure 552019DEST_PATH_IMAGE018
Figure 167808DEST_PATH_IMAGE012
Figure 564340DEST_PATH_IMAGE013
Figure 488434DEST_PATH_IMAGE018
Figure 857098DEST_PATH_IMAGE014
Figure 741243DEST_PATH_IMAGE018
Figure 331625DEST_PATH_IMAGE016
Figure 170268DEST_PATH_IMAGE038
Figure 554806DEST_PATH_IMAGE017
, polynary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 898379DEST_PATH_IMAGE018
Figure 275134DEST_PATH_IMAGE010
Figure 3925DEST_PATH_IMAGE039
Figure 440722DEST_PATH_IMAGE011
Figure 186141DEST_PATH_IMAGE012
Figure 35017DEST_PATH_IMAGE040
Figure 642716DEST_PATH_IMAGE013
Figure 429407DEST_PATH_IMAGE018
Figure 413543DEST_PATH_IMAGE014
Figure 116926DEST_PATH_IMAGE041
Figure 895526DEST_PATH_IMAGE015
Figure 169513DEST_PATH_IMAGE018
Figure 691761DEST_PATH_IMAGE016
Figure 249650DEST_PATH_IMAGE042
Figure 199151DEST_PATH_IMAGE017
Figure 226013DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 964348DEST_PATH_IMAGE010
Figure 333329DEST_PATH_IMAGE011
Figure 197380DEST_PATH_IMAGE018
Figure 198703DEST_PATH_IMAGE012
Figure 490007DEST_PATH_IMAGE044
Figure 142891DEST_PATH_IMAGE018
Figure 749453DEST_PATH_IMAGE014
Figure 211659DEST_PATH_IMAGE045
Figure 93213DEST_PATH_IMAGE018
Figure 803549DEST_PATH_IMAGE016
Figure 147122DEST_PATH_IMAGE017
Figure 405934DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 377301DEST_PATH_IMAGE018
Figure 446889DEST_PATH_IMAGE010
Figure 379072DEST_PATH_IMAGE047
Figure 375354DEST_PATH_IMAGE048
Figure 195543DEST_PATH_IMAGE013
Figure 203819DEST_PATH_IMAGE018
Figure 615209DEST_PATH_IMAGE014
Figure 771252DEST_PATH_IMAGE049
Figure 926290DEST_PATH_IMAGE015
Figure 371364DEST_PATH_IMAGE016
Figure 765436DEST_PATH_IMAGE050
Figure 910296DEST_PATH_IMAGE018
, set encryption parameter
Figure 647176DEST_PATH_IMAGE002
Figure 528545DEST_PATH_IMAGE003
Figure 25385DEST_PATH_IMAGE004
Figure 987394DEST_PATH_IMAGE005
Figure 911487DEST_PATH_IMAGE006
Figure 14573DEST_PATH_IMAGE007
Figure 298792DEST_PATH_IMAGE008
With
Figure 69302DEST_PATH_IMAGE009
Initial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesPosition control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 754679DEST_PATH_IMAGE051
Carry out H1=
Figure 842589DEST_PATH_IMAGE052
Figure 467606DEST_PATH_IMAGE010
Figure 733502DEST_PATH_IMAGE019
Figure 437201DEST_PATH_IMAGE052
Figure 353522DEST_PATH_IMAGE020
Figure 918495DEST_PATH_IMAGE013
Figure 348209DEST_PATH_IMAGE052
Figure 682238DEST_PATH_IMAGE014
Figure 289937DEST_PATH_IMAGE021
Figure 44452DEST_PATH_IMAGE052
Figure 232988DEST_PATH_IMAGE016
Figure 11588DEST_PATH_IMAGE022
Figure 800422DEST_PATH_IMAGE017
Figure 322670DEST_PATH_IMAGE052
Polynary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 631291DEST_PATH_IMAGE051
Carry out H1=
Figure 580793DEST_PATH_IMAGE052
Figure 929001DEST_PATH_IMAGE019
Figure 560970DEST_PATH_IMAGE011
Figure 196220DEST_PATH_IMAGE052
Figure 444799DEST_PATH_IMAGE012
Figure 592063DEST_PATH_IMAGE013
Figure 132635DEST_PATH_IMAGE052
Figure 868510DEST_PATH_IMAGE014
Figure 536252DEST_PATH_IMAGE021
Figure 673972DEST_PATH_IMAGE015
Figure 385445DEST_PATH_IMAGE052
Figure 814469DEST_PATH_IMAGE022
Figure 954649DEST_PATH_IMAGE052
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H2=
Figure 665116DEST_PATH_IMAGE053
Figure 239503DEST_PATH_IMAGE023
Figure 43511DEST_PATH_IMAGE011
Figure 241274DEST_PATH_IMAGE053
Figure 788930DEST_PATH_IMAGE012
Figure 5017DEST_PATH_IMAGE024
Figure 245505DEST_PATH_IMAGE013
Figure 664985DEST_PATH_IMAGE053
Figure 16332DEST_PATH_IMAGE014
Figure 86925DEST_PATH_IMAGE025
Figure 498315DEST_PATH_IMAGE015
Figure 405091DEST_PATH_IMAGE053
Figure 294550DEST_PATH_IMAGE016
Figure 930433DEST_PATH_IMAGE053
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 872850DEST_PATH_IMAGE054
Carry out H2=
Figure 403189DEST_PATH_IMAGE053
Figure 156381DEST_PATH_IMAGE010
Figure 37750DEST_PATH_IMAGE023
Figure 783858DEST_PATH_IMAGE011
Figure 434282DEST_PATH_IMAGE053
Figure 92796DEST_PATH_IMAGE012
Figure 461461DEST_PATH_IMAGE024
Figure 516190DEST_PATH_IMAGE053
Figure 345606DEST_PATH_IMAGE014
Figure 201567DEST_PATH_IMAGE025
Figure 648914DEST_PATH_IMAGE053
Figure 992488DEST_PATH_IMAGE026
Figure 884089DEST_PATH_IMAGE017
Figure 363612DEST_PATH_IMAGE053
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H3=
Figure 365383DEST_PATH_IMAGE010
Figure 795097DEST_PATH_IMAGE027
Figure 392617DEST_PATH_IMAGE055
Figure 159887DEST_PATH_IMAGE013
Figure 938487DEST_PATH_IMAGE055
Figure 478053DEST_PATH_IMAGE014
Figure 249569DEST_PATH_IMAGE029
Figure 27032DEST_PATH_IMAGE015
Figure 976533DEST_PATH_IMAGE055
Figure 987083DEST_PATH_IMAGE016
Figure 313023DEST_PATH_IMAGE030
Figure 476151DEST_PATH_IMAGE017
Figure 596553DEST_PATH_IMAGE055
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this polynary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesCarry out polynary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN2013100224262A 2013-01-22 2013-01-22 Multi-variable-parameter gradient multi-variant encryption anti-fake information storage brand Pending CN103106441A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100224262A CN103106441A (en) 2013-01-22 2013-01-22 Multi-variable-parameter gradient multi-variant encryption anti-fake information storage brand

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100224262A CN103106441A (en) 2013-01-22 2013-01-22 Multi-variable-parameter gradient multi-variant encryption anti-fake information storage brand

Publications (1)

Publication Number Publication Date
CN103106441A true CN103106441A (en) 2013-05-15

Family

ID=48314287

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100224262A Pending CN103106441A (en) 2013-01-22 2013-01-22 Multi-variable-parameter gradient multi-variant encryption anti-fake information storage brand

Country Status (1)

Country Link
CN (1) CN103106441A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101022499A (en) * 2007-03-06 2007-08-22 北京大学 Method for abstracting graph and text infromation utilizing half-hue image networking hiding
CN101079147A (en) * 2007-06-25 2007-11-28 中山大学 Multiple bit digital watermark method capable of resisting printing, scanning and geometric transformation
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101022499A (en) * 2007-03-06 2007-08-22 北京大学 Method for abstracting graph and text infromation utilizing half-hue image networking hiding
CN101079147A (en) * 2007-06-25 2007-11-28 中山大学 Multiple bit digital watermark method capable of resisting printing, scanning and geometric transformation
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯登国,裴定一: "《密码学导引》", 30 April 1999 *

Similar Documents

Publication Publication Date Title
CN103106442A (en) Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106460A (en) Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark
CN103106513A (en) Multi-parameter univariate poly encryption anti-fake information storage trademark
CN103106441A (en) Multi-variable-parameter gradient multi-variant encryption anti-fake information storage brand
CN103136567A (en) One-parameter variable gradient binary encryption anti-fake information storage brand
CN103106440A (en) Multi-parameter unitary encryption anti-fake information storage brand
CN103106451A (en) Multi-variable-parameter gradient ternary-variant circulating encryption anti-fake information storage brand
CN103106443A (en) One-parameter double-variant unary encryption anti-fake information storage brand
CN103136565A (en) Multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand
CN103106453A (en) Multi-parameter ternary variant circulating encryption anti-fake information storage brand
CN103106449B (en) Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103116788A (en) Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark
CN103106438A (en) Parameter-gradient multivariable multi-encryption anti-fake information storage trademark
CN103106439A (en) Multiparameter multivariable binary encryption anti-fake information storage trademark
CN103116796A (en) One-parameter variation transmutation unary encryption anti-fake information storage trademark
CN103116774B (en) Parameter transmutation unary circulation encryption anti-fake information storage trademark
CN103106512A (en) Multiparameter multivariable ternary encryption anti-fake information storage trademark
CN103106502B (en) Multi-variable-parameter gradient ternary-variant encryption anti-fake information storage brand
CN103106448A (en) Single variable parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103106466B (en) Single parameter variable transmutation binary variable circulation encryption anti-counterfeiting information storage trademark
CN103106464B (en) Single parameter variable transmutation ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103106447A (en) Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark
CN103106476B (en) Single variable parameter transmutation unitary circulation encryption anti-counterfeiting information storage trademark
CN103116797A (en) Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark
CN103106450B (en) Single parameter multivariable unitary circulation anti-fake information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130515