CN103106452A - Multivariate parameter gradation unitary circulating encryption anti-fake information storage trademark - Google Patents

Multivariate parameter gradation unitary circulating encryption anti-fake information storage trademark Download PDF

Info

Publication number
CN103106452A
CN103106452A CN2013100232269A CN201310023226A CN103106452A CN 103106452 A CN103106452 A CN 103106452A CN 2013100232269 A CN2013100232269 A CN 2013100232269A CN 201310023226 A CN201310023226 A CN 201310023226A CN 103106452 A CN103106452 A CN 103106452A
Authority
CN
China
Prior art keywords
binary system
binary
group
trade mark
counterfeiting information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100232269A
Other languages
Chinese (zh)
Inventor
张立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN2013100232269A priority Critical patent/CN103106452A/en
Publication of CN103106452A publication Critical patent/CN103106452A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Credit Cards Or The Like (AREA)

Abstract

Disclosed is a multivariate parameter gradation unitary circulating encryption anti-fake information storage trademark. The multivariate parameter gradation unitary circulating encryption anti-fake information storage trademark can enable binary system anti-fake information to be generated into a binary system modulating signal through unitary circulating encryption and channel encoding, and enables the anti-fake information to be embedded in a whole trademark page table by ordered changing of amplitude modulation website electrical conductivity through a circulation look-up table modulation method. A user can distinguish the anti-fake information from any one of fragments when trademark identification is conducted. The multivariate parameter gradation unitary encryption anti-fake information storage trademark can be used in various anti-fake trademarks.

Description

Multivariate parameter gradation unitary circulates anti-fake information storage trademark
Art:
The present invention relates to a kind of anti-false trademark, particularly a kind of multivariate parameter gradation unitary circulation anti-fake information storage trademark, binary system encryption anti-fake information can be stored on the trade mark page and realize the false proof of trade mark by the trade mark, the trade mark can be used for extensive stock it is false proof in.
Background technology:
Anti-false trademark, also known as antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, are a kind of proof labels discerned the false from the genuine, prevent personation, are mark true and false, that distinguish marketing quality quality of the people for distinguishing merchandise resources during commodity circulation.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and the interests of client.The trade mark of China is audaciously innovated; employ laser anti-counterfeit, core micropore are false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but false proof is high-tech trial of strength with struggle that is faking; advanced anti-counterfeiting technology has certain ageing again; so; trade mark anti-fake technique must constantly be lifted; could be false proof with being maintained the leading position forever in faking, this is also the basic assurance for protecting the interests of businessman and client to maintain commodity circulation safety.
The content of the invention:
In order to improve the reliability and security of trademark anti-counterfeit, the present invention is improved existing trade mark anti-fake technique for the deficiency that existing trademark anti-counterfeit is present, propose a kind of anti-counterfeiting information storage trade mark, the trade mark passes through the change to amplitude electric conductivity in brand printing, encryption anti-fake information is embedded on the whole trade mark page in binary system coded signal form, encryption anti-fake information can be recognized in any one fragment in brand recognition, therefore with very strong disguised and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information stores trade mark, is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, the image and word on trade mark page paper are made up of amplitude,
According to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, and the horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
The horizontal scanning line being printed on trade mark page paper has N bars, the column scan line being printed on trade mark page paper has M bars, the amplitude being printed on trade mark page paper is divided into N rows M row on trade mark paper, amplitude is neat arranged in arrays on trade mark page paper paper, i is allowed to take 1 to arrive N, j is allowed to take 1 to arrive M, j-th strip column scan line on trade mark page paper is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper, i-th horizontal scanning line on trade mark page paper is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper
When the binary message for needing to store the trade mark page is read, the 1st article on trade mark page paper is set to high level successively to the N articles horizontal scanning line,
When the 1st article of horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported with 0,1 code form from the 1st bar of column scan line to the M bars column scan line, the amplitude that the 1st row on trade mark page paper is printed by electrically conductive ink exports binary message 1, the amplitude that the 1st row on trade mark page paper is printed by dielectric ink exports binary message 0, above-mentioned readout is repeated to other rows on trade mark page paper
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and binary system encryption parameter is denoted as respectively
Figure 357172DEST_PATH_IMAGE002
Figure 579206DEST_PATH_IMAGE003
Figure 243930DEST_PATH_IMAGE004
Figure 255617DEST_PATH_IMAGE005
Figure 374883DEST_PATH_IMAGE006
Figure 257564DEST_PATH_IMAGE007
Figure 95070DEST_PATH_IMAGE008
With, encryption parameter
Figure 634953DEST_PATH_IMAGE002
Figure 198790DEST_PATH_IMAGE003
Figure 22127DEST_PATH_IMAGE004
With
Figure 51787DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, binary system encryption variables are denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 152DEST_PATH_IMAGE010
Figure 905791DEST_PATH_IMAGE011
Figure 438141DEST_PATH_IMAGE012
Figure 821849DEST_PATH_IMAGE013
Figure 966840DEST_PATH_IMAGE015
Figure 989416DEST_PATH_IMAGE016
Figure 176815DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 162088DEST_PATH_IMAGE010
Figure 409530DEST_PATH_IMAGE011
Figure 417937DEST_PATH_IMAGE012
Figure 685025DEST_PATH_IMAGE014
Figure 103368DEST_PATH_IMAGE015
Figure 629738DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 261707DEST_PATH_IMAGE010
Figure 850952DEST_PATH_IMAGE011
Figure 833951DEST_PATH_IMAGE012
Figure 665379DEST_PATH_IMAGE013
Figure 151855DEST_PATH_IMAGE014
Figure 177580DEST_PATH_IMAGE015
Figure 382296DEST_PATH_IMAGE016
Figure 766484DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 569672DEST_PATH_IMAGE011
Figure 996105DEST_PATH_IMAGE012
Figure 434914DEST_PATH_IMAGE013
Figure 895983DEST_PATH_IMAGE014
Figure 177239DEST_PATH_IMAGE016
Figure 717942DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 534982DEST_PATH_IMAGE010
Figure 73411DEST_PATH_IMAGE011
Figure 474436DEST_PATH_IMAGE012
Figure 756513DEST_PATH_IMAGE013
Figure 690709DEST_PATH_IMAGE014
Figure 288360DEST_PATH_IMAGE016
Figure 108549DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 514833DEST_PATH_IMAGE011
Figure 890450DEST_PATH_IMAGE012
Figure 514330DEST_PATH_IMAGE013
Figure 157538DEST_PATH_IMAGE014
Figure 208671DEST_PATH_IMAGE015
Figure 71585DEST_PATH_IMAGE016
Figure 233576DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 560652DEST_PATH_IMAGE010
Figure 284151DEST_PATH_IMAGE011
Figure 453729DEST_PATH_IMAGE014
Figure 345199DEST_PATH_IMAGE015
Figure 182705DEST_PATH_IMAGE016
Figure 686499DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 773077DEST_PATH_IMAGE012
Figure 80561DEST_PATH_IMAGE013
Figure 174419DEST_PATH_IMAGE014
Figure 407692DEST_PATH_IMAGE015
Figure 799808DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 810489DEST_PATH_IMAGE010
Figure 716128DEST_PATH_IMAGE011
Figure 251408DEST_PATH_IMAGE012
Figure 900695DEST_PATH_IMAGE013
Figure 969145DEST_PATH_IMAGE014
Figure 799753DEST_PATH_IMAGE016
Figure 252731DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 423129DEST_PATH_IMAGE010
Figure 667422DEST_PATH_IMAGE019
Figure 658512DEST_PATH_IMAGE011
Figure 854318DEST_PATH_IMAGE012
Figure 848557DEST_PATH_IMAGE021
Figure 275307DEST_PATH_IMAGE022
Figure 864551DEST_PATH_IMAGE014
Figure 83436DEST_PATH_IMAGE023
Figure 478646DEST_PATH_IMAGE015
Figure 230701DEST_PATH_IMAGE024
Figure 990847DEST_PATH_IMAGE016
Figure 195563DEST_PATH_IMAGE025
Figure 830681DEST_PATH_IMAGE017
Figure 437243DEST_PATH_IMAGE026
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 368290DEST_PATH_IMAGE027
Figure 60303DEST_PATH_IMAGE010
Figure 451443DEST_PATH_IMAGE011
Figure 912512DEST_PATH_IMAGE029
Figure 692304DEST_PATH_IMAGE030
Figure 170690DEST_PATH_IMAGE013
Figure 486264DEST_PATH_IMAGE031
Figure 279820DEST_PATH_IMAGE014
Figure 179381DEST_PATH_IMAGE032
Figure 461457DEST_PATH_IMAGE015
Figure 631539DEST_PATH_IMAGE033
Figure 718937DEST_PATH_IMAGE034
Figure 539125DEST_PATH_IMAGE017
Figure 829292DEST_PATH_IMAGE035
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 709523DEST_PATH_IMAGE036
Figure 583676DEST_PATH_IMAGE010
Figure 207556DEST_PATH_IMAGE037
Figure 352229DEST_PATH_IMAGE011
Figure 403362DEST_PATH_IMAGE038
Figure 2013100232269100002DEST_PATH_IMAGE039
Figure 929731DEST_PATH_IMAGE013
Figure 194491DEST_PATH_IMAGE040
Figure 999690DEST_PATH_IMAGE041
Figure 965372DEST_PATH_IMAGE015
Figure 84638DEST_PATH_IMAGE042
Figure 550965DEST_PATH_IMAGE043
Figure 54759DEST_PATH_IMAGE017
Figure 294110DEST_PATH_IMAGE044
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 857947DEST_PATH_IMAGE045
Figure 415705DEST_PATH_IMAGE010
Figure 723189DEST_PATH_IMAGE046
Figure 817047DEST_PATH_IMAGE011
Figure 551785DEST_PATH_IMAGE047
Figure 599769DEST_PATH_IMAGE012
Figure 445365DEST_PATH_IMAGE048
Figure 456046DEST_PATH_IMAGE013
Figure 361685DEST_PATH_IMAGE049
Figure 395500DEST_PATH_IMAGE014
Figure 2013100232269100002DEST_PATH_IMAGE050
Figure 481006DEST_PATH_IMAGE015
Figure 360417DEST_PATH_IMAGE016
Figure 847690DEST_PATH_IMAGE017
Figure 505068DEST_PATH_IMAGE053
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 752509DEST_PATH_IMAGE054
Figure 259452DEST_PATH_IMAGE010
Figure 250541DEST_PATH_IMAGE055
Figure 701475DEST_PATH_IMAGE056
Figure 695713DEST_PATH_IMAGE012
Figure 856884DEST_PATH_IMAGE013
Figure 774025DEST_PATH_IMAGE058
Figure 491445DEST_PATH_IMAGE014
Figure 314083DEST_PATH_IMAGE059
Figure 66139DEST_PATH_IMAGE015
Figure 826284DEST_PATH_IMAGE060
Figure 31001DEST_PATH_IMAGE016
Figure 2013100232269100002DEST_PATH_IMAGE061
Figure 603802DEST_PATH_IMAGE017
Figure 210364DEST_PATH_IMAGE062
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 141411DEST_PATH_IMAGE063
Figure 334888DEST_PATH_IMAGE010
Figure 470652DEST_PATH_IMAGE011
Figure 838179DEST_PATH_IMAGE065
Figure 516023DEST_PATH_IMAGE012
Figure 309983DEST_PATH_IMAGE013
Figure 750902DEST_PATH_IMAGE014
Figure 767400DEST_PATH_IMAGE068
Figure 912391DEST_PATH_IMAGE069
Figure 119436DEST_PATH_IMAGE070
Figure 409603DEST_PATH_IMAGE017
Figure 352151DEST_PATH_IMAGE071
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 2013100232269100002DEST_PATH_IMAGE072
Figure 166917DEST_PATH_IMAGE010
Figure 525217DEST_PATH_IMAGE073
Figure 986602DEST_PATH_IMAGE074
Figure 348051DEST_PATH_IMAGE012
Figure 510042DEST_PATH_IMAGE075
Figure 509222DEST_PATH_IMAGE013
Figure 731256DEST_PATH_IMAGE076
Figure 407150DEST_PATH_IMAGE014
Figure 372832DEST_PATH_IMAGE077
Figure 492097DEST_PATH_IMAGE015
Figure 619453DEST_PATH_IMAGE078
Figure 955494DEST_PATH_IMAGE016
Figure 459288DEST_PATH_IMAGE079
Figure 698640DEST_PATH_IMAGE017
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 636213DEST_PATH_IMAGE081
Figure 442233DEST_PATH_IMAGE010
Figure 270512DEST_PATH_IMAGE082
Figure 5249DEST_PATH_IMAGE011
Figure 2013100232269100002DEST_PATH_IMAGE083
Figure 990916DEST_PATH_IMAGE012
Figure 102092DEST_PATH_IMAGE084
Figure 50456DEST_PATH_IMAGE013
Figure 956095DEST_PATH_IMAGE085
Figure 488446DEST_PATH_IMAGE014
Figure 137733DEST_PATH_IMAGE086
Figure 442069DEST_PATH_IMAGE015
Figure 518609DEST_PATH_IMAGE087
Figure 716865DEST_PATH_IMAGE088
Figure 639822DEST_PATH_IMAGE017
Figure 887263DEST_PATH_IMAGE089
, set encryption parameter
Figure 394206DEST_PATH_IMAGE002
Figure 322979DEST_PATH_IMAGE003
Figure 539590DEST_PATH_IMAGE004
Figure 957933DEST_PATH_IMAGE005
Figure 45155DEST_PATH_IMAGE007
Figure 113342DEST_PATH_IMAGE008
WithInitial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 685586DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 18479DEST_PATH_IMAGE090
Carry out H1=
Figure 944103DEST_PATH_IMAGE091
Figure 969828DEST_PATH_IMAGE010
Figure 174544DEST_PATH_IMAGE019
Figure 809662DEST_PATH_IMAGE011
Figure 150645DEST_PATH_IMAGE020
Figure 409588DEST_PATH_IMAGE012
Figure 776295DEST_PATH_IMAGE013
Figure 738829DEST_PATH_IMAGE022
Figure 106356DEST_PATH_IMAGE014
Figure 20085DEST_PATH_IMAGE023
Figure 560788DEST_PATH_IMAGE015
Figure 141942DEST_PATH_IMAGE024
Figure 913327DEST_PATH_IMAGE016
Figure 579932DEST_PATH_IMAGE025
Figure 596429DEST_PATH_IMAGE017
Figure 32090DEST_PATH_IMAGE026
Unitary circulation cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 538157DEST_PATH_IMAGE090
Carry out H1=
Figure 205242DEST_PATH_IMAGE091
Figure 25430DEST_PATH_IMAGE010
Figure 195829DEST_PATH_IMAGE011
Figure 69981DEST_PATH_IMAGE020
Figure 490598DEST_PATH_IMAGE012
Figure 838534DEST_PATH_IMAGE021
Figure 686405DEST_PATH_IMAGE013
Figure 549318DEST_PATH_IMAGE022
Figure 212774DEST_PATH_IMAGE014
Figure 699567DEST_PATH_IMAGE015
Figure 49777DEST_PATH_IMAGE024
Figure 812197DEST_PATH_IMAGE016
Figure 429998DEST_PATH_IMAGE025
Figure 822933DEST_PATH_IMAGE017
Figure 660439DEST_PATH_IMAGE026
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while unitary circulation cryptographic calculation, next unitary circulation cryptographic calculation is pointed to H2=
Figure 164233DEST_PATH_IMAGE027
Figure 639470DEST_PATH_IMAGE010
Figure 265623DEST_PATH_IMAGE092
Figure 590425DEST_PATH_IMAGE011
Figure 632331DEST_PATH_IMAGE029
Figure 726189DEST_PATH_IMAGE012
Figure 959462DEST_PATH_IMAGE030
Figure 568297DEST_PATH_IMAGE013
Figure 679473DEST_PATH_IMAGE031
Figure 627837DEST_PATH_IMAGE014
Figure 533476DEST_PATH_IMAGE032
Figure 520914DEST_PATH_IMAGE016
Figure 659772DEST_PATH_IMAGE034
Figure 866817DEST_PATH_IMAGE035
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 789774DEST_PATH_IMAGE093
Carry out H2=
Figure 45623DEST_PATH_IMAGE010
Figure 366239DEST_PATH_IMAGE011
Figure 784582DEST_PATH_IMAGE029
Figure 14706DEST_PATH_IMAGE012
Figure 809486DEST_PATH_IMAGE030
Figure 939991DEST_PATH_IMAGE013
Figure 529235DEST_PATH_IMAGE031
Figure 574552DEST_PATH_IMAGE014
Figure 907444DEST_PATH_IMAGE032
Figure 921110DEST_PATH_IMAGE033
Figure 125826DEST_PATH_IMAGE016
Figure 996830DEST_PATH_IMAGE034
Figure 665709DEST_PATH_IMAGE017
Figure 862335DEST_PATH_IMAGE035
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while unitary circulation cryptographic calculation, next unitary circulation cryptographic calculation is pointed to H3=
Figure 787304DEST_PATH_IMAGE036
Figure 727578DEST_PATH_IMAGE010
Figure 188646DEST_PATH_IMAGE037
Figure 290594DEST_PATH_IMAGE011
Figure 2013100232269100002DEST_PATH_IMAGE094
Figure 971368DEST_PATH_IMAGE012
Figure 765329DEST_PATH_IMAGE013
Figure 203318DEST_PATH_IMAGE014
Figure 547712DEST_PATH_IMAGE041
Figure 983372DEST_PATH_IMAGE015
Figure 427123DEST_PATH_IMAGE042
Figure 581024DEST_PATH_IMAGE016
Figure 192844DEST_PATH_IMAGE017
Figure 869813DEST_PATH_IMAGE044
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this unitary circulation cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 245431DEST_PATH_IMAGE001
Carry out unitary circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, valid certificates can be provided for true trade mark, there is stronger anti-forgery ability simultaneously.
To solve above-mentioned technical problem, processing is digitized to image false-proof information and character anti-counterfeiting information first, the binary system anti-counterfeiting information table of 8 one group of generation, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, unitary circulation cryptographic calculation is carried out to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables, the binary system encryption anti-fake information table of 32 one group of generation, pass through channel coding using 32 binary system encryption anti-fake informations in binary system encryption anti-fake information table, 32 one group of binary modulated signal of the generation with error detecting and error correcting function, channel coding can use loop coding, convolutional encoding or Turbo coding diversified forms, picture signal is adjusted to be handled by rasterizing trade mark page original continuous(RIP)Halftoning hybrid screening picture signal is exported with hybrid screening, including amplitude and FM screened image signal, the electric conductivity of amplitude in hybrid screening picture signal is modulated using circulation look-up table modulation system using 32 one group of binary modulated signals of generation, make the electric conductivity of amplitude according to dielectric ink amplitude and electrically conductive ink amplitude is regular changes, adjacent 32 amplitudes in hybrid screening picture signal are made to carry 32 binary system anti-counterfeiting information by the change of electric conductivity, so as to generate the hybrid screening picture signal of the embedded anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, trade mark page site electric conductivity signal is gathered first, by the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding, decrypts i-th group of 32 binary message in anti-counterfeiting information table by binary system and is denoted as Mi
Binary system is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, set encryption parameter
Figure 869310DEST_PATH_IMAGE002
Figure 512519DEST_PATH_IMAGE003
Figure 650873DEST_PATH_IMAGE006
Figure 915632DEST_PATH_IMAGE007
Figure 650850DEST_PATH_IMAGE008
With
Figure 735481DEST_PATH_IMAGE009
Initial value for encryption when initial value, initial value when setting encryption variables j, d, e, f, g, h, r, p and q initial value as encryption, it is k=0 that binary operator, which controls variable k initial value design, by unitary circulation ciphering process, and it is M that binary operator, which controls decryption computing during variable k=0,i=
Figure 701163DEST_PATH_IMAGE018
Figure 820428DEST_PATH_IMAGE010
Figure 275680DEST_PATH_IMAGE019
Figure 611722DEST_PATH_IMAGE011
Figure 115515DEST_PATH_IMAGE020
Figure 89287DEST_PATH_IMAGE012
Figure 653124DEST_PATH_IMAGE021
Figure 29791DEST_PATH_IMAGE013
Figure 835810DEST_PATH_IMAGE022
Figure 664406DEST_PATH_IMAGE023
Figure 118838DEST_PATH_IMAGE024
Figure 556949DEST_PATH_IMAGE016
Figure 462588DEST_PATH_IMAGE025
Figure 145690DEST_PATH_IMAGE026
, it is M that binary operator, which controls decryption computing during variable k=1,i=
Figure 276457DEST_PATH_IMAGE027
Figure 851533DEST_PATH_IMAGE010
Figure 107065DEST_PATH_IMAGE028
Figure 560043DEST_PATH_IMAGE011
Figure 231906DEST_PATH_IMAGE012
Figure 37051DEST_PATH_IMAGE030
Figure 28141DEST_PATH_IMAGE013
Figure 805604DEST_PATH_IMAGE031
Figure 218185DEST_PATH_IMAGE032
Figure 747387DEST_PATH_IMAGE015
Figure 707253DEST_PATH_IMAGE033
Figure 13917DEST_PATH_IMAGE034
Figure 848274DEST_PATH_IMAGE017
Figure 600330DEST_PATH_IMAGE035
, it is M that binary operator, which controls decryption computing during variable k=2,i=
Figure 360475DEST_PATH_IMAGE036
Figure 627509DEST_PATH_IMAGE010
Figure 764092DEST_PATH_IMAGE037
Figure 869189DEST_PATH_IMAGE011
Figure 800236DEST_PATH_IMAGE038
Figure 432523DEST_PATH_IMAGE039
Figure 955908DEST_PATH_IMAGE013
Figure 738629DEST_PATH_IMAGE014
Figure 217015DEST_PATH_IMAGE041
Figure 32896DEST_PATH_IMAGE016
Figure 314973DEST_PATH_IMAGE043
Figure 485054DEST_PATH_IMAGE017
Figure 194384DEST_PATH_IMAGE044
, it is M that binary operator, which controls decryption computing during variable k=3,i=
Figure 595890DEST_PATH_IMAGE045
Figure 416078DEST_PATH_IMAGE010
Figure 768562DEST_PATH_IMAGE046
Figure 648793DEST_PATH_IMAGE011
Figure 291499DEST_PATH_IMAGE048
Figure 342632DEST_PATH_IMAGE013
Figure 896891DEST_PATH_IMAGE049
Figure 58882DEST_PATH_IMAGE014
Figure 280096DEST_PATH_IMAGE015
Figure 692622DEST_PATH_IMAGE051
Figure 148051DEST_PATH_IMAGE016
Figure 267316DEST_PATH_IMAGE052
Figure 660251DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=4,i=
Figure 234507DEST_PATH_IMAGE054
Figure 536175DEST_PATH_IMAGE010
Figure 100012DEST_PATH_IMAGE055
Figure 466719DEST_PATH_IMAGE056
Figure 62042DEST_PATH_IMAGE012
Figure 405616DEST_PATH_IMAGE013
Figure 251212DEST_PATH_IMAGE058
Figure 199577DEST_PATH_IMAGE014
Figure 603751DEST_PATH_IMAGE059
Figure 637566DEST_PATH_IMAGE015
Figure 286853DEST_PATH_IMAGE060
Figure 152041DEST_PATH_IMAGE016
Figure 228581DEST_PATH_IMAGE061
Figure 251157DEST_PATH_IMAGE017
Figure 704135DEST_PATH_IMAGE062
, it is M that binary operator, which controls decryption computing during variable k=5,i=
Figure 361513DEST_PATH_IMAGE063
Figure 608955DEST_PATH_IMAGE010
Figure 679679DEST_PATH_IMAGE064
Figure 169304DEST_PATH_IMAGE011
Figure 365110DEST_PATH_IMAGE012
Figure 860813DEST_PATH_IMAGE066
Figure 891479DEST_PATH_IMAGE013
Figure 585766DEST_PATH_IMAGE067
Figure 158010DEST_PATH_IMAGE068
Figure 490902DEST_PATH_IMAGE015
Figure 741493DEST_PATH_IMAGE069
Figure 501638DEST_PATH_IMAGE016
Figure 706355DEST_PATH_IMAGE070
Figure 905255DEST_PATH_IMAGE017
Figure 511817DEST_PATH_IMAGE071
, it is M that binary operator, which controls decryption computing during variable k=6,i=
Figure 956047DEST_PATH_IMAGE072
Figure 648060DEST_PATH_IMAGE010
Figure 322755DEST_PATH_IMAGE073
Figure 783823DEST_PATH_IMAGE011
Figure 649886DEST_PATH_IMAGE074
Figure 891511DEST_PATH_IMAGE012
Figure 104318DEST_PATH_IMAGE075
Figure 685472DEST_PATH_IMAGE013
Figure 958321DEST_PATH_IMAGE076
Figure 188708DEST_PATH_IMAGE014
Figure 706670DEST_PATH_IMAGE077
Figure 142331DEST_PATH_IMAGE015
Figure 851661DEST_PATH_IMAGE078
Figure 739982DEST_PATH_IMAGE016
Figure 58706DEST_PATH_IMAGE079
Figure 411190DEST_PATH_IMAGE017
Figure 291421DEST_PATH_IMAGE080
, it is M that binary operator, which controls decryption computing during variable k=7,i=
Figure 667039DEST_PATH_IMAGE081
Figure 25339DEST_PATH_IMAGE010
Figure 937056DEST_PATH_IMAGE082
Figure 851103DEST_PATH_IMAGE083
Figure 75411DEST_PATH_IMAGE012
Figure 74591DEST_PATH_IMAGE084
Figure 795160DEST_PATH_IMAGE013
Figure 145370DEST_PATH_IMAGE085
Figure 111052DEST_PATH_IMAGE014
Figure 230318DEST_PATH_IMAGE086
Figure 747243DEST_PATH_IMAGE087
Figure 251036DEST_PATH_IMAGE016
Figure 490388DEST_PATH_IMAGE088
Figure 788645DEST_PATH_IMAGE017
, first M from binary system decryption anti-counterfeiting information table1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiCorresponding decryption computing is carried out, binary system anti-counterfeiting information is solved
Figure 919467DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 is the overall structure figure of the present invention.
Fig. 2 is A-A sectional views of the present invention.
Fig. 3 loads anti-counterfeiting information flow chart.
Fig. 4 extracts anti-counterfeiting information flow chart.
Embodiment
As in Fig. 1 and Fig. 2, anti-fake information storage trademark, it is made up of trade mark page paper 7-1, amplitude 6-1 to the 6-150 being printed on trade mark page paper 7-1, horizontal scanning line 1-1 to the 1-15 being printed on trade mark page paper 7-1, column scan line 2-1 to the 2-10 being printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 are made up of amplitude 6-1 to 6-150
According to storage binary system encryption anti-fake information, a part of amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, another part amplitude on trade mark page paper 7-1 is formed by dielectric ink printing, horizontal scanning line 1-1 to 1-15 and column scan line 2-1 to 2-10 on trade mark page paper 7-1 are formed by the printing of electrically conducting transparent ink
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, and the light amplitude on trade mark page paper 7-1 is formed by dielectric ink printing,
The amplitude being printed on trade mark page paper 7-1 is divided into 15 rows 10 on trade mark paper and arranged, amplitude 6-1 to 6-150 is neat arranged in arrays on trade mark page paper 7-1, i is allowed to take 1 to 15, j is allowed to take 1 to 10, j-th strip column scan line on trade mark page paper 7-1 is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper 7-1, i-th horizontal scanning line on trade mark page paper 7-1 is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper 7-1
When the binary system encryption anti-fake information for needing to store the trade mark page is read, the 1st article of horizontal scanning line on trade mark page paper 7-1 is set to high level successively to the 15th article of horizontal scanning line,
When the 1st article of horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary system encryption anti-fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is exported from the 1st bar of column scan line to the 10th bar of column scan line, the 1st row on trade mark page paper 7-1 exports binary message 1 by electrically conductive ink printing into amplitude, the 1st row on trade mark page paper 7-1 exports binary message 0 by dielectric ink printing into amplitude, therefore the binary system encryption anti-fake information 1100001000 that the 1st row is read, above-mentioned readout is repeated to other rows on trade mark page paper 7-1.
In loading anti-counterfeiting information flow chart 3, original anti-counterfeiting information(Image, word)It is digitized into processing, the binary system anti-counterfeiting information table of 8 one group of generation, 8 one group of binary messages in binary system anti-counterfeiting information table are expanded into 32 one group of binary messages, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary message in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 810062DEST_PATH_IMAGE001
, i is the positive integer more than 0, from first 32 binary system encryption anti-fake information in 32 one group of binary system anti-counterfeiting information tables
Figure 544800DEST_PATH_IMAGE090
Start, to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 91319DEST_PATH_IMAGE001
Carry out unitary circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize that trademark anti-counterfeit prints, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, realize trademark anti-counterfeit.
In anti-counterfeiting information flow chart 4 is extracted, when extracting anti-counterfeiting information, the electric conductivity signal of trade mark page halftone dot image is gathered first, by the electric conductivity identification to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding.
The binary system generated after decoding is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting the initial value of encryption parameter as encryption, initial value when setting the initial value of encryption variables as encryption, it is k=0 that binary operator, which controls variable k initial value design, first M from the binary system decryption anti-counterfeiting information table of generation1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiComputing is decrypted, binary system anti-counterfeiting information is solved
Figure 703959DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.

Claims (1)

1. a kind of generate binary modulated signal by anti-counterfeiting information by cryptographic calculation and channel coding, and the multivariate parameter gradation unitary being embedded in anti-counterfeiting information in full page by circulating tabling look-up modulation mode circulates anti-fake information storage trademark,It is characterized in that:Anti-counterfeiting information stores trade mark, it is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, according to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 2013100232269100001DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and binary system encryption parameter is denoted as respectively
Figure 2013100232269100001DEST_PATH_IMAGE002
Figure 2013100232269100001DEST_PATH_IMAGE003
Figure 2013100232269100001DEST_PATH_IMAGE004
Figure 2013100232269100001DEST_PATH_IMAGE005
Figure 2013100232269100001DEST_PATH_IMAGE006
Figure 2013100232269100001DEST_PATH_IMAGE008
With
Figure 2013100232269100001DEST_PATH_IMAGE009
, encryption parameter
Figure 178298DEST_PATH_IMAGE002
Figure 169388DEST_PATH_IMAGE003
Figure 436597DEST_PATH_IMAGE004
Figure 854940DEST_PATH_IMAGE005
Figure 85064DEST_PATH_IMAGE006
Figure 879845DEST_PATH_IMAGE007
With
Figure 661911DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, binary system encryption variables are denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 2013100232269100001DEST_PATH_IMAGE010
Figure 2013100232269100001DEST_PATH_IMAGE011
Figure 2013100232269100001DEST_PATH_IMAGE012
Figure 2013100232269100001DEST_PATH_IMAGE013
Figure 2013100232269100001DEST_PATH_IMAGE015
Figure 2013100232269100001DEST_PATH_IMAGE016
Figure 2013100232269100001DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 146375DEST_PATH_IMAGE010
Figure 479267DEST_PATH_IMAGE011
Figure 28060DEST_PATH_IMAGE012
Figure 759966DEST_PATH_IMAGE014
Figure 434158DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 359127DEST_PATH_IMAGE010
Figure 299401DEST_PATH_IMAGE011
Figure 760469DEST_PATH_IMAGE012
Figure 862418DEST_PATH_IMAGE013
Figure 543191DEST_PATH_IMAGE014
Figure 21577DEST_PATH_IMAGE015
Figure 337152DEST_PATH_IMAGE016
Figure 937897DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 119535DEST_PATH_IMAGE011
Figure 555195DEST_PATH_IMAGE012
Figure 998946DEST_PATH_IMAGE013
Figure 486219DEST_PATH_IMAGE015
Figure 776386DEST_PATH_IMAGE016
Figure 391038DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 889070DEST_PATH_IMAGE011
Figure 33744DEST_PATH_IMAGE012
Figure 84876DEST_PATH_IMAGE013
Figure 947790DEST_PATH_IMAGE014
Figure 938322DEST_PATH_IMAGE016
Figure 160356DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 210669DEST_PATH_IMAGE011
Figure 828470DEST_PATH_IMAGE012
Figure 221405DEST_PATH_IMAGE013
Figure 562705DEST_PATH_IMAGE015
Figure 601778DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 661001DEST_PATH_IMAGE010
Figure 124660DEST_PATH_IMAGE012
Figure 357933DEST_PATH_IMAGE013
Figure 904452DEST_PATH_IMAGE014
Figure 750049DEST_PATH_IMAGE015
Figure 698413DEST_PATH_IMAGE016
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 263966DEST_PATH_IMAGE010
Figure 402999DEST_PATH_IMAGE011
Figure 409132DEST_PATH_IMAGE012
Figure 239740DEST_PATH_IMAGE014
Figure 692718DEST_PATH_IMAGE015
Figure 863116DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 668261DEST_PATH_IMAGE010
Figure 160816DEST_PATH_IMAGE011
Figure 880062DEST_PATH_IMAGE015
Figure 366855DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 2013100232269100001DEST_PATH_IMAGE018
Figure 523423DEST_PATH_IMAGE010
Figure 2013100232269100001DEST_PATH_IMAGE019
Figure 793999DEST_PATH_IMAGE011
Figure 982273DEST_PATH_IMAGE012
Figure 2013100232269100001DEST_PATH_IMAGE021
Figure 742418DEST_PATH_IMAGE013
Figure 2013100232269100001DEST_PATH_IMAGE023
Figure 522866DEST_PATH_IMAGE015
Figure 2013100232269100001DEST_PATH_IMAGE024
Figure 2013100232269100001DEST_PATH_IMAGE025
Figure 434376DEST_PATH_IMAGE017
Figure 2013100232269100001DEST_PATH_IMAGE026
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 2013100232269100001DEST_PATH_IMAGE028
Figure 455212DEST_PATH_IMAGE011
Figure 2013100232269100001DEST_PATH_IMAGE029
Figure 853964DEST_PATH_IMAGE012
Figure 2013100232269100001DEST_PATH_IMAGE030
Figure 955912DEST_PATH_IMAGE013
Figure DEST_PATH_IMAGE031
Figure 571439DEST_PATH_IMAGE014
Figure 2013100232269100001DEST_PATH_IMAGE032
Figure DEST_PATH_IMAGE033
Figure 804547DEST_PATH_IMAGE016
Figure 2013100232269100001DEST_PATH_IMAGE034
Figure 280659DEST_PATH_IMAGE017
Figure 2013100232269100001DEST_PATH_IMAGE035
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 2013100232269100001DEST_PATH_IMAGE036
Figure 117903DEST_PATH_IMAGE010
Figure 2013100232269100001DEST_PATH_IMAGE037
Figure 337663DEST_PATH_IMAGE011
Figure 2013100232269100001DEST_PATH_IMAGE038
Figure 946892DEST_PATH_IMAGE012
Figure 2013100232269100001DEST_PATH_IMAGE039
Figure 593905DEST_PATH_IMAGE013
Figure 2013100232269100001DEST_PATH_IMAGE040
Figure 482227DEST_PATH_IMAGE014
Figure 2013100232269100001DEST_PATH_IMAGE042
Figure 966484DEST_PATH_IMAGE016
Figure 2013100232269100001DEST_PATH_IMAGE043
Figure 348180DEST_PATH_IMAGE017
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 715009DEST_PATH_IMAGE010
Figure 2013100232269100001DEST_PATH_IMAGE046
Figure 2013100232269100001DEST_PATH_IMAGE047
Figure 857463DEST_PATH_IMAGE012
Figure 2013100232269100001DEST_PATH_IMAGE048
Figure 2013100232269100001DEST_PATH_IMAGE049
Figure 210657DEST_PATH_IMAGE014
Figure 2013100232269100001DEST_PATH_IMAGE050
Figure 310331DEST_PATH_IMAGE015
Figure 2013100232269100001DEST_PATH_IMAGE051
Figure 575091DEST_PATH_IMAGE016
Figure 2013100232269100001DEST_PATH_IMAGE052
Figure 967764DEST_PATH_IMAGE017
Figure 2013100232269100001DEST_PATH_IMAGE053
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 2013100232269100001DEST_PATH_IMAGE054
Figure 255657DEST_PATH_IMAGE010
Figure 2013100232269100001DEST_PATH_IMAGE055
Figure 660486DEST_PATH_IMAGE011
Figure 2013100232269100001DEST_PATH_IMAGE056
Figure 2013100232269100001DEST_PATH_IMAGE057
Figure 608906DEST_PATH_IMAGE013
Figure DEST_PATH_IMAGE058
Figure 118516DEST_PATH_IMAGE014
Figure 2013100232269100001DEST_PATH_IMAGE059
Figure 73176DEST_PATH_IMAGE015
Figure 312527DEST_PATH_IMAGE016
Figure 2013100232269100001DEST_PATH_IMAGE061
Figure 814047DEST_PATH_IMAGE017
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 2013100232269100001DEST_PATH_IMAGE063
Figure 309488DEST_PATH_IMAGE010
Figure 554656DEST_PATH_IMAGE011
Figure 2013100232269100001DEST_PATH_IMAGE065
Figure 87662DEST_PATH_IMAGE012
Figure DEST_PATH_IMAGE066
Figure 822399DEST_PATH_IMAGE013
Figure DEST_PATH_IMAGE067
Figure 805137DEST_PATH_IMAGE014
Figure DEST_PATH_IMAGE068
Figure 588416DEST_PATH_IMAGE015
Figure DEST_PATH_IMAGE069
Figure DEST_PATH_IMAGE070
Figure 881568DEST_PATH_IMAGE017
Figure DEST_PATH_IMAGE071
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 2013100232269100001DEST_PATH_IMAGE072
Figure 289284DEST_PATH_IMAGE010
Figure 938571DEST_PATH_IMAGE011
Figure DEST_PATH_IMAGE074
Figure 679125DEST_PATH_IMAGE012
Figure DEST_PATH_IMAGE075
Figure 194814DEST_PATH_IMAGE013
Figure DEST_PATH_IMAGE076
Figure 454938DEST_PATH_IMAGE014
Figure DEST_PATH_IMAGE077
Figure 347064DEST_PATH_IMAGE015
Figure DEST_PATH_IMAGE078
Figure 942125DEST_PATH_IMAGE016
Figure DEST_PATH_IMAGE079
, unitary circulation cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure DEST_PATH_IMAGE081
Figure 509558DEST_PATH_IMAGE010
Figure DEST_PATH_IMAGE082
Figure 2113DEST_PATH_IMAGE011
Figure 2013100232269100001DEST_PATH_IMAGE083
Figure 717259DEST_PATH_IMAGE012
Figure DEST_PATH_IMAGE084
Figure 571821DEST_PATH_IMAGE013
Figure DEST_PATH_IMAGE085
Figure 67524DEST_PATH_IMAGE014
Figure DEST_PATH_IMAGE086
Figure 534409DEST_PATH_IMAGE015
Figure DEST_PATH_IMAGE087
Figure 605526DEST_PATH_IMAGE016
Figure 460350DEST_PATH_IMAGE017
Figure DEST_PATH_IMAGE089
, set encryption parameter
Figure 613988DEST_PATH_IMAGE002
Figure 946881DEST_PATH_IMAGE003
Figure 698936DEST_PATH_IMAGE004
Figure 459082DEST_PATH_IMAGE005
Figure 375882DEST_PATH_IMAGE007
Figure 982444DEST_PATH_IMAGE008
With
Figure 913490DEST_PATH_IMAGE009
Initial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 605503DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure DEST_PATH_IMAGE090
Carry out H1=
Figure DEST_PATH_IMAGE091
Figure 654099DEST_PATH_IMAGE010
Figure 177484DEST_PATH_IMAGE019
Figure 545012DEST_PATH_IMAGE011
Figure 225785DEST_PATH_IMAGE020
Figure 19746DEST_PATH_IMAGE021
Figure 292596DEST_PATH_IMAGE013
Figure 21517DEST_PATH_IMAGE022
Figure 536550DEST_PATH_IMAGE014
Figure 972210DEST_PATH_IMAGE023
Figure 681540DEST_PATH_IMAGE015
Figure 569862DEST_PATH_IMAGE024
Figure 891515DEST_PATH_IMAGE016
Figure 181682DEST_PATH_IMAGE025
Figure 124231DEST_PATH_IMAGE017
Figure 499848DEST_PATH_IMAGE026
Unitary circulation cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 858148DEST_PATH_IMAGE090
Carry out H1=
Figure 766936DEST_PATH_IMAGE091
Figure 818069DEST_PATH_IMAGE010
Figure 680983DEST_PATH_IMAGE019
Figure 905291DEST_PATH_IMAGE011
Figure 904471DEST_PATH_IMAGE020
Figure 117715DEST_PATH_IMAGE012
Figure 433607DEST_PATH_IMAGE013
Figure 552873DEST_PATH_IMAGE022
Figure 178764DEST_PATH_IMAGE014
Figure 16270DEST_PATH_IMAGE023
Figure 821732DEST_PATH_IMAGE024
Figure 119990DEST_PATH_IMAGE016
Figure 946256DEST_PATH_IMAGE025
Figure 253741DEST_PATH_IMAGE017
Figure 144337DEST_PATH_IMAGE026
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while unitary circulation cryptographic calculation, next unitary circulation cryptographic calculation is pointed to H2=
Figure 879074DEST_PATH_IMAGE027
Figure DEST_PATH_IMAGE092
Figure 972987DEST_PATH_IMAGE011
Figure 921352DEST_PATH_IMAGE029
Figure 826991DEST_PATH_IMAGE012
Figure 923123DEST_PATH_IMAGE030
Figure 73875DEST_PATH_IMAGE013
Figure 876746DEST_PATH_IMAGE031
Figure 160331DEST_PATH_IMAGE015
Figure 145605DEST_PATH_IMAGE033
Figure 393046DEST_PATH_IMAGE016
Figure 401454DEST_PATH_IMAGE034
Figure 392544DEST_PATH_IMAGE017
Figure 671472DEST_PATH_IMAGE035
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure DEST_PATH_IMAGE093
Carry out H2=
Figure 89815DEST_PATH_IMAGE027
Figure 319939DEST_PATH_IMAGE010
Figure 114719DEST_PATH_IMAGE092
Figure 245224DEST_PATH_IMAGE011
Figure 834468DEST_PATH_IMAGE029
Figure 817468DEST_PATH_IMAGE012
Figure 150360DEST_PATH_IMAGE030
Figure 699153DEST_PATH_IMAGE013
Figure 50562DEST_PATH_IMAGE031
Figure 255278DEST_PATH_IMAGE014
Figure 391861DEST_PATH_IMAGE032
Figure 732844DEST_PATH_IMAGE015
Figure 182335DEST_PATH_IMAGE016
Figure 857030DEST_PATH_IMAGE034
Figure 694929DEST_PATH_IMAGE017
Figure 62456DEST_PATH_IMAGE035
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while unitary circulation cryptographic calculation, next unitary circulation cryptographic calculation is pointed to H3=
Figure 38503DEST_PATH_IMAGE036
Figure 80670DEST_PATH_IMAGE010
Figure 661824DEST_PATH_IMAGE037
Figure 934674DEST_PATH_IMAGE011
Figure 975180DEST_PATH_IMAGE012
Figure 53994DEST_PATH_IMAGE039
Figure 489655DEST_PATH_IMAGE013
Figure 434871DEST_PATH_IMAGE040
Figure 713405DEST_PATH_IMAGE014
Figure 23340DEST_PATH_IMAGE041
Figure 313507DEST_PATH_IMAGE015
Figure 193738DEST_PATH_IMAGE042
Figure 569356DEST_PATH_IMAGE016
Figure 684314DEST_PATH_IMAGE044
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this unitary circulation cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 547228DEST_PATH_IMAGE001
Carry out unitary circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN2013100232269A 2013-01-22 2013-01-22 Multivariate parameter gradation unitary circulating encryption anti-fake information storage trademark Pending CN103106452A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100232269A CN103106452A (en) 2013-01-22 2013-01-22 Multivariate parameter gradation unitary circulating encryption anti-fake information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100232269A CN103106452A (en) 2013-01-22 2013-01-22 Multivariate parameter gradation unitary circulating encryption anti-fake information storage trademark

Publications (1)

Publication Number Publication Date
CN103106452A true CN103106452A (en) 2013-05-15

Family

ID=48314298

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100232269A Pending CN103106452A (en) 2013-01-22 2013-01-22 Multivariate parameter gradation unitary circulating encryption anti-fake information storage trademark

Country Status (1)

Country Link
CN (1) CN103106452A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101295343A (en) * 2008-06-19 2008-10-29 福建鸿博印刷股份有限公司 Two-dimensional code multi-enciphering anti-fake printing method
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101295343A (en) * 2008-06-19 2008-10-29 福建鸿博印刷股份有限公司 Two-dimensional code multi-enciphering anti-fake printing method
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯登国等: "《密码学导引》", 30 April 1999, article "2.AES候选算法简介", pages: 271-273 *

Similar Documents

Publication Publication Date Title
CN103106460A (en) Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark
CN103106513A (en) Multi-parameter univariate poly encryption anti-fake information storage trademark
CN103106442A (en) Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106452A (en) Multivariate parameter gradation unitary circulating encryption anti-fake information storage trademark
CN103106432A (en) Multi-parametric-variable gradient unitary circulating encryption anti-fake information storage trademark
CN103106516A (en) Multivariate multi-parameter gradient binary encryption anti-fake information storage trademark
CN103106503A (en) Multivariate multi-parameter gradient polynary encryption anti-fake information storage trademark
CN103106519A (en) Multi-parametric-variable double-layer gradient polynary encryption anti-fake information storage trademark
CN103116797A (en) Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark
CN103116796A (en) One-parameter variation transmutation unary encryption anti-fake information storage trademark
CN103106448A (en) Single variable parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103106447A (en) Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark
CN103106450A (en) Single parameter multivariable unitary circulation encryption anti-counterfeiting information storage trademark
CN103106457A (en) Single parameter ternary circulation encryption anti-counterfeiting information storage trademark
CN103106429A (en) Single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark
CN103106517A (en) Parameter transmutation ternary encryption anti-fake information storage trademark
CN103106518A (en) Parameter transmutation one-element encryption anti-fake information storage trademark
CN103106438A (en) Parameter-gradient multivariable multi-encryption anti-fake information storage trademark
CN103106449A (en) Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103106439A (en) Multiparameter multivariable binary encryption anti-fake information storage trademark
CN103116790A (en) Parameter transmutation binary encryption anti-fake information storage trademark
CN103106512A (en) Multiparameter multivariable ternary encryption anti-fake information storage trademark
CN103116788A (en) Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark
CN103106440A (en) Multi-parameter unitary encryption anti-fake information storage brand
CN103136565A (en) Multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130515