CN103106484A - Parameter transmutation multi-element circulation encryption anti-fake information storage trademark - Google Patents

Parameter transmutation multi-element circulation encryption anti-fake information storage trademark Download PDF

Info

Publication number
CN103106484A
CN103106484A CN2013100235568A CN201310023556A CN103106484A CN 103106484 A CN103106484 A CN 103106484A CN 2013100235568 A CN2013100235568 A CN 2013100235568A CN 201310023556 A CN201310023556 A CN 201310023556A CN 103106484 A CN103106484 A CN 103106484A
Authority
CN
China
Prior art keywords
binary
trade mark
group
counterfeiting information
operator control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100235568A
Other languages
Chinese (zh)
Inventor
董武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN2013100235568A priority Critical patent/CN103106484A/en
Publication of CN103106484A publication Critical patent/CN103106484A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Credit Cards Or The Like (AREA)

Abstract

Provided is a parameter transmutation multi-element circulation encryption anti-fake information storage trademark. The parameter transmutation multi-element circulation encryption anti-fake information storage trademark is capable of transforming binary system anti-fake information into a binary system modulating signal through multi-element circulation encryption and channel coding, capable of embedding anti-fake information into the whole trademark page by changing conductivity of an amplitude modulation website in a circulation look-up table modulation method, capable of identifying the anti-fake information from any fragment when a trademark is identified and capable of being used in various anti-fake trademarks.

Description

The polynary circulation encryption anti-counterfeiting of parameter alternation information storage trade mark
affiliated technical field:
The present invention relates to a kind of anti-false trademark, particularly the polynary circulation encryption anti-counterfeiting of a kind of parameter alternation information is stored trade mark, this trade mark can be kept at binary add tight defense fake information on the trade mark page and realize the false proof of trade mark, and what this trade mark can be for extensive stock is false proof.
background technology:
Anti-false trademark, claim again antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, is a kind of proof label of discerning the false from the genuine, preventing personation, be in the commodity process of circulation people for distinguishing true and false, the sign of distinguishing the commercial quality quality of merchandise resources.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and client's interests.The trade mark of China has carried out innovation audaciously; adopted laser anti-counterfeit, the core micropore is false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but the false proof struggle with fraud is high-tech trial of strength; advanced anti-counterfeiting technology has certain ageing again; so; must constantly promote trade mark anti-fake technique; could false proof with fake in forever maintain the leading position, this is also that protection businessman and client's interests are maintained the commodity safe basic assurance that circulates.
summary of the invention:
For reliability and the security that improves trademark anti-counterfeit, the deficiency that the present invention is directed to existing trademark anti-counterfeit existence is improved existing trade mark anti-fake technique, a kind of anti-counterfeiting information storage trade mark has been proposed, this trade mark is by the change to amplitude electric conductivity in brand printing, encryption anti-counterfeiting information is embedded on the whole trade mark page with scale-of-two coded signal form, can identify encryption anti-counterfeiting information when brand recognition from any one fragment, therefore there is very strong disguise and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, image and word on trade mark page paper consist of amplitude,
Binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, and the horizontal scanning line on trade mark page paper and column scan line are printed and formed by electrically conducting transparent printing ink
The horizontal scanning line be printed on trade mark page paper has the N bar, the column scan line be printed on trade mark page paper has the M bar, the amplitude be printed on trade mark page paper is divided into the capable M row of N on the trade mark paper, amplitude neatly is matrix and arranges on trade mark page paper paper, allow i get 1 to N, allow j get 1 to M, j bar column scan line on trade mark page paper is electrically connected to the basal surface of each amplitude of the row of the j on trade mark page paper, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper is capable with i on trade mark page paper is electrically connected to
In the time the binary message of trade mark page stores need to being read, be set to successively high level to N bar horizontal scanning line by the 1st on trade mark page paper,
When the 1st horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported from the 1st column scan line to M bar column scan line with 0,1 code form, the 1st row on trade mark page paper is printed the amplitude output binary message 1 formed by electrically conductive ink, the 1st row on trade mark page paper is printed the amplitude output binary message 0 formed by dielectric ink, can repeat above-mentioned readout to other row on trade mark page paper
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 542365DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H i, i is greater than 0 positive integer, and binary system is encrypted parameter and is denoted as respectively
Figure 2013100235568100002DEST_PATH_IMAGE002
,
Figure 64613DEST_PATH_IMAGE003
,
Figure 2013100235568100002DEST_PATH_IMAGE004
,
Figure 966710DEST_PATH_IMAGE005
,
Figure 2013100235568100002DEST_PATH_IMAGE006
,
Figure 509687DEST_PATH_IMAGE007
, With
Figure 130024DEST_PATH_IMAGE009
, encryption parameter
Figure 315018DEST_PATH_IMAGE002
,
Figure 478146DEST_PATH_IMAGE003
,
Figure 988762DEST_PATH_IMAGE004
,
Figure 237340DEST_PATH_IMAGE005
,
Figure 226025DEST_PATH_IMAGE006
,
Figure 509239DEST_PATH_IMAGE007
,
Figure 925177DEST_PATH_IMAGE008
With
Figure 661051DEST_PATH_IMAGE009
It is 0 to 256 binary system positive integer, binary system is encrypted variable and is denoted as q, j, d, e, f, g, h and r, the binary system positive integer that encryption variables q, j, d, e, f, g, h and r are 0 to 256, the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 2013100235568100002DEST_PATH_IMAGE010
Figure 2013100235568100002DEST_PATH_IMAGE012
Figure 653464DEST_PATH_IMAGE013
Figure 2013100235568100002DEST_PATH_IMAGE014
Figure 709145DEST_PATH_IMAGE015
Figure 2013100235568100002DEST_PATH_IMAGE016
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 856278DEST_PATH_IMAGE010
Figure 848505DEST_PATH_IMAGE011
Figure 871825DEST_PATH_IMAGE012
Figure 113450DEST_PATH_IMAGE013
Figure 857415DEST_PATH_IMAGE014
Figure 94361DEST_PATH_IMAGE015
Figure 220766DEST_PATH_IMAGE017
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 768422DEST_PATH_IMAGE010
Figure 859875DEST_PATH_IMAGE011
Figure 100364DEST_PATH_IMAGE012
Figure 353173DEST_PATH_IMAGE016
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 805200DEST_PATH_IMAGE010
Figure 746612DEST_PATH_IMAGE011
Figure 677111DEST_PATH_IMAGE014
Figure 207449DEST_PATH_IMAGE015
Figure 554117DEST_PATH_IMAGE016
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 56959DEST_PATH_IMAGE010
Figure 832017DEST_PATH_IMAGE011
Figure 84007DEST_PATH_IMAGE012
Figure 983830DEST_PATH_IMAGE013
Figure 18782DEST_PATH_IMAGE014
Figure 913926DEST_PATH_IMAGE015
Figure 336817DEST_PATH_IMAGE016
Figure 192777DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 156054DEST_PATH_IMAGE010
Figure 515491DEST_PATH_IMAGE011
Figure 577174DEST_PATH_IMAGE013
Figure 750667DEST_PATH_IMAGE014
Figure 230190DEST_PATH_IMAGE015
Figure 791621DEST_PATH_IMAGE016
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 661674DEST_PATH_IMAGE010
Figure 995703DEST_PATH_IMAGE011
Figure 780305DEST_PATH_IMAGE013
Figure 623497DEST_PATH_IMAGE014
Figure 77612DEST_PATH_IMAGE015
Figure 980846DEST_PATH_IMAGE016
Figure 520411DEST_PATH_IMAGE017
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 167293DEST_PATH_IMAGE010
Figure 475915DEST_PATH_IMAGE011
Figure 550050DEST_PATH_IMAGE012
Figure 311333DEST_PATH_IMAGE013
Figure 761906DEST_PATH_IMAGE014
Figure 925034DEST_PATH_IMAGE015
Figure 170070DEST_PATH_IMAGE016
Figure 215387DEST_PATH_IMAGE017
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 79437DEST_PATH_IMAGE010
Figure 221706DEST_PATH_IMAGE011
Figure 639098DEST_PATH_IMAGE013
Figure 306839DEST_PATH_IMAGE014
Figure 31399DEST_PATH_IMAGE016
Figure 379204DEST_PATH_IMAGE017
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, polynary circulation cryptographic calculation is defined as H i=
Figure 585057DEST_PATH_IMAGE018
Figure 701918DEST_PATH_IMAGE010
Figure 600603DEST_PATH_IMAGE002
Figure 170125DEST_PATH_IMAGE011
Figure 179669DEST_PATH_IMAGE018
Figure 416616DEST_PATH_IMAGE012
Figure 220624DEST_PATH_IMAGE002
Figure 90677DEST_PATH_IMAGE018
Figure 182129DEST_PATH_IMAGE014
Figure 688197DEST_PATH_IMAGE002
Figure 849237DEST_PATH_IMAGE018
Figure 670562DEST_PATH_IMAGE016
Figure 206586DEST_PATH_IMAGE002
Figure 127455DEST_PATH_IMAGE018
, during binary operator control variables k=1, polynary circulation cryptographic calculation is defined as H i=
Figure 2013100235568100002DEST_PATH_IMAGE019
Figure 662341DEST_PATH_IMAGE010
Figure 979053DEST_PATH_IMAGE003
Figure 202627DEST_PATH_IMAGE019
Figure 123179DEST_PATH_IMAGE012
Figure 876371DEST_PATH_IMAGE003
Figure 882373DEST_PATH_IMAGE013
Figure 113634DEST_PATH_IMAGE019
Figure 888692DEST_PATH_IMAGE014
Figure 812786DEST_PATH_IMAGE003
Figure 712609DEST_PATH_IMAGE015
Figure 872195DEST_PATH_IMAGE019
Figure 377125DEST_PATH_IMAGE016
Figure 452715DEST_PATH_IMAGE017
Figure 150412DEST_PATH_IMAGE019
, during binary operator control variables k=2, polynary circulation cryptographic calculation is defined as H i=
Figure 775429DEST_PATH_IMAGE020
Figure 10604DEST_PATH_IMAGE011
Figure 490127DEST_PATH_IMAGE020
Figure 51558DEST_PATH_IMAGE012
Figure 656032DEST_PATH_IMAGE013
Figure 255640DEST_PATH_IMAGE020
Figure 987973DEST_PATH_IMAGE014
Figure 40243DEST_PATH_IMAGE004
Figure 883434DEST_PATH_IMAGE015
Figure 868707DEST_PATH_IMAGE020
Figure 647308DEST_PATH_IMAGE016
Figure 311507DEST_PATH_IMAGE004
Figure 833755DEST_PATH_IMAGE017
Figure 267011DEST_PATH_IMAGE020
, during binary operator control variables k=3, polynary circulation cryptographic calculation is defined as H i=
Figure 2013100235568100002DEST_PATH_IMAGE021
Figure 809987DEST_PATH_IMAGE010
Figure 21843DEST_PATH_IMAGE011
Figure 184971DEST_PATH_IMAGE021
Figure 430008DEST_PATH_IMAGE012
Figure 944166DEST_PATH_IMAGE005
Figure 932850DEST_PATH_IMAGE013
Figure 23669DEST_PATH_IMAGE005
Figure 425831DEST_PATH_IMAGE015
Figure 688185DEST_PATH_IMAGE021
Figure 415970DEST_PATH_IMAGE016
Figure 969628DEST_PATH_IMAGE017
Figure 86489DEST_PATH_IMAGE021
, during binary operator control variables k=4, polynary circulation cryptographic calculation is defined as H i=
Figure 719595DEST_PATH_IMAGE022
Figure 564240DEST_PATH_IMAGE006
Figure 68537DEST_PATH_IMAGE012
Figure 6406DEST_PATH_IMAGE006
Figure 55134DEST_PATH_IMAGE015
Figure 325578DEST_PATH_IMAGE022
Figure 512026DEST_PATH_IMAGE006
Figure 187858DEST_PATH_IMAGE017
Figure 906501DEST_PATH_IMAGE022
, during binary operator control variables k=5, polynary circulation cryptographic calculation is defined as H i=
Figure 2013100235568100002DEST_PATH_IMAGE023
Figure 894049DEST_PATH_IMAGE010
Figure 507750DEST_PATH_IMAGE011
Figure 1365DEST_PATH_IMAGE012
Figure 498205DEST_PATH_IMAGE007
Figure 679788DEST_PATH_IMAGE013
Figure 728516DEST_PATH_IMAGE023
Figure 256766DEST_PATH_IMAGE007
Figure 981325DEST_PATH_IMAGE023
Figure 534983DEST_PATH_IMAGE007
Figure 160000DEST_PATH_IMAGE017
, during binary operator control variables k=6, polynary circulation cryptographic calculation is defined as H i=
Figure 628207DEST_PATH_IMAGE024
Figure 129596DEST_PATH_IMAGE010
Figure 170550DEST_PATH_IMAGE011
Figure 40603DEST_PATH_IMAGE012
Figure 640212DEST_PATH_IMAGE008
Figure 372544DEST_PATH_IMAGE013
Figure 159235DEST_PATH_IMAGE024
Figure 315595DEST_PATH_IMAGE008
Figure 94195DEST_PATH_IMAGE015
Figure 492816DEST_PATH_IMAGE024
Figure 15064DEST_PATH_IMAGE016
Figure 928979DEST_PATH_IMAGE017
Figure 955841DEST_PATH_IMAGE024
, during binary operator control variables k=7, polynary circulation cryptographic calculation is defined as H i=
Figure 609676DEST_PATH_IMAGE010
Figure 163017DEST_PATH_IMAGE009
Figure 283420DEST_PATH_IMAGE011
Figure 488060DEST_PATH_IMAGE012
Figure 771274DEST_PATH_IMAGE009
Figure 187212DEST_PATH_IMAGE013
Figure 923087DEST_PATH_IMAGE025
Figure 715462DEST_PATH_IMAGE014
Figure 853182DEST_PATH_IMAGE009
Figure 440022DEST_PATH_IMAGE015
Figure 663193DEST_PATH_IMAGE025
Figure 259259DEST_PATH_IMAGE016
Figure 782644DEST_PATH_IMAGE009
Figure 250852DEST_PATH_IMAGE025
, set encryption parameter
Figure 260396DEST_PATH_IMAGE002
, ,
Figure 125569DEST_PATH_IMAGE004
,
Figure 182387DEST_PATH_IMAGE005
, ,
Figure 821495DEST_PATH_IMAGE007
,
Figure 61984DEST_PATH_IMAGE008
With
Figure 606098DEST_PATH_IMAGE009
Initial value, set the initial value of encryption variables q, j, d, e, f, g, h and r, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 957445DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right Carry out H 1=
Figure DEST_PATH_IMAGE027
Figure 908269DEST_PATH_IMAGE010
Figure 815045DEST_PATH_IMAGE002
Figure 301707DEST_PATH_IMAGE027
Figure 883998DEST_PATH_IMAGE012
Figure 402704DEST_PATH_IMAGE002
Figure 95854DEST_PATH_IMAGE013
Figure 16405DEST_PATH_IMAGE027
Figure 510021DEST_PATH_IMAGE002
Figure 6861DEST_PATH_IMAGE015
Figure 781919DEST_PATH_IMAGE027
Figure 237171DEST_PATH_IMAGE016
Figure 340256DEST_PATH_IMAGE002
Figure 499842DEST_PATH_IMAGE017
Polynary circulation cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 489981DEST_PATH_IMAGE026
Carry out H 1=
Figure 80362DEST_PATH_IMAGE027
Figure 450164DEST_PATH_IMAGE010
Figure 199814DEST_PATH_IMAGE002
Figure 465710DEST_PATH_IMAGE011
Figure 668021DEST_PATH_IMAGE027
Figure 44776DEST_PATH_IMAGE012
Figure 648933DEST_PATH_IMAGE002
Figure 616889DEST_PATH_IMAGE013
Figure 181862DEST_PATH_IMAGE027
Figure 820971DEST_PATH_IMAGE002
Figure 553304DEST_PATH_IMAGE015
Figure 714344DEST_PATH_IMAGE016
Figure 345679DEST_PATH_IMAGE027
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1 and k+1 computing in the time of polynary circulation cryptographic calculation, make next polynary circulation cryptographic calculation point to H 2=
Figure 301183DEST_PATH_IMAGE010
Figure 437635DEST_PATH_IMAGE003
Figure 464497DEST_PATH_IMAGE011
Figure 343777DEST_PATH_IMAGE012
Figure 854393DEST_PATH_IMAGE003
Figure 403240DEST_PATH_IMAGE028
Figure 822807DEST_PATH_IMAGE014
Figure 143804DEST_PATH_IMAGE003
Figure 879679DEST_PATH_IMAGE015
Figure 672055DEST_PATH_IMAGE028
Figure 809775DEST_PATH_IMAGE016
Figure 396614DEST_PATH_IMAGE003
Figure 619785DEST_PATH_IMAGE017
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure DEST_PATH_IMAGE029
Carry out H 2=
Figure 215086DEST_PATH_IMAGE010
Figure 499940DEST_PATH_IMAGE028
Figure 303948DEST_PATH_IMAGE012
Figure 626345DEST_PATH_IMAGE003
Figure 174001DEST_PATH_IMAGE013
Figure 45880DEST_PATH_IMAGE028
Figure 411002DEST_PATH_IMAGE014
Figure 830482DEST_PATH_IMAGE003
Figure 306463DEST_PATH_IMAGE015
Figure 127788DEST_PATH_IMAGE028
Figure 663812DEST_PATH_IMAGE016
Figure 570588DEST_PATH_IMAGE003
Figure 526092DEST_PATH_IMAGE028
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1 and k+1 computing in the time of polynary circulation cryptographic calculation, make next polynary circulation cryptographic calculation point to H 3=
Figure 233016DEST_PATH_IMAGE030
Figure 851397DEST_PATH_IMAGE004
Figure 259561DEST_PATH_IMAGE030
Figure 277282DEST_PATH_IMAGE012
Figure 774122DEST_PATH_IMAGE004
Figure 549180DEST_PATH_IMAGE013
Figure 738853DEST_PATH_IMAGE030
Figure 37614DEST_PATH_IMAGE015
Figure 991663DEST_PATH_IMAGE030
Figure 847624DEST_PATH_IMAGE016
Figure 810900DEST_PATH_IMAGE004
Figure 701496DEST_PATH_IMAGE017
Figure 967392DEST_PATH_IMAGE030
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this polynary circulation cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 169704DEST_PATH_IMAGE001
carry out polynary circulation cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, can provide valid certificates for true trade mark, there is stronger anti-forgery ability simultaneously.
For solving above-mentioned technical matters, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, each 8 one group of scale-of-two anti-counterfeiting information in scale-of-two anti-counterfeiting information table are expanded to 32 one group of scale-of-two anti-counterfeiting information, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, each 32 scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table are carried out to polynary circulation cryptographic calculation, generate the binary add tight defense fake information table of 32 group, utilize 32 binary add tight defense fake informations process chnnel codings in binary add tight defense fake information table, generation has the binary modulated signal of 32 group of error detecting and error correcting function, chnnel coding can adopt loop coding, convolutional encoding or Turbo coding various ways, trade mark page original continuous is changed the line map, and image signal is processed (RIP) through rasterizing and hybrid screening is exported shadow tone hybrid screening picture signal, comprising amplitude and FM screened image signal, utilize 32 one group of binary modulated signals that generate to adopt the electric conductivity of amplitude in circulation look-up table modulation system modulation hybrid screening picture signal, the electric conductivity that makes amplitude is according to the dielectric ink amplitude and the electrically conductive ink amplitude is regular changes, make adjacent 32 amplitudes in the hybrid screening picture signal carry 32 scale-of-two anti-counterfeiting information by the change of electric conductivity, thereby be created on the hybrid screening picture signal that embeds anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, at first gather trade mark page site electric conductivity signal, identification through the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generate scale-of-two deciphering anti-counterfeiting information table after channel-decoding, 32 binary messages of i group that scale-of-two is deciphered in the anti-counterfeiting information table are denoted as M i.
Binary system is deciphered to 32 binary message M in the anti-counterfeiting information table iThe initial value design of Position Control variable i be i=1, set encryption parameter ,
Figure 416194DEST_PATH_IMAGE003
, , ,
Figure 254203DEST_PATH_IMAGE006
, ,
Figure 320565DEST_PATH_IMAGE008
With
Figure 372835DEST_PATH_IMAGE009
The initial value of initial value when encrypting, the initial value when initial value of setting encryption variables q, j, d, e, f, g, h and r is encryption, the initial value design of binary operator control variables k is k=0, known by polynary circulation ciphering process, and during binary operator control variables k=0, decrypt operation is M i=
Figure 216026DEST_PATH_IMAGE018
Figure 573375DEST_PATH_IMAGE002
Figure 644099DEST_PATH_IMAGE011
Figure 166347DEST_PATH_IMAGE018
Figure 599603DEST_PATH_IMAGE012
Figure 549104DEST_PATH_IMAGE002
Figure 435021DEST_PATH_IMAGE013
Figure 760960DEST_PATH_IMAGE018
Figure 48721DEST_PATH_IMAGE014
Figure 700283DEST_PATH_IMAGE002
Figure 214441DEST_PATH_IMAGE015
Figure 220760DEST_PATH_IMAGE016
Figure 638152DEST_PATH_IMAGE017
, during binary operator control variables k=1, decrypt operation is M i=
Figure 833827DEST_PATH_IMAGE019
Figure 561611DEST_PATH_IMAGE010
Figure 909416DEST_PATH_IMAGE003
Figure 115269DEST_PATH_IMAGE011
Figure 98193DEST_PATH_IMAGE012
Figure 543080DEST_PATH_IMAGE003
Figure 320729DEST_PATH_IMAGE019
Figure 124737DEST_PATH_IMAGE014
Figure 994790DEST_PATH_IMAGE015
Figure 86243DEST_PATH_IMAGE019
Figure 277370DEST_PATH_IMAGE003
Figure 753351DEST_PATH_IMAGE017
Figure 574676DEST_PATH_IMAGE019
, during binary operator control variables k=2, decrypt operation is M i=
Figure 17476DEST_PATH_IMAGE010
Figure 31568DEST_PATH_IMAGE004
Figure 820850DEST_PATH_IMAGE020
Figure 351275DEST_PATH_IMAGE012
Figure 44424DEST_PATH_IMAGE004
Figure 964976DEST_PATH_IMAGE013
Figure 718168DEST_PATH_IMAGE020
Figure 724170DEST_PATH_IMAGE014
Figure 955431DEST_PATH_IMAGE004
Figure 137014DEST_PATH_IMAGE015
Figure 185741DEST_PATH_IMAGE020
Figure 554406DEST_PATH_IMAGE016
Figure 713992DEST_PATH_IMAGE004
Figure 218922DEST_PATH_IMAGE017
, during binary operator control variables k=3, decrypt operation is M i=
Figure 294512DEST_PATH_IMAGE021
Figure 148384DEST_PATH_IMAGE005
Figure 414280DEST_PATH_IMAGE011
Figure 616592DEST_PATH_IMAGE021
Figure 258925DEST_PATH_IMAGE012
Figure 299880DEST_PATH_IMAGE013
Figure 396012DEST_PATH_IMAGE021
Figure 435512DEST_PATH_IMAGE014
Figure 35120DEST_PATH_IMAGE005
Figure 819723DEST_PATH_IMAGE021
Figure 662914DEST_PATH_IMAGE016
Figure 117029DEST_PATH_IMAGE005
Figure 426787DEST_PATH_IMAGE017
Figure 90987DEST_PATH_IMAGE021
, during binary operator control variables k=4, decrypt operation is M i=
Figure 613235DEST_PATH_IMAGE022
Figure 46491DEST_PATH_IMAGE010
Figure 995992DEST_PATH_IMAGE006
Figure 881908DEST_PATH_IMAGE011
Figure 207848DEST_PATH_IMAGE022
Figure 495609DEST_PATH_IMAGE012
Figure 147171DEST_PATH_IMAGE006
Figure 661329DEST_PATH_IMAGE013
Figure 650013DEST_PATH_IMAGE022
Figure 667648DEST_PATH_IMAGE014
Figure 349165DEST_PATH_IMAGE006
Figure 85040DEST_PATH_IMAGE015
Figure 611836DEST_PATH_IMAGE022
Figure 913559DEST_PATH_IMAGE006
Figure 402309DEST_PATH_IMAGE017
Figure 873742DEST_PATH_IMAGE022
, during binary operator control variables k=5, decrypt operation is M i=
Figure 990602DEST_PATH_IMAGE023
Figure 623709DEST_PATH_IMAGE010
Figure 458810DEST_PATH_IMAGE007
Figure 468354DEST_PATH_IMAGE011
Figure 439721DEST_PATH_IMAGE023
Figure 40467DEST_PATH_IMAGE012
Figure 972651DEST_PATH_IMAGE007
Figure 910520DEST_PATH_IMAGE013
Figure 661941DEST_PATH_IMAGE007
Figure 137922DEST_PATH_IMAGE015
Figure 490406DEST_PATH_IMAGE023
Figure 667626DEST_PATH_IMAGE007
Figure 822664DEST_PATH_IMAGE017
Figure 634849DEST_PATH_IMAGE023
, during binary operator control variables k=6, decrypt operation is M i=
Figure 217140DEST_PATH_IMAGE024
Figure 735846DEST_PATH_IMAGE010
Figure 960154DEST_PATH_IMAGE008
Figure 756071DEST_PATH_IMAGE011
Figure 249687DEST_PATH_IMAGE012
Figure 871161DEST_PATH_IMAGE008
Figure 521585DEST_PATH_IMAGE013
Figure 570312DEST_PATH_IMAGE024
Figure 470135DEST_PATH_IMAGE014
Figure 505087DEST_PATH_IMAGE008
Figure 134652DEST_PATH_IMAGE015
Figure 229647DEST_PATH_IMAGE024
Figure 944662DEST_PATH_IMAGE016
Figure 532955DEST_PATH_IMAGE017
Figure 330010DEST_PATH_IMAGE024
, during binary operator control variables k=7, decrypt operation is M i=
Figure 407687DEST_PATH_IMAGE025
Figure 909076DEST_PATH_IMAGE010
Figure 388599DEST_PATH_IMAGE009
Figure 515004DEST_PATH_IMAGE025
Figure 820083DEST_PATH_IMAGE012
Figure 419692DEST_PATH_IMAGE009
Figure 558549DEST_PATH_IMAGE013
Figure 469873DEST_PATH_IMAGE025
Figure 454010DEST_PATH_IMAGE014
Figure 811359DEST_PATH_IMAGE015
Figure 165482DEST_PATH_IMAGE009
Figure 646142DEST_PATH_IMAGE017
Figure 673004DEST_PATH_IMAGE025
, first M from binary system deciphering anti-counterfeiting information table 1Start, to each 32 the binary message M in binary system deciphering anti-counterfeiting information table iCarry out corresponding decrypt operation, solve the binary system anti-counterfeiting information
Figure 857998DEST_PATH_IMAGE001
, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, removes highly 24, recovers to generate the binary system anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.
The accompanying drawing explanation
Below in conjunction with accompanying drawing, the present invention is further described.
Fig. 1 is one-piece construction figure of the present invention.
Fig. 2 is A of the present invention-A cut-open view.
Fig. 3 loads the anti-counterfeiting information process flow diagram.
Fig. 4 extracts the anti-counterfeiting information process flow diagram.
Embodiment
In Fig. 1 and Fig. 2, encryption anti-counterfeiting information storage trade mark, by trade mark page paper 7-1, be printed on amplitude 6-1 on trade mark page paper 7-1 to 6-150, be printed on horizontal scanning line 1-1 on trade mark page paper 7-1 and form to 2-10 to 1-15, the column scan line 2-1 that is printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 consist of to 6-150 amplitude 6-1
According to storage binary add tight defense fake information, a part of amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper 7-1 is printed and is formed by dielectric ink, horizontal scanning line 1-1 on trade mark page paper 7-1 is printed and is formed by electrically conducting transparent printing ink to 2-10 to 1-15 and column scan line 2-1
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, and the light amplitude on trade mark page paper 7-1 is printed and formed by dielectric ink,
The amplitude be printed on trade mark page paper 7-1 is divided into 15 row 10 row on the trade mark paper, amplitude 6-1 neatly is matrix and arranges on trade mark page paper 7-1 to 6-150, allow i get 1 to 15, allow j get 1 to 10, j bar column scan line on trade mark page paper 7-1 is electrically connected to the basal surface of each amplitude of j on trade mark page paper 7-1 row, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper 7-1 is capable with i on trade mark page paper 7-1 is electrically connected to
In the time the binary add tight defense fake information of trade mark page stores need to being read, 15 horizontal scanning lines of the 1st horizontal scanning line to the on trade mark page paper 7-1 are set to high level successively,
When the 1st horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary add tight defense fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is from 10 column scan line outputs of the 1st column scan line to the, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 1 by electrically conductive ink, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 0 by dielectric ink, therefore the binary add tight defense fake information 1100001000 that the 1st row is read, can repeat above-mentioned readout to other row on trade mark page paper 7-1.
In loading anti-counterfeiting information process flow diagram 3, original anti-counterfeiting information (image, word) is through digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, 8 one group of binary messages in scale-of-two anti-counterfeiting information table are expanded to 32 one group of binary messages, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, and 32 binary messages of i group in 32 one group scale-of-two anti-counterfeiting information table are denoted as
Figure 286705DEST_PATH_IMAGE001
, i is greater than 0 positive integer, 32 binary add tight defense fake informations of first from 32 one group scale-of-two anti-counterfeiting information table start, to each 32 the scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table
Figure 780320DEST_PATH_IMAGE001
carry out polynary circulation cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that scale-of-two anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize the trademark anti-counterfeit printing, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, realize trademark anti-counterfeit.
In extracting anti-counterfeiting information process flow diagram 4, when extracting anti-counterfeiting information, at first gather the electric conductivity signal of trade mark page halftone dot image, through the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generates scale-of-two deciphering anti-counterfeiting information table after channel-decoding.
By 32 binary message M in the scale-of-two deciphering anti-counterfeiting information table generated after decoding ithe initial value design of position control variable i be i=1, the initial value when initial value of setting encryption parameter is encryption, the initial value when initial value of setting encryption variables is encryption, the initial value design of binary operator control variable k is k=0, first M from the scale-of-two deciphering anti-counterfeiting information table generated 1start, to each 32 the binary message M in scale-of-two deciphering anti-counterfeiting information table ibe decrypted computing, solve the scale-of-two anti-counterfeiting information
Figure 769005DEST_PATH_IMAGE001
, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, removes highly 24, recovers to generate the scale-of-two anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.

Claims (1)

1. one kind generates the binary modulated signal by anti-counterfeiting information by cryptographic calculation and chnnel coding, and by the circulation modulation system of tabling look-up, anti-counterfeiting information is embedded in to the polynary circulation encryption anti-counterfeiting of the parameter alternation information storage trade mark in full page, it is characterized in that:anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, horizontal scanning line on trade mark page paper and column scan line are printed and are formed by electrically conducting transparent printing ink
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 2013100235568100001DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H i, i is greater than 0 positive integer, and binary system is encrypted parameter and is denoted as respectively
Figure 2013100235568100001DEST_PATH_IMAGE002
,
Figure 2013100235568100001DEST_PATH_IMAGE003
,
Figure 2013100235568100001DEST_PATH_IMAGE004
,
Figure DEST_PATH_IMAGE005
,
Figure 2013100235568100001DEST_PATH_IMAGE006
, ,
Figure 2013100235568100001DEST_PATH_IMAGE008
With
Figure DEST_PATH_IMAGE009
, encryption parameter
Figure 983859DEST_PATH_IMAGE002
,
Figure 399797DEST_PATH_IMAGE003
, ,
Figure 928048DEST_PATH_IMAGE005
,
Figure 65768DEST_PATH_IMAGE006
,
Figure 652607DEST_PATH_IMAGE007
,
Figure 875778DEST_PATH_IMAGE008
With
Figure 878369DEST_PATH_IMAGE009
It is 0 to 256 binary system positive integer, binary system is encrypted variable and is denoted as q, j, d, e, f, g, h and r, the binary system positive integer that encryption variables q, j, d, e, f, g, h and r are 0 to 256, the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 2013100235568100001DEST_PATH_IMAGE010
Figure DEST_PATH_IMAGE011
Figure 2013100235568100001DEST_PATH_IMAGE012
Figure DEST_PATH_IMAGE013
Figure DEST_PATH_IMAGE016
Figure DEST_PATH_IMAGE017
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 244497DEST_PATH_IMAGE010
Figure 877604DEST_PATH_IMAGE011
Figure 712705DEST_PATH_IMAGE012
Figure 722249DEST_PATH_IMAGE013
Figure 693616DEST_PATH_IMAGE014
Figure 820021DEST_PATH_IMAGE016
Figure 633256DEST_PATH_IMAGE017
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 865654DEST_PATH_IMAGE010
Figure 230777DEST_PATH_IMAGE011
Figure 650257DEST_PATH_IMAGE012
Figure 126237DEST_PATH_IMAGE013
Figure 390363DEST_PATH_IMAGE016
Figure 681753DEST_PATH_IMAGE017
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 357585DEST_PATH_IMAGE010
Figure 64510DEST_PATH_IMAGE011
Figure 458582DEST_PATH_IMAGE012
Figure 276365DEST_PATH_IMAGE013
Figure 72283DEST_PATH_IMAGE014
Figure 187372DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 837797DEST_PATH_IMAGE010
Figure 520768DEST_PATH_IMAGE012
Figure 555720DEST_PATH_IMAGE013
Figure 450864DEST_PATH_IMAGE014
Figure 545859DEST_PATH_IMAGE015
Figure 99517DEST_PATH_IMAGE017
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 849167DEST_PATH_IMAGE010
Figure 115063DEST_PATH_IMAGE011
Figure 317374DEST_PATH_IMAGE012
Figure 694129DEST_PATH_IMAGE013
Figure 298286DEST_PATH_IMAGE014
Figure 735083DEST_PATH_IMAGE015
Figure 424691DEST_PATH_IMAGE016
Figure 605136DEST_PATH_IMAGE017
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 63799DEST_PATH_IMAGE010
Figure 671498DEST_PATH_IMAGE011
Figure 254926DEST_PATH_IMAGE012
Figure 552232DEST_PATH_IMAGE014
Figure 455466DEST_PATH_IMAGE015
Figure 995032DEST_PATH_IMAGE016
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 950536DEST_PATH_IMAGE010
Figure 24671DEST_PATH_IMAGE011
Figure 51533DEST_PATH_IMAGE012
Figure 616375DEST_PATH_IMAGE017
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 24223DEST_PATH_IMAGE010
Figure 909002DEST_PATH_IMAGE011
Figure 644877DEST_PATH_IMAGE012
Figure 843777DEST_PATH_IMAGE013
Figure 106131DEST_PATH_IMAGE014
Figure 568337DEST_PATH_IMAGE015
Figure 121995DEST_PATH_IMAGE017
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, polynary circulation cryptographic calculation is defined as H i=
Figure DEST_PATH_IMAGE018
Figure 238855DEST_PATH_IMAGE010
Figure 137541DEST_PATH_IMAGE002
Figure 972642DEST_PATH_IMAGE011
Figure 716607DEST_PATH_IMAGE018
Figure 953553DEST_PATH_IMAGE012
Figure 125592DEST_PATH_IMAGE014
Figure 490714DEST_PATH_IMAGE002
Figure 910194DEST_PATH_IMAGE015
Figure 386175DEST_PATH_IMAGE018
Figure 207500DEST_PATH_IMAGE016
Figure 150048DEST_PATH_IMAGE002
Figure 181458DEST_PATH_IMAGE017
, during binary operator control variables k=1, polynary circulation cryptographic calculation is defined as H i=
Figure 605803DEST_PATH_IMAGE010
Figure 324447DEST_PATH_IMAGE003
Figure 942827DEST_PATH_IMAGE019
Figure 597799DEST_PATH_IMAGE012
Figure 350992DEST_PATH_IMAGE003
Figure 853834DEST_PATH_IMAGE019
Figure 35417DEST_PATH_IMAGE014
Figure 818565DEST_PATH_IMAGE003
Figure 187230DEST_PATH_IMAGE015
Figure 117325DEST_PATH_IMAGE016
Figure 71375DEST_PATH_IMAGE003
Figure 458494DEST_PATH_IMAGE017
Figure 297137DEST_PATH_IMAGE019
, during binary operator control variables k=2, polynary circulation cryptographic calculation is defined as H i=
Figure 718257DEST_PATH_IMAGE011
Figure 485225DEST_PATH_IMAGE020
Figure 495906DEST_PATH_IMAGE012
Figure 932704DEST_PATH_IMAGE004
Figure 622311DEST_PATH_IMAGE013
Figure 869119DEST_PATH_IMAGE004
Figure 46022DEST_PATH_IMAGE015
Figure 295738DEST_PATH_IMAGE020
Figure 749853DEST_PATH_IMAGE016
Figure 653087DEST_PATH_IMAGE004
Figure 839535DEST_PATH_IMAGE020
, during binary operator control variables k=3, polynary circulation cryptographic calculation is defined as H i=
Figure DEST_PATH_IMAGE021
Figure 148156DEST_PATH_IMAGE010
Figure 222291DEST_PATH_IMAGE005
Figure 983574DEST_PATH_IMAGE011
Figure 597275DEST_PATH_IMAGE012
Figure 887628DEST_PATH_IMAGE013
Figure 751679DEST_PATH_IMAGE021
Figure 893947DEST_PATH_IMAGE014
Figure 450830DEST_PATH_IMAGE005
Figure 311339DEST_PATH_IMAGE015
Figure 979081DEST_PATH_IMAGE021
Figure 975856DEST_PATH_IMAGE016
Figure 608700DEST_PATH_IMAGE005
Figure 831871DEST_PATH_IMAGE017
Figure 162358DEST_PATH_IMAGE021
, during binary operator control variables k=4, polynary circulation cryptographic calculation is defined as H i=
Figure DEST_PATH_IMAGE022
Figure 748060DEST_PATH_IMAGE010
Figure 646746DEST_PATH_IMAGE006
Figure 622792DEST_PATH_IMAGE011
Figure 756970DEST_PATH_IMAGE022
Figure 869283DEST_PATH_IMAGE012
Figure 667978DEST_PATH_IMAGE022
Figure 140864DEST_PATH_IMAGE006
Figure 950557DEST_PATH_IMAGE015
Figure 301904DEST_PATH_IMAGE022
Figure 259582DEST_PATH_IMAGE016
Figure 670972DEST_PATH_IMAGE006
Figure 108907DEST_PATH_IMAGE017
Figure 122999DEST_PATH_IMAGE022
, during binary operator control variables k=5, polynary circulation cryptographic calculation is defined as H i=
Figure DEST_PATH_IMAGE023
Figure 657885DEST_PATH_IMAGE010
Figure 974597DEST_PATH_IMAGE007
Figure 493303DEST_PATH_IMAGE011
Figure 186453DEST_PATH_IMAGE023
Figure 513529DEST_PATH_IMAGE012
Figure 391355DEST_PATH_IMAGE007
Figure 628618DEST_PATH_IMAGE023
Figure 327770DEST_PATH_IMAGE007
Figure 227593DEST_PATH_IMAGE015
Figure 892110DEST_PATH_IMAGE016
Figure 987105DEST_PATH_IMAGE007
Figure 967699DEST_PATH_IMAGE017
Figure 540763DEST_PATH_IMAGE023
, during binary operator control variables k=6, polynary circulation cryptographic calculation is defined as H I=
Figure 290413DEST_PATH_IMAGE024
Figure 87468DEST_PATH_IMAGE010
Figure 165145DEST_PATH_IMAGE008
Figure 932113DEST_PATH_IMAGE011
Figure 411636DEST_PATH_IMAGE024
Figure 984065DEST_PATH_IMAGE013
Figure 708308DEST_PATH_IMAGE024
Figure 316007DEST_PATH_IMAGE014
Figure 492910DEST_PATH_IMAGE008
Figure 790216DEST_PATH_IMAGE024
Figure 568816DEST_PATH_IMAGE016
Figure 233016DEST_PATH_IMAGE008
Figure 286422DEST_PATH_IMAGE017
Figure 595044DEST_PATH_IMAGE024
, during binary operator control variables k=7, polynary circulation cryptographic calculation is defined as H i=
Figure 669179DEST_PATH_IMAGE025
Figure 430462DEST_PATH_IMAGE010
Figure 44163DEST_PATH_IMAGE011
Figure 289199DEST_PATH_IMAGE025
Figure 334516DEST_PATH_IMAGE012
Figure 323200DEST_PATH_IMAGE009
Figure 465469DEST_PATH_IMAGE013
Figure 553511DEST_PATH_IMAGE025
Figure 289385DEST_PATH_IMAGE014
Figure 816182DEST_PATH_IMAGE009
Figure 953902DEST_PATH_IMAGE015
Figure 806320DEST_PATH_IMAGE025
Figure 763912DEST_PATH_IMAGE016
Figure 359978DEST_PATH_IMAGE009
Figure 883364DEST_PATH_IMAGE017
Figure 516470DEST_PATH_IMAGE025
, set encryption parameter ,
Figure 361115DEST_PATH_IMAGE003
,
Figure 332483DEST_PATH_IMAGE004
,
Figure 402070DEST_PATH_IMAGE005
,
Figure 865412DEST_PATH_IMAGE006
, ,
Figure 770100DEST_PATH_IMAGE008
With Initial value, set the initial value of encryption variables q, j, d, e, f, g, h and r, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 554702DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right
Figure 30683DEST_PATH_IMAGE026
Carry out H 1=
Figure 852009DEST_PATH_IMAGE027
Figure 528978DEST_PATH_IMAGE010
Figure 560387DEST_PATH_IMAGE002
Figure 715425DEST_PATH_IMAGE011
Figure 515891DEST_PATH_IMAGE027
Figure 98182DEST_PATH_IMAGE012
Figure 628607DEST_PATH_IMAGE002
Figure 648832DEST_PATH_IMAGE027
Figure 526659DEST_PATH_IMAGE014
Figure 142448DEST_PATH_IMAGE002
Figure 763922DEST_PATH_IMAGE015
Figure 463074DEST_PATH_IMAGE016
Figure 362897DEST_PATH_IMAGE002
Figure 397849DEST_PATH_IMAGE017
Figure 27413DEST_PATH_IMAGE027
Polynary circulation cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right Carry out H 1=
Figure 425716DEST_PATH_IMAGE002
Figure 222771DEST_PATH_IMAGE011
Figure 300448DEST_PATH_IMAGE027
Figure 801837DEST_PATH_IMAGE012
Figure 281360DEST_PATH_IMAGE002
Figure 842791DEST_PATH_IMAGE013
Figure 407765DEST_PATH_IMAGE027
Figure 119369DEST_PATH_IMAGE014
Figure 843611DEST_PATH_IMAGE002
Figure 451310DEST_PATH_IMAGE015
Figure 362634DEST_PATH_IMAGE027
Figure 346771DEST_PATH_IMAGE016
Figure 704120DEST_PATH_IMAGE017
Figure 509265DEST_PATH_IMAGE027
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1 and k+1 computing in the time of polynary circulation cryptographic calculation, make next polynary circulation cryptographic calculation point to H 2=
Figure 156147DEST_PATH_IMAGE028
Figure 464768DEST_PATH_IMAGE010
Figure 538904DEST_PATH_IMAGE003
Figure 565765DEST_PATH_IMAGE011
Figure 750759DEST_PATH_IMAGE028
Figure 179466DEST_PATH_IMAGE012
Figure 424503DEST_PATH_IMAGE003
Figure 204240DEST_PATH_IMAGE013
Figure 752585DEST_PATH_IMAGE015
Figure 325387DEST_PATH_IMAGE028
Figure 463107DEST_PATH_IMAGE016
Figure 49946DEST_PATH_IMAGE003
Figure 400342DEST_PATH_IMAGE028
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure 923727DEST_PATH_IMAGE029
Carry out H 2=
Figure 391934DEST_PATH_IMAGE010
Figure 435163DEST_PATH_IMAGE011
Figure 641102DEST_PATH_IMAGE028
Figure 573286DEST_PATH_IMAGE012
Figure 511155DEST_PATH_IMAGE003
Figure 212395DEST_PATH_IMAGE013
Figure 577517DEST_PATH_IMAGE028
Figure 528156DEST_PATH_IMAGE014
Figure 472978DEST_PATH_IMAGE003
Figure 330579DEST_PATH_IMAGE016
Figure 266042DEST_PATH_IMAGE003
Figure 473033DEST_PATH_IMAGE017
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1 and k+1 computing in the time of polynary circulation cryptographic calculation, make next polynary circulation cryptographic calculation point to H 3=
Figure 985289DEST_PATH_IMAGE010
Figure 781206DEST_PATH_IMAGE004
Figure 393453DEST_PATH_IMAGE011
Figure 274822DEST_PATH_IMAGE030
Figure 896296DEST_PATH_IMAGE012
Figure 546720DEST_PATH_IMAGE004
Figure 595447DEST_PATH_IMAGE013
Figure 229691DEST_PATH_IMAGE030
Figure 264643DEST_PATH_IMAGE014
Figure 254782DEST_PATH_IMAGE015
Figure 969797DEST_PATH_IMAGE030
Figure 808440DEST_PATH_IMAGE016
Figure 558090DEST_PATH_IMAGE004
Figure 355145DEST_PATH_IMAGE017
Figure 432822DEST_PATH_IMAGE030
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this polynary circulation cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 934211DEST_PATH_IMAGE001
carry out polynary circulation cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN2013100235568A 2013-01-22 2013-01-22 Parameter transmutation multi-element circulation encryption anti-fake information storage trademark Pending CN103106484A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100235568A CN103106484A (en) 2013-01-22 2013-01-22 Parameter transmutation multi-element circulation encryption anti-fake information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100235568A CN103106484A (en) 2013-01-22 2013-01-22 Parameter transmutation multi-element circulation encryption anti-fake information storage trademark

Publications (1)

Publication Number Publication Date
CN103106484A true CN103106484A (en) 2013-05-15

Family

ID=48314330

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100235568A Pending CN103106484A (en) 2013-01-22 2013-01-22 Parameter transmutation multi-element circulation encryption anti-fake information storage trademark

Country Status (1)

Country Link
CN (1) CN103106484A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102194137A (en) * 2011-04-25 2011-09-21 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on shape of amplitude modified screen
CN102225671A (en) * 2011-04-14 2011-10-26 北京印刷学院 Encrypted anti-counterfeit printing technology for modulating shape of printed matter amplitude-modulation screen dot by dual-encrypted signal
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages
CN102831835A (en) * 2011-06-14 2012-12-19 张晋 Inkless printing book paper

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102225671A (en) * 2011-04-14 2011-10-26 北京印刷学院 Encrypted anti-counterfeit printing technology for modulating shape of printed matter amplitude-modulation screen dot by dual-encrypted signal
CN102194137A (en) * 2011-04-25 2011-09-21 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on shape of amplitude modified screen
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages
CN102831835A (en) * 2011-06-14 2012-12-19 张晋 Inkless printing book paper

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯登国等: "《密码学导引》", 30 April 1999, 科学出版社 *

Similar Documents

Publication Publication Date Title
CN103106427A (en) Single parameter multiple-encryption anti-counterfeiting information storage trademark
CN103942590A (en) One-parameter multi-element circulation encryption anti-fake information storage trademark
CN103106484A (en) Parameter transmutation multi-element circulation encryption anti-fake information storage trademark
CN103106458A (en) Single variable parameter transmutation multi-element circulation encryption anti-fake information storage trademark
CN103106509A (en) Single variable parameter transmutation multi-element variable circulation encryption anti-fake information storage trademark
CN103106493A (en) Parameter transmutation ternary circulation encryption anti-fake information storage trademark
CN103106478A (en) Single variable parameter transmutation ternary circulation encryption anti-fake information storage trademark
CN103106479A (en) Parameter transmutation binary circulation encryption anti-fake information storage trademark
CN103106468A (en) Parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106504A (en) Single variable parameter transmutation binary encryption anti-fake information storage trademark
CN103106444A (en) Single variable parameter transmutation ternary encryption anti-fake information storage trademark
CN103116783A (en) Parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103106463A (en) Single parameter variable transmutation polytomized variable circulation encryption anti-counterfeiting information storage trademark
CN103116774A (en) Parameter transmutation unary circulation encryption anti-fake information storage trademark
CN103106466A (en) Single parameter variable transmutation binary variable circulation encryption anti-counterfeiting information storage trademark
CN103106491A (en) Single parameter variable transmutation ternary encryption anti-counterfeiting information storage trademark
CN103106476A (en) Single variable parameter transmutation unitary circulation encryption anti-counterfeiting information storage trademark
CN103106487A (en) Single parameter variable transmutation unitary circulation encryption anti-counterfeiting information storage trademark
CN103106467A (en) Single parameter variable transmutation binary circulation encryption anti-counterfeiting information storage trademark
CN103116773A (en) Parameter transmutation ternary variable circulation encryption anti-fake information storage trademark
CN103106456A (en) Single parameter polymtized variable circulation encryption anti-counterfeiting information storage trademark
CN103116798A (en) Multi-parameter ternary cycle encryption anti-counterfeiting information storage trademark
CN103116779A (en) One-parameter variation transmutation multivariable circulation encryption anti-fake information storage trademark
CN103106464A (en) Single parameter variable transmutation ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103106500A (en) Single variable parameter transmutation unitary encryption anti-counterfeiting information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130515