CN103106512A - Multiparameter multivariable ternary encryption anti-fake information storage trademark - Google Patents

Multiparameter multivariable ternary encryption anti-fake information storage trademark Download PDF

Info

Publication number
CN103106512A
CN103106512A CN2013100223950A CN201310022395A CN103106512A CN 103106512 A CN103106512 A CN 103106512A CN 2013100223950 A CN2013100223950 A CN 2013100223950A CN 201310022395 A CN201310022395 A CN 201310022395A CN 103106512 A CN103106512 A CN 103106512A
Authority
CN
China
Prior art keywords
binary
binary system
group
trade mark
counterfeiting information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100223950A
Other languages
Chinese (zh)
Inventor
张立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN2013100223950A priority Critical patent/CN103106512A/en
Publication of CN103106512A publication Critical patent/CN103106512A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Printing Methods (AREA)

Abstract

The invention relates to a multiparameter multivariable ternary encryption anti-fake information storage trademark. The multiparameter multivariable ternary encryption anti-fake information storage trademark can process binary anti-fake information to generate binary modulation signals through ternary encryption and channel coding. The anti-fake information is embedded in a whole trademark page through orderly change of amplitude-modulated dot conductivity with a circular table lookup modulation mode method. The anti-fake information can be identified from any fragment at the time of trademark identification and the multiparameter multivariable ternary encryption anti-fake information storage trademark can be used for all kinds of anti-fake trademarks.

Description

Multiparameter multivariable ternary encryption anti-fake information storage trademark
Art:
The present invention relates to a kind of anti-false trademark, particularly a kind of Multiparameter multivariable ternary encryption anti-fake information storage trademark, binary system encryption anti-fake information can be stored on the trade mark page and realize the false proof of trade mark by the trade mark, the trade mark can be used for extensive stock it is false proof in.
Background technology:
Anti-false trademark, also known as antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, are a kind of proof labels discerned the false from the genuine, prevent personation, are mark true and false, that distinguish marketing quality quality of the people for distinguishing merchandise resources during commodity circulation.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and the interests of client.The trade mark of China is audaciously innovated; employ laser anti-counterfeit, core micropore are false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but false proof is high-tech trial of strength with struggle that is faking; advanced anti-counterfeiting technology has certain ageing again; so; trade mark anti-fake technique must constantly be lifted; could be false proof with being maintained the leading position forever in faking, this is also the basic assurance for protecting the interests of businessman and client to maintain commodity circulation safety.
The content of the invention:
In order to improve the reliability and security of trademark anti-counterfeit, the present invention is improved existing trade mark anti-fake technique for the deficiency that existing trademark anti-counterfeit is present, propose a kind of anti-counterfeiting information storage trade mark, the trade mark passes through the change to amplitude electric conductivity in brand printing, encryption anti-fake information is embedded on the whole trade mark page in binary system coded signal form, encryption anti-fake information can be recognized in any one fragment in brand recognition, therefore with very strong disguised and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information stores trade mark, is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, the image and word on trade mark page paper are made up of amplitude,
According to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, and the horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
The horizontal scanning line being printed on trade mark page paper has N bars, the column scan line being printed on trade mark page paper has M bars, the amplitude being printed on trade mark page paper is divided into N rows M row on trade mark paper, amplitude is neat arranged in arrays on trade mark page paper paper, i is allowed to take 1 to arrive N, j is allowed to take 1 to arrive M, j-th strip column scan line on trade mark page paper is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper, i-th horizontal scanning line on trade mark page paper is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper
When the binary message for needing to store the trade mark page is read, the 1st article on trade mark page paper is set to high level successively to the N articles horizontal scanning line,
When the 1st article of horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported with 0,1 code form from the 1st bar of column scan line to the M bars column scan line, the amplitude that the 1st row on trade mark page paper is printed by electrically conductive ink exports binary message 1, the amplitude that the 1st row on trade mark page paper is printed by dielectric ink exports binary message 0, above-mentioned readout is repeated to other rows on trade mark page paper
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 589871DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as respectively
Figure 569328DEST_PATH_IMAGE002
Figure 349065DEST_PATH_IMAGE003
Figure 806591DEST_PATH_IMAGE004
Figure 568060DEST_PATH_IMAGE006
Figure 897410DEST_PATH_IMAGE007
With
Figure 952140DEST_PATH_IMAGE009
, encryption parameter
Figure 13680DEST_PATH_IMAGE002
Figure 830326DEST_PATH_IMAGE003
Figure 629655DEST_PATH_IMAGE004
Figure 153040DEST_PATH_IMAGE005
Figure 645201DEST_PATH_IMAGE006
Figure 949143DEST_PATH_IMAGE007
Figure 286584DEST_PATH_IMAGE008
With
Figure 992372DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, eight-digit binary number encryption variables are denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 389855DEST_PATH_IMAGE010
Figure 181094DEST_PATH_IMAGE011
Figure 322225DEST_PATH_IMAGE012
Figure 882519DEST_PATH_IMAGE013
Figure 729438DEST_PATH_IMAGE015
Figure 89061DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 93927DEST_PATH_IMAGE010
Figure 611756DEST_PATH_IMAGE011
Figure 629577DEST_PATH_IMAGE013
Figure 805343DEST_PATH_IMAGE014
Figure 792891DEST_PATH_IMAGE015
Figure 79515DEST_PATH_IMAGE016
Figure 203329DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 549997DEST_PATH_IMAGE010
Figure 24841DEST_PATH_IMAGE011
Figure 115156DEST_PATH_IMAGE012
Figure 359056DEST_PATH_IMAGE013
Figure 510869DEST_PATH_IMAGE015
Figure 201613DEST_PATH_IMAGE016
Figure 565598DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 988489DEST_PATH_IMAGE010
Figure 443785DEST_PATH_IMAGE011
Figure 875903DEST_PATH_IMAGE012
Figure 828815DEST_PATH_IMAGE013
Figure 688187DEST_PATH_IMAGE014
Figure 359340DEST_PATH_IMAGE015
Figure 595149DEST_PATH_IMAGE016
Figure 605830DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 636103DEST_PATH_IMAGE010
Figure 794552DEST_PATH_IMAGE011
Figure 697152DEST_PATH_IMAGE014
Figure 342897DEST_PATH_IMAGE015
Figure 654930DEST_PATH_IMAGE016
Figure 764837DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 136912DEST_PATH_IMAGE010
Figure 207637DEST_PATH_IMAGE011
Figure 317501DEST_PATH_IMAGE012
Figure 219598DEST_PATH_IMAGE013
Figure 762575DEST_PATH_IMAGE014
Figure 117333DEST_PATH_IMAGE015
Figure 36747DEST_PATH_IMAGE016
Figure 793350DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 614862DEST_PATH_IMAGE011
Figure 72388DEST_PATH_IMAGE012
Figure 833856DEST_PATH_IMAGE014
Figure 163207DEST_PATH_IMAGE015
Figure 424424DEST_PATH_IMAGE016
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 211300DEST_PATH_IMAGE010
Figure 27946DEST_PATH_IMAGE011
Figure 833134DEST_PATH_IMAGE012
Figure 910998DEST_PATH_IMAGE014
Figure 949361DEST_PATH_IMAGE015
Figure 552381DEST_PATH_IMAGE016
Figure 258168DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 655652DEST_PATH_IMAGE010
Figure 446890DEST_PATH_IMAGE011
Figure 588022DEST_PATH_IMAGE012
Figure 148316DEST_PATH_IMAGE013
Figure 716700DEST_PATH_IMAGE014
Figure 995235DEST_PATH_IMAGE015
Figure 940057DEST_PATH_IMAGE016
Figure 417175DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, ternary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 859975DEST_PATH_IMAGE010
Figure 360487DEST_PATH_IMAGE019
Figure 895373DEST_PATH_IMAGE011
Figure 805560DEST_PATH_IMAGE018
Figure 793108DEST_PATH_IMAGE012
Figure 2013100223950100002DEST_PATH_IMAGE020
Figure 142050DEST_PATH_IMAGE013
Figure 531443DEST_PATH_IMAGE018
Figure 878111DEST_PATH_IMAGE014
Figure 352954DEST_PATH_IMAGE021
Figure 177691DEST_PATH_IMAGE015
Figure DEST_PATH_IMAGE022
Figure 483907DEST_PATH_IMAGE016
Figure 1476DEST_PATH_IMAGE023
Figure 2013100223950100002DEST_PATH_IMAGE024
, ternary cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 654360DEST_PATH_IMAGE019
Figure 758626DEST_PATH_IMAGE010
Figure 447096DEST_PATH_IMAGE018
Figure 896532DEST_PATH_IMAGE011
Figure 63071DEST_PATH_IMAGE025
Figure 281563DEST_PATH_IMAGE012
Figure 140934DEST_PATH_IMAGE018
Figure 812087DEST_PATH_IMAGE013
Figure 2013100223950100002DEST_PATH_IMAGE026
Figure 110213DEST_PATH_IMAGE014
Figure 213484DEST_PATH_IMAGE015
Figure 371933DEST_PATH_IMAGE022
Figure 880275DEST_PATH_IMAGE016
Figure 73359DEST_PATH_IMAGE023
Figure 274533DEST_PATH_IMAGE017
, ternary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 226451DEST_PATH_IMAGE019
Figure 274042DEST_PATH_IMAGE010
Figure 646117DEST_PATH_IMAGE025
Figure 779158DEST_PATH_IMAGE011
Figure 894882DEST_PATH_IMAGE018
Figure 796979DEST_PATH_IMAGE012
Figure 339956DEST_PATH_IMAGE020
Figure 694714DEST_PATH_IMAGE013
Figure 551811DEST_PATH_IMAGE018
Figure 308415DEST_PATH_IMAGE014
Figure 22293DEST_PATH_IMAGE021
Figure 587452DEST_PATH_IMAGE018
Figure 348921DEST_PATH_IMAGE023
Figure 678271DEST_PATH_IMAGE017
Figure 673909DEST_PATH_IMAGE024
, ternary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 410964DEST_PATH_IMAGE019
Figure 732224DEST_PATH_IMAGE010
Figure 283291DEST_PATH_IMAGE025
Figure 348199DEST_PATH_IMAGE011
Figure 933901DEST_PATH_IMAGE020
Figure 160483DEST_PATH_IMAGE012
Figure 464425DEST_PATH_IMAGE018
Figure 67445DEST_PATH_IMAGE013
Figure 507653DEST_PATH_IMAGE026
Figure 170716DEST_PATH_IMAGE014
Figure 696375DEST_PATH_IMAGE018
Figure 103086DEST_PATH_IMAGE015
Figure 663380DEST_PATH_IMAGE022
Figure 231765DEST_PATH_IMAGE016
Figure 510299DEST_PATH_IMAGE018
Figure 455122DEST_PATH_IMAGE017
Figure 762317DEST_PATH_IMAGE024
, ternary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 501603DEST_PATH_IMAGE019
Figure 1855DEST_PATH_IMAGE010
Figure 750368DEST_PATH_IMAGE025
Figure 19675DEST_PATH_IMAGE011
Figure 195442DEST_PATH_IMAGE020
Figure 120672DEST_PATH_IMAGE012
Figure 407297DEST_PATH_IMAGE026
Figure 352622DEST_PATH_IMAGE014
Figure 442938DEST_PATH_IMAGE021
Figure 749155DEST_PATH_IMAGE015
Figure 204407DEST_PATH_IMAGE018
Figure 166546DEST_PATH_IMAGE016
Figure 794974DEST_PATH_IMAGE023
Figure 899239DEST_PATH_IMAGE017
, ternary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 771566DEST_PATH_IMAGE018
Figure 203685DEST_PATH_IMAGE010
Figure 281548DEST_PATH_IMAGE011
Figure 922931DEST_PATH_IMAGE012
Figure 995929DEST_PATH_IMAGE026
Figure 184651DEST_PATH_IMAGE021
Figure 958572DEST_PATH_IMAGE014
Figure 151656DEST_PATH_IMAGE018
Figure 352830DEST_PATH_IMAGE015
Figure 732996DEST_PATH_IMAGE027
Figure 310607DEST_PATH_IMAGE016
Figure 724414DEST_PATH_IMAGE017
Figure 591876DEST_PATH_IMAGE024
, ternary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 707599DEST_PATH_IMAGE019
Figure 609696DEST_PATH_IMAGE010
Figure 710693DEST_PATH_IMAGE011
Figure 386711DEST_PATH_IMAGE012
Figure 100589DEST_PATH_IMAGE026
Figure 400170DEST_PATH_IMAGE021
Figure 276859DEST_PATH_IMAGE014
Figure 689888DEST_PATH_IMAGE018
Figure 421084DEST_PATH_IMAGE016
Figure 476765DEST_PATH_IMAGE023
Figure 299270DEST_PATH_IMAGE017
Figure 364178DEST_PATH_IMAGE018
, ternary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 199148DEST_PATH_IMAGE018
Figure 425730DEST_PATH_IMAGE010
Figure 729672DEST_PATH_IMAGE025
Figure 332692DEST_PATH_IMAGE011
Figure 164380DEST_PATH_IMAGE018
Figure 827443DEST_PATH_IMAGE012
Figure 290785DEST_PATH_IMAGE026
Figure 697496DEST_PATH_IMAGE013
Figure 826175DEST_PATH_IMAGE014
Figure 839130DEST_PATH_IMAGE022
Figure 783952DEST_PATH_IMAGE015
Figure 198753DEST_PATH_IMAGE023
Figure 203618DEST_PATH_IMAGE016
Figure 703870DEST_PATH_IMAGE018
, set encryption parameter
Figure 897457DEST_PATH_IMAGE002
Figure 822687DEST_PATH_IMAGE003
Figure 109312DEST_PATH_IMAGE004
Figure 498705DEST_PATH_IMAGE005
Figure 579794DEST_PATH_IMAGE006
Figure 60497DEST_PATH_IMAGE007
Figure 150812DEST_PATH_IMAGE008
With
Figure 394712DEST_PATH_IMAGE009
Initial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesPosition control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is rightCarry out H1=
Figure 608841DEST_PATH_IMAGE029
Figure 237269DEST_PATH_IMAGE010
Figure 601254DEST_PATH_IMAGE019
Figure 289724DEST_PATH_IMAGE011
Figure 411264DEST_PATH_IMAGE029
Figure 61874DEST_PATH_IMAGE020
Figure 921246DEST_PATH_IMAGE013
Figure 272025DEST_PATH_IMAGE029
Figure 366889DEST_PATH_IMAGE014
Figure 564521DEST_PATH_IMAGE021
Figure 594794DEST_PATH_IMAGE015
Figure 382271DEST_PATH_IMAGE022
Figure 156192DEST_PATH_IMAGE016
Figure 36028DEST_PATH_IMAGE023
Figure 174886DEST_PATH_IMAGE017
Figure 945264DEST_PATH_IMAGE024
Ternary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 522876DEST_PATH_IMAGE028
Carry out H1=
Figure 304887DEST_PATH_IMAGE029
Figure 676963DEST_PATH_IMAGE010
Figure 747687DEST_PATH_IMAGE019
Figure 869270DEST_PATH_IMAGE011
Figure 771367DEST_PATH_IMAGE029
Figure 314344DEST_PATH_IMAGE012
Figure 594387DEST_PATH_IMAGE029
Figure 573845DEST_PATH_IMAGE014
Figure 415899DEST_PATH_IMAGE021
Figure 116833DEST_PATH_IMAGE015
Figure 993522DEST_PATH_IMAGE022
Figure 207652DEST_PATH_IMAGE023
Figure 531186DEST_PATH_IMAGE017
Figure 262381DEST_PATH_IMAGE024
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while ternary cryptographic calculation, next ternary cryptographic calculation is pointed to H2=
Figure 134708DEST_PATH_IMAGE010
Figure 2013100223950100002DEST_PATH_IMAGE030
Figure 582056DEST_PATH_IMAGE025
Figure 74217DEST_PATH_IMAGE012
Figure 315843DEST_PATH_IMAGE030
Figure 653283DEST_PATH_IMAGE013
Figure 359071DEST_PATH_IMAGE026
Figure 756554DEST_PATH_IMAGE014
Figure 553652DEST_PATH_IMAGE030
Figure 255078DEST_PATH_IMAGE022
Figure 89042DEST_PATH_IMAGE016
Figure 101997DEST_PATH_IMAGE023
Figure 984502DEST_PATH_IMAGE017
Figure 399303DEST_PATH_IMAGE024
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 404168DEST_PATH_IMAGE031
Carry out H2=
Figure 904420DEST_PATH_IMAGE019
Figure 387354DEST_PATH_IMAGE010
Figure 922240DEST_PATH_IMAGE030
Figure 23237DEST_PATH_IMAGE025
Figure 309862DEST_PATH_IMAGE012
Figure 433676DEST_PATH_IMAGE030
Figure 780344DEST_PATH_IMAGE013
Figure 255187DEST_PATH_IMAGE026
Figure 283186DEST_PATH_IMAGE014
Figure 606981DEST_PATH_IMAGE030
Figure 858971DEST_PATH_IMAGE015
Figure 883427DEST_PATH_IMAGE022
Figure 511855DEST_PATH_IMAGE016
Figure 813523DEST_PATH_IMAGE023
Figure 236414DEST_PATH_IMAGE017
Figure 685850DEST_PATH_IMAGE024
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while ternary cryptographic calculation, next ternary cryptographic calculation is pointed to H3=
Figure 117968DEST_PATH_IMAGE019
Figure 70881DEST_PATH_IMAGE010
Figure 930252DEST_PATH_IMAGE025
Figure 601405DEST_PATH_IMAGE011
Figure 2013100223950100002DEST_PATH_IMAGE032
Figure 837214DEST_PATH_IMAGE012
Figure 910213DEST_PATH_IMAGE020
Figure 98934DEST_PATH_IMAGE032
Figure 872855DEST_PATH_IMAGE014
Figure 806220DEST_PATH_IMAGE021
Figure 7394DEST_PATH_IMAGE015
Figure 653139DEST_PATH_IMAGE032
Figure 902854DEST_PATH_IMAGE016
Figure 950445DEST_PATH_IMAGE023
Figure 322520DEST_PATH_IMAGE017
Figure 455561DEST_PATH_IMAGE024
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this ternary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 571285DEST_PATH_IMAGE001
Carry out ternary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, valid certificates can be provided for true trade mark, there is stronger anti-forgery ability simultaneously.
To solve above-mentioned technical problem, processing is digitized to image false-proof information and character anti-counterfeiting information first, the binary system anti-counterfeiting information table of 8 one group of generation, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, ternary cryptographic calculation is carried out to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables, the binary system encryption anti-fake information table of 32 one group of generation, pass through channel coding using 32 binary system encryption anti-fake informations in binary system encryption anti-fake information table, 32 one group of binary modulated signal of the generation with error detecting and error correcting function, channel coding can use loop coding, convolutional encoding or Turbo coding diversified forms, picture signal is adjusted to be handled by rasterizing trade mark page original continuous(RIP)Halftoning hybrid screening picture signal is exported with hybrid screening, including amplitude and FM screened image signal, the electric conductivity of amplitude in hybrid screening picture signal is modulated using circulation look-up table modulation system using 32 one group of binary modulated signals of generation, make the electric conductivity of amplitude according to dielectric ink amplitude and electrically conductive ink amplitude is regular changes, adjacent 32 amplitudes in hybrid screening picture signal are made to carry 32 binary system anti-counterfeiting information by the change of electric conductivity, so as to generate the hybrid screening picture signal of the embedded anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, trade mark page site electric conductivity signal is gathered first, by the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding, decrypts i-th group of 32 binary message in anti-counterfeiting information table by binary system and is denoted as Mi
Binary system is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, set encryption parameter
Figure 16359DEST_PATH_IMAGE003
Figure 308800DEST_PATH_IMAGE004
Figure 228214DEST_PATH_IMAGE005
Figure 984818DEST_PATH_IMAGE006
Figure 698696DEST_PATH_IMAGE007
Figure 806329DEST_PATH_IMAGE008
With
Figure 263855DEST_PATH_IMAGE009
Initial value for encryption when initial value, initial value when setting encryption variables j, d, e, f, g, h, r, p and q initial value as encryption, it is k=0 that binary operator, which controls variable k initial value design, by ternary ciphering process, and it is M that binary operator, which controls decryption computing during variable k=0,i=
Figure 874965DEST_PATH_IMAGE018
Figure 25324DEST_PATH_IMAGE010
Figure 348815DEST_PATH_IMAGE019
Figure 547715DEST_PATH_IMAGE011
Figure 13331DEST_PATH_IMAGE018
Figure 334591DEST_PATH_IMAGE012
Figure 151237DEST_PATH_IMAGE020
Figure 950566DEST_PATH_IMAGE013
Figure 536268DEST_PATH_IMAGE018
Figure 966112DEST_PATH_IMAGE014
Figure 607495DEST_PATH_IMAGE015
Figure 313283DEST_PATH_IMAGE022
Figure 710766DEST_PATH_IMAGE016
Figure 502005DEST_PATH_IMAGE023
Figure 643136DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=1,i=
Figure 771815DEST_PATH_IMAGE019
Figure 988033DEST_PATH_IMAGE010
Figure 932855DEST_PATH_IMAGE018
Figure 347656DEST_PATH_IMAGE011
Figure 358380DEST_PATH_IMAGE025
Figure 858632DEST_PATH_IMAGE012
Figure 341566DEST_PATH_IMAGE018
Figure 876452DEST_PATH_IMAGE013
Figure 222858DEST_PATH_IMAGE026
Figure 210405DEST_PATH_IMAGE014
Figure 826193DEST_PATH_IMAGE018
Figure 215586DEST_PATH_IMAGE015
Figure 562254DEST_PATH_IMAGE022
Figure 37097DEST_PATH_IMAGE016
Figure 861834DEST_PATH_IMAGE023
Figure 43416DEST_PATH_IMAGE017
Figure 560985DEST_PATH_IMAGE024
, it is M that binary operator, which controls decryption computing during variable k=2,i=
Figure 523125DEST_PATH_IMAGE019
Figure 151553DEST_PATH_IMAGE010
Figure 249959DEST_PATH_IMAGE025
Figure 387865DEST_PATH_IMAGE018
Figure 492087DEST_PATH_IMAGE012
Figure 710579DEST_PATH_IMAGE020
Figure 482772DEST_PATH_IMAGE014
Figure 555770DEST_PATH_IMAGE021
Figure 586043DEST_PATH_IMAGE015
Figure 744492DEST_PATH_IMAGE018
Figure 252834DEST_PATH_IMAGE016
Figure 445918DEST_PATH_IMAGE023
Figure 647092DEST_PATH_IMAGE017
Figure 292837DEST_PATH_IMAGE024
, it is M that binary operator, which controls decryption computing during variable k=3,i=
Figure 590143DEST_PATH_IMAGE010
Figure 95259DEST_PATH_IMAGE011
Figure 113080DEST_PATH_IMAGE012
Figure 656057DEST_PATH_IMAGE018
Figure 948498DEST_PATH_IMAGE013
Figure 624516DEST_PATH_IMAGE014
Figure 332534DEST_PATH_IMAGE018
Figure 440168DEST_PATH_IMAGE015
Figure 897694DEST_PATH_IMAGE022
Figure 508804DEST_PATH_IMAGE016
Figure 659162DEST_PATH_IMAGE018
Figure 926196DEST_PATH_IMAGE017
Figure 921834DEST_PATH_IMAGE024
, it is M that binary operator, which controls decryption computing during variable k=4,i=
Figure 653029DEST_PATH_IMAGE019
Figure 974289DEST_PATH_IMAGE010
Figure 590264DEST_PATH_IMAGE011
Figure 175966DEST_PATH_IMAGE020
Figure 402548DEST_PATH_IMAGE012
Figure 644174DEST_PATH_IMAGE026
Figure 247193DEST_PATH_IMAGE013
Figure 687402DEST_PATH_IMAGE018
Figure 350464DEST_PATH_IMAGE014
Figure 876124DEST_PATH_IMAGE021
Figure 288694DEST_PATH_IMAGE015
Figure 848988DEST_PATH_IMAGE018
Figure 369704DEST_PATH_IMAGE016
Figure 648239DEST_PATH_IMAGE023
Figure 593061DEST_PATH_IMAGE017
Figure 945545DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=5,i=
Figure 684831DEST_PATH_IMAGE018
Figure 185082DEST_PATH_IMAGE010
Figure 933595DEST_PATH_IMAGE025
Figure 202903DEST_PATH_IMAGE011
Figure 378669DEST_PATH_IMAGE020
Figure 303900DEST_PATH_IMAGE012
Figure 590525DEST_PATH_IMAGE026
Figure 979918DEST_PATH_IMAGE013
Figure 326585DEST_PATH_IMAGE021
Figure 535850DEST_PATH_IMAGE014
Figure 626166DEST_PATH_IMAGE018
Figure 870065DEST_PATH_IMAGE015
Figure 387634DEST_PATH_IMAGE027
Figure 355633DEST_PATH_IMAGE016
Figure 921744DEST_PATH_IMAGE018
Figure 20150DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=6,i=
Figure 892477DEST_PATH_IMAGE019
Figure 324595DEST_PATH_IMAGE010
Figure 543087DEST_PATH_IMAGE018
Figure 402459DEST_PATH_IMAGE011
Figure 981524DEST_PATH_IMAGE012
Figure 54523DEST_PATH_IMAGE026
Figure 147112DEST_PATH_IMAGE013
Figure 305561DEST_PATH_IMAGE021
Figure 17165DEST_PATH_IMAGE014
Figure 210249DEST_PATH_IMAGE022
Figure 411424DEST_PATH_IMAGE015
Figure 791589DEST_PATH_IMAGE018
Figure 369201DEST_PATH_IMAGE016
Figure 410932DEST_PATH_IMAGE023
, it is M that binary operator, which controls decryption computing during variable k=7,i=
Figure 703876DEST_PATH_IMAGE018
Figure 605973DEST_PATH_IMAGE010
Figure 423122DEST_PATH_IMAGE018
Figure 382988DEST_PATH_IMAGE012
Figure 159183DEST_PATH_IMAGE026
Figure 1237DEST_PATH_IMAGE013
Figure 458763DEST_PATH_IMAGE021
Figure 335452DEST_PATH_IMAGE014
Figure 220232DEST_PATH_IMAGE022
Figure 479678DEST_PATH_IMAGE016
Figure 535359DEST_PATH_IMAGE018
Figure 357864DEST_PATH_IMAGE017
Figure 422772DEST_PATH_IMAGE024
, first M from binary system decryption anti-counterfeiting information table1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiCorresponding decryption computing is carried out, binary system anti-counterfeiting information is solved
Figure 8474DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 is the overall structure figure of the present invention.
Fig. 2 is A-A sectional views of the present invention.
Fig. 3 loads anti-counterfeiting information flow chart.
Fig. 4 extracts anti-counterfeiting information flow chart.
Embodiment
As in Fig. 1 and Fig. 2, anti-fake information storage trademark, it is made up of trade mark page paper 7-1, amplitude 6-1 to the 6-150 being printed on trade mark page paper 7-1, horizontal scanning line 1-1 to the 1-15 being printed on trade mark page paper 7-1, column scan line 2-1 to the 2-10 being printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 are made up of amplitude 6-1 to 6-150
According to storage binary system encryption anti-fake information, a part of amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, another part amplitude on trade mark page paper 7-1 is formed by dielectric ink printing, horizontal scanning line 1-1 to 1-15 and column scan line 2-1 to 2-10 on trade mark page paper 7-1 are formed by the printing of electrically conducting transparent ink
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, and the light amplitude on trade mark page paper 7-1 is formed by dielectric ink printing,
The amplitude being printed on trade mark page paper 7-1 is divided into 15 rows 10 on trade mark paper and arranged, amplitude 6-1 to 6-150 is neat arranged in arrays on trade mark page paper 7-1, i is allowed to take 1 to 15, j is allowed to take 1 to 10, j-th strip column scan line on trade mark page paper 7-1 is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper 7-1, i-th horizontal scanning line on trade mark page paper 7-1 is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper 7-1
When the binary system encryption anti-fake information for needing to store the trade mark page is read, the 1st article of horizontal scanning line on trade mark page paper 7-1 is set to high level successively to the 15th article of horizontal scanning line,
When the 1st article of horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary system encryption anti-fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is exported from the 1st bar of column scan line to the 10th bar of column scan line, the 1st row on trade mark page paper 7-1 exports binary message 1 by electrically conductive ink printing into amplitude, the 1st row on trade mark page paper 7-1 exports binary message 0 by dielectric ink printing into amplitude, therefore the binary system encryption anti-fake information 1100001000 that the 1st row is read, above-mentioned readout is repeated to other rows on trade mark page paper 7-1.
In loading anti-counterfeiting information flow chart 3, original anti-counterfeiting information(Image, word)It is digitized into processing, the binary system anti-counterfeiting information table of 8 one group of generation, 8 one group of binary messages in binary system anti-counterfeiting information table are expanded into 32 one group of binary messages, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary message in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 125071DEST_PATH_IMAGE001
, i is the positive integer more than 0, from first 32 binary system encryption anti-fake information in 32 one group of binary system anti-counterfeiting information tables
Figure 366696DEST_PATH_IMAGE028
Start, to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 969716DEST_PATH_IMAGE001
Carry out ternary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize that trademark anti-counterfeit prints, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, realize trademark anti-counterfeit.
In anti-counterfeiting information flow chart 4 is extracted, when extracting anti-counterfeiting information, the electric conductivity signal of trade mark page halftone dot image is gathered first, by the electric conductivity identification to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding.
The binary system generated after decoding is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting the initial value of encryption parameter as encryption, initial value when setting the initial value of encryption variables as encryption, it is k=0 that binary operator, which controls variable k initial value design, first M from the binary system decryption anti-counterfeiting information table of generation1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiComputing is decrypted, binary system anti-counterfeiting information is solved
Figure 409925DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.

Claims (1)

1. a kind of generate binary modulated signal by anti-counterfeiting information by cryptographic calculation and channel coding, and by circulating the Multiparameter multivariable ternary encryption anti-fake information storage trademark that anti-counterfeiting information is embedded in full page by tabling look-up modulation mode,It is characterized in that:Anti-counterfeiting information stores trade mark, it is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, according to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as respectively
Figure 379326DEST_PATH_IMAGE002
Figure 221380DEST_PATH_IMAGE003
Figure 678906DEST_PATH_IMAGE004
Figure 555595DEST_PATH_IMAGE005
Figure 440374DEST_PATH_IMAGE006
Figure 775584DEST_PATH_IMAGE007
Figure 36801DEST_PATH_IMAGE008
With
Figure 767996DEST_PATH_IMAGE009
, encryption parameter
Figure 823677DEST_PATH_IMAGE002
Figure 640323DEST_PATH_IMAGE003
Figure 439652DEST_PATH_IMAGE004
Figure 25354DEST_PATH_IMAGE005
Figure 517516DEST_PATH_IMAGE006
Figure 821458DEST_PATH_IMAGE007
Figure 158898DEST_PATH_IMAGE008
With
Figure 864686DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, eight-digit binary number encryption variables are denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 262169DEST_PATH_IMAGE010
Figure 53408DEST_PATH_IMAGE011
Figure 754834DEST_PATH_IMAGE013
Figure 588797DEST_PATH_IMAGE014
Figure 595893DEST_PATH_IMAGE015
Figure 540716DEST_PATH_IMAGE016
Figure 955517DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 960382DEST_PATH_IMAGE010
Figure 943567DEST_PATH_IMAGE012
Figure 654220DEST_PATH_IMAGE014
Figure 641768DEST_PATH_IMAGE015
Figure 928392DEST_PATH_IMAGE016
Figure 52206DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 398874DEST_PATH_IMAGE010
Figure 811401DEST_PATH_IMAGE011
Figure 901716DEST_PATH_IMAGE012
Figure 145616DEST_PATH_IMAGE013
Figure 459923DEST_PATH_IMAGE014
Figure 552556DEST_PATH_IMAGE015
Figure 180983DEST_PATH_IMAGE016
Figure 544968DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 967859DEST_PATH_IMAGE010
Figure 417295DEST_PATH_IMAGE011
Figure 849414DEST_PATH_IMAGE012
Figure 802326DEST_PATH_IMAGE013
Figure 661698DEST_PATH_IMAGE014
Figure 568660DEST_PATH_IMAGE016
Figure 641658DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 671931DEST_PATH_IMAGE010
Figure 830380DEST_PATH_IMAGE011
Figure 541984DEST_PATH_IMAGE012
Figure 469489DEST_PATH_IMAGE013
Figure 500741DEST_PATH_IMAGE014
Figure 146486DEST_PATH_IMAGE015
Figure 458519DEST_PATH_IMAGE016
Figure 506109DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 878184DEST_PATH_IMAGE010
Figure 11226DEST_PATH_IMAGE011
Figure 29046DEST_PATH_IMAGE013
Figure 926781DEST_PATH_IMAGE015
Figure 846195DEST_PATH_IMAGE016
Figure 602799DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 424310DEST_PATH_IMAGE011
Figure 881836DEST_PATH_IMAGE012
Figure 492946DEST_PATH_IMAGE013
Figure 649164DEST_PATH_IMAGE014
Figure 978514DEST_PATH_IMAGE015
Figure 239731DEST_PATH_IMAGE016
Figure 705348DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 26608DEST_PATH_IMAGE010
Figure 843254DEST_PATH_IMAGE011
Figure 228285DEST_PATH_IMAGE013
Figure 720446DEST_PATH_IMAGE014
Figure 758809DEST_PATH_IMAGE015
Figure 361829DEST_PATH_IMAGE016
Figure 67617DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 465100DEST_PATH_IMAGE010
Figure 256338DEST_PATH_IMAGE011
Figure 397470DEST_PATH_IMAGE012
Figure 957764DEST_PATH_IMAGE013
Figure 520289DEST_PATH_IMAGE014
Figure 798824DEST_PATH_IMAGE015
Figure 743646DEST_PATH_IMAGE016
Figure 158447DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, ternary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 163312DEST_PATH_IMAGE018
Figure 601247DEST_PATH_IMAGE010
Figure 529254DEST_PATH_IMAGE018
Figure 516802DEST_PATH_IMAGE012
Figure 130503DEST_PATH_IMAGE013
Figure 776751DEST_PATH_IMAGE021
Figure 20650DEST_PATH_IMAGE015
Figure 538219DEST_PATH_IMAGE022
Figure 500359DEST_PATH_IMAGE016
Figure 134646DEST_PATH_IMAGE023
Figure DEST_PATH_IMAGE024
, ternary cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 983839DEST_PATH_IMAGE019
Figure 370958DEST_PATH_IMAGE010
Figure 36032DEST_PATH_IMAGE018
Figure 316841DEST_PATH_IMAGE011
Figure 256108DEST_PATH_IMAGE012
Figure 163070DEST_PATH_IMAGE013
Figure 298385DEST_PATH_IMAGE014
Figure 266341DEST_PATH_IMAGE018
Figure 424790DEST_PATH_IMAGE015
Figure 933131DEST_PATH_IMAGE022
Figure 126215DEST_PATH_IMAGE016
Figure 327390DEST_PATH_IMAGE023
Figure 973135DEST_PATH_IMAGE017
Figure 285167DEST_PATH_IMAGE024
, ternary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 332758DEST_PATH_IMAGE019
Figure 837874DEST_PATH_IMAGE025
Figure 793378DEST_PATH_IMAGE018
Figure 336355DEST_PATH_IMAGE012
Figure 696972DEST_PATH_IMAGE020
Figure 372990DEST_PATH_IMAGE018
Figure 24551DEST_PATH_IMAGE014
Figure 194501DEST_PATH_IMAGE021
Figure 652027DEST_PATH_IMAGE015
Figure 263137DEST_PATH_IMAGE018
Figure 413496DEST_PATH_IMAGE016
Figure 738484DEST_PATH_IMAGE017
, ternary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 728623DEST_PATH_IMAGE019
Figure 344598DEST_PATH_IMAGE025
Figure 156882DEST_PATH_IMAGE020
Figure 398507DEST_PATH_IMAGE012
Figure 98939DEST_PATH_IMAGE026
Figure 31308DEST_PATH_IMAGE018
Figure 591603DEST_PATH_IMAGE015
Figure 159987DEST_PATH_IMAGE022
Figure 438522DEST_PATH_IMAGE016
Figure 321027DEST_PATH_IMAGE018
Figure 735828DEST_PATH_IMAGE017
Figure 475114DEST_PATH_IMAGE024
, ternary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 993186DEST_PATH_IMAGE025
Figure 168952DEST_PATH_IMAGE011
Figure 94183DEST_PATH_IMAGE020
Figure 380808DEST_PATH_IMAGE012
Figure 770201DEST_PATH_IMAGE026
Figure 116869DEST_PATH_IMAGE013
Figure 331992DEST_PATH_IMAGE018
Figure 422308DEST_PATH_IMAGE014
Figure 666208DEST_PATH_IMAGE021
Figure 183777DEST_PATH_IMAGE015
Figure 145917DEST_PATH_IMAGE018
Figure 712027DEST_PATH_IMAGE016
Figure 810433DEST_PATH_IMAGE023
Figure 498903DEST_PATH_IMAGE017
Figure 682760DEST_PATH_IMAGE018
, ternary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 114878DEST_PATH_IMAGE018
Figure 333370DEST_PATH_IMAGE010
Figure 801578DEST_PATH_IMAGE011
Figure 771808DEST_PATH_IMAGE020
Figure 875079DEST_PATH_IMAGE026
Figure 807449DEST_PATH_IMAGE021
Figure 18111DEST_PATH_IMAGE014
Figure 219285DEST_PATH_IMAGE018
Figure 599451DEST_PATH_IMAGE015
Figure DEST_PATH_IMAGE027
Figure 239379DEST_PATH_IMAGE016
Figure 224653DEST_PATH_IMAGE018
Figure 596728DEST_PATH_IMAGE017
Figure 464190DEST_PATH_IMAGE024
, ternary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 579914DEST_PATH_IMAGE019
Figure 482011DEST_PATH_IMAGE010
Figure 24988DEST_PATH_IMAGE018
Figure 583008DEST_PATH_IMAGE011
Figure 236843DEST_PATH_IMAGE020
Figure 972904DEST_PATH_IMAGE026
Figure 814958DEST_PATH_IMAGE013
Figure 272484DEST_PATH_IMAGE021
Figure 149173DEST_PATH_IMAGE014
Figure 39812DEST_PATH_IMAGE022
Figure 369162DEST_PATH_IMAGE015
Figure 568062DEST_PATH_IMAGE018
Figure 299258DEST_PATH_IMAGE016
Figure 354939DEST_PATH_IMAGE023
, ternary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 822195DEST_PATH_IMAGE018
Figure 290402DEST_PATH_IMAGE025
Figure 893422DEST_PATH_IMAGE011
Figure 333631DEST_PATH_IMAGE018
Figure 996693DEST_PATH_IMAGE012
Figure 522353DEST_PATH_IMAGE026
Figure 929063DEST_PATH_IMAGE013
Figure 223778DEST_PATH_IMAGE021
Figure 57742DEST_PATH_IMAGE014
Figure 953203DEST_PATH_IMAGE015
Figure 367009DEST_PATH_IMAGE016
Figure 867261DEST_PATH_IMAGE018
Figure 615774DEST_PATH_IMAGE017
Figure 885081DEST_PATH_IMAGE024
, set encryption parameter
Figure 998531DEST_PATH_IMAGE002
Figure 986078DEST_PATH_IMAGE003
Figure 272703DEST_PATH_IMAGE004
Figure 662096DEST_PATH_IMAGE005
Figure 743185DEST_PATH_IMAGE006
Figure 218028DEST_PATH_IMAGE007
Figure 308344DEST_PATH_IMAGE008
With
Figure 552244DEST_PATH_IMAGE009
Initial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 7496DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure DEST_PATH_IMAGE028
Carry out H1=
Figure DEST_PATH_IMAGE029
Figure 828690DEST_PATH_IMAGE010
Figure 457118DEST_PATH_IMAGE019
Figure 826962DEST_PATH_IMAGE011
Figure 515432DEST_PATH_IMAGE029
Figure 699289DEST_PATH_IMAGE012
Figure 21422DEST_PATH_IMAGE020
Figure 239914DEST_PATH_IMAGE013
Figure 99285DEST_PATH_IMAGE029
Figure 740668DEST_PATH_IMAGE021
Figure 813667DEST_PATH_IMAGE015
Figure 781623DEST_PATH_IMAGE022
Figure 713992DEST_PATH_IMAGE023
Figure 641497DEST_PATH_IMAGE017
Ternary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is rightCarry out H1=
Figure 157798DEST_PATH_IMAGE019
Figure 290839DEST_PATH_IMAGE011
Figure 406563DEST_PATH_IMAGE029
Figure 857496DEST_PATH_IMAGE020
Figure 415516DEST_PATH_IMAGE013
Figure 131668DEST_PATH_IMAGE029
Figure 950588DEST_PATH_IMAGE014
Figure 867729DEST_PATH_IMAGE021
Figure 709783DEST_PATH_IMAGE015
Figure 229626DEST_PATH_IMAGE022
Figure 106315DEST_PATH_IMAGE016
Figure 928778DEST_PATH_IMAGE023
Figure 258128DEST_PATH_IMAGE017
Figure 581662DEST_PATH_IMAGE024
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while ternary cryptographic calculation, next ternary cryptographic calculation is pointed to H2=
Figure 250540DEST_PATH_IMAGE019
Figure 368538DEST_PATH_IMAGE010
Figure DEST_PATH_IMAGE030
Figure 553226DEST_PATH_IMAGE011
Figure 290238DEST_PATH_IMAGE025
Figure 875940DEST_PATH_IMAGE012
Figure 368101DEST_PATH_IMAGE030
Figure 796678DEST_PATH_IMAGE013
Figure 839906DEST_PATH_IMAGE014
Figure 237389DEST_PATH_IMAGE030
Figure 90945DEST_PATH_IMAGE015
Figure 169759DEST_PATH_IMAGE022
Figure 735913DEST_PATH_IMAGE016
Figure 569877DEST_PATH_IMAGE023
Figure 143684DEST_PATH_IMAGE017
Figure 88506DEST_PATH_IMAGE024
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure DEST_PATH_IMAGE031
Carry out H2=
Figure 565624DEST_PATH_IMAGE019
Figure 570489DEST_PATH_IMAGE010
Figure 88319DEST_PATH_IMAGE030
Figure 571253DEST_PATH_IMAGE011
Figure 106139DEST_PATH_IMAGE025
Figure 344222DEST_PATH_IMAGE012
Figure 618395DEST_PATH_IMAGE013
Figure 151193DEST_PATH_IMAGE014
Figure 563720DEST_PATH_IMAGE030
Figure 897935DEST_PATH_IMAGE022
Figure 336876DEST_PATH_IMAGE016
Figure 933302DEST_PATH_IMAGE017
Figure 297288DEST_PATH_IMAGE024
I+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1, q+1 and k+1 computing are carried out while ternary cryptographic calculation, next ternary cryptographic calculation is pointed to H3=
Figure 720179DEST_PATH_IMAGE019
Figure 169615DEST_PATH_IMAGE010
Figure 539416DEST_PATH_IMAGE025
Figure DEST_PATH_IMAGE032
Figure 414017DEST_PATH_IMAGE012
Figure 393977DEST_PATH_IMAGE032
Figure 424250DEST_PATH_IMAGE014
Figure 582699DEST_PATH_IMAGE021
Figure 294303DEST_PATH_IMAGE015
Figure 221808DEST_PATH_IMAGE032
Figure 422982DEST_PATH_IMAGE016
Figure 68727DEST_PATH_IMAGE023
Figure 499534DEST_PATH_IMAGE017
Figure 858709DEST_PATH_IMAGE024
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this ternary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 355418DEST_PATH_IMAGE001
Carry out ternary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN2013100223950A 2013-01-22 2013-01-22 Multiparameter multivariable ternary encryption anti-fake information storage trademark Pending CN103106512A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100223950A CN103106512A (en) 2013-01-22 2013-01-22 Multiparameter multivariable ternary encryption anti-fake information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100223950A CN103106512A (en) 2013-01-22 2013-01-22 Multiparameter multivariable ternary encryption anti-fake information storage trademark

Publications (1)

Publication Number Publication Date
CN103106512A true CN103106512A (en) 2013-05-15

Family

ID=48314358

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100223950A Pending CN103106512A (en) 2013-01-22 2013-01-22 Multiparameter multivariable ternary encryption anti-fake information storage trademark

Country Status (1)

Country Link
CN (1) CN103106512A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101295343A (en) * 2008-06-19 2008-10-29 福建鸿博印刷股份有限公司 Two-dimensional code multi-enciphering anti-fake printing method
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101295343A (en) * 2008-06-19 2008-10-29 福建鸿博印刷股份有限公司 Two-dimensional code multi-enciphering anti-fake printing method
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯登国等: "《密码学导引》", 30 April 1999, article "2.AES候选算法简介", pages: 271-273 *

Similar Documents

Publication Publication Date Title
CN103106442A (en) Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106460A (en) Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark
CN103106513A (en) Multi-parameter univariate poly encryption anti-fake information storage trademark
CN103106512A (en) Multiparameter multivariable ternary encryption anti-fake information storage trademark
CN103106439A (en) Multiparameter multivariable binary encryption anti-fake information storage trademark
CN103106459A (en) Multiparameter transmutation multivariable cycle multielement encryption anti-fake information storage trademark
CN103106438A (en) Parameter-gradient multivariable multi-encryption anti-fake information storage trademark
CN103106449A (en) Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103116788A (en) Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark
CN103106450A (en) Single parameter multivariable unitary circulation encryption anti-counterfeiting information storage trademark
CN103106451A (en) Multi-variable-parameter gradient ternary-variant circulating encryption anti-fake information storage brand
CN103106457A (en) Single parameter ternary circulation encryption anti-counterfeiting information storage trademark
CN103116796A (en) One-parameter variation transmutation unary encryption anti-fake information storage trademark
CN103106517A (en) Parameter transmutation ternary encryption anti-fake information storage trademark
CN103106440A (en) Multi-parameter unitary encryption anti-fake information storage brand
CN103106447A (en) Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark
CN103106453A (en) Multi-parameter ternary variant circulating encryption anti-fake information storage brand
CN103106429A (en) Single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark
CN103116797A (en) Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark
CN103106448A (en) Single variable parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103116790A (en) Parameter transmutation binary encryption anti-fake information storage trademark
CN103106518A (en) Parameter transmutation one-element encryption anti-fake information storage trademark
CN103106441A (en) Multi-variable-parameter gradient multi-variant encryption anti-fake information storage brand
CN103136565A (en) Multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand
CN103136567A (en) One-parameter variable gradient binary encryption anti-fake information storage brand

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130515