CN103116796A - One-parameter variation transmutation unary encryption anti-fake information storage trademark - Google Patents

One-parameter variation transmutation unary encryption anti-fake information storage trademark Download PDF

Info

Publication number
CN103116796A
CN103116796A CN2013100235835A CN201310023583A CN103116796A CN 103116796 A CN103116796 A CN 103116796A CN 2013100235835 A CN2013100235835 A CN 2013100235835A CN 201310023583 A CN201310023583 A CN 201310023583A CN 103116796 A CN103116796 A CN 103116796A
Authority
CN
China
Prior art keywords
binary
binary system
group
trade mark
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100235835A
Other languages
Chinese (zh)
Inventor
张明鸣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN2013100235835A priority Critical patent/CN103116796A/en
Publication of CN103116796A publication Critical patent/CN103116796A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Printing Methods (AREA)

Abstract

The invention discloses a one-parameter variation transmutation unary encryption anti-fake information storage trademark. By the adoption of the trademark, binary system anti-fake information can produce a binary system modulating signal through a unary encryption and channel coding, and through a circulation look-up table modulation mode, the anti-fake information is inserted in a whole trademark page by changing the conductivity of an amplitude modulation dot in order. The anti-fake information can be recognized from any fragment when the trademark is recognized. The one-parameter variation transmutation unary encryption anti-fake information storage trademark can be used in every kind of trademarks.

Description

One-parameter variation transmutation unary encryption anti-fake information storage trademark
Art:
The present invention relates to a kind of anti-false trademark, particularly a kind of One-parameter variation transmutation unary encryption anti-fake information storage trademark, binary system encryption anti-fake information can be stored on the trade mark page and realize the false proof of trade mark by the trade mark, the trade mark can be used for extensive stock it is false proof in.
Background technology:
Anti-false trademark, also known as antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, are a kind of proof labels discerned the false from the genuine, prevent personation, are mark true and false, that distinguish marketing quality quality of the people for distinguishing merchandise resources during commodity circulation.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and the interests of client.The trade mark of China is audaciously innovated; employ laser anti-counterfeit, core micropore are false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but false proof is high-tech trial of strength with struggle that is faking; advanced anti-counterfeiting technology has certain ageing again; so; trade mark anti-fake technique must constantly be lifted; could be false proof with being maintained the leading position forever in faking, this is also the basic assurance for protecting the interests of businessman and client to maintain commodity circulation safety.
The content of the invention:
In order to improve the reliability and security of trademark anti-counterfeit, the present invention is improved existing trade mark anti-fake technique for the deficiency that existing trademark anti-counterfeit is present, propose a kind of anti-counterfeiting information storage trade mark, the trade mark passes through the change to amplitude electric conductivity in brand printing, encryption anti-fake information is embedded on the whole trade mark page in binary system coded signal form, encryption anti-fake information can be recognized in any one fragment in brand recognition, therefore with very strong disguised and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information stores trade mark, is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, the image and word on trade mark page paper are made up of amplitude,
According to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, and the horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
The horizontal scanning line being printed on trade mark page paper has N bars, the column scan line being printed on trade mark page paper has M bars, the amplitude being printed on trade mark page paper is divided into N rows M row on trade mark paper, amplitude is neat arranged in arrays on trade mark page paper paper, i is allowed to take 1 to arrive N, j is allowed to take 1 to arrive M, j-th strip column scan line on trade mark page paper is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper, i-th horizontal scanning line on trade mark page paper is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper
When the binary message for needing to store the trade mark page is read, the 1st article on trade mark page paper is set to high level successively to the N articles horizontal scanning line,
When the 1st article of horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported with 0,1 code form from the 1st bar of column scan line to the M bars column scan line, the amplitude that the 1st row on trade mark page paper is printed by electrically conductive ink exports binary message 1, the amplitude that the 1st row on trade mark page paper is printed by dielectric ink exports binary message 0, above-mentioned readout is repeated to other rows on trade mark page paper
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 314648DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as HiI is the positive integer more than 0, eight-digit binary number encryption parameter is denoted as C, encryption parameter C is the binary system positive integer of 0≤C≤256, eight-digit binary number encryption variables are denoted as q, j, d, e, f, g, h, r and p respectively, and encryption variables q, j, d, e, f, g, h, r and p are 0 to 256 binary system positive integer, and binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 169471DEST_PATH_IMAGE002
Figure 385427DEST_PATH_IMAGE003
Figure 718319DEST_PATH_IMAGE004
Figure 470375DEST_PATH_IMAGE005
Figure 924983DEST_PATH_IMAGE007
Figure 61566DEST_PATH_IMAGE008
Figure 668128DEST_PATH_IMAGE009
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 599175DEST_PATH_IMAGE002
Figure 789722DEST_PATH_IMAGE003
Figure 925486DEST_PATH_IMAGE005
Figure 973786DEST_PATH_IMAGE007
Figure 186593DEST_PATH_IMAGE008
Figure 767747DEST_PATH_IMAGE009
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 40597DEST_PATH_IMAGE002
Figure 205736DEST_PATH_IMAGE003
Figure 657895DEST_PATH_IMAGE005
Figure 367225DEST_PATH_IMAGE006
Figure 317863DEST_PATH_IMAGE007
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 747598DEST_PATH_IMAGE002
Figure 621751DEST_PATH_IMAGE003
Figure 980051DEST_PATH_IMAGE004
Figure 390304DEST_PATH_IMAGE005
Figure 441436DEST_PATH_IMAGE006
Figure 805815DEST_PATH_IMAGE007
Figure 967806DEST_PATH_IMAGE008
Figure 966986DEST_PATH_IMAGE009
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 37765DEST_PATH_IMAGE003
Figure 3447DEST_PATH_IMAGE004
Figure 122713DEST_PATH_IMAGE005
Figure 538441DEST_PATH_IMAGE007
Figure 281586DEST_PATH_IMAGE009
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 78379DEST_PATH_IMAGE002
Figure 403181DEST_PATH_IMAGE003
Figure 710665DEST_PATH_IMAGE004
Figure 601261DEST_PATH_IMAGE005
Figure 335999DEST_PATH_IMAGE006
Figure 383983DEST_PATH_IMAGE007
Figure 495158DEST_PATH_IMAGE008
Figure 443523DEST_PATH_IMAGE009
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 349162DEST_PATH_IMAGE002
Figure 881512DEST_PATH_IMAGE003
Figure 468482DEST_PATH_IMAGE004
Figure 271353DEST_PATH_IMAGE005
Figure 849358DEST_PATH_IMAGE006
Figure 370470DEST_PATH_IMAGE007
Figure 480825DEST_PATH_IMAGE009
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 226802DEST_PATH_IMAGE002
Figure 226299DEST_PATH_IMAGE004
Figure 3762DEST_PATH_IMAGE005
Figure 923570DEST_PATH_IMAGE006
Figure 153694DEST_PATH_IMAGE007
Figure 948475DEST_PATH_IMAGE008
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 588907DEST_PATH_IMAGE003
Figure 984116DEST_PATH_IMAGE004
Figure 470592DEST_PATH_IMAGE005
Figure 128462DEST_PATH_IMAGE007
Figure 265046DEST_PATH_IMAGE008
Figure 668345DEST_PATH_IMAGE009
Be respectively defined as+, ×, × ,-,+,-,-, ×, unitary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 301190DEST_PATH_IMAGE010
Figure 730214DEST_PATH_IMAGE011
Figure 60274DEST_PATH_IMAGE011
Figure 974004DEST_PATH_IMAGE004
Figure 33544DEST_PATH_IMAGE005
Figure 804928DEST_PATH_IMAGE011
Figure 471533DEST_PATH_IMAGE006
Figure 488031DEST_PATH_IMAGE011
Figure 868907DEST_PATH_IMAGE011
Figure 22808DEST_PATH_IMAGE008
Figure 842996DEST_PATH_IMAGE011
Figure 133163DEST_PATH_IMAGE009
Figure 511930DEST_PATH_IMAGE011
, unitary cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 825230DEST_PATH_IMAGE012
Figure 183531DEST_PATH_IMAGE002
Figure 95248DEST_PATH_IMAGE010
Figure 943118DEST_PATH_IMAGE003
Figure 806032DEST_PATH_IMAGE012
Figure 968023DEST_PATH_IMAGE004
Figure 953352DEST_PATH_IMAGE005
Figure 3664DEST_PATH_IMAGE006
Figure 122930DEST_PATH_IMAGE012
Figure 841549DEST_PATH_IMAGE007
Figure 679055DEST_PATH_IMAGE012
Figure 182848DEST_PATH_IMAGE008
Figure 156621DEST_PATH_IMAGE012
, unitary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 585700DEST_PATH_IMAGE013
Figure 679558DEST_PATH_IMAGE002
Figure 915760DEST_PATH_IMAGE013
Figure 573455DEST_PATH_IMAGE010
Figure 521819DEST_PATH_IMAGE004
Figure 925994DEST_PATH_IMAGE013
Figure 959809DEST_PATH_IMAGE005
Figure 343517DEST_PATH_IMAGE013
Figure 851115DEST_PATH_IMAGE006
Figure 366803DEST_PATH_IMAGE013
Figure 887914DEST_PATH_IMAGE007
Figure 137630DEST_PATH_IMAGE013
Figure 744247DEST_PATH_IMAGE013
Figure 117766DEST_PATH_IMAGE009
, unitary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 322537DEST_PATH_IMAGE014
Figure 740880DEST_PATH_IMAGE002
Figure 971005DEST_PATH_IMAGE014
Figure 460072DEST_PATH_IMAGE014
Figure 533780DEST_PATH_IMAGE010
Figure 866673DEST_PATH_IMAGE005
Figure 353149DEST_PATH_IMAGE014
Figure 19808DEST_PATH_IMAGE014
Figure 890812DEST_PATH_IMAGE007
Figure 998839DEST_PATH_IMAGE014
Figure 621898DEST_PATH_IMAGE014
Figure 562173DEST_PATH_IMAGE009
Figure 521776DEST_PATH_IMAGE014
, unitary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 623724DEST_PATH_IMAGE015
Figure 803033DEST_PATH_IMAGE002
Figure 343736DEST_PATH_IMAGE015
Figure 659311DEST_PATH_IMAGE003
Figure 37913DEST_PATH_IMAGE004
Figure 319989DEST_PATH_IMAGE015
Figure 254185DEST_PATH_IMAGE005
Figure 851837DEST_PATH_IMAGE006
Figure 672025DEST_PATH_IMAGE015
Figure 475376DEST_PATH_IMAGE007
Figure 90028DEST_PATH_IMAGE015
Figure 465646DEST_PATH_IMAGE008
Figure 732734DEST_PATH_IMAGE009
Figure 783866DEST_PATH_IMAGE015
, unitary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 574995DEST_PATH_IMAGE016
Figure 797029DEST_PATH_IMAGE003
Figure 881660DEST_PATH_IMAGE016
Figure 847342DEST_PATH_IMAGE004
Figure 465143DEST_PATH_IMAGE016
Figure 858078DEST_PATH_IMAGE005
Figure 695584DEST_PATH_IMAGE016
Figure 261694DEST_PATH_IMAGE006
Figure 235467DEST_PATH_IMAGE010
Figure 802233DEST_PATH_IMAGE007
Figure 861456DEST_PATH_IMAGE016
Figure 168940DEST_PATH_IMAGE008
Figure 262798DEST_PATH_IMAGE016
Figure 496071DEST_PATH_IMAGE009
Figure 42590DEST_PATH_IMAGE016
, unitary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 888186DEST_PATH_IMAGE017
Figure 836551DEST_PATH_IMAGE002
Figure 265751DEST_PATH_IMAGE003
Figure 983489DEST_PATH_IMAGE004
Figure 686128DEST_PATH_IMAGE017
Figure 941660DEST_PATH_IMAGE005
Figure 893173DEST_PATH_IMAGE017
Figure 816129DEST_PATH_IMAGE006
Figure 245547DEST_PATH_IMAGE007
Figure 236637DEST_PATH_IMAGE010
Figure 491928DEST_PATH_IMAGE009
Figure 457348DEST_PATH_IMAGE017
, unitary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 354897DEST_PATH_IMAGE018
Figure 50111DEST_PATH_IMAGE018
Figure 197376DEST_PATH_IMAGE018
Figure 393740DEST_PATH_IMAGE004
Figure 598456DEST_PATH_IMAGE018
Figure 735039DEST_PATH_IMAGE005
Figure 843066DEST_PATH_IMAGE018
Figure 649479DEST_PATH_IMAGE006
Figure 840027DEST_PATH_IMAGE018
Figure 780301DEST_PATH_IMAGE007
Figure 241369DEST_PATH_IMAGE018
Figure 343317DEST_PATH_IMAGE008
Figure 24091DEST_PATH_IMAGE010
Figure 502477DEST_PATH_IMAGE009
Figure 818052DEST_PATH_IMAGE018
, setting encryption parameter C initial value, setting encryption variables q, j, d, e, f, g, h, r and p initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 410008DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 811034DEST_PATH_IMAGE019
Carry out H1=
Figure 34839DEST_PATH_IMAGE011
Figure 743349DEST_PATH_IMAGE011
Figure 534980DEST_PATH_IMAGE004
Figure 415212DEST_PATH_IMAGE011
Figure 853146DEST_PATH_IMAGE005
Figure 621699DEST_PATH_IMAGE006
Figure 298931DEST_PATH_IMAGE011
Figure 822371DEST_PATH_IMAGE011
Figure 87130DEST_PATH_IMAGE008
Figure 393794DEST_PATH_IMAGE009
Figure 872660DEST_PATH_IMAGE011
Unitary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 991926DEST_PATH_IMAGE019
Carry out H1=
Figure 322544DEST_PATH_IMAGE020
Figure 393006DEST_PATH_IMAGE002
Figure 896800DEST_PATH_IMAGE011
Figure 198468DEST_PATH_IMAGE003
Figure 762304DEST_PATH_IMAGE011
Figure 821527DEST_PATH_IMAGE004
Figure 630477DEST_PATH_IMAGE011
Figure 724335DEST_PATH_IMAGE005
Figure 459072DEST_PATH_IMAGE011
Figure 5591DEST_PATH_IMAGE006
Figure 298087DEST_PATH_IMAGE007
Figure 203726DEST_PATH_IMAGE011
Figure 641606DEST_PATH_IMAGE011
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while unitary cryptographic calculation, next unitary cryptographic calculation is pointed to H2=
Figure 162717DEST_PATH_IMAGE012
Figure 615695DEST_PATH_IMAGE002
Figure 273073DEST_PATH_IMAGE021
Figure 582832DEST_PATH_IMAGE003
Figure 92704DEST_PATH_IMAGE012
Figure 83793DEST_PATH_IMAGE004
Figure 861257DEST_PATH_IMAGE012
Figure 273838DEST_PATH_IMAGE012
Figure 803040DEST_PATH_IMAGE006
Figure 435009DEST_PATH_IMAGE012
Figure 289833DEST_PATH_IMAGE007
Figure 496999DEST_PATH_IMAGE012
Figure 892208DEST_PATH_IMAGE008
Figure 404409DEST_PATH_IMAGE009
Figure 609126DEST_PATH_IMAGE012
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 244244DEST_PATH_IMAGE022
Carry out H2=
Figure 781853DEST_PATH_IMAGE002
Figure 473865DEST_PATH_IMAGE021
Figure 650025DEST_PATH_IMAGE003
Figure 111093DEST_PATH_IMAGE012
Figure 478621DEST_PATH_IMAGE004
Figure 657929DEST_PATH_IMAGE012
Figure 933053DEST_PATH_IMAGE005
Figure 12742DEST_PATH_IMAGE012
Figure 285592DEST_PATH_IMAGE006
Figure 952196DEST_PATH_IMAGE012
Figure 968694DEST_PATH_IMAGE007
Figure 615149DEST_PATH_IMAGE008
Figure 503471DEST_PATH_IMAGE012
Figure 323659DEST_PATH_IMAGE009
Figure 112362DEST_PATH_IMAGE012
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while unitary cryptographic calculation, next unitary cryptographic calculation is pointed to H3=
Figure 368211DEST_PATH_IMAGE002
Figure 199080DEST_PATH_IMAGE003
Figure 751678DEST_PATH_IMAGE023
Figure 614592DEST_PATH_IMAGE004
Figure 775763DEST_PATH_IMAGE005
Figure 884882DEST_PATH_IMAGE013
Figure 235092DEST_PATH_IMAGE006
Figure 702238DEST_PATH_IMAGE013
Figure 821504DEST_PATH_IMAGE007
Figure 848683DEST_PATH_IMAGE008
Figure 352477DEST_PATH_IMAGE013
Figure 90363DEST_PATH_IMAGE009
Figure 388620DEST_PATH_IMAGE013
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this unitary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 713423DEST_PATH_IMAGE001
Carry out unitary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, valid certificates can be provided for true trade mark, there is stronger anti-forgery ability simultaneously.
To solve above-mentioned technical problem, processing is digitized to image false-proof information and character anti-counterfeiting information first, the binary system anti-counterfeiting information table of 8 one group of generation, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, unitary cryptographic calculation is carried out to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables, the binary system encryption anti-fake information table of 32 one group of generation, pass through channel coding using 32 binary system encryption anti-fake informations in binary system encryption anti-fake information table, 32 one group of binary modulated signal of the generation with error detecting and error correcting function, channel coding can use loop coding, convolutional encoding or Turbo coding diversified forms, picture signal is adjusted to be handled by rasterizing trade mark page original continuous(RIP)Halftoning hybrid screening picture signal is exported with hybrid screening, including amplitude and FM screened image signal, the electric conductivity of amplitude in hybrid screening picture signal is modulated using circulation look-up table modulation system using 32 one group of binary modulated signals of generation, make the electric conductivity of amplitude according to dielectric ink amplitude and electrically conductive ink amplitude is regular changes, adjacent 32 amplitudes in hybrid screening picture signal are made to carry 32 binary system anti-counterfeiting information by the change of electric conductivity, so as to generate the hybrid screening picture signal of the embedded anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, trade mark page site electric conductivity signal is gathered first, by the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding, decrypts i-th group of 32 binary message in anti-counterfeiting information table by binary system and is denoted as Mi
Binary system is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting encryption parameter C initial value as encryption, initial value when setting encryption variables q, j, d, e, f, g, h, r and p initial value as encryption, it is k=0 that binary operator, which controls variable k initial value design, by unitary ciphering process, it is M that binary operator, which controls decryption computing during variable k=0,i=
Figure 20907DEST_PATH_IMAGE010
Figure 350651DEST_PATH_IMAGE002
Figure 85389DEST_PATH_IMAGE011
Figure 569591DEST_PATH_IMAGE003
Figure 743083DEST_PATH_IMAGE011
Figure 189983DEST_PATH_IMAGE004
Figure 67120DEST_PATH_IMAGE005
Figure 217872DEST_PATH_IMAGE011
Figure 20743DEST_PATH_IMAGE006
Figure 97283DEST_PATH_IMAGE011
Figure 680711DEST_PATH_IMAGE007
Figure 868110DEST_PATH_IMAGE011
Figure 289602DEST_PATH_IMAGE008
Figure 545451DEST_PATH_IMAGE009
Figure 536541DEST_PATH_IMAGE011
, it is M that binary operator, which controls decryption computing during variable k=1,i=
Figure 803750DEST_PATH_IMAGE012
Figure 222093DEST_PATH_IMAGE002
Figure 452217DEST_PATH_IMAGE010
Figure 941284DEST_PATH_IMAGE012
Figure 966747DEST_PATH_IMAGE004
Figure 282639DEST_PATH_IMAGE005
Figure 270580DEST_PATH_IMAGE012
Figure 563338DEST_PATH_IMAGE012
Figure 699921DEST_PATH_IMAGE007
Figure 40904DEST_PATH_IMAGE012
Figure 428078DEST_PATH_IMAGE012
Figure 102772DEST_PATH_IMAGE009
Figure 563841DEST_PATH_IMAGE012
, it is M that binary operator, which controls decryption computing during variable k=2,i=
Figure 432833DEST_PATH_IMAGE013
Figure 346562DEST_PATH_IMAGE002
Figure 824948DEST_PATH_IMAGE013
Figure 406102DEST_PATH_IMAGE003
Figure 844092DEST_PATH_IMAGE004
Figure 860589DEST_PATH_IMAGE013
Figure 296250DEST_PATH_IMAGE005
Figure 241465DEST_PATH_IMAGE013
Figure 395366DEST_PATH_IMAGE006
Figure 215555DEST_PATH_IMAGE013
Figure 505722DEST_PATH_IMAGE007
Figure 884488DEST_PATH_IMAGE013
Figure 322423DEST_PATH_IMAGE008
Figure 680723DEST_PATH_IMAGE013
Figure 90976DEST_PATH_IMAGE009
Figure 876529DEST_PATH_IMAGE013
, it is M that binary operator, which controls decryption computing during variable k=3,i=
Figure 252626DEST_PATH_IMAGE014
Figure 414618DEST_PATH_IMAGE002
Figure 679377DEST_PATH_IMAGE014
Figure 901411DEST_PATH_IMAGE003
Figure 750156DEST_PATH_IMAGE014
Figure 24776DEST_PATH_IMAGE005
Figure 862282DEST_PATH_IMAGE014
Figure 867541DEST_PATH_IMAGE006
Figure 841313DEST_PATH_IMAGE014
Figure 405150DEST_PATH_IMAGE007
Figure 729952DEST_PATH_IMAGE014
Figure 270392DEST_PATH_IMAGE008
Figure 364250DEST_PATH_IMAGE014
Figure 98988DEST_PATH_IMAGE009
Figure 707824DEST_PATH_IMAGE014
, it is M that binary operator, which controls decryption computing during variable k=4,i=
Figure 818999DEST_PATH_IMAGE015
Figure 268829DEST_PATH_IMAGE002
Figure 925200DEST_PATH_IMAGE015
Figure 959015DEST_PATH_IMAGE003
Figure 342723DEST_PATH_IMAGE015
Figure 900919DEST_PATH_IMAGE004
Figure 977460DEST_PATH_IMAGE015
Figure 498571DEST_PATH_IMAGE005
Figure 685970DEST_PATH_IMAGE010
Figure 107462DEST_PATH_IMAGE006
Figure 354903DEST_PATH_IMAGE015
Figure 363311DEST_PATH_IMAGE007
Figure 354400DEST_PATH_IMAGE015
Figure 113988DEST_PATH_IMAGE015
Figure 344112DEST_PATH_IMAGE009
Figure 138893DEST_PATH_IMAGE015
, it is M that binary operator, which controls decryption computing during variable k=5,i=
Figure 770863DEST_PATH_IMAGE016
Figure 858642DEST_PATH_IMAGE002
Figure 841642DEST_PATH_IMAGE016
Figure 174534DEST_PATH_IMAGE003
Figure 661010DEST_PATH_IMAGE016
Figure 188200DEST_PATH_IMAGE004
Figure 392916DEST_PATH_IMAGE016
Figure 263920DEST_PATH_IMAGE005
Figure 565643DEST_PATH_IMAGE006
Figure 557684DEST_PATH_IMAGE008
Figure 238458DEST_PATH_IMAGE016
Figure 716844DEST_PATH_IMAGE009
Figure 32418DEST_PATH_IMAGE016
, it is M that binary operator, which controls decryption computing during variable k=6,i=
Figure 570847DEST_PATH_IMAGE017
Figure 188145DEST_PATH_IMAGE003
Figure 631896DEST_PATH_IMAGE017
Figure 119169DEST_PATH_IMAGE017
Figure 409336DEST_PATH_IMAGE005
Figure 86305DEST_PATH_IMAGE017
Figure 461922DEST_PATH_IMAGE006
Figure 729011DEST_PATH_IMAGE007
Figure 780143DEST_PATH_IMAGE010
Figure 643057DEST_PATH_IMAGE008
Figure 306513DEST_PATH_IMAGE017
Figure 571272DEST_PATH_IMAGE009
Figure 793306DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=7,i=
Figure 461420DEST_PATH_IMAGE018
Figure 691861DEST_PATH_IMAGE018
Figure 697119DEST_PATH_IMAGE004
Figure 670891DEST_PATH_IMAGE018
Figure 605535DEST_PATH_IMAGE018
Figure 913020DEST_PATH_IMAGE006
Figure 508343DEST_PATH_IMAGE018
Figure 243080DEST_PATH_IMAGE007
Figure 789599DEST_PATH_IMAGE018
Figure 635196DEST_PATH_IMAGE008
Figure 19778DEST_PATH_IMAGE010
Figure 925418DEST_PATH_IMAGE009
, first M from binary system decryption anti-counterfeiting information table1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiCorresponding decryption computing is carried out, binary system anti-counterfeiting information is solved
Figure 98266DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 is the overall structure figure of the present invention.
Fig. 2 is A-A sectional views of the present invention.
Fig. 3 loads anti-counterfeiting information flow chart.
Fig. 4 extracts anti-counterfeiting information flow chart.
Embodiment
As in Fig. 1 and Fig. 2, anti-fake information storage trademark, it is made up of trade mark page paper 7-1, amplitude 6-1 to the 6-150 being printed on trade mark page paper 7-1, horizontal scanning line 1-1 to the 1-15 being printed on trade mark page paper 7-1, column scan line 2-1 to the 2-10 being printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 are made up of amplitude 6-1 to 6-150
According to storage binary system encryption anti-fake information, a part of amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, another part amplitude on trade mark page paper 7-1 is formed by dielectric ink printing, horizontal scanning line 1-1 to 1-15 and column scan line 2-1 to 2-10 on trade mark page paper 7-1 are formed by the printing of electrically conducting transparent ink
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, and the light amplitude on trade mark page paper 7-1 is formed by dielectric ink printing,
The amplitude being printed on trade mark page paper 7-1 is divided into 15 rows 10 on trade mark paper and arranged, amplitude 6-1 to 6-150 is neat arranged in arrays on trade mark page paper 7-1, i is allowed to take 1 to 15, j is allowed to take 1 to 10, j-th strip column scan line on trade mark page paper 7-1 is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper 7-1, i-th horizontal scanning line on trade mark page paper 7-1 is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper 7-1
When the binary system encryption anti-fake information for needing to store the trade mark page is read, the 1st article of horizontal scanning line on trade mark page paper 7-1 is set to high level successively to the 15th article of horizontal scanning line,
When the 1st article of horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary system encryption anti-fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is exported from the 1st bar of column scan line to the 10th bar of column scan line, the 1st row on trade mark page paper 7-1 exports binary message 1 by electrically conductive ink printing into amplitude, the 1st row on trade mark page paper 7-1 exports binary message 0 by dielectric ink printing into amplitude, therefore the binary system encryption anti-fake information 1100001000 that the 1st row is read, above-mentioned readout is repeated to other rows on trade mark page paper 7-1.
In loading anti-counterfeiting information flow chart 3, original anti-counterfeiting information(Image, word)It is digitized into processing, the binary system anti-counterfeiting information table of 8 one group of generation, 8 one group of binary messages in binary system anti-counterfeiting information table are expanded into 32 one group of binary messages, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary message in 32 one group of binary system anti-counterfeiting information tables are denoted as, i is the positive integer more than 0, from first 32 binary system encryption anti-fake information in 32 one group of binary system anti-counterfeiting information tables
Figure 305573DEST_PATH_IMAGE019
Start, to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 498788DEST_PATH_IMAGE001
Carry out unitary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize that trademark anti-counterfeit prints, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, realize trademark anti-counterfeit.
In anti-counterfeiting information flow chart 4 is extracted, when extracting anti-counterfeiting information, the electric conductivity signal of trade mark page halftone dot image is gathered first, by the electric conductivity identification to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding.
The binary system generated after decoding is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting the initial value of encryption parameter as encryption, initial value when setting the initial value of encryption variables as encryption, it is k=0 that binary operator, which controls variable k initial value design, first M from the binary system decryption anti-counterfeiting information table of generation1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiComputing is decrypted, binary system anti-counterfeiting information is solved
Figure 450302DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.

Claims (1)

1. a kind of generate binary modulated signal by anti-counterfeiting information by cryptographic calculation and channel coding, and by circulating the One-parameter variation transmutation unary encryption anti-fake information storage trademark that anti-counterfeiting information is embedded in full page by tabling look-up modulation mode,It is characterized in that:Anti-counterfeiting information stores trade mark, it is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, according to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 690258DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as HiI is the positive integer more than 0, eight-digit binary number encryption parameter is denoted as C, encryption parameter C is the binary system positive integer of 0≤C≤256, eight-digit binary number encryption variables are denoted as q, j, d, e, f, g, h, r and p respectively, and encryption variables q, j, d, e, f, g, h, r and p are 0 to 256 binary system positive integer, and binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 545082DEST_PATH_IMAGE002
Figure 262502DEST_PATH_IMAGE003
Figure 595394DEST_PATH_IMAGE004
Figure 845985DEST_PATH_IMAGE005
Figure 606130DEST_PATH_IMAGE006
Figure 810847DEST_PATH_IMAGE007
Figure 947430DEST_PATH_IMAGE008
Figure 55457DEST_PATH_IMAGE009
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 986504DEST_PATH_IMAGE002
Figure 678516DEST_PATH_IMAGE003
Figure 353211DEST_PATH_IMAGE004
Figure 312815DEST_PATH_IMAGE005
Figure 680342DEST_PATH_IMAGE006
Figure 859651DEST_PATH_IMAGE007
Figure 72457DEST_PATH_IMAGE008
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 94530DEST_PATH_IMAGE003
Figure 111028DEST_PATH_IMAGE004
Figure 609005DEST_PATH_IMAGE005
Figure 816871DEST_PATH_IMAGE006
Figure 705192DEST_PATH_IMAGE007
Figure 525381DEST_PATH_IMAGE008
Figure 815548DEST_PATH_IMAGE009
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 185525DEST_PATH_IMAGE002
Figure 561143DEST_PATH_IMAGE003
Figure 919443DEST_PATH_IMAGE004
Figure 765914DEST_PATH_IMAGE005
Figure 817047DEST_PATH_IMAGE006
Figure 679960DEST_PATH_IMAGE007
Figure 841951DEST_PATH_IMAGE008
Figure 342596DEST_PATH_IMAGE009
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 564630DEST_PATH_IMAGE002
Figure 880522DEST_PATH_IMAGE004
Figure 498323DEST_PATH_IMAGE005
Figure 687996DEST_PATH_IMAGE006
Figure 29295DEST_PATH_IMAGE008
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 68369DEST_PATH_IMAGE002
Figure 393171DEST_PATH_IMAGE003
Figure 700656DEST_PATH_IMAGE004
Figure 528934DEST_PATH_IMAGE005
Figure 762207DEST_PATH_IMAGE006
Figure 308726DEST_PATH_IMAGE007
Figure 419902DEST_PATH_IMAGE008
Figure 368266DEST_PATH_IMAGE009
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 775370DEST_PATH_IMAGE002
Figure 809185DEST_PATH_IMAGE003
Figure 458472DEST_PATH_IMAGE004
Figure 261343DEST_PATH_IMAGE005
Figure 836419DEST_PATH_IMAGE006
Figure 357530DEST_PATH_IMAGE007
Figure 467886DEST_PATH_IMAGE009
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 236918DEST_PATH_IMAGE003
Figure 228008DEST_PATH_IMAGE004
Figure 5471DEST_PATH_IMAGE005
Figure 152474DEST_PATH_IMAGE007
Figure 947254DEST_PATH_IMAGE008
Figure 579224DEST_PATH_IMAGE009
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 669933DEST_PATH_IMAGE002
Figure 652932DEST_PATH_IMAGE003
Figure 985825DEST_PATH_IMAGE004
Figure 472301DEST_PATH_IMAGE005
Figure 560343DEST_PATH_IMAGE006
Figure 263594DEST_PATH_IMAGE007
Figure 400177DEST_PATH_IMAGE008
Figure 741160DEST_PATH_IMAGE009
Be respectively defined as+, ×, × ,-,+,-,-, ×, unitary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 937786DEST_PATH_IMAGE010
Figure 805959DEST_PATH_IMAGE011
Figure 267027DEST_PATH_IMAGE003
Figure 634554DEST_PATH_IMAGE011
Figure 46819DEST_PATH_IMAGE004
Figure 525205DEST_PATH_IMAGE011
Figure 106359DEST_PATH_IMAGE005
Figure 484961DEST_PATH_IMAGE006
Figure 676133DEST_PATH_IMAGE007
Figure 621348DEST_PATH_IMAGE011
Figure 837566DEST_PATH_IMAGE008
Figure 657754DEST_PATH_IMAGE011
, unitary cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 702306DEST_PATH_IMAGE012
Figure 60606DEST_PATH_IMAGE002
Figure 470859DEST_PATH_IMAGE010
Figure 256412DEST_PATH_IMAGE003
Figure 620791DEST_PATH_IMAGE012
Figure 782782DEST_PATH_IMAGE004
Figure 47541DEST_PATH_IMAGE012
Figure 118320DEST_PATH_IMAGE012
Figure 756106DEST_PATH_IMAGE006
Figure 769771DEST_PATH_IMAGE007
Figure 669594DEST_PATH_IMAGE012
Figure 173388DEST_PATH_IMAGE008
Figure 147160DEST_PATH_IMAGE012
Figure 710997DEST_PATH_IMAGE009
Figure 534334DEST_PATH_IMAGE012
, unitary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 576239DEST_PATH_IMAGE013
Figure 670097DEST_PATH_IMAGE002
Figure 404835DEST_PATH_IMAGE013
Figure 575713DEST_PATH_IMAGE010
Figure 524078DEST_PATH_IMAGE004
Figure 429717DEST_PATH_IMAGE013
Figure 962067DEST_PATH_IMAGE005
Figure 414225DEST_PATH_IMAGE006
Figure 490765DEST_PATH_IMAGE013
Figure 513341DEST_PATH_IMAGE007
Figure 700740DEST_PATH_IMAGE013
Figure 871139DEST_PATH_IMAGE013
Figure 378081DEST_PATH_IMAGE009
Figure 369171DEST_PATH_IMAGE013
, unitary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 146634DEST_PATH_IMAGE014
Figure 564977DEST_PATH_IMAGE002
Figure 296566DEST_PATH_IMAGE014
Figure 29030DEST_PATH_IMAGE003
Figure 723316DEST_PATH_IMAGE014
Figure 312561DEST_PATH_IMAGE004
Figure 794095DEST_PATH_IMAGE010
Figure 126988DEST_PATH_IMAGE005
Figure 613464DEST_PATH_IMAGE014
Figure 345370DEST_PATH_IMAGE014
Figure 216374DEST_PATH_IMAGE007
Figure 19562DEST_PATH_IMAGE008
Figure 436867DEST_PATH_IMAGE009
Figure 897936DEST_PATH_IMAGE014
, unitary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 999884DEST_PATH_IMAGE015
Figure 179193DEST_PATH_IMAGE002
Figure 412301DEST_PATH_IMAGE003
Figure 950730DEST_PATH_IMAGE015
Figure 850291DEST_PATH_IMAGE004
Figure 70050DEST_PATH_IMAGE015
Figure 505711DEST_PATH_IMAGE005
Figure 450927DEST_PATH_IMAGE010
Figure 425016DEST_PATH_IMAGE015
Figure 715183DEST_PATH_IMAGE007
Figure 828370DEST_PATH_IMAGE015
Figure 827867DEST_PATH_IMAGE015
Figure 34858DEST_PATH_IMAGE009
Figure 85990DEST_PATH_IMAGE015
, unitary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 388052DEST_PATH_IMAGE016
Figure 550043DEST_PATH_IMAGE002
Figure 682319DEST_PATH_IMAGE016
Figure 585684DEST_PATH_IMAGE004
Figure 704950DEST_PATH_IMAGE016
Figure 611069DEST_PATH_IMAGE005
Figure 448575DEST_PATH_IMAGE016
Figure 952368DEST_PATH_IMAGE006
Figure 926140DEST_PATH_IMAGE010
Figure 355220DEST_PATH_IMAGE008
Figure 511394DEST_PATH_IMAGE016
Figure 246132DEST_PATH_IMAGE009
Figure 294116DEST_PATH_IMAGE016
, unitary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 77395DEST_PATH_IMAGE002
Figure 25760DEST_PATH_IMAGE017
Figure 429934DEST_PATH_IMAGE003
Figure 463749DEST_PATH_IMAGE017
Figure 113036DEST_PATH_IMAGE004
Figure 181487DEST_PATH_IMAGE017
Figure 759492DEST_PATH_IMAGE005
Figure 15024DEST_PATH_IMAGE017
Figure 468002DEST_PATH_IMAGE006
Figure 136935DEST_PATH_IMAGE007
Figure 710633DEST_PATH_IMAGE017
Figure 128976DEST_PATH_IMAGE009
Figure 126144DEST_PATH_IMAGE017
, unitary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 2013100235835100001DEST_PATH_IMAGE018
Figure 207409DEST_PATH_IMAGE002
Figure 104958DEST_PATH_IMAGE018
Figure 694202DEST_PATH_IMAGE003
Figure 411622DEST_PATH_IMAGE018
Figure 243050DEST_PATH_IMAGE004
Figure 995105DEST_PATH_IMAGE018
Figure 817568DEST_PATH_IMAGE005
Figure 22284DEST_PATH_IMAGE018
Figure 158867DEST_PATH_IMAGE006
Figure 266894DEST_PATH_IMAGE018
Figure 889953DEST_PATH_IMAGE018
Figure 830228DEST_PATH_IMAGE008
Figure 789831DEST_PATH_IMAGE010
Figure 71088DEST_PATH_IMAGE018
, setting encryption parameter C initial value, setting encryption variables q, j, d, e, f, g, h, r and p initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 611791DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 2013100235835100001DEST_PATH_IMAGE019
Carry out H1=
Figure 2013100235835100001DEST_PATH_IMAGE020
Figure 304197DEST_PATH_IMAGE002
Figure 243651DEST_PATH_IMAGE003
Figure 961946DEST_PATH_IMAGE011
Figure 132027DEST_PATH_IMAGE004
Figure 841357DEST_PATH_IMAGE011
Figure 791996DEST_PATH_IMAGE005
Figure 113649DEST_PATH_IMAGE011
Figure 403816DEST_PATH_IMAGE006
Figure 284047DEST_PATH_IMAGE011
Figure 659665DEST_PATH_IMAGE007
Figure 782079DEST_PATH_IMAGE011
Figure 977886DEST_PATH_IMAGE011
Figure 840799DEST_PATH_IMAGE009
Figure 515974DEST_PATH_IMAGE011
Unitary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 780733DEST_PATH_IMAGE019
Carry out H1=
Figure 87398DEST_PATH_IMAGE002
Figure 551615DEST_PATH_IMAGE011
Figure 733198DEST_PATH_IMAGE003
Figure 126133DEST_PATH_IMAGE011
Figure 698060DEST_PATH_IMAGE004
Figure 942670DEST_PATH_IMAGE005
Figure 506506DEST_PATH_IMAGE011
Figure 565729DEST_PATH_IMAGE006
Figure 403290DEST_PATH_IMAGE007
Figure 138028DEST_PATH_IMAGE011
Figure 746863DEST_PATH_IMAGE008
Figure 592460DEST_PATH_IMAGE011
Figure 42289DEST_PATH_IMAGE009
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while unitary cryptographic calculation, next unitary cryptographic calculation is pointed to H2=
Figure 981743DEST_PATH_IMAGE012
Figure 67249DEST_PATH_IMAGE002
Figure 2013100235835100001DEST_PATH_IMAGE021
Figure 870120DEST_PATH_IMAGE003
Figure 946660DEST_PATH_IMAGE012
Figure 906919DEST_PATH_IMAGE004
Figure 359897DEST_PATH_IMAGE012
Figure 17275DEST_PATH_IMAGE005
Figure 264716DEST_PATH_IMAGE012
Figure 647025DEST_PATH_IMAGE006
Figure 638115DEST_PATH_IMAGE012
Figure 905324DEST_PATH_IMAGE007
Figure 323667DEST_PATH_IMAGE012
Figure 383152DEST_PATH_IMAGE008
Figure 912354DEST_PATH_IMAGE012
Figure 544323DEST_PATH_IMAGE009
Figure 835365DEST_PATH_IMAGE012
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is rightCarry out H2=
Figure 867299DEST_PATH_IMAGE012
Figure 262509DEST_PATH_IMAGE002
Figure 14564DEST_PATH_IMAGE021
Figure 148611DEST_PATH_IMAGE003
Figure 353327DEST_PATH_IMAGE012
Figure 840569DEST_PATH_IMAGE005
Figure 532581DEST_PATH_IMAGE012
Figure 207276DEST_PATH_IMAGE006
Figure 730661DEST_PATH_IMAGE012
Figure 941171DEST_PATH_IMAGE008
Figure 293709DEST_PATH_IMAGE009
Figure 960314DEST_PATH_IMAGE012
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while unitary cryptographic calculation, next unitary cryptographic calculation is pointed to H3=
Figure 976812DEST_PATH_IMAGE013
Figure 412472DEST_PATH_IMAGE002
Figure 498633DEST_PATH_IMAGE013
Figure 386955DEST_PATH_IMAGE003
Figure 2013100235835100001DEST_PATH_IMAGE023
Figure 643362DEST_PATH_IMAGE004
Figure 871212DEST_PATH_IMAGE013
Figure 252908DEST_PATH_IMAGE005
Figure 628526DEST_PATH_IMAGE013
Figure 986826DEST_PATH_IMAGE006
Figure 397078DEST_PATH_IMAGE013
Figure 946746DEST_PATH_IMAGE007
Figure 33968DEST_PATH_IMAGE008
Figure 255182DEST_PATH_IMAGE009
Figure 106857DEST_PATH_IMAGE013
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this unitary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 72539DEST_PATH_IMAGE001
Carry out unitary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN2013100235835A 2013-01-22 2013-01-22 One-parameter variation transmutation unary encryption anti-fake information storage trademark Pending CN103116796A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100235835A CN103116796A (en) 2013-01-22 2013-01-22 One-parameter variation transmutation unary encryption anti-fake information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100235835A CN103116796A (en) 2013-01-22 2013-01-22 One-parameter variation transmutation unary encryption anti-fake information storage trademark

Publications (1)

Publication Number Publication Date
CN103116796A true CN103116796A (en) 2013-05-22

Family

ID=48415166

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100235835A Pending CN103116796A (en) 2013-01-22 2013-01-22 One-parameter variation transmutation unary encryption anti-fake information storage trademark

Country Status (1)

Country Link
CN (1) CN103116796A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯登国 等: "《密码学导引》", 30 April 1999, article "密码学导引", pages: 271-273 *

Similar Documents

Publication Publication Date Title
CN103106442A (en) Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106460A (en) Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark
CN103106513A (en) Multi-parameter univariate poly encryption anti-fake information storage trademark
CN103116796A (en) One-parameter variation transmutation unary encryption anti-fake information storage trademark
CN103106443A (en) One-parameter double-variant unary encryption anti-fake information storage brand
CN103116788A (en) Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark
CN103106447A (en) Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark
CN103106448A (en) Single variable parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103116790A (en) Parameter transmutation binary encryption anti-fake information storage trademark
CN103106438A (en) Parameter-gradient multivariable multi-encryption anti-fake information storage trademark
CN103106457A (en) Single parameter ternary circulation encryption anti-counterfeiting information storage trademark
CN103106439A (en) Multiparameter multivariable binary encryption anti-fake information storage trademark
CN103106429A (en) Single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark
CN103116797A (en) Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark
CN103106512A (en) Multiparameter multivariable ternary encryption anti-fake information storage trademark
CN103106452A (en) Multivariate parameter gradation unitary circulating encryption anti-fake information storage trademark
CN103106518A (en) Parameter transmutation one-element encryption anti-fake information storage trademark
CN103106450A (en) Single parameter multivariable unitary circulation encryption anti-counterfeiting information storage trademark
CN103106517A (en) Parameter transmutation ternary encryption anti-fake information storage trademark
CN103106440A (en) Multi-parameter unitary encryption anti-fake information storage brand
CN103136567A (en) One-parameter variable gradient binary encryption anti-fake information storage brand
CN103106441A (en) Multi-variable-parameter gradient multi-variant encryption anti-fake information storage brand
CN103106449A (en) Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103106459A (en) Multiparameter transmutation multivariable cycle multielement encryption anti-fake information storage trademark
CN103106503A (en) Multivariate multi-parameter gradient polynary encryption anti-fake information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130522