CN109829529A - The optimization method and device of the embedding parameter of anti-copying two dimensional code - Google Patents

The optimization method and device of the embedding parameter of anti-copying two dimensional code Download PDF

Info

Publication number
CN109829529A
CN109829529A CN201910083224.6A CN201910083224A CN109829529A CN 109829529 A CN109829529 A CN 109829529A CN 201910083224 A CN201910083224 A CN 201910083224A CN 109829529 A CN109829529 A CN 109829529A
Authority
CN
China
Prior art keywords
dimensional code
coding
mean value
form factor
amendment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910083224.6A
Other languages
Chinese (zh)
Other versions
CN109829529B (en
Inventor
谢宁
罗钢
陈昌盛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen University
Original Assignee
Shenzhen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen University filed Critical Shenzhen University
Priority to CN201910083224.6A priority Critical patent/CN109829529B/en
Publication of CN109829529A publication Critical patent/CN109829529A/en
Application granted granted Critical
Publication of CN109829529B publication Critical patent/CN109829529B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The present disclosure describes a kind of optimization methods of the embedding parameter of anti-copying two dimensional code characterized by comprising obtains original two-dimensional code;Original two-dimensional code is printed and scanned, multiple target two dimensional codes are obtained;Based on multiple target two dimensional codes, the target two dimensional code of multiple default numbers is synthesized by corresponding two dimensional code composite diagram according to the mode being smoothly averaged;Mean value, variance and the form factor of two dimensional code composite diagram are calculated, and obtains amendment mean value, revising plan and amendment form factor by correction function amendment mean value, variance and form factor;The theoretical correction bit error rate is known by Generalized Gauss function based on amendment mean value, revising plan and amendment form factor;And the error correcting capability for comparing the theoretical correction bit error rate and two dimensional code reduces the error correcting capability of two dimensional code, when the theoretical correction bit error rate is less than or equal to the error correcting capability of two dimensional code to improve the intrusion scene of bootlegging side.

Description

The optimization method and device of the embedding parameter of anti-copying two dimensional code
Technical field
This disclosure relates to information technology field, and in particular to a kind of optimization method of the embedding parameter of anti-copying two dimensional code and Device.
Background technique
Traditional two dimensional code is easy to be replicated by illegal user after printing.Currently, the copy prevention method of two dimensional code Specifically include that (1) carrys out anti-copying using digital watermark technology;(2) special printed material or technique anti-copying are used;(3) make With physical unclonable feature anti-copying;(4) anti-copying pattern anti-copying is used.
Although the above method can play the role of anti-copying to a certain extent, there is also apparent limitations: one Aspect, which reduce the versatility of two dimensional code, specifically the above method reduces two dimensional code to the general of output and reading equipment All over applicability, and on resisting bootlegging and general applicability problem, there are contradictions;On the other hand, reduction can not be fought to attack It hits, specifically due to the blocky and disclosed coding structure of conventional two-dimensional code, the above method can not be resisted for structuring two Tie up the image restoring attack of code;In another aspect, it needs additional online information etc., the specifically verification process of the above method It can not be completed, be needed using auxiliary information on additional line, such as database on line based on the characteristics of image under line.
In order to preferably improve copy prevention method, need effectively to analyze the two dimensional code of bootlegging, however Existing technology shortage further analyzes the two dimensional code of multiple bootleggings.
Summary of the invention
To solve the above-mentioned problems, the embedding parameter of two dimensional code can be optimized by proposing one kind, and improve bootlegging side Intrusion scene anti-copying two dimensional code embedding parameter optimization method and device.
For this purpose, the first aspect of the disclosure provides a kind of optimization method of the embedding parameter of anti-copying two dimensional code, it is special Sign is, comprising: obtains original two-dimensional code;The original two-dimensional code is printed and scanned, multiple target two dimensional codes are obtained; Based on target two dimensional code described in multiple, the target two dimensional code of multiple default numbers is synthesized according to the mode being smoothly averaged Corresponding two dimensional code composite diagram;Mean value, variance and the form factor of the two dimensional code composite diagram are calculated, and is repaired by correction function The just described mean value, the variance and the form factor obtain amendment mean value, revising plan and amendment form factor;Based on described Amendment mean value, the revising plan and the amendment form factor know the theoretical correction bit error rate by Generalized Gauss function;And And the error correcting capability of the theoretical correction bit error rate and two dimensional code, when the theoretical correction bit error rate is less than or equal to described When the error correcting capability of two dimensional code, the error correcting capability of the two dimensional code is reduced, to improve the intrusion scene of bootlegging side.
In the disclosure, original two-dimensional code is obtained, and multiple described target two dimensional codes are obtained based on original two-dimensional code, according to The target two dimensional code of multiple default numbers is synthesized corresponding two dimensional code composite diagram by the mode being smoothly averaged, and is calculated Two dimensional code composite diagram mean value, variance and form factor and the amendment bit error rate, compare entangling for the theoretical correction bit error rate and two dimensional code Wrong ability optimizes embedding parameter.Thereby, it is possible to optimize the embedding parameter of two dimensional code, and improve the intrusion scene of bootlegging side.
In the optimization method of the embedding parameter of anti-copying two dimensional code involved in the disclosure, optionally, further includes: prepare Raw information and authentication information are encoded the raw information by the first coding mode, are obtained coding raw information, are led to It crosses the second coding mode to encode the authentication information, obtains encoded authentication information;Based on the coding raw information and The authentication information obtains the original two-dimensional code.As a result, by raw information and authentication information by different coding modes into Row coding, enhances original two-dimensional code encryption ability obtained, and improve decryption difficulty.
In the optimization method of the embedding parameter of anti-copying two dimensional code involved in the disclosure, optionally, by the coding Whole section of the authentication information insertion coding raw information, obtains target bits stream;According to default modulation system by the target ratio Spy's circulation is changed to gray value, and is printed and scanned and then obtain original two-dimensional code.Thereby, it is possible to further obtain encryption energy The stronger original two-dimensional code of power.
In the optimization method of the embedding parameter of anti-copying two dimensional code involved in the disclosure, optionally, described first is compiled Code mode uses multi-system Error Correction of Coding mode, and second coding mode uses binary error-correcting code mode.Thereby, it is possible to Reinforce the secrecy effect of original two-dimensional code.
In the optimization method of the embedding parameter of anti-copying two dimensional code involved in the disclosure, optionally, the default tune Mode processed uses pulse amplitude modulation mode.Thereby, it is possible to obtain original two-dimensional code by pulse amplitude modulation mode.
Second aspect disclosed in the disclosure provides a kind of optimization device of the embedding parameter of anti-copying two dimensional code, feature It is, comprising: obtain module, be used to obtain original two-dimensional code;Print scanned module, be used for the original two-dimensional code into Row printing and scanning, obtain multiple target two dimensional codes;Synthesis module is used for multiple target two dimensional codes, according to smooth The target two dimensional code of multiple default numbers is synthesized corresponding two dimensional code composite diagram by the mode being averaged;Computing module, The mean value, described is corrected for calculating mean value, variance and the form factor of the two dimensional code composite diagram, and by correction function Variance and the form factor obtain amendment mean value, revising plan and amendment form factor;To the amendment mean value, the amendment Variance and the amendment form factor know the theoretical correction bit error rate by Generalized Gauss function;And comparison module, it is used for The error correcting capability for comparing the theoretical correction bit error rate and two dimensional code, when the theoretical correction bit error rate is less than or equal to described two When tieing up the error correcting capability of code, the error correcting capability of the two dimensional code is reduced, to improve the intrusion scene of bootlegging side.
In the disclosure, it obtains module and obtains original two-dimensional code, print scanned module is based on original two-dimensional code by printing After scan module obtains multiple target two dimensional codes, two dimensional code composite diagram is generated by synthesis module.Computing module is calculated two It ties up code composite diagram mean value, variance and form factor and the amendment bit error rate, comparison module compares the theoretical correction bit error rate and two dimension The error correcting capability of code optimizes embedding parameter.Thereby, it is possible to optimize the embedding parameter of two dimensional code, and improve the attack of bootlegging side Cost.
In the optimization device of the embedding parameter of anti-copying two dimensional code involved in the disclosure, optionally, the acquisition mould Block prepares raw information and authentication information, encodes the raw information by the first coding mode, obtains encoding original The authentication information is encoded by the second coding mode, obtains encoded authentication information by information;It is original based on the coding Information and the authentication information obtain the original two-dimensional code.Raw information and authentication information are passed through into different codings as a result, Mode is encoded, and enhances original two-dimensional code encryption ability obtained, and improve decryption difficulty.
In the optimization device of the embedding parameter of anti-copying two dimensional code involved in the disclosure, optionally, the acquisition mould Whole section of the encoded authentication information insertion coding raw information is obtained target bits stream, according to default modulation system by block Target bits circulation is changed to gray value, and is printed and is scanned and then obtain original two-dimensional code.Thereby, it is possible into one Step obtains the stronger original two-dimensional code of cryptographic capabilities.
In the optimization device of the embedding parameter of anti-copying two dimensional code involved in the disclosure, optionally, the acquisition mould First coding mode is used multi-system Error Correction of Coding mode by block, and second coding mode is used binary error-correcting code side Formula.Thereby, it is possible to reinforce the secrecy effect of original two-dimensional code.
In the optimization device of the embedding parameter of anti-copying two dimensional code involved in the disclosure, optionally, the acquisition mould The default modulation system is used pulse amplitude modulation mode by block.Thereby, it is possible to be obtained just by pulse amplitude modulation mode Beginning two dimensional code.
According to the disclosure, the embedding parameter of two dimensional code can be optimized by being capable of providing one kind, and improve attacking for bootlegging side Hit the optimization method and device of the embedding parameter of the anti-copying two dimensional code of cost.
Detailed description of the invention
Embodiment of the disclosure will be explained in further detail solely by reference to the example of attached drawing now, in which:
Fig. 1 is to show the process of the optimization method of the embedding parameter of anti-copying two dimensional code involved in the example of the disclosure Schematic diagram.
Fig. 2 is to show the relationship of the target two dimensional code synthesis number of two dimensional code composite diagram involved in the example of the disclosure Figure.
Fig. 3 is to show the structure of the optimization device of the embedding parameter of anti-copying two dimensional code involved in the example of the disclosure Schematic diagram.
Fig. 4 is to show the structure of the optimization equipment of the embedding parameter of anti-copying two dimensional code involved in the example of the disclosure Schematic diagram.
Specific embodiment
Hereinafter, explaining the preferred embodiment of the disclosure in detail with reference to attached drawing.In the following description, for identical Component assign identical symbol, the repetitive description thereof will be omitted.Scheme in addition, attached drawing is only schematical.
It should be noted that the specification and claims of the disclosure and term " first " in above-mentioned attached drawing, " Two ", " third " and " the 4th " etc. are not use to describe a particular order for distinguishing different objects.In addition, term " includes " " having " and their any deformations, it is intended that cover and non-exclusive include.Such as contain a series of steps or units Process, method, system, product or equipment be not limited to listed step or unit, but optionally further comprising do not have The step of listing or unit, or optionally further comprising for the intrinsic other steps of these process, methods, product or equipment or list Member.
Fig. 1 is to show a kind of optimization method of the embedding parameter of anti-copying two dimensional code involved in the example of the disclosure Flow diagram.As shown in Figure 1, the optimization method of the embedding parameter of anti-copying two dimensional code includes obtaining original two-dimensional code (step S100)。
In the step s 100, original two-dimensional code can be electronic two-dimensional code.Original two-dimensional code can based on raw information and Authentication information obtains.Wherein, raw information can be information that user to be transmitted namely raw information to can be user institute defeated The information entered, such as character string.Authentication information can be character string, binary bit stream etc..Authentication information can be used for first The true and false of beginning two dimensional code is authenticated, to verify the authenticity of original two-dimensional code.
In some instances, prepare raw information and authentication information, compiled raw information by the first coding mode Code obtains coding raw information, encodes authentication information by the second coding mode, obtain encoded authentication information.As a result, Raw information and authentication information are encoded by different coding modes, enhance original two-dimensional code encryption energy obtained Power, and improve decryption difficulty.
Specifically, the first coding mode can be multi-system Error Correction of Coding mode, such as reed-solomon (Reed- Solomon, RS) coding mode.RS coding is a kind of channel coding.RS coding has forward error correction capability, and it is to by correcting Multinomial caused by over-sampling data is effective.RS coding has stronger anti-interference, noise resisting ability and error correcting capability.Separately Outside, coding raw information can be one section of binary bit stream being made of " 0 " and " 1 ".Wherein, the second coding mode can be Binary error-correcting code mode, such as BCH (Bose, Ray-Chaudhuri Hocquenghem) coding mode.BCH code is one Linear block codes in kind finite field.BCH code has the ability for correcting multiple random errors, commonly used in communication and field of storage In error correction.Bose-Chaudhuri-Hocquenghem Code can be used for the Multilevel Phase-Shift keying of the power level of prime number grade or prime number.Compared with RS coding, BCH is compiled The anti-interference of code, noise resisting ability and error correcting capability are weaker.It is made of in addition, encoded authentication information can be one section " 0 " and " 1 " Binary bit stream.In this case, the first coding mode is different from the second coding mode.It is initial thereby, it is possible to reinforce The secrecy effect of two dimensional code.
In some instances, it can be carried out simultaneously to the coding behavior of raw information and to the coding behavior of authentication information, It can also sequentially carry out.When sequence carries out, first raw information can be encoded, first authentication information can also be compiled Code.
In some instances, the message length of encoded authentication information can be much smaller than the message length of coding raw information. For example, encoded authentication information can be less than the 30% of coding raw information.For example, the length of encoded authentication information is 100bits, The length for encoding raw information is 1000bits, and the length of finally obtained target bits stream is 1000bits~1100bits Between.
In some instances, based on coding raw information and encoded authentication information acquisition original two-dimensional code.Specifically, will Encoded authentication information embedded coding raw information obtains target bits stream;And according to default modulation system by target bits stream Gray value is converted to, and is printed and is scanned and then obtain original two-dimensional code.Laser printer, ink-jet can be used in printing Printer etc..For example, can be printed by the printer of model FUJIP355d.Scan operation can be used flat bed scanner, Other first-class imaging capture devices of rotating drum image scanner, cell-phone camera.For example, can by the scanner of model BENQK810 into Row scanning.Thereby, it is possible to further obtain the stronger original two-dimensional code of cryptographic capabilities.
In some instances, encoded authentication information may include multiple segment encoding authentication informations.Each segment encoding is recognized Card information can obtain target bits stream with embedded coding raw information.Wherein, the mode of insertion for example can be replacement.Change and Yan Zhi, the partial information encoded in raw information can be replaced by multiple segment encoding authentication informations.Thereby, it is possible to recognize coding Card information is pretended, and the robustness of the original two-dimensional code of acquisition is improved.For example, the length when encoded authentication information is 100bits, when the length for encoding raw information is 1000bits, encoded authentication information can replace length in coding raw information It is 1000bits target bits stream thereby, it is possible to obtain length for the partial information of 100bits.Thereby, it is possible to obtain including recognizing The original two-dimensional code of information is demonstrate,proved, and authentication information has the lower bit error rate.
In addition, each segment encoding authentication information length is identical.Namely encoded authentication information can carry out average segmentation and obtain Obtain multiple segment encoding authentication informations.The segment encoding authentication information obtained as a result, based on average segmentation, can further be obtained Original two-dimensional code with the lower bit error rate.
In some instances, default modulation system can use quadrature amplitude modulation (Quadrature Amplitude Modulation, QAM) mode, quadrature phase shift keying (Quadrature Phase-Shift Keying, QPSK) mode or arteries and veins Any one of modulated mode.
In some instances, impulse modulation mode can be pulse amplitude modulation (Pulse Amplitude Modulation, PAM) modulation system.Target bits can be circulated using PAM modulation system and be changed to gray value, and then generated Original two-dimensional code.
Specifically, target bits stream can be made of " 0 " and " 1 ".Regard two adjacent bits as one group, then Every group there are 4 kinds of situations, such as " 00 ", " 01 ", " 10 " and " 11 ".Different groups can be modulated to not using PAM modulation system Same gray value, such as the corresponding gray value of above-mentioned four kinds of situations can be " 40 ", " 100 ", " 160 " and " 220 ".Based on above-mentioned Four kinds of gray values can obtain original two-dimensional code.Wherein, every group of adjacent two bit is closed in the position of target bits stream It is the positional relationship one-to-one correspondence with the pixel with corresponding gray value in original two-dimensional code.Impulse amplitude tune is used as a result, Target bits can be circulated and be changed to gray value by mode processed, and then obtain original two-dimensional code.
The example of the disclosure is without being limited thereto, in other examples, can by adjacent three of target bits stream and with On binary number regard one group as, different groups can be modulated to using PAM modulation system by different gray values, and obtain initial Two dimensional code.
In some instances, generate original two-dimensional code device for example can be computer, printer (laser printer, Ink-jet printer etc.).
In some instances, the optimization method of the embedding parameter of anti-copying two dimensional code can also include to original two-dimensional code into Row printing and scanning, obtain multiple target two dimensional codes (step S200).
In step s 200, original two-dimensional code is printed and is scanned.Printer and scanner can refer to but unlimited Description in above-mentioned steps S100.Repetition is printed and scanned to original two-dimensional code, and available multiple are independent identically distributed Target two dimensional code.
In some instances, the optimization method of the embedding parameter of anti-copying two dimensional code can also include being based on multiple targets two Code is tieed up, the target two dimensional code of multiple default numbers is synthesized by corresponding two dimensional code composite diagram (step according to the mode being smoothly averaged Rapid S300).
In step S300, default number for example can be " 1 ", " 2 ", " 3 " etc..It is multiple to be but not limited to 16.
Specifically, the target two dimensional code that default number is 1 can for example be synthesized according to the mode being smoothly averaged One two dimensional code composite diagram.The target two dimensional code that default number is 10 can be synthesized ten according to the mode being smoothly averaged Two dimensional code composite diagram.Wherein, default number is more, and the bit error rate of corresponding two dimensional code composite diagram is lower.
In some instances, the optimization method of the embedding parameter of anti-copying two dimensional code can also include calculating two dimensional code synthesis Mean value, variance and the form factor of figure, and obtained by correction function amendment mean value, variance and form factor and correct mean value, repair Positive variance and amendment form factor (step S400).
In step S400, it can carry out calculating its mean value, variance and form factor based on two dimensional code composite diagram.It will obtain Mean value, variance and form factor amendment mean value, revising plan and amendment form factor are obtained by the amendment of correction function.
In some instances, the optimization method of the embedding parameter of anti-copying two dimensional code can also include based on amendment mean value, Revising plan and amendment form factor know the theoretical correction bit error rate (step S500) by Generalized Gauss function.
It, can be using amendment mean value, revising plan and amendment form factor as Generalized Gauss function in step S500 Parameter is inputted, the theoretical correction bit error rate of every two dimensional code composite diagram is calculated by Generalized Gauss function.
In some instances, the optimization method of the embedding parameter of anti-copying two dimensional code can also include comparing theoretical correction mistake The error correcting capability of code rate and two dimensional code reduces two dimension when the theoretical correction bit error rate is less than or equal to the error correcting capability of two dimensional code The error correcting capability of code, to improve the intrusion scene (step S600) of bootlegging side.
In step S600, when the theoretical correction bit error rate is greater than the error correcting capability of two dimensional code, the two dimensional code of bootlegging It can be identified.When the theoretical correction bit error rate is less than or equal to the error correcting capability of two dimensional code, the two dimensional code of bootlegging is not It can effectively be identified.Wherein, the error correcting capability of the two dimensional code when the theoretical correction bit error rate is equal to the error correcting capability of two dimensional code It can regard decision threshold as.
In some instances, when the theoretical correction bit error rate is less than or equal to the error correcting capability of two dimensional code, optimize two dimensional code Embedding parameter, namely reduce two dimensional code error correcting capability.Thereby, it is possible to so that bootlegging side is synthesized more target two dimensions Code, to obtain corresponding two dimensional code composite diagram, so that the two dimensional code of new bootlegging cannot be identified effectively.At this In the case of kind, the intrusion scene of bootlegging side can be improved.
Fig. 2 is to show the relationship of the target two dimensional code synthesis number of two dimensional code composite diagram involved in the example of the disclosure Figure.Wherein, longitudinal axis representation theory corrects the bit error rate.Horizontal axis indicates that target two dimensional code synthesizes number.Curve A indicates different two dimensional codes The value of its theoretical correction bit error rate under the scene of the target two dimensional code synthesis number of composite diagram.Straight line B indicates initial two dimensional code Error correcting capability.Straight line C indicates the error correcting capability of the two dimensional code of adjustment.The lower limit of straight line D expression error correcting capability.The value of straight line D It can guarantee the bit error rate of the legal two dimensional code under worst scene, the region between straight line B and straight line D means that error correcting capability Optimization range.With the increase of synthesis number, the theoretical correction bit error rate is in downward trend.As seen from the figure, by ten When two dimensional code synthesizes, the value of the theoretical correction bit error rate is located at the lower section of straight line B, when downward error correcting capability is to straight line C It waits, needs the synthesis of 16 target two dimensional codes, can just make the theoretical correction bit error rate lower than C.Thereby, it is possible to improve attack at This.
In the disclosure, original two-dimensional code is obtained, and multiple target two dimensional codes are obtained based on original two-dimensional code, according to smooth The target two dimensional code of multiple default numbers is synthesized corresponding two dimensional code composite diagram by the mode being averaged, and two dimensional code conjunction is calculated At figure mean value, variance and form factor and the amendment bit error rate, compare the error correcting capability of the theoretical correction bit error rate and two dimensional code, it is excellent Change embedding parameter.Thereby, it is possible to optimize the embedding parameter of two dimensional code, and improve the intrusion scene of bootlegging side.
Fig. 3 is to show the structure of the optimization device of the embedding parameter of anti-copying two dimensional code involved in the example of the disclosure Schematic diagram.As shown in figure 3, the optimization device 1 of the embedding parameter of anti-copying two dimensional code includes obtaining module 11, print scanned module 12, synthesis module 13, computing module 14 and comparison module 15.
In some instances, obtaining module 11 can be used for obtaining original two-dimensional code.Wherein, it obtains module and prepares original letter Breath and authentication information, are encoded raw information by the first coding mode, obtain coding raw information, pass through the second coding Mode encodes authentication information, obtains encoded authentication information.First coding mode uses multi-system Error Correction of Coding mode, example Such as RS coding mode, the second coding mode is used into binary error-correcting code mode, such as Bose-Chaudhuri-Hocquenghem Code mode.
In some instances, original two-dimensional code can be obtained based on coding raw information and authentication information by obtaining module 11. Specifically, whole section of embedded coding raw information of encoded authentication information is obtained target bits stream;It will according to default modulation system Target bits circulation is changed to gray value, and is printed and scanned and then obtain original two-dimensional code.Default modulation system can adopt With pulse amplitude modulation mode.The function of obtaining module 11 specifically may refer to step S100.
In some instances, print scanned module 12 can be used for that original two-dimensional code is printed and scanned, and obtain more Open target two dimensional code.It specifically may refer to step S200.
In some instances, synthesis module 13 can be used for multiple target two dimensional codes, according to the mode being smoothly averaged The target two dimensional code of multiple default numbers is synthesized into corresponding two dimensional code composite diagram.It specifically may refer to step S300.
In some instances, computing module 14 can be used for calculating the mean value, variance and form factor of two dimensional code composite diagram, And amendment mean value, revising plan and amendment form factor are obtained by correction function amendment mean value, variance and form factor;To repairing Positive mean value, revising plan and amendment form factor know the theoretical correction bit error rate by Generalized Gauss function.Specifically it may refer to Step S400 and step S500.
In some instances, comparison module 15 can be used for comparing the error correcting capability of the theoretical correction bit error rate and two dimensional code, When the theoretical correction bit error rate is less than or equal to the error correcting capability of two dimensional code, the error correcting capability of two dimensional code is reduced, it is illegal to improve The intrusion scene of duplication side.It specifically may refer to step S600.
This disclosure relates to a kind of optimization equipment of the embedding parameter of anti-copying two dimensional code.Fig. 4 is to show showing for the disclosure The structural schematic diagram of the optimization equipment of the embedding parameter of anti-copying two dimensional code involved in example.
In the disclosure, the optimization of the embedding parameter of anti-copying two dimensional code as shown in Figure 4 includes processor 21 and memory 22.Wherein, processor 21 and memory 22 are separately connected communication bus.Memory 22 can be high speed RAM memory, can also To be non-volatile memory (non-volatile memory).Memory 22 may include the program for storing program code The data storage area of memory block and transmission data-signal.It will be understood by those skilled in the art that anti-copying shown in Fig. 4 is two-dimentional The structure of optimization equipment 1 of the embedding parameter of code does not constitute the restriction to the disclosure, it, can also either busbar network It can also include perhaps combining certain components or difference than more or fewer components shown in Fig. 4 to be hub-and-spoke configuration Component layout.
Wherein, processor 21 is the control centre of the optimization equipment 1 of the embedding parameter of anti-copying two dimensional code.Processor 21 can To be central processing unit (Central Processing Unit, CPU).Processor 21 is whole using various interfaces and connection The various pieces of the optimization equipment 1 of the embedding parameter of a anti-copying two dimensional code, are stored in memory 22 by running or executing Software program and/or module, and the program code for being stored in and storing in the program storage area of memory 22 is called, for holding The following operation of row:
Obtain original two-dimensional code;Original two-dimensional code is printed and scanned, multiple target two dimensional codes are obtained;Based on multiple The target two dimensional code of multiple default numbers is synthesized corresponding two dimensional code according to the mode being smoothly averaged and synthesized by target two dimensional code Figure;Calculate mean value, variance and the form factor of two dimensional code composite diagram, and by correction function amendment mean value, variance and shape because Son obtains amendment mean value, revising plan and amendment form factor;Passed through based on amendment mean value, revising plan and amendment form factor Generalized Gauss function knows the theoretical correction bit error rate;And the error correcting capability for comparing the theoretical correction bit error rate and two dimensional code, works as reason When being less than or equal to the error correcting capability of two dimensional code by the amendment bit error rate, the error correcting capability of two dimensional code is reduced, to improve bootlegging The intrusion scene of side.
In the present embodiment, the processor 21 of the optimization equipment 1 of the embedding parameter of the anti-copying two dimensional code of transmitting terminal It also executes following operation: preparing raw information and authentication information, raw information is encoded by the first coding mode, is obtained Raw information is encoded, authentication information is encoded by the second coding mode, obtains encoded authentication information;It is original based on encoding Information and authentication information obtain original two-dimensional code.
In the present embodiment, the processor 21 of the optimization equipment 1 of the embedding parameter of the anti-copying two dimensional code of transmitting terminal It also executes following operation: by whole section of embedded coding raw information of encoded authentication information, obtaining target bits stream;According to default modulation Target bits circulation is changed to gray value by mode, and is printed and scanned and then obtain original two-dimensional code.
In the present embodiment, the processor 21 of the optimization equipment 1 of the embedding parameter of the anti-copying two dimensional code of transmitting terminal Also execute following operation: the first coding mode uses RS coding mode, and the second coding mode uses Bose-Chaudhuri-Hocquenghem Code mode.
In the present embodiment, the processor 21 of the optimization equipment 1 of the embedding parameter of the anti-copying two dimensional code of transmitting terminal Also execute following operation: default modulation system uses pulse amplitude modulation mode.
In the present embodiment, it should be understood that disclosed equipment can be realized in other ways.More than for example, Described equipment embodiment is only schematical, such as the division of unit, only a kind of logical function partition, practical There may be another division manner when realization, such as multiple units or components may be combined or can be integrated into another and be System, or some features can be ignored or not executed.Another point, shown or discussed mutual coupling or direct-coupling Or communication connection can be through some interfaces, the indirect coupling or communication connection of device or unit can be electrical or other Form.
Unit may or may not be physically separated as illustrated by the separation member, shown as a unit Component may or may not be physical unit, it can and it is in one place, or may be distributed over multiple networks On unit.It can some or all of the units may be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
In addition, each functional unit in the present embodiment can integrate in one processing unit, it is also possible to each Unit physically exists alone, and can also be integrated in one unit with two or more units.Above-mentioned integrated unit both may be used To use formal implementation of hardware, can also realize in the form of software functional units.
It, can if integrated unit is realized in the form of SFU software functional unit and when sold or used as an independent product To be stored in a computer-readable access to memory.Based on this understanding, the technical solution of the disclosure is substantially in other words The all or part of the part that contributes to existing technology or the technical solution can embody in the form of software products Come, which is stored in a memory, including some instructions are used so that a computer equipment (can be Personal computer, server or network equipment etc.) execute each embodiment method of the disclosure all or part of the steps.And it is preceding The memory stated includes: USB flash disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, the various media that can store program code such as magnetic or disk.
Present embodiment discloses a kind of computer readable storage medium, those of ordinary skill in the art will appreciate that above-mentioned public affairs All or part of the steps in the optimization method of the embedding parameter for the various anti-copying two dimensional codes opened is (can be referred to by program Enable) it is completed to instruct relevant hardware, which can store in computer-readable memory (storage medium), Memory may include: flash disk, read-only memory (English: Read-Only Memory, abbreviation: ROM), random access device (English: Random Access Memory, abbreviation: RAM), disk or CD etc..
Although being illustrated in conjunction with the accompanying drawings and embodiments to the disclosure above, it will be appreciated that above description The disclosure is not limited in any form.Those skilled in the art can without departing from the connotation and range of the disclosure To be deformed and be changed to the disclosure as needed, these deformations and variation are each fallen in the scope of the present disclosure.

Claims (10)

1. a kind of optimization method of the embedding parameter of anti-copying two dimensional code, which is characterized in that
Include:
Obtain original two-dimensional code;
The original two-dimensional code is printed and scanned, multiple target two dimensional codes are obtained;
Based on target two dimensional code described in multiple, according to the mode being smoothly averaged by the target two dimensional code of multiple default numbers Synthesize corresponding two dimensional code composite diagram;
It calculates mean value, variance and the form factor of the two dimensional code composite diagram, and corrects the mean value, described by correction function Variance and the form factor obtain amendment mean value, revising plan and amendment form factor;
Know that theory is repaired by Generalized Gauss function based on the amendment mean value, the revising plan and the amendment form factor The positive bit error rate;And
The error correcting capability for comparing the theoretical correction bit error rate and two dimensional code, when the theoretical correction bit error rate is less than or equal to institute When stating the error correcting capability of two dimensional code, the error correcting capability of the two dimensional code is reduced, to improve the intrusion scene of bootlegging side.
2. optimization method according to claim 1, which is characterized in that
Further include:
Prepare raw information and authentication information, encoded the raw information by the first coding mode, it is former to obtain coding The authentication information is encoded by the second coding mode, obtains encoded authentication information by beginning information;
The original two-dimensional code is obtained based on the coding raw information and the authentication information.
3. optimization method according to claim 2, which is characterized in that
By whole section of the encoded authentication information insertion coding raw information, target bits stream is obtained;
Target bits circulation is changed to gray value according to default modulation system, and is printed and is scanned and then obtained initial Two dimensional code.
4. optimization method according to claim 2, which is characterized in that
First coding mode uses multi-system Error Correction of Coding mode,
Second coding mode uses binary error-correcting code mode.
5. optimization method according to claim 3, which is characterized in that
The default modulation system uses pulse amplitude modulation mode.
6. a kind of optimization device of the embedding parameter of anti-copying two dimensional code, which is characterized in that
Include:
Module is obtained, is used to obtain original two-dimensional code;
Print scanned module is used to that the original two-dimensional code to be printed and be scanned, obtains multiple target two dimensional codes;
Synthesis module, is used for multiple target two dimensional codes, according to the mode being smoothly averaged by multiple default numbers The target two dimensional code synthesizes corresponding two dimensional code composite diagram;
Computing module is used to calculate mean value, variance and the form factor of the two dimensional code composite diagram, and repairs by correction function The just described mean value, the variance and the form factor obtain amendment mean value, revising plan and amendment form factor;It is repaired to described Positive mean value, the revising plan and the amendment form factor know the theoretical correction bit error rate by Generalized Gauss function;And
Comparison module is used for the error correcting capability of the theoretical correction bit error rate and two dimensional code described in comparison, when the theoretical correction misses When code rate is less than or equal to the error correcting capability of the two dimensional code, the error correcting capability of the two dimensional code is reduced, to improve bootlegging The intrusion scene of side.
7. optimization device as claimed in claim 6, which is characterized in that
The acquisition module prepares raw information and authentication information, is compiled the raw information by the first coding mode Code obtains coding raw information, encodes the authentication information by the second coding mode, obtain encoded authentication information;
The original two-dimensional code is obtained based on the coding raw information and the authentication information.
8. optimization device as claimed in claim 7, which is characterized in that
Whole section of the encoded authentication information insertion coding raw information is obtained target bits stream, pressed by the acquisition module Target bits circulation is changed to gray value according to default modulation system, and is printed and is scanned and then obtain original two-dimensional Code.
9. optimization device as claimed in claim 7, which is characterized in that
First coding mode is used multi-system Error Correction of Coding mode by the acquisition module,
Second coding mode is used into binary error-correcting code mode.
10. optimization device as claimed in claim 8, which is characterized in that
The default modulation system is used pulse amplitude modulation mode by the acquisition module.
CN201910083224.6A 2019-01-18 2019-01-18 Method and device for optimizing embedded parameters of anti-copy two-dimensional code Active CN109829529B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910083224.6A CN109829529B (en) 2019-01-18 2019-01-18 Method and device for optimizing embedded parameters of anti-copy two-dimensional code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910083224.6A CN109829529B (en) 2019-01-18 2019-01-18 Method and device for optimizing embedded parameters of anti-copy two-dimensional code

Publications (2)

Publication Number Publication Date
CN109829529A true CN109829529A (en) 2019-05-31
CN109829529B CN109829529B (en) 2021-05-25

Family

ID=66862734

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910083224.6A Active CN109829529B (en) 2019-01-18 2019-01-18 Method and device for optimizing embedded parameters of anti-copy two-dimensional code

Country Status (1)

Country Link
CN (1) CN109829529B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090255992A1 (en) * 2006-04-29 2009-10-15 Gmedia Corporation System for Synthesizing a Two Dimensional Code and a Logo and the Method Thereof
US20130026241A1 (en) * 2011-07-25 2013-01-31 Sakahashi Koji Device and its use for creation, output and management of 2d barcodes with embedded images
CN105095935A (en) * 2015-06-01 2015-11-25 深圳大学 Low-density high-coding-capcity lattice two-dimensional code integrated with chaos encryption technology
CN106203571A (en) * 2016-07-11 2016-12-07 搜油郎成都科技有限公司 Image production method based on Quick Response Code and recognition methods and realize system
CN206863799U (en) * 2017-05-08 2018-01-09 广州市中崎商业机器股份有限公司 A kind of intelligent express system based on Quick Response Code
CN107909133A (en) * 2017-11-15 2018-04-13 深圳大学 Two-dimensional code generation method, Quick Response Code coding/decoding method and terminal
CN108229596A (en) * 2016-12-09 2018-06-29 北京大码技术有限公司 Combined two-dimension code, digital certificates carrier, generation, reading device and method
CN108345925A (en) * 2017-01-24 2018-07-31 北京大码技术有限公司 Generation, reading method and the device of composite type two-dimensional code

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090255992A1 (en) * 2006-04-29 2009-10-15 Gmedia Corporation System for Synthesizing a Two Dimensional Code and a Logo and the Method Thereof
US20130026241A1 (en) * 2011-07-25 2013-01-31 Sakahashi Koji Device and its use for creation, output and management of 2d barcodes with embedded images
CN105095935A (en) * 2015-06-01 2015-11-25 深圳大学 Low-density high-coding-capcity lattice two-dimensional code integrated with chaos encryption technology
CN106203571A (en) * 2016-07-11 2016-12-07 搜油郎成都科技有限公司 Image production method based on Quick Response Code and recognition methods and realize system
CN108229596A (en) * 2016-12-09 2018-06-29 北京大码技术有限公司 Combined two-dimension code, digital certificates carrier, generation, reading device and method
CN108345925A (en) * 2017-01-24 2018-07-31 北京大码技术有限公司 Generation, reading method and the device of composite type two-dimensional code
CN206863799U (en) * 2017-05-08 2018-01-09 广州市中崎商业机器股份有限公司 A kind of intelligent express system based on Quick Response Code
CN107909133A (en) * 2017-11-15 2018-04-13 深圳大学 Two-dimensional code generation method, Quick Response Code coding/decoding method and terminal

Also Published As

Publication number Publication date
CN109829529B (en) 2021-05-25

Similar Documents

Publication Publication Date Title
US11042791B2 (en) Method and apparatus for generating and reading composite two-dimensional code
CN109818739B (en) Generation type image steganography method based on countermeasure network
Zhang et al. Fragile watermarking with error-free restoration capability
Bulan et al. Orientation modulation for data hiding in clustered-dot halftone prints
Lee et al. A secret-sharing-based method for authentication of grayscale document images via the use of the PNG image with a data repair capability
CN109840576A (en) The generation method and coding/decoding method of anti-copying two dimensional code based on segmentation insertion
EP1340188B1 (en) Method of encoding a handwritten signature
CN103761702A (en) Image hiding and authentication method based on secret sharing
CN104881838B (en) One kind is based on GF (23) (K, N) significant point deposited without expansion image and reconstructing method
CN107846530A (en) Digital watermarking algorithm
CN108960387B (en) Anti-counterfeiting two-dimensional code and generation and identification method thereof
Liu et al. Rich QR codes with three-layer information using hamming code
Cheung et al. A sequential quantization strategy for data embedding and integrity verification
WO2020199500A1 (en) Clone-proof qr code and anti-counterfeiting qr code authentication method for qr code
Artiles et al. Robust image watermarking algorithm using chaotic sequences
Villán et al. Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding
Lu et al. An effective maximum distortion controlling technology in the dual-image-based reversible data hiding scheme
CN109829529A (en) The optimization method and device of the embedding parameter of anti-copying two dimensional code
CN104702814B (en) (K, N) Image of Meaningful based on triple backups point is deposited and restoration methods
CN109447886B (en) Binding to EMD-2 1 Embedded multi-carrier secret map separate storage method with recovery
Yang et al. Weighted bipartite graph for locating optimal LSB substitution for secret embedding
Chang et al. Secret image hiding and sharing based on the (t, n)-threshold
Lien et al. Dispersed data hiding using hamming code with recovery capability
CN109840574B (en) Two-dimensional code information hiding method and device, electronic equipment and storage medium
CN108171665A (en) A kind of multi version backup and restricted double authentication master key (t, s, k, n) image separate-management method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant