CN109829529A - The optimization method and device of the embedding parameter of anti-copying two dimensional code - Google Patents
The optimization method and device of the embedding parameter of anti-copying two dimensional code Download PDFInfo
- Publication number
- CN109829529A CN109829529A CN201910083224.6A CN201910083224A CN109829529A CN 109829529 A CN109829529 A CN 109829529A CN 201910083224 A CN201910083224 A CN 201910083224A CN 109829529 A CN109829529 A CN 109829529A
- Authority
- CN
- China
- Prior art keywords
- dimensional code
- coding
- mean value
- form factor
- amendment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The present disclosure describes a kind of optimization methods of the embedding parameter of anti-copying two dimensional code characterized by comprising obtains original two-dimensional code;Original two-dimensional code is printed and scanned, multiple target two dimensional codes are obtained;Based on multiple target two dimensional codes, the target two dimensional code of multiple default numbers is synthesized by corresponding two dimensional code composite diagram according to the mode being smoothly averaged;Mean value, variance and the form factor of two dimensional code composite diagram are calculated, and obtains amendment mean value, revising plan and amendment form factor by correction function amendment mean value, variance and form factor;The theoretical correction bit error rate is known by Generalized Gauss function based on amendment mean value, revising plan and amendment form factor;And the error correcting capability for comparing the theoretical correction bit error rate and two dimensional code reduces the error correcting capability of two dimensional code, when the theoretical correction bit error rate is less than or equal to the error correcting capability of two dimensional code to improve the intrusion scene of bootlegging side.
Description
Technical field
This disclosure relates to information technology field, and in particular to a kind of optimization method of the embedding parameter of anti-copying two dimensional code and
Device.
Background technique
Traditional two dimensional code is easy to be replicated by illegal user after printing.Currently, the copy prevention method of two dimensional code
Specifically include that (1) carrys out anti-copying using digital watermark technology;(2) special printed material or technique anti-copying are used;(3) make
With physical unclonable feature anti-copying;(4) anti-copying pattern anti-copying is used.
Although the above method can play the role of anti-copying to a certain extent, there is also apparent limitations: one
Aspect, which reduce the versatility of two dimensional code, specifically the above method reduces two dimensional code to the general of output and reading equipment
All over applicability, and on resisting bootlegging and general applicability problem, there are contradictions;On the other hand, reduction can not be fought to attack
It hits, specifically due to the blocky and disclosed coding structure of conventional two-dimensional code, the above method can not be resisted for structuring two
Tie up the image restoring attack of code;In another aspect, it needs additional online information etc., the specifically verification process of the above method
It can not be completed, be needed using auxiliary information on additional line, such as database on line based on the characteristics of image under line.
In order to preferably improve copy prevention method, need effectively to analyze the two dimensional code of bootlegging, however
Existing technology shortage further analyzes the two dimensional code of multiple bootleggings.
Summary of the invention
To solve the above-mentioned problems, the embedding parameter of two dimensional code can be optimized by proposing one kind, and improve bootlegging side
Intrusion scene anti-copying two dimensional code embedding parameter optimization method and device.
For this purpose, the first aspect of the disclosure provides a kind of optimization method of the embedding parameter of anti-copying two dimensional code, it is special
Sign is, comprising: obtains original two-dimensional code;The original two-dimensional code is printed and scanned, multiple target two dimensional codes are obtained;
Based on target two dimensional code described in multiple, the target two dimensional code of multiple default numbers is synthesized according to the mode being smoothly averaged
Corresponding two dimensional code composite diagram;Mean value, variance and the form factor of the two dimensional code composite diagram are calculated, and is repaired by correction function
The just described mean value, the variance and the form factor obtain amendment mean value, revising plan and amendment form factor;Based on described
Amendment mean value, the revising plan and the amendment form factor know the theoretical correction bit error rate by Generalized Gauss function;And
And the error correcting capability of the theoretical correction bit error rate and two dimensional code, when the theoretical correction bit error rate is less than or equal to described
When the error correcting capability of two dimensional code, the error correcting capability of the two dimensional code is reduced, to improve the intrusion scene of bootlegging side.
In the disclosure, original two-dimensional code is obtained, and multiple described target two dimensional codes are obtained based on original two-dimensional code, according to
The target two dimensional code of multiple default numbers is synthesized corresponding two dimensional code composite diagram by the mode being smoothly averaged, and is calculated
Two dimensional code composite diagram mean value, variance and form factor and the amendment bit error rate, compare entangling for the theoretical correction bit error rate and two dimensional code
Wrong ability optimizes embedding parameter.Thereby, it is possible to optimize the embedding parameter of two dimensional code, and improve the intrusion scene of bootlegging side.
In the optimization method of the embedding parameter of anti-copying two dimensional code involved in the disclosure, optionally, further includes: prepare
Raw information and authentication information are encoded the raw information by the first coding mode, are obtained coding raw information, are led to
It crosses the second coding mode to encode the authentication information, obtains encoded authentication information;Based on the coding raw information and
The authentication information obtains the original two-dimensional code.As a result, by raw information and authentication information by different coding modes into
Row coding, enhances original two-dimensional code encryption ability obtained, and improve decryption difficulty.
In the optimization method of the embedding parameter of anti-copying two dimensional code involved in the disclosure, optionally, by the coding
Whole section of the authentication information insertion coding raw information, obtains target bits stream;According to default modulation system by the target ratio
Spy's circulation is changed to gray value, and is printed and scanned and then obtain original two-dimensional code.Thereby, it is possible to further obtain encryption energy
The stronger original two-dimensional code of power.
In the optimization method of the embedding parameter of anti-copying two dimensional code involved in the disclosure, optionally, described first is compiled
Code mode uses multi-system Error Correction of Coding mode, and second coding mode uses binary error-correcting code mode.Thereby, it is possible to
Reinforce the secrecy effect of original two-dimensional code.
In the optimization method of the embedding parameter of anti-copying two dimensional code involved in the disclosure, optionally, the default tune
Mode processed uses pulse amplitude modulation mode.Thereby, it is possible to obtain original two-dimensional code by pulse amplitude modulation mode.
Second aspect disclosed in the disclosure provides a kind of optimization device of the embedding parameter of anti-copying two dimensional code, feature
It is, comprising: obtain module, be used to obtain original two-dimensional code;Print scanned module, be used for the original two-dimensional code into
Row printing and scanning, obtain multiple target two dimensional codes;Synthesis module is used for multiple target two dimensional codes, according to smooth
The target two dimensional code of multiple default numbers is synthesized corresponding two dimensional code composite diagram by the mode being averaged;Computing module,
The mean value, described is corrected for calculating mean value, variance and the form factor of the two dimensional code composite diagram, and by correction function
Variance and the form factor obtain amendment mean value, revising plan and amendment form factor;To the amendment mean value, the amendment
Variance and the amendment form factor know the theoretical correction bit error rate by Generalized Gauss function;And comparison module, it is used for
The error correcting capability for comparing the theoretical correction bit error rate and two dimensional code, when the theoretical correction bit error rate is less than or equal to described two
When tieing up the error correcting capability of code, the error correcting capability of the two dimensional code is reduced, to improve the intrusion scene of bootlegging side.
In the disclosure, it obtains module and obtains original two-dimensional code, print scanned module is based on original two-dimensional code by printing
After scan module obtains multiple target two dimensional codes, two dimensional code composite diagram is generated by synthesis module.Computing module is calculated two
It ties up code composite diagram mean value, variance and form factor and the amendment bit error rate, comparison module compares the theoretical correction bit error rate and two dimension
The error correcting capability of code optimizes embedding parameter.Thereby, it is possible to optimize the embedding parameter of two dimensional code, and improve the attack of bootlegging side
Cost.
In the optimization device of the embedding parameter of anti-copying two dimensional code involved in the disclosure, optionally, the acquisition mould
Block prepares raw information and authentication information, encodes the raw information by the first coding mode, obtains encoding original
The authentication information is encoded by the second coding mode, obtains encoded authentication information by information;It is original based on the coding
Information and the authentication information obtain the original two-dimensional code.Raw information and authentication information are passed through into different codings as a result,
Mode is encoded, and enhances original two-dimensional code encryption ability obtained, and improve decryption difficulty.
In the optimization device of the embedding parameter of anti-copying two dimensional code involved in the disclosure, optionally, the acquisition mould
Whole section of the encoded authentication information insertion coding raw information is obtained target bits stream, according to default modulation system by block
Target bits circulation is changed to gray value, and is printed and is scanned and then obtain original two-dimensional code.Thereby, it is possible into one
Step obtains the stronger original two-dimensional code of cryptographic capabilities.
In the optimization device of the embedding parameter of anti-copying two dimensional code involved in the disclosure, optionally, the acquisition mould
First coding mode is used multi-system Error Correction of Coding mode by block, and second coding mode is used binary error-correcting code side
Formula.Thereby, it is possible to reinforce the secrecy effect of original two-dimensional code.
In the optimization device of the embedding parameter of anti-copying two dimensional code involved in the disclosure, optionally, the acquisition mould
The default modulation system is used pulse amplitude modulation mode by block.Thereby, it is possible to be obtained just by pulse amplitude modulation mode
Beginning two dimensional code.
According to the disclosure, the embedding parameter of two dimensional code can be optimized by being capable of providing one kind, and improve attacking for bootlegging side
Hit the optimization method and device of the embedding parameter of the anti-copying two dimensional code of cost.
Detailed description of the invention
Embodiment of the disclosure will be explained in further detail solely by reference to the example of attached drawing now, in which:
Fig. 1 is to show the process of the optimization method of the embedding parameter of anti-copying two dimensional code involved in the example of the disclosure
Schematic diagram.
Fig. 2 is to show the relationship of the target two dimensional code synthesis number of two dimensional code composite diagram involved in the example of the disclosure
Figure.
Fig. 3 is to show the structure of the optimization device of the embedding parameter of anti-copying two dimensional code involved in the example of the disclosure
Schematic diagram.
Fig. 4 is to show the structure of the optimization equipment of the embedding parameter of anti-copying two dimensional code involved in the example of the disclosure
Schematic diagram.
Specific embodiment
Hereinafter, explaining the preferred embodiment of the disclosure in detail with reference to attached drawing.In the following description, for identical
Component assign identical symbol, the repetitive description thereof will be omitted.Scheme in addition, attached drawing is only schematical.
It should be noted that the specification and claims of the disclosure and term " first " in above-mentioned attached drawing, "
Two ", " third " and " the 4th " etc. are not use to describe a particular order for distinguishing different objects.In addition, term " includes "
" having " and their any deformations, it is intended that cover and non-exclusive include.Such as contain a series of steps or units
Process, method, system, product or equipment be not limited to listed step or unit, but optionally further comprising do not have
The step of listing or unit, or optionally further comprising for the intrinsic other steps of these process, methods, product or equipment or list
Member.
Fig. 1 is to show a kind of optimization method of the embedding parameter of anti-copying two dimensional code involved in the example of the disclosure
Flow diagram.As shown in Figure 1, the optimization method of the embedding parameter of anti-copying two dimensional code includes obtaining original two-dimensional code (step
S100)。
In the step s 100, original two-dimensional code can be electronic two-dimensional code.Original two-dimensional code can based on raw information and
Authentication information obtains.Wherein, raw information can be information that user to be transmitted namely raw information to can be user institute defeated
The information entered, such as character string.Authentication information can be character string, binary bit stream etc..Authentication information can be used for first
The true and false of beginning two dimensional code is authenticated, to verify the authenticity of original two-dimensional code.
In some instances, prepare raw information and authentication information, compiled raw information by the first coding mode
Code obtains coding raw information, encodes authentication information by the second coding mode, obtain encoded authentication information.As a result,
Raw information and authentication information are encoded by different coding modes, enhance original two-dimensional code encryption energy obtained
Power, and improve decryption difficulty.
Specifically, the first coding mode can be multi-system Error Correction of Coding mode, such as reed-solomon (Reed-
Solomon, RS) coding mode.RS coding is a kind of channel coding.RS coding has forward error correction capability, and it is to by correcting
Multinomial caused by over-sampling data is effective.RS coding has stronger anti-interference, noise resisting ability and error correcting capability.Separately
Outside, coding raw information can be one section of binary bit stream being made of " 0 " and " 1 ".Wherein, the second coding mode can be
Binary error-correcting code mode, such as BCH (Bose, Ray-Chaudhuri Hocquenghem) coding mode.BCH code is one
Linear block codes in kind finite field.BCH code has the ability for correcting multiple random errors, commonly used in communication and field of storage
In error correction.Bose-Chaudhuri-Hocquenghem Code can be used for the Multilevel Phase-Shift keying of the power level of prime number grade or prime number.Compared with RS coding, BCH is compiled
The anti-interference of code, noise resisting ability and error correcting capability are weaker.It is made of in addition, encoded authentication information can be one section " 0 " and " 1 "
Binary bit stream.In this case, the first coding mode is different from the second coding mode.It is initial thereby, it is possible to reinforce
The secrecy effect of two dimensional code.
In some instances, it can be carried out simultaneously to the coding behavior of raw information and to the coding behavior of authentication information,
It can also sequentially carry out.When sequence carries out, first raw information can be encoded, first authentication information can also be compiled
Code.
In some instances, the message length of encoded authentication information can be much smaller than the message length of coding raw information.
For example, encoded authentication information can be less than the 30% of coding raw information.For example, the length of encoded authentication information is 100bits,
The length for encoding raw information is 1000bits, and the length of finally obtained target bits stream is 1000bits~1100bits
Between.
In some instances, based on coding raw information and encoded authentication information acquisition original two-dimensional code.Specifically, will
Encoded authentication information embedded coding raw information obtains target bits stream;And according to default modulation system by target bits stream
Gray value is converted to, and is printed and is scanned and then obtain original two-dimensional code.Laser printer, ink-jet can be used in printing
Printer etc..For example, can be printed by the printer of model FUJIP355d.Scan operation can be used flat bed scanner,
Other first-class imaging capture devices of rotating drum image scanner, cell-phone camera.For example, can by the scanner of model BENQK810 into
Row scanning.Thereby, it is possible to further obtain the stronger original two-dimensional code of cryptographic capabilities.
In some instances, encoded authentication information may include multiple segment encoding authentication informations.Each segment encoding is recognized
Card information can obtain target bits stream with embedded coding raw information.Wherein, the mode of insertion for example can be replacement.Change and
Yan Zhi, the partial information encoded in raw information can be replaced by multiple segment encoding authentication informations.Thereby, it is possible to recognize coding
Card information is pretended, and the robustness of the original two-dimensional code of acquisition is improved.For example, the length when encoded authentication information is
100bits, when the length for encoding raw information is 1000bits, encoded authentication information can replace length in coding raw information
It is 1000bits target bits stream thereby, it is possible to obtain length for the partial information of 100bits.Thereby, it is possible to obtain including recognizing
The original two-dimensional code of information is demonstrate,proved, and authentication information has the lower bit error rate.
In addition, each segment encoding authentication information length is identical.Namely encoded authentication information can carry out average segmentation and obtain
Obtain multiple segment encoding authentication informations.The segment encoding authentication information obtained as a result, based on average segmentation, can further be obtained
Original two-dimensional code with the lower bit error rate.
In some instances, default modulation system can use quadrature amplitude modulation (Quadrature Amplitude
Modulation, QAM) mode, quadrature phase shift keying (Quadrature Phase-Shift Keying, QPSK) mode or arteries and veins
Any one of modulated mode.
In some instances, impulse modulation mode can be pulse amplitude modulation (Pulse Amplitude
Modulation, PAM) modulation system.Target bits can be circulated using PAM modulation system and be changed to gray value, and then generated
Original two-dimensional code.
Specifically, target bits stream can be made of " 0 " and " 1 ".Regard two adjacent bits as one group, then
Every group there are 4 kinds of situations, such as " 00 ", " 01 ", " 10 " and " 11 ".Different groups can be modulated to not using PAM modulation system
Same gray value, such as the corresponding gray value of above-mentioned four kinds of situations can be " 40 ", " 100 ", " 160 " and " 220 ".Based on above-mentioned
Four kinds of gray values can obtain original two-dimensional code.Wherein, every group of adjacent two bit is closed in the position of target bits stream
It is the positional relationship one-to-one correspondence with the pixel with corresponding gray value in original two-dimensional code.Impulse amplitude tune is used as a result,
Target bits can be circulated and be changed to gray value by mode processed, and then obtain original two-dimensional code.
The example of the disclosure is without being limited thereto, in other examples, can by adjacent three of target bits stream and with
On binary number regard one group as, different groups can be modulated to using PAM modulation system by different gray values, and obtain initial
Two dimensional code.
In some instances, generate original two-dimensional code device for example can be computer, printer (laser printer,
Ink-jet printer etc.).
In some instances, the optimization method of the embedding parameter of anti-copying two dimensional code can also include to original two-dimensional code into
Row printing and scanning, obtain multiple target two dimensional codes (step S200).
In step s 200, original two-dimensional code is printed and is scanned.Printer and scanner can refer to but unlimited
Description in above-mentioned steps S100.Repetition is printed and scanned to original two-dimensional code, and available multiple are independent identically distributed
Target two dimensional code.
In some instances, the optimization method of the embedding parameter of anti-copying two dimensional code can also include being based on multiple targets two
Code is tieed up, the target two dimensional code of multiple default numbers is synthesized by corresponding two dimensional code composite diagram (step according to the mode being smoothly averaged
Rapid S300).
In step S300, default number for example can be " 1 ", " 2 ", " 3 " etc..It is multiple to be but not limited to
16.
Specifically, the target two dimensional code that default number is 1 can for example be synthesized according to the mode being smoothly averaged
One two dimensional code composite diagram.The target two dimensional code that default number is 10 can be synthesized ten according to the mode being smoothly averaged
Two dimensional code composite diagram.Wherein, default number is more, and the bit error rate of corresponding two dimensional code composite diagram is lower.
In some instances, the optimization method of the embedding parameter of anti-copying two dimensional code can also include calculating two dimensional code synthesis
Mean value, variance and the form factor of figure, and obtained by correction function amendment mean value, variance and form factor and correct mean value, repair
Positive variance and amendment form factor (step S400).
In step S400, it can carry out calculating its mean value, variance and form factor based on two dimensional code composite diagram.It will obtain
Mean value, variance and form factor amendment mean value, revising plan and amendment form factor are obtained by the amendment of correction function.
In some instances, the optimization method of the embedding parameter of anti-copying two dimensional code can also include based on amendment mean value,
Revising plan and amendment form factor know the theoretical correction bit error rate (step S500) by Generalized Gauss function.
It, can be using amendment mean value, revising plan and amendment form factor as Generalized Gauss function in step S500
Parameter is inputted, the theoretical correction bit error rate of every two dimensional code composite diagram is calculated by Generalized Gauss function.
In some instances, the optimization method of the embedding parameter of anti-copying two dimensional code can also include comparing theoretical correction mistake
The error correcting capability of code rate and two dimensional code reduces two dimension when the theoretical correction bit error rate is less than or equal to the error correcting capability of two dimensional code
The error correcting capability of code, to improve the intrusion scene (step S600) of bootlegging side.
In step S600, when the theoretical correction bit error rate is greater than the error correcting capability of two dimensional code, the two dimensional code of bootlegging
It can be identified.When the theoretical correction bit error rate is less than or equal to the error correcting capability of two dimensional code, the two dimensional code of bootlegging is not
It can effectively be identified.Wherein, the error correcting capability of the two dimensional code when the theoretical correction bit error rate is equal to the error correcting capability of two dimensional code
It can regard decision threshold as.
In some instances, when the theoretical correction bit error rate is less than or equal to the error correcting capability of two dimensional code, optimize two dimensional code
Embedding parameter, namely reduce two dimensional code error correcting capability.Thereby, it is possible to so that bootlegging side is synthesized more target two dimensions
Code, to obtain corresponding two dimensional code composite diagram, so that the two dimensional code of new bootlegging cannot be identified effectively.At this
In the case of kind, the intrusion scene of bootlegging side can be improved.
Fig. 2 is to show the relationship of the target two dimensional code synthesis number of two dimensional code composite diagram involved in the example of the disclosure
Figure.Wherein, longitudinal axis representation theory corrects the bit error rate.Horizontal axis indicates that target two dimensional code synthesizes number.Curve A indicates different two dimensional codes
The value of its theoretical correction bit error rate under the scene of the target two dimensional code synthesis number of composite diagram.Straight line B indicates initial two dimensional code
Error correcting capability.Straight line C indicates the error correcting capability of the two dimensional code of adjustment.The lower limit of straight line D expression error correcting capability.The value of straight line D
It can guarantee the bit error rate of the legal two dimensional code under worst scene, the region between straight line B and straight line D means that error correcting capability
Optimization range.With the increase of synthesis number, the theoretical correction bit error rate is in downward trend.As seen from the figure, by ten
When two dimensional code synthesizes, the value of the theoretical correction bit error rate is located at the lower section of straight line B, when downward error correcting capability is to straight line C
It waits, needs the synthesis of 16 target two dimensional codes, can just make the theoretical correction bit error rate lower than C.Thereby, it is possible to improve attack at
This.
In the disclosure, original two-dimensional code is obtained, and multiple target two dimensional codes are obtained based on original two-dimensional code, according to smooth
The target two dimensional code of multiple default numbers is synthesized corresponding two dimensional code composite diagram by the mode being averaged, and two dimensional code conjunction is calculated
At figure mean value, variance and form factor and the amendment bit error rate, compare the error correcting capability of the theoretical correction bit error rate and two dimensional code, it is excellent
Change embedding parameter.Thereby, it is possible to optimize the embedding parameter of two dimensional code, and improve the intrusion scene of bootlegging side.
Fig. 3 is to show the structure of the optimization device of the embedding parameter of anti-copying two dimensional code involved in the example of the disclosure
Schematic diagram.As shown in figure 3, the optimization device 1 of the embedding parameter of anti-copying two dimensional code includes obtaining module 11, print scanned module
12, synthesis module 13, computing module 14 and comparison module 15.
In some instances, obtaining module 11 can be used for obtaining original two-dimensional code.Wherein, it obtains module and prepares original letter
Breath and authentication information, are encoded raw information by the first coding mode, obtain coding raw information, pass through the second coding
Mode encodes authentication information, obtains encoded authentication information.First coding mode uses multi-system Error Correction of Coding mode, example
Such as RS coding mode, the second coding mode is used into binary error-correcting code mode, such as Bose-Chaudhuri-Hocquenghem Code mode.
In some instances, original two-dimensional code can be obtained based on coding raw information and authentication information by obtaining module 11.
Specifically, whole section of embedded coding raw information of encoded authentication information is obtained target bits stream;It will according to default modulation system
Target bits circulation is changed to gray value, and is printed and scanned and then obtain original two-dimensional code.Default modulation system can adopt
With pulse amplitude modulation mode.The function of obtaining module 11 specifically may refer to step S100.
In some instances, print scanned module 12 can be used for that original two-dimensional code is printed and scanned, and obtain more
Open target two dimensional code.It specifically may refer to step S200.
In some instances, synthesis module 13 can be used for multiple target two dimensional codes, according to the mode being smoothly averaged
The target two dimensional code of multiple default numbers is synthesized into corresponding two dimensional code composite diagram.It specifically may refer to step S300.
In some instances, computing module 14 can be used for calculating the mean value, variance and form factor of two dimensional code composite diagram,
And amendment mean value, revising plan and amendment form factor are obtained by correction function amendment mean value, variance and form factor;To repairing
Positive mean value, revising plan and amendment form factor know the theoretical correction bit error rate by Generalized Gauss function.Specifically it may refer to
Step S400 and step S500.
In some instances, comparison module 15 can be used for comparing the error correcting capability of the theoretical correction bit error rate and two dimensional code,
When the theoretical correction bit error rate is less than or equal to the error correcting capability of two dimensional code, the error correcting capability of two dimensional code is reduced, it is illegal to improve
The intrusion scene of duplication side.It specifically may refer to step S600.
This disclosure relates to a kind of optimization equipment of the embedding parameter of anti-copying two dimensional code.Fig. 4 is to show showing for the disclosure
The structural schematic diagram of the optimization equipment of the embedding parameter of anti-copying two dimensional code involved in example.
In the disclosure, the optimization of the embedding parameter of anti-copying two dimensional code as shown in Figure 4 includes processor 21 and memory
22.Wherein, processor 21 and memory 22 are separately connected communication bus.Memory 22 can be high speed RAM memory, can also
To be non-volatile memory (non-volatile memory).Memory 22 may include the program for storing program code
The data storage area of memory block and transmission data-signal.It will be understood by those skilled in the art that anti-copying shown in Fig. 4 is two-dimentional
The structure of optimization equipment 1 of the embedding parameter of code does not constitute the restriction to the disclosure, it, can also either busbar network
It can also include perhaps combining certain components or difference than more or fewer components shown in Fig. 4 to be hub-and-spoke configuration
Component layout.
Wherein, processor 21 is the control centre of the optimization equipment 1 of the embedding parameter of anti-copying two dimensional code.Processor 21 can
To be central processing unit (Central Processing Unit, CPU).Processor 21 is whole using various interfaces and connection
The various pieces of the optimization equipment 1 of the embedding parameter of a anti-copying two dimensional code, are stored in memory 22 by running or executing
Software program and/or module, and the program code for being stored in and storing in the program storage area of memory 22 is called, for holding
The following operation of row:
Obtain original two-dimensional code;Original two-dimensional code is printed and scanned, multiple target two dimensional codes are obtained;Based on multiple
The target two dimensional code of multiple default numbers is synthesized corresponding two dimensional code according to the mode being smoothly averaged and synthesized by target two dimensional code
Figure;Calculate mean value, variance and the form factor of two dimensional code composite diagram, and by correction function amendment mean value, variance and shape because
Son obtains amendment mean value, revising plan and amendment form factor;Passed through based on amendment mean value, revising plan and amendment form factor
Generalized Gauss function knows the theoretical correction bit error rate;And the error correcting capability for comparing the theoretical correction bit error rate and two dimensional code, works as reason
When being less than or equal to the error correcting capability of two dimensional code by the amendment bit error rate, the error correcting capability of two dimensional code is reduced, to improve bootlegging
The intrusion scene of side.
In the present embodiment, the processor 21 of the optimization equipment 1 of the embedding parameter of the anti-copying two dimensional code of transmitting terminal
It also executes following operation: preparing raw information and authentication information, raw information is encoded by the first coding mode, is obtained
Raw information is encoded, authentication information is encoded by the second coding mode, obtains encoded authentication information;It is original based on encoding
Information and authentication information obtain original two-dimensional code.
In the present embodiment, the processor 21 of the optimization equipment 1 of the embedding parameter of the anti-copying two dimensional code of transmitting terminal
It also executes following operation: by whole section of embedded coding raw information of encoded authentication information, obtaining target bits stream;According to default modulation
Target bits circulation is changed to gray value by mode, and is printed and scanned and then obtain original two-dimensional code.
In the present embodiment, the processor 21 of the optimization equipment 1 of the embedding parameter of the anti-copying two dimensional code of transmitting terminal
Also execute following operation: the first coding mode uses RS coding mode, and the second coding mode uses Bose-Chaudhuri-Hocquenghem Code mode.
In the present embodiment, the processor 21 of the optimization equipment 1 of the embedding parameter of the anti-copying two dimensional code of transmitting terminal
Also execute following operation: default modulation system uses pulse amplitude modulation mode.
In the present embodiment, it should be understood that disclosed equipment can be realized in other ways.More than for example,
Described equipment embodiment is only schematical, such as the division of unit, only a kind of logical function partition, practical
There may be another division manner when realization, such as multiple units or components may be combined or can be integrated into another and be
System, or some features can be ignored or not executed.Another point, shown or discussed mutual coupling or direct-coupling
Or communication connection can be through some interfaces, the indirect coupling or communication connection of device or unit can be electrical or other
Form.
Unit may or may not be physically separated as illustrated by the separation member, shown as a unit
Component may or may not be physical unit, it can and it is in one place, or may be distributed over multiple networks
On unit.It can some or all of the units may be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
In addition, each functional unit in the present embodiment can integrate in one processing unit, it is also possible to each
Unit physically exists alone, and can also be integrated in one unit with two or more units.Above-mentioned integrated unit both may be used
To use formal implementation of hardware, can also realize in the form of software functional units.
It, can if integrated unit is realized in the form of SFU software functional unit and when sold or used as an independent product
To be stored in a computer-readable access to memory.Based on this understanding, the technical solution of the disclosure is substantially in other words
The all or part of the part that contributes to existing technology or the technical solution can embody in the form of software products
Come, which is stored in a memory, including some instructions are used so that a computer equipment (can be
Personal computer, server or network equipment etc.) execute each embodiment method of the disclosure all or part of the steps.And it is preceding
The memory stated includes: USB flash disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random
Access Memory), mobile hard disk, the various media that can store program code such as magnetic or disk.
Present embodiment discloses a kind of computer readable storage medium, those of ordinary skill in the art will appreciate that above-mentioned public affairs
All or part of the steps in the optimization method of the embedding parameter for the various anti-copying two dimensional codes opened is (can be referred to by program
Enable) it is completed to instruct relevant hardware, which can store in computer-readable memory (storage medium),
Memory may include: flash disk, read-only memory (English: Read-Only Memory, abbreviation: ROM), random access device
(English: Random Access Memory, abbreviation: RAM), disk or CD etc..
Although being illustrated in conjunction with the accompanying drawings and embodiments to the disclosure above, it will be appreciated that above description
The disclosure is not limited in any form.Those skilled in the art can without departing from the connotation and range of the disclosure
To be deformed and be changed to the disclosure as needed, these deformations and variation are each fallen in the scope of the present disclosure.
Claims (10)
1. a kind of optimization method of the embedding parameter of anti-copying two dimensional code, which is characterized in that
Include:
Obtain original two-dimensional code;
The original two-dimensional code is printed and scanned, multiple target two dimensional codes are obtained;
Based on target two dimensional code described in multiple, according to the mode being smoothly averaged by the target two dimensional code of multiple default numbers
Synthesize corresponding two dimensional code composite diagram;
It calculates mean value, variance and the form factor of the two dimensional code composite diagram, and corrects the mean value, described by correction function
Variance and the form factor obtain amendment mean value, revising plan and amendment form factor;
Know that theory is repaired by Generalized Gauss function based on the amendment mean value, the revising plan and the amendment form factor
The positive bit error rate;And
The error correcting capability for comparing the theoretical correction bit error rate and two dimensional code, when the theoretical correction bit error rate is less than or equal to institute
When stating the error correcting capability of two dimensional code, the error correcting capability of the two dimensional code is reduced, to improve the intrusion scene of bootlegging side.
2. optimization method according to claim 1, which is characterized in that
Further include:
Prepare raw information and authentication information, encoded the raw information by the first coding mode, it is former to obtain coding
The authentication information is encoded by the second coding mode, obtains encoded authentication information by beginning information;
The original two-dimensional code is obtained based on the coding raw information and the authentication information.
3. optimization method according to claim 2, which is characterized in that
By whole section of the encoded authentication information insertion coding raw information, target bits stream is obtained;
Target bits circulation is changed to gray value according to default modulation system, and is printed and is scanned and then obtained initial
Two dimensional code.
4. optimization method according to claim 2, which is characterized in that
First coding mode uses multi-system Error Correction of Coding mode,
Second coding mode uses binary error-correcting code mode.
5. optimization method according to claim 3, which is characterized in that
The default modulation system uses pulse amplitude modulation mode.
6. a kind of optimization device of the embedding parameter of anti-copying two dimensional code, which is characterized in that
Include:
Module is obtained, is used to obtain original two-dimensional code;
Print scanned module is used to that the original two-dimensional code to be printed and be scanned, obtains multiple target two dimensional codes;
Synthesis module, is used for multiple target two dimensional codes, according to the mode being smoothly averaged by multiple default numbers
The target two dimensional code synthesizes corresponding two dimensional code composite diagram;
Computing module is used to calculate mean value, variance and the form factor of the two dimensional code composite diagram, and repairs by correction function
The just described mean value, the variance and the form factor obtain amendment mean value, revising plan and amendment form factor;It is repaired to described
Positive mean value, the revising plan and the amendment form factor know the theoretical correction bit error rate by Generalized Gauss function;And
Comparison module is used for the error correcting capability of the theoretical correction bit error rate and two dimensional code described in comparison, when the theoretical correction misses
When code rate is less than or equal to the error correcting capability of the two dimensional code, the error correcting capability of the two dimensional code is reduced, to improve bootlegging
The intrusion scene of side.
7. optimization device as claimed in claim 6, which is characterized in that
The acquisition module prepares raw information and authentication information, is compiled the raw information by the first coding mode
Code obtains coding raw information, encodes the authentication information by the second coding mode, obtain encoded authentication information;
The original two-dimensional code is obtained based on the coding raw information and the authentication information.
8. optimization device as claimed in claim 7, which is characterized in that
Whole section of the encoded authentication information insertion coding raw information is obtained target bits stream, pressed by the acquisition module
Target bits circulation is changed to gray value according to default modulation system, and is printed and is scanned and then obtain original two-dimensional
Code.
9. optimization device as claimed in claim 7, which is characterized in that
First coding mode is used multi-system Error Correction of Coding mode by the acquisition module,
Second coding mode is used into binary error-correcting code mode.
10. optimization device as claimed in claim 8, which is characterized in that
The default modulation system is used pulse amplitude modulation mode by the acquisition module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910083224.6A CN109829529B (en) | 2019-01-18 | 2019-01-18 | Method and device for optimizing embedded parameters of anti-copy two-dimensional code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910083224.6A CN109829529B (en) | 2019-01-18 | 2019-01-18 | Method and device for optimizing embedded parameters of anti-copy two-dimensional code |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109829529A true CN109829529A (en) | 2019-05-31 |
CN109829529B CN109829529B (en) | 2021-05-25 |
Family
ID=66862734
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910083224.6A Active CN109829529B (en) | 2019-01-18 | 2019-01-18 | Method and device for optimizing embedded parameters of anti-copy two-dimensional code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109829529B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090255992A1 (en) * | 2006-04-29 | 2009-10-15 | Gmedia Corporation | System for Synthesizing a Two Dimensional Code and a Logo and the Method Thereof |
US20130026241A1 (en) * | 2011-07-25 | 2013-01-31 | Sakahashi Koji | Device and its use for creation, output and management of 2d barcodes with embedded images |
CN105095935A (en) * | 2015-06-01 | 2015-11-25 | 深圳大学 | Low-density high-coding-capcity lattice two-dimensional code integrated with chaos encryption technology |
CN106203571A (en) * | 2016-07-11 | 2016-12-07 | 搜油郎成都科技有限公司 | Image production method based on Quick Response Code and recognition methods and realize system |
CN206863799U (en) * | 2017-05-08 | 2018-01-09 | 广州市中崎商业机器股份有限公司 | A kind of intelligent express system based on Quick Response Code |
CN107909133A (en) * | 2017-11-15 | 2018-04-13 | 深圳大学 | Two-dimensional code generation method, Quick Response Code coding/decoding method and terminal |
CN108229596A (en) * | 2016-12-09 | 2018-06-29 | 北京大码技术有限公司 | Combined two-dimension code, digital certificates carrier, generation, reading device and method |
CN108345925A (en) * | 2017-01-24 | 2018-07-31 | 北京大码技术有限公司 | Generation, reading method and the device of composite type two-dimensional code |
-
2019
- 2019-01-18 CN CN201910083224.6A patent/CN109829529B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090255992A1 (en) * | 2006-04-29 | 2009-10-15 | Gmedia Corporation | System for Synthesizing a Two Dimensional Code and a Logo and the Method Thereof |
US20130026241A1 (en) * | 2011-07-25 | 2013-01-31 | Sakahashi Koji | Device and its use for creation, output and management of 2d barcodes with embedded images |
CN105095935A (en) * | 2015-06-01 | 2015-11-25 | 深圳大学 | Low-density high-coding-capcity lattice two-dimensional code integrated with chaos encryption technology |
CN106203571A (en) * | 2016-07-11 | 2016-12-07 | 搜油郎成都科技有限公司 | Image production method based on Quick Response Code and recognition methods and realize system |
CN108229596A (en) * | 2016-12-09 | 2018-06-29 | 北京大码技术有限公司 | Combined two-dimension code, digital certificates carrier, generation, reading device and method |
CN108345925A (en) * | 2017-01-24 | 2018-07-31 | 北京大码技术有限公司 | Generation, reading method and the device of composite type two-dimensional code |
CN206863799U (en) * | 2017-05-08 | 2018-01-09 | 广州市中崎商业机器股份有限公司 | A kind of intelligent express system based on Quick Response Code |
CN107909133A (en) * | 2017-11-15 | 2018-04-13 | 深圳大学 | Two-dimensional code generation method, Quick Response Code coding/decoding method and terminal |
Also Published As
Publication number | Publication date |
---|---|
CN109829529B (en) | 2021-05-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11042791B2 (en) | Method and apparatus for generating and reading composite two-dimensional code | |
CN109818739B (en) | Generation type image steganography method based on countermeasure network | |
Zhang et al. | Fragile watermarking with error-free restoration capability | |
Bulan et al. | Orientation modulation for data hiding in clustered-dot halftone prints | |
Lee et al. | A secret-sharing-based method for authentication of grayscale document images via the use of the PNG image with a data repair capability | |
CN109840576A (en) | The generation method and coding/decoding method of anti-copying two dimensional code based on segmentation insertion | |
EP1340188B1 (en) | Method of encoding a handwritten signature | |
CN103761702A (en) | Image hiding and authentication method based on secret sharing | |
CN104881838B (en) | One kind is based on GF (23) (K, N) significant point deposited without expansion image and reconstructing method | |
CN107846530A (en) | Digital watermarking algorithm | |
CN108960387B (en) | Anti-counterfeiting two-dimensional code and generation and identification method thereof | |
Liu et al. | Rich QR codes with three-layer information using hamming code | |
Cheung et al. | A sequential quantization strategy for data embedding and integrity verification | |
WO2020199500A1 (en) | Clone-proof qr code and anti-counterfeiting qr code authentication method for qr code | |
Artiles et al. | Robust image watermarking algorithm using chaotic sequences | |
Villán et al. | Tamper-proofing of electronic and printed text documents via robust hashing and data-hiding | |
Lu et al. | An effective maximum distortion controlling technology in the dual-image-based reversible data hiding scheme | |
CN109829529A (en) | The optimization method and device of the embedding parameter of anti-copying two dimensional code | |
CN104702814B (en) | (K, N) Image of Meaningful based on triple backups point is deposited and restoration methods | |
CN109447886B (en) | Binding to EMD-2 1 Embedded multi-carrier secret map separate storage method with recovery | |
Yang et al. | Weighted bipartite graph for locating optimal LSB substitution for secret embedding | |
Chang et al. | Secret image hiding and sharing based on the (t, n)-threshold | |
Lien et al. | Dispersed data hiding using hamming code with recovery capability | |
CN109840574B (en) | Two-dimensional code information hiding method and device, electronic equipment and storage medium | |
CN108171665A (en) | A kind of multi version backup and restricted double authentication master key (t, s, k, n) image separate-management method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |