CN117499551B - Encryption anti-counterfeiting printing method based on binary signals - Google Patents

Encryption anti-counterfeiting printing method based on binary signals Download PDF

Info

Publication number
CN117499551B
CN117499551B CN202410001213.XA CN202410001213A CN117499551B CN 117499551 B CN117499551 B CN 117499551B CN 202410001213 A CN202410001213 A CN 202410001213A CN 117499551 B CN117499551 B CN 117499551B
Authority
CN
China
Prior art keywords
image
sub
binary
counterfeiting
matrix
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410001213.XA
Other languages
Chinese (zh)
Other versions
CN117499551A (en
Inventor
靳磊
胡海滨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin Zrp Printing Technology Co ltd
Original Assignee
Tianjin Zrp Printing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin Zrp Printing Technology Co ltd filed Critical Tianjin Zrp Printing Technology Co ltd
Priority to CN202410001213.XA priority Critical patent/CN117499551B/en
Publication of CN117499551A publication Critical patent/CN117499551A/en
Application granted granted Critical
Publication of CN117499551B publication Critical patent/CN117499551B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B41PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
    • B41MPRINTING, DUPLICATING, MARKING, OR COPYING PROCESSES; COLOUR PRINTING
    • B41M3/00Printing processes to produce particular kinds of printed work, e.g. patterns
    • B41M3/14Security printing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Abstract

The invention provides an encryption anti-counterfeiting printing method based on binary signals, which relates to the technical field of encryption anti-counterfeiting printing calculation, and is used for acquiring an image to be printed, dividing the preprocessed image into a plurality of sub-block images, encrypting pixel values of each sub-block image, and obtaining an encrypted gray characteristic value matrix of each sub-block image; converting the encrypted pixel value matrix of each sub-block image into a binary matrix, and performing splicing, splitting and combining treatment on the binary matrix to form an anti-counterfeiting mark array matrix; combining the anti-counterfeiting mark array matrixes of each sub-block image to obtain anti-counterfeiting marks, and embedding the anti-counterfeiting marks into the middle of the image to be printed; and carrying out position transformation operation on each character image in the image to be printed, and replacing each character image in the image to be printed with the character image subjected to the position transformation operation, so that anti-counterfeiting printing is realized, the interference of anti-counterfeiting patterns is small, and the stability is high.

Description

Encryption anti-counterfeiting printing method based on binary signals
Technical Field
The invention relates to the technical field of encryption anti-counterfeiting printing, in particular to an encryption anti-counterfeiting printing method based on binary signals.
Background
The common anti-counterfeiting methods in the prior art include the following steps: the first is a laser anti-counterfeiting mark, the logo or special identification pattern of the product is printed into an anti-counterfeiting label of the product by using a laser recessive ink fluorescent ink printing technology, and the same type of product uses the same label, so that the anti-counterfeiting label is easy to forge, and the forged anti-counterfeiting label is used on a fake product, so that the authenticity of the product is confused, and the effective anti-counterfeiting is difficult. The second is the cipher antifake label, its adopted method is that each product encodes a series of numbers, the code of each product is different, print this number on the label and cover up, store this number in the computer database that can supply consumer to inquire at the same time, when consumers purchase products, input the number on the sign into the computer database through the telephone or network computer to compare and discern, the same is true, the difference is false, the method is simple, discern easy, difficult counterfeit, but in actual use, because the code data is printed the label after the computer is produced uniformly. The true and false code data representing the product can be copied illegally to be counterfeited, meanwhile, the code can also recycle the code on the product which is not inquired to be counterfeited to be attached to the fake product, and the anti-counterfeiting effect is difficult to ensure. The third is texture anti-counterfeiting, the texture features on the labels are used for anti-counterfeiting, and the labels are difficult to forge, but only the serial number of the labels is set, and the labels are clear codes, each label can be repeatedly inquired, and counterfeiters can forge the serial numbers on the labels and the necessary texture features reflected in inquiring, namely whether the images in the square are plagiarism or not, in batches according to the features through warehouse safemen or salesperson. In summary, the existing anti-counterfeiting methods have certain defects, so that the counterfeiting of the product cannot be prevented at all.
Electronic content is inevitably subject to digital-to-analog signal conversion, analog-to-digital signal conversion, and sampling attacks on the electronic content information during printing and scanning recognition, resulting in partial information loss. When the digital content is embedded with anti-counterfeiting information or forms an anti-counterfeiting mark in the low frequency of the Fourier space, the anti-counterfeiting mark has high visibility on the change of the original digital content, but has high robustness against D/A conversion, sampling and A/D conversion; when anti-fake information is embedded in a high-frequency area of a Fourier space of digital content or anti-fake marks are formed, the visibility of change of an original image is low, but the robustness of D/A conversion resistance and A/D conversion resistance is low, in order to change the original information of the digital content to the minimum extent, the anti-fake information is embedded in the high-frequency area, but the anti-fake performance is invalid due to printing and recognition processes, in addition, a document is different from a general image, and the anti-fake method has the characteristic of small information quantity from the angle of the image, so that the anti-fake information cannot be directly embedded in characters by the digital anti-fake method in the prior art.
Disclosure of Invention
In order to solve the technical problems, the invention provides an encryption anti-counterfeiting printing method based on binary signals, which comprises the following steps:
s1, acquiring an image to be printed, and preprocessing the image;
S2, dividing the preprocessed image into a plurality of sub-block images, and encrypting pixel values of each sub-block image to obtain an encrypted gray characteristic value matrix of each sub-block image;
s3, converting the encrypted pixel value matrix of each sub-block image into a binary matrix, and performing splicing, splitting and combining treatment on the binary matrix to form an anti-counterfeiting mark array matrix;
S4, combining the anti-counterfeiting mark array matrixes of each sub-block image to obtain anti-counterfeiting marks, and embedding the anti-counterfeiting marks into the middle of the image to be printed;
s5, carrying out position transformation operation on each text image in the image to be printed, and replacing each text image in the image to be printed with the text image subjected to the position transformation operation.
Further, step S2 includes:
S21, dividing the preprocessed image into a plurality of sub-block images, and assuming that the pixel gray value of the sub-block image of each sub-block image at (i, j) is N ij, and the pixel gray value of the sub-block image at (i, j) obtained after processing is B ij;
S22, if N ij is more than 127, then: let B ij = 255;
Otherwise: b ij = 0;
S23, calculating gray level difference E ij:Eij=Nij-Bij of the sub-block image pixels;
S24, respectively adding the gray level difference E ij with the gray level value N ij of the sub-block image pixel at the corresponding position to obtain an encrypted gray characteristic value F ij;
And S25, traversing each pixel of each sub-block image, wherein the traversing sequence is required to be performed from top to bottom in a row, and the traversing sequence of the pixels is from left to right in each row, so as to obtain an encrypted gray characteristic value matrix F of each sub-block image.
Further, step S3 includes:
S31, setting P numbers before and after decimal points of each gray characteristic value F ij, and performing binary conversion on the gray characteristic values F ij to obtain a binary matrix of P dimensions, wherein each row of the binary matrix represents one of the P numbers;
S32, respectively scanning the converted P-dimensional binary matrix according to rows, sorting according to the size of the number represented by each row, and performing decreasing splicing to form a binary number column S;
S33, intercepting and splitting the descending ordered sequence S into J binary character strings, setting 2 (J-1) binary characters in total for the descending ordered sequence S, taking the former L-1 bit binary character to form a first binary character string, removing the first character string, taking the former L-1 bit binary character to form a second binary character string, and analogizing the first binary character string until the L-1 bit binary character is the L-th binary character string, and combining the L binary character strings together to obtain the anti-counterfeiting mark array matrix.
Further, in step S5, the position transformation operation transformation formula is:
Wherein, 、/>Representing the coordinate position of the nth pixel point in the image to be printed before transformation,/>、/>The positions of the corresponding pixel points after transformation are represented, a and b are modulo parameters, C represents the iteration times, and mod is modulo operation.
Further, in step S1, binarizing the image after median filtering by using an optimal threshold method, and assuming that S (z) represents the sum of the target unimodal density function and the background unimodal density function, the mixed probability density formula of the pixel point z is:
wherein S 1 is background region gray value prior probability, S 2 is target region gray value prior probability, S 1+S2 =1; the mean square error of the background area is Target area mean square error is/>; Background area average area value is/>The average area value of the target area is
Further, the minimum threshold T is:
and according to the threshold T, binarizing the image.
Further, the background pixel probability E 1 (T) is:
the target pixel probability E 2 (T) is:
the total error probability E (T) is: e (T) =s 2×E1(T)+S1×E2 (T).
Compared with the prior art, the invention has the following beneficial technical effects: acquiring an image to be printed, and preprocessing the image; dividing the preprocessed image into a plurality of sub-block images, and encrypting pixel values of each sub-block image to obtain an encrypted gray characteristic value matrix of each sub-block image; converting the encrypted pixel value matrix of each sub-block image into a binary matrix, and performing splicing, splitting and combining treatment on the binary matrix to form an anti-counterfeiting mark array matrix; combining the anti-counterfeiting mark array matrixes of each sub-block image to obtain anti-counterfeiting marks, and embedding the anti-counterfeiting marks into the middle of the image to be printed; and carrying out position transformation operation on each character image in the image to be printed, and replacing each character image in the image to be printed with the character image subjected to the position transformation operation, so that anti-counterfeiting printing is realized, the interference of anti-counterfeiting patterns is small, and the stability is high.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the description of the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort to a person skilled in the art.
FIG. 1 is a flow chart of the binary signal based encryption anti-counterfeit printing method of the present invention;
fig. 2 is a flowchart of encrypting a pixel value of each sub-block image to obtain an encrypted pixel value matrix of each sub-block image according to the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
In the drawings of the specific embodiments of the present invention, in order to better and more clearly describe the working principle of each element in the system, the connection relationship of each part in the device is represented, but only the relative positional relationship between each element is clearly distinguished, and the limitations on the signal transmission direction, connection sequence and the structure size, dimension and shape of each part in the element or structure cannot be constructed.
As shown in fig. 1, a flowchart of the binary signal-based encryption anti-counterfeit printing method of the present invention includes:
s1, acquiring an image to be printed, and preprocessing the image.
S11, image graying.
The image acquisition device acquires a color image, which contains a large amount of information, and has a large amount of computation when processing the color image, so that the gray-scale operation needs to be performed on the color image first. The gray value I has a calculation formula of i=0.3 r+0.59g+0.11b.
S12, median filtering of the image. The image acquisition process of the printing information is often interfered by various noises, and the images are often deformed by edge burrs, isolated point noises and the like. In order to improve encryption anti-counterfeiting efficiency, filtering and denoising treatment should be performed.
The square window in the median filtering can well remove noise in the image, and meanwhile, the image edge can be prevented from being affected. Preferably, a square window of 3x3 using a median filtering template is determined to be the best.
S13, binarizing the image.
In this embodiment, the image after median filtering is binarized by using an optimal threshold method, and s (z) is set to represent the sum of the target unimodal density function and the background unimodal density function, so that the mixed probability density formula of the pixel point z is as follows:
wherein S 1 is background region gray value prior probability, S 2 is target region gray value prior probability, S 1+S2 =1; the mean square error of the background area is Target area mean square error is/>; Background area average area value is/>The average area value of the target area is
The background pixel probability E 1 (T) is:
the target pixel probability E 2 (T) is:
The total error probability E (T) is: e (T) =s 2×E1(T)+S1×E2 (T);
Order the The threshold T at which the error is minimum is obtained, and the following equation is obtained:
S1×s1(T)=S2×s2(T)。
and according to the threshold T, binarizing the image.
S2, dividing the preprocessed image into a plurality of sub-block images, and encrypting the pixel value of each sub-block image to obtain an encrypted pixel value matrix of each sub-block image. As shown in fig. 2, the method comprises the following steps:
S21, dividing the preprocessed image into a plurality of sub-block images, and assuming that the pixel gray value of the sub-block image of each sub-block image at (i, j) is N ij, and the pixel gray value of the sub-block image of each sub-block image at (i, j) obtained after processing is B ij;
S22, if N ij is more than 127, then: let B ij = 255;
Otherwise: b ij = 0;
S23, calculating gray level difference E ij:Eij=Nij-Bij of the sub-block image pixels;
S24, respectively adding the gray level difference E ij with the gray level value N ij of the sub-block image pixel at the corresponding position to obtain an encrypted gray characteristic value F ij;
And S25, traversing each pixel of each sub-block image, wherein the traversing sequence is required to be performed from top to bottom in a row, and the traversing sequence of the pixels is from left to right in each row, so as to obtain an encrypted gray characteristic value matrix F of each sub-block image.
S3, converting the encrypted pixel value matrix of each sub-block image into a binary matrix, and performing splicing, splitting and combining treatment on the binary matrix to form an anti-counterfeiting mark array matrix.
S31, setting P numbers before and after decimal points of each gray characteristic value F ij, and performing binary conversion on the gray characteristic values F ij to obtain a binary matrix of P dimensions, wherein each row of the binary matrix represents one of the P numbers;
s32, scanning the converted P-dimensional binary matrix according to rows, sorting according to the size of the number represented by each row, and performing decreasing splicing to form a binary number column S.
S33, intercepting and splitting the descending ordered sequence S into J binary character strings, setting 2 (J-1) binary characters in total for the descending ordered sequence S, taking the former L-1 bit binary character to form a first binary character string, removing the first character string, taking the former L-1 bit binary character to form a second binary character string, and analogizing the first binary character string until the L-1 bit binary character is the L-th binary character string, and combining the L binary character strings together to obtain the anti-counterfeiting mark array matrix.
S4, combining the anti-counterfeiting mark array matrixes of each sub-block image to obtain anti-counterfeiting marks, and embedding the anti-counterfeiting marks into the middle of the image to be printed.
The combining of the matrix of the anti-counterfeiting mark array of each sub-block image can be performed by any matrix combining mode in the prior art, such as addition, subtraction and the like.
S5, carrying out position transformation operation on each text image in the image to be printed, and replacing each text image in the image to be printed with the text image subjected to the position transformation operation.
In order to make the pseudo-random effect of image modulation better, and also to reduce the regular arrangement of printing templates, the position transformation operation is performed on the image to be printed.
An image to be printed with a size of A x B pixels is set, and a position transformation operation transformation formula is as follows:
Wherein, 、/>Representing the coordinate position of the nth pixel point in the image to be printed before transformation,/>、/>The positions of the corresponding pixel points after transformation are represented, a and b are modulo parameters, C represents the iteration times, and mod is modulo operation.
The position transformation operation is to transform the pixels of the image into positions through a formula, so that the processed image can not recognize the original text information, and the visual resolution is very disordered, thereby realizing the encryption of the text image. The number of image scrambling and reduction times varies for different sizes.
The color image embedded with the anti-fake mark array matrix is formed into a composite digital color anti-fake image, the composite digital color image has a two-layer structure, the bottom is a priming ink layer which is in direct contact with the surface of the printed matter body, and the top is an image printing layer which is used for printing the composite digital color anti-fake image.
In the preferred embodiment, the top image printing layer utilizes the characteristic of medium-frequency distribution of filtering to set anti-counterfeiting shading in a color image to be printed, solves the problems that when anti-counterfeiting information is printed or scanned and identified, an original signal is changed, D/A and A/D conversion attack is difficult to resist and the like, is not easy to imitate or copy, realizes printing anti-counterfeiting of documents such as contracts, notes and the like, can be directly applied to the surface of a printed matter body, verifies the authenticity of the printed matter through any image contained in a composite digital color anti-counterfeiting image, and has small anti-counterfeiting pattern interference and high stability.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present application, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted across a computer-readable storage medium. The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), etc.
While the application has been described with reference to certain preferred embodiments, it will be understood by those skilled in the art that various changes and substitutions of equivalents may be made and equivalents will be apparent to those skilled in the art without departing from the scope of the application. Therefore, the protection scope of the application is subject to the protection scope of the claims.

Claims (1)

1. An encryption anti-counterfeiting printing method based on binary signals is characterized by comprising the following steps:
s1, acquiring an image to be printed, and preprocessing the image;
S2, dividing the preprocessed image into a plurality of sub-block images, and encrypting pixel values of each sub-block image to obtain an encrypted gray characteristic value matrix of each sub-block image;
S21, dividing the preprocessed image into a plurality of sub-block images, and assuming that the pixel gray value of the sub-block image of each sub-block image at (i, j) is N ij, and the pixel gray value of the sub-block image at (i, j) obtained after processing is B ij;
S22, if N ij is more than 127, then: let B ij = 255;
Otherwise: b ij = 0;
S23, calculating gray level difference E ij:Eij=Nij-Bij of the sub-block image pixels;
S24, respectively adding the gray level difference E ij with the gray level value N ij of the sub-block image pixel at the corresponding position to obtain an encrypted gray characteristic value F ij;
s25, traversing each pixel of each sub-block image, wherein the traversing sequence is required to be carried out from top to bottom in a row-to-row manner, and the traversing sequence of the pixels is from left to right in each row, so as to obtain an encrypted gray characteristic value matrix F of each sub-block image;
s3, converting the encrypted pixel value matrix of each sub-block image into a binary matrix, and performing splicing, splitting and combining treatment on the binary matrix to form an anti-counterfeiting mark array matrix;
S31, setting P numbers before and after decimal points of each gray characteristic value F ij, and performing binary conversion on the gray characteristic values F ij to obtain a binary matrix of P dimensions, wherein each row of the binary matrix represents one of the P numbers;
S32, respectively scanning the converted P-dimensional binary matrix according to rows, sorting according to the size of the number represented by each row, and performing decreasing splicing to form a binary number column S;
S33, intercepting and splitting the descending ordered sequence S into J binary character strings, setting 2 (J-1) binary characters in total for the descending ordered sequence S, taking the former L-1 bit binary character to form a first binary character string, removing the first character string, taking the former L-1 bit binary character to form a second binary character string, and analogizing in sequence until the L-1 bit binary character is the L-th binary character string, and combining the L binary character strings together to obtain an anti-counterfeiting mark array matrix;
S4, combining the anti-counterfeiting mark array matrixes of each sub-block image to obtain anti-counterfeiting marks, and embedding the anti-counterfeiting marks into the middle of the image to be printed;
S5, carrying out position transformation operation on each character image in the image to be printed, and replacing each character image in the image to be printed with the character image subjected to the position transformation operation;
The position transformation operation transformation formula is as follows:
Wherein, 、/>Representing the coordinate position of the nth pixel point in the image to be printed before transformation,/>、/>The positions of the corresponding pixel points after transformation are represented, a and b are modulo parameters, C represents the iteration times, and mod is modulo operation.
CN202410001213.XA 2024-01-02 2024-01-02 Encryption anti-counterfeiting printing method based on binary signals Active CN117499551B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410001213.XA CN117499551B (en) 2024-01-02 2024-01-02 Encryption anti-counterfeiting printing method based on binary signals

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410001213.XA CN117499551B (en) 2024-01-02 2024-01-02 Encryption anti-counterfeiting printing method based on binary signals

Publications (2)

Publication Number Publication Date
CN117499551A CN117499551A (en) 2024-02-02
CN117499551B true CN117499551B (en) 2024-04-23

Family

ID=89678562

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410001213.XA Active CN117499551B (en) 2024-01-02 2024-01-02 Encryption anti-counterfeiting printing method based on binary signals

Country Status (1)

Country Link
CN (1) CN117499551B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103440617A (en) * 2013-09-18 2013-12-11 黄良永 Image processing method for improving safety of medical image
JP2016012028A (en) * 2014-06-27 2016-01-21 シャープ株式会社 Image obfuscation device, image obfuscation method, program, and recording medium
CN106950950A (en) * 2017-03-02 2017-07-14 广东工业大学 A kind of automobile doubling accessory system and control method based on camera
CN109684796A (en) * 2018-10-31 2019-04-26 平安科技(深圳)有限公司 A kind of document method for anti-counterfeit, device and readable storage medium storing program for executing based on digital watermarking
WO2023092342A1 (en) * 2021-11-24 2023-06-01 上海健康医学院 Medical image privacy protection method based on ciphertext image restoration

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4952627B2 (en) * 2008-03-21 2012-06-13 富士通株式会社 Image processing apparatus, image processing method, and image processing program

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103440617A (en) * 2013-09-18 2013-12-11 黄良永 Image processing method for improving safety of medical image
JP2016012028A (en) * 2014-06-27 2016-01-21 シャープ株式会社 Image obfuscation device, image obfuscation method, program, and recording medium
CN106950950A (en) * 2017-03-02 2017-07-14 广东工业大学 A kind of automobile doubling accessory system and control method based on camera
CN109684796A (en) * 2018-10-31 2019-04-26 平安科技(深圳)有限公司 A kind of document method for anti-counterfeit, device and readable storage medium storing program for executing based on digital watermarking
WO2023092342A1 (en) * 2021-11-24 2023-06-01 上海健康医学院 Medical image privacy protection method based on ciphertext image restoration

Also Published As

Publication number Publication date
CN117499551A (en) 2024-02-02

Similar Documents

Publication Publication Date Title
JP4721469B2 (en) Printing and authentication of security documents on substrates
RU2477522C2 (en) Method and apparatus for protecting documents
Daraee et al. Watermarking in binary document images using fractal codes
KR101016712B1 (en) Watermark information detection method
CN110766594B (en) Information hiding method and device, detection method and device and anti-counterfeiting tracing method
JP5520384B2 (en) Method for generating a security binary image for a banknote
US20060255141A1 (en) Machine readable data
CN113313225B (en) Anti-counterfeiting method based on sparse dot matrix code
JP4595014B2 (en) Digital watermark embedding device and detection device
Tan et al. Print-Scan Resilient Text Image Watermarking Based on Stroke Direction Modulation for Chinese Document Authentication.
Amiri et al. Robust watermarking against print and scan attack through efficient modeling algorithm
CN115293311B (en) Color watermark anti-counterfeiting method and device based on micro-point code
CN114997352A (en) Anti-counterfeiting tracing code generation and verification method based on dot matrix
CN109816077A (en) A kind of hidden method of two-dimensional barcode information, device, electronic equipment and storage medium
CN106934756B (en) Method and system for embedding information in single-color or special-color image
US8038073B2 (en) Tamper detection of documents using encoded dots
CN117499551B (en) Encryption anti-counterfeiting printing method based on binary signals
Dutta et al. An efficient and secure digital image watermarking using features from iris image
CN111368960A (en) Quantum anti-counterfeiting two-dimensional code generation method and scanning method
Mayer et al. Fundamentals and applications of hardcopy communication
CN115423063A (en) Anti-copying shading anti-counterfeiting method and device based on micro dot codes
Yadav et al. Copy sensitive graphical code estimation: Physical vs numerical resolution
Tkachenko Generation and analysis of graphical codes using textured patterns for printed document authentication
Zhang et al. Copy detection pattern-based authentication for printed documents with multi-dimensional features
JP2001119562A (en) Image processor, image processing method and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant