TW456110B - Design of 2-D safe free code and coder-decoder manufacturing method thereof - Google Patents

Design of 2-D safe free code and coder-decoder manufacturing method thereof Download PDF

Info

Publication number
TW456110B
TW456110B TW86109878A TW86109878A TW456110B TW 456110 B TW456110 B TW 456110B TW 86109878 A TW86109878 A TW 86109878A TW 86109878 A TW86109878 A TW 86109878A TW 456110 B TW456110 B TW 456110B
Authority
TW
Taiwan
Prior art keywords
data
code
dimensional
free code
patent application
Prior art date
Application number
TW86109878A
Other languages
Chinese (zh)
Inventor
Jiun-Tsai Ye
Ling-Huei Chen
Original Assignee
Ye Jiun Tsai
Chen Ling Huei
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ye Jiun Tsai, Chen Ling Huei filed Critical Ye Jiun Tsai
Priority to TW86109878A priority Critical patent/TW456110B/en
Application granted granted Critical
Publication of TW456110B publication Critical patent/TW456110B/en

Links

Abstract

The present invention not only designs a type of 2-D safe free code that not only can store any information, provide data security protection, correct errors, and allow fast reading but also proposes a coder-decoder manufacturing method for the 2-D safe free code. For data security, the present invention differentiates data into general data and classified data and provides classified data with two different protections. The first protection is to hide classified data so as to eliminate curiosity of intended code-breakers. The second protection is to apply security measures on classified data so as to enhance code-breaking difficulties. Fast reading of the 2-D safe free code can still be achieved even when the code is rotating, tilted, zoomed, or is placed under an unstable light. Also, data can correctly be read even when the 2-D safe free code is damaged, stained, or decayed. In all data storage applications, such as basic data of goods in a store, book data, medical records, and license information, the 2-D safe free code can be applied for automatic information collection. Besides, in applications, such as license and credit card forging prevention, stock management, and identification system, where data security is required, the 2-D safe free code can be applied for data security protection. The 2-D safe free code can even be applied for automatic mail distribution.

Description

456110 Λ. 五、發明説明() 二維碼大致上可分成堆疊式二維碣和矩陣 _ 類。所謂堆疊式二維碼就是將許多的一維條碼上下言…給 小並堆疊起來,由於是由一維條碼堆疊起史 ' " 木,所以它的鸪 碼方式較簡單且是公開的,較容易被廣泛應用,但也由 它是由一維條碼所堆疊起來,在錯誤糾正能 ^ & 、身料文全 的考量及二維碼樣式的設計等方面都較差,·至於矩陣式的 二維碼’因為大部份的設計都有做讀取時的考量,因此樣 式設計較佳,且大部份都有做錯誤糾正的考量,但有一個 較大的缺點是大部份的矩陣式二#碼都是封閉式的編碼方 式,也就是編碼方式是不公開的’如此一來就比較不容易 被廣泛應用,還有一點就是將二維碼樣式設計的太複雜會 降低儲存密度。 由於目前的二維碼,無論是堆疊式的或是矩陣式的都 有其缺點,其中有一最嚴重的缺點乃是對其欲儲存的資料 如英文子元,都有其特定的對應碼,為了達到高儲存.準, 所能儲存的資料種類將有一定限制,因此其應用範圍將受 到拫大限制’碰到一些圖形或非其定義範圍之符號,將無 法儲存。基於此,本發明設計一能克服這些缺點、保留其 經濟部中央標準局負工消費合作社印裝 優點、強調資料安全 '不受資料形式限制、可快速讀取、 且適用於各種環境的二維碼。 二維碼可應用於各行各業中,如信用卡之簽名、身分 遇證之指紋、臉孔等;若用二維碼儲存,可防信用卡、身 分證、護照等被盜用。郵件之地址若用二維碼儲存,可達 信件自動分發之功能,另外,病人之基本且敏感的資料 -1 - 本紙張从適用中國國家標丰(CNS〉A4規格(21〇χ 297公^· 經濟部中央標準局負工消費合作社印製 45611〇 五、發明説明(2 ) 如重要疾病、過敏藥物),如以二維碼打於掛號證上可 於急診或急救時提供有用且快速資訊。凡此種種,皆已顯 示出二維碼可應用的範圍非常廣泛。基於此,本發明最主 要的目的是設計一可被廣泛地應用於各行各業的二維碼系 統,因此此系統將具有以下幾個特點:丨編碼方式是採公 開方式以達到普及的目的;2·在資料安全方面’我們將資 料分成一般資料和機密資料,在編碼方式公開的情況下, 一般使用者皆能讀取一般資料,至於機密資料,必須有特 殊授權者方能擷取,可達保護機密資料的目的:3.在錯誤 糾正方面,我們所設計的二維碼在開放的環境下,無論是 觉到到傷、磨損、沾污、褪色甚至破損,都能夠正確地被 讀取,4·在不同的環境(包括燈光條件不穩定、旋轉、縮放 投t/變形)下所擷取的二維碼皆能被正確且快速的讀取 ^5.可存放的資料除了中文、英文、數字外,一些特殊的 字疋或特珠的資訊(如圖形、簽名、指紋等)也都能被儲存 ’並且能容易與應用程式連接起來。由於本發明所設計之 ^ —維瑪將具以上特點,故將其命名為二維安全自由碼。 本發明方法係利用二維碼高儲存量的優點,針對錯誤 糾正^資料安全兩方面,以及解決二維碼在讀取容易發生 的1題去nX S十—維碼樣式,並設計其編碼器和解碼器,說 明如下: 貝料可包含中文 '英文、數字、一些符號和圖形(如指 纹 '答名耸、 Vi ’並且分成機密資料與一般資料。整個編崎 和解碼分成兩層3 挪碼時.先用RS編碼器加入糾錯瑪,然 本紙乐尺度適用中g國家漂注456110 Λ. 5. Description of the invention () Two-dimensional codes can be roughly divided into stacked two-dimensional units and matrices. The so-called stacked two-dimensional code is to speak a lot of one-dimensional bar codes ... to be small and stacked. Since it is a history of stacking one-dimensional bar codes', its coding method is simpler and more open. It is easy to be widely used, but it is also stacked by a one-dimensional bar code, which is poor in terms of error correction ^ & consideration of body text and design of two-dimensional code style. As for the matrix two "Dimensional code" because most of the design are considered when reading, so the style design is better, and most of them are considered for error correction, but there is a major disadvantage is that most of the matrix The two # codes are all closed encoding methods, that is, the encoding methods are not publicly available. Therefore, it is not easy to be widely used. Another point is that designing the two-dimensional code style too complicated will reduce the storage density. Because the current two-dimensional codes, whether stacked or matrix, have their shortcomings. One of the most serious shortcomings is that the data they want to store, such as English sub-elements, have their specific corresponding codes. Reaching high storage standards, the type of data that can be stored will be limited, so its scope of application will be greatly limited. If it encounters some graphics or symbols outside its defined range, it cannot be stored. Based on this, the present invention is designed to overcome these shortcomings, retain its printing advantages of the Central Standards Bureau of the Ministry of Economic Affairs, consumer cooperatives, and emphasize the security of data. 'It is not restricted by the form of data, can be quickly read, and is suitable for various environments. code. The two-dimensional code can be used in various industries, such as the signature of credit cards, fingerprints of identity cards, faces, etc. If stored with two-dimensional codes, it can prevent the theft of credit cards, ID cards, passports, etc. If the mail address is stored with a QR code, it can achieve the function of automatic distribution of letters. In addition, the patient's basic and sensitive information -1-This paper is from China National Standard Feng (CNS> A4 specification (21〇χ 297 公 ^) · Printed by the Consumers' Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs 456110.5. Description of the Invention (2) For important diseases and allergic drugs, such as using a QR code on a registered certificate can provide useful and fast information during emergency or emergency treatment All of these have shown that the application range of two-dimensional codes is very wide. Based on this, the main purpose of the present invention is to design a two-dimensional code system that can be widely used in various industries, so this system will It has the following characteristics: 丨 The encoding method is adopted to achieve publicity; 2. In the aspect of data security, we divide the data into general information and confidential information. When the encoding method is public, ordinary users can read it. Take general information. As for confidential information, it must be retrieved by a special authorized person, which can protect the confidential information: 3. In terms of error correction, we designed two In an open environment, dimensional code can be read correctly whether it is aware of injuries, abrasion, staining, fading or even breakage. 4. In different environments (including unstable lighting conditions, rotation, zooming and casting) / Deformation) can be correctly and quickly read the QR code ^ 5. In addition to Chinese, English, numbers, storable data, some special characters or special information (such as graphics, signatures) , Fingerprints, etc.) can also be stored 'and can be easily connected with the application program. Because the Vima designed by the present invention will have the above characteristics, it is named as a two-dimensional secure free code. The method of the present invention uses The advantages of high storage capacity of the two-dimensional code are aimed at the two aspects of error correction ^ data security, and solving the problem that is easy to occur when reading the two-dimensional code. Go to the nX S ten-dimensional code style, and design its encoder and decoder. It is as follows: The shell material can contain Chinese 'English, numbers, some symbols and graphics (such as fingerprints' Answer, Vi' and is divided into confidential information and general information. The entire compilation and decoding is divided into two layers and 3 code shifts. First use RS coding Ma added error correction, and then applies the scale of the present music paper bleaching g States Note

CNS (請先閱讀背面之注意事項再填寫本頁) -n J*^·' T . a 456110 泛明説明(3 ;' " 後由資料隱臧器將機密資辑當藏免丨民士 ΓΪΤ ^ 7…、賊到碼中,最後給予一些協 (讀先閲讀背面之注意事項再填寫本頁) 助讀取二維碼之特徵’騎製此二維安全自由碼時 ,則以相反的順序,先利用加入的特徵,得知其位置、方 向、旋轉角度H使用者,經由RS解碼器做錯誤糾正 並給予一般資訊,而對有授權去 目ιΙ·5Γί* λ-. J月仅權項,則可進一步經比對密碼 是否正確決定是否給予機密資訊。 在錯誤糾正方面,本研究方法將利用Reeds〇1〇m〇n(RS) 碼作為外層的編碼方法,採用RS碼的原因是它的錯誤纠正 忐力咼,並且允許連續的」錯誤,另一個特性就是Rs碼是_ 個被廣為使用的錯誤糾正碼,也就是普及性很高,包括探 險號太空梭在傳送天王星及海王星影像回地球是用RS碼 做錯誤糾正,日常生活常用的CD也是用RS碼做錯誤糾正 ,甚至未來高解晰度電視(HDTV )也會使用RS碼,以下對採 用的RS碼做簡單的敘述。 經濟部中央樣孪局員工消費合作杜印- RS碼之完整名稱為可糾正t個錯誤之(n,k)Rs碼,其 中t代表這是一個可以糾正t個錯誤的rs碼,k代表資料 編碼前字碼(codeword)的個數,η代表加了糾錯瑪後字瑪 之總個數。以下對RS碼參數之間的關係作一說明,現假設 有一連串的資料,若每一個字碼是以m個b i ts表示,則可 糾正t個錯誤之(n,k) rs碼中η必需為P-l ,也因此一旦 ΐ決定,由另一關係式n-k = 2t即可決定可儲存的資料量k ,如此便是一個可糾正t洇錯誤的(n,k) RS碼= 由於本發明所設計的二維安全自由碼希望能應用於各 行各業,因此希望错存的資料除了能含中英文、數字及待 4 5 6 1 10 4 5 6 1 10 經濟部中央嫖隼局員工消f合泎社印装 殊符號外,亦能含圖形、與德 〜像'聲τ等。因此在資料儲存 時,本系統僅將欲儲在玷咨& .a $ 、 — 人,孖的貝--斜哽為一位元.串’而將每m個 連讀位元看成一個本讲。[51 & 馬 口此,任河資料在編碼前可先作 壓縮加密再达至本系統編碼,如此可達高儲存率及機密性 ,且因本系統視所有輸人之資料為位元串,因此資料之形 式將不受任随制,此點可使本线很容易地推廣於各種 應用中存病歷資料、信用卡簽名、身分證之臉孔或 指纹。 在資料安全方面,本發明提出一 ^的概念,當有機密 的需要時―,可將欲儲存的資料分成兩個層:欠:機密資料與 一般資料=經由本發明所提出之編碼器,除了可將一般資 料轉換成二維碼,並且可將機密資料藏入其中,而此一概 念的主要目的是,經由一般的解碼器仍可正確讀出一般資 料,卻不知有機密資料藏於其中,經由本發明所提出之有 機密需要的解碼器,除了可得到—般資料外’經由密碼比 對,也可得到所需之機密資料=賦予二維碼資料安全的保 護,可將二維碼加上不同層次的保密管制,則不同層次只 可讀取該層級的資料,應用在名片的資料自動收集時,可 將如家令電話和住址設定成機密資料,只有.在本人允許的 情況下,才可取得該機密資料。 在讀取方面,本發明使用影像擷取機(vide〇 camera) 作為二維安全自由碼的讀取設#,由於是處於開放環境下 ,空間特有的改變,例如旋轉(r〇tati〇n)、缩放(scaiing) 、以及投影變形(projected disiorUon)等問題皆會產生 —4 —CNS (Please read the notes on the back before filling this page) -n J * ^ · 'T. A 456110 General statement (3;' " ΓΪΤ ^ 7 ..., the thief enters the code, and finally gives some cooperation (read the precautions on the back first and then fill out this page) to help read the characteristics of the two-dimensional code. In order, we first use the added features to learn its position, direction, and rotation angle H. The user corrects errors and gives general information through the RS decoder, and authorizes to go to the eyes. I. 5Γί * λ-. Item, you can further compare whether the password is correct to determine whether to give confidential information. In terms of error correction, this research method will use the Reeds〇10〇m〇n (RS) code as the outer layer encoding method. The reason for using the RS code is Its error correction is very powerful, and allows continuous "errors. Another feature is that Rs codes are _ widely used error correction codes, which is very popular, including the space shuttle of the expedition transmitting Uranus and Neptune. Images are returned to Earth using RS codes Miscorrection, CDs commonly used in daily life also use RS codes for error correction, and even high-definition television (HDTV) will use RS codes in the future. The following briefly describes the RS codes used. Employees of the Central Bureau of Economic Affairs, Ministry of Economic Affairs Du Yin-The complete name of the RS code is the (n, k) Rs code that can correct t errors, where t represents an rs code that can correct t errors, and k represents the number of codewords before data encoding , Η represents the total number of word marks after the error correction mark is added. The following explains the relationship between RS code parameters. Now suppose there is a series of data. If each word code is represented by m bi ts, you can To correct t errors, η in (n, k) rs code must be Pl. Therefore, once ΐ is determined, the amount of data k that can be stored can be determined by another relationship nk = 2t. This is a correctable t 洇Wrong (n, k) RS code = Since the two-dimensional secure free code designed by the present invention is expected to be applied to various industries, it is hoped that the misstored data can contain Chinese and English, numbers, and pending 4 5 6 1 10 4 5 6 1 10 Printed by Hefei Co., Ltd. In addition to special symbols, it can also contain graphics, and German-like 'sound τ, etc. Therefore, when storing data, this system will only store the information to be stored in 玷 & .a $, — person, 孖 贝 — oblique 哽 as a bit Yuan. String 'and treat every m consecutive reading bits as a textbook. [51 & Makou Here, Renhe data can be compressed and encrypted before it is encoded in this system, which can achieve high storage Rate and confidentiality, and because the system regards all input data as bit strings, the form of the data will not be arbitrarily controlled. This allows the line to be easily promoted to store medical records and credit card signatures in various applications. Face or fingerprint of ID card. In terms of data security, the present invention proposes a concept that when confidentiality is needed, the data to be stored can be divided into two layers: owe: confidential data and general data = via the encoder proposed by the present invention, except General data can be converted into two-dimensional code, and confidential information can be hidden in it. The main purpose of this concept is to read general data correctly through ordinary decoders, but I don't know that the confidential data is hidden in it. Through the decoder required by the confidentiality proposed by the present invention, in addition to the general information, the required confidential information can also be obtained through password comparison. The security protection of the QR code data can be given, and the QR code can be added. At different levels of confidentiality control, only different levels of data can be read at different levels. When used in the automatic collection of business card information, such as home phone and address can be set as confidential information. Only if I allow it, The confidential information can be obtained. In terms of reading, the present invention uses a video capture machine (vide〇camera) as the reading device of the two-dimensional secure free code. Because it is in an open environment, space-specific changes, such as rotation (r〇tati〇n) , Scaling (scaiing), and projected disiorUon, etc.-4-

(讀先閲讀背面之注意事項再填寫本頁J ---------A.----^---:訂-------i 丨 本纸痕尺度適用中国茑家標準(CNS ) A4規洛(210 經濟部令央樣率局員工消费合作¾印製 456110 、贫5 ) ,為了解決這類問題,本發明也於二維安全自由碼設計笮 段加上幾個特徵以處理這些問題並且加快讀取速度。首先 ,加上兩個細的長方形外框,藉此二外樞,以期快速地找 到二維安全自由碼之所在及其旋轉方向,並可同時解決缩 放問題。其次於二維碼樣本之左上角加上一個小正方形作 為方向之判斷,由於樣本是長方形,所以只需要一個就可 以決定二維媽之起始位置及方向。 茲配合圖式及實施例詳細說明本發明之方法。 圖式簡單說明 圖—係本發明之整體流程圖。 圊二係本發明二維安全自由碼編碼器之方塊圓。 圖二顯不本發明所產生之二維安全自由碼之一具體實 施例α -圖四係本發明二維安全自由碼解碼器之方塊圖。 圖五係本發明二維安全自由碼讀取部份之流程圖。 圖六顯不二维安全自由碼讀取過程之實施例。 圖七顯不一些不同讀取條件下及發生錯誤的情況下依 然可正確讀取的實施例。 以下配合方塊圖及實施例詳細說明本發明之方法。 八請參考圖一,圖一為本發明之主要流程圖,本發明可 π成100(a)之二維安全自由碼編碼器與1〇〇(b)之二維安 全自由碼解碼器兩部份;編碼器的目的是要將2〇〇(曰〉之以 或1表示的位元串轉換成600 (3)之二維安全自由碼樣弍 ’而其中會透過步驟300(a)加入錯誤纠正碼,步驟100! 先«讀背面之注意事項再填寫本頁) -- In - - I n n - _ --訂------泉-----(Read the precautions on the back before filling in this page J --------- A .---- ^ ---: Order ------- i 丨 This paper mark is applicable to China 茑Home Standards (CNS) A4 Regulations (210 Ministry of Economic Affairs, Central sample rate bureau employee consumption cooperation print 456110, poor 5), in order to solve this type of problem, the present invention also adds several This feature can deal with these problems and speed up the reading speed. First, add two thin rectangular frames and use the two outer pivots to quickly find the location of the two-dimensional secure free code and its rotation direction, and solve them at the same time. Scaling problem. Secondly, a small square is added to the upper left corner of the QR code sample to determine the direction. Since the sample is rectangular, only one can be used to determine the starting position and direction of the 2D mother. The example illustrates the method of the present invention in detail. The diagram is a simple illustration of the diagram-is the overall flowchart of the present invention. The second is the square circle of the two-dimensional secure free code encoder of the present invention. Figure two shows the two-dimensional security produced by the present invention. A specific embodiment of a free code α-Figure four series of the present invention Block diagram of the two-dimensional secure free code decoder. Figure 5 is a flowchart of the reading part of the two-dimensional secure free code of the present invention. Figure six shows an embodiment of the two-dimensional secure free code reading process. Figure seven shows some An embodiment that can still be read correctly under different reading conditions and in the case of an error. The method of the present invention will be described in detail below with reference to the block diagram and the embodiment. 8. Please refer to FIG. 1, which is a main flowchart of the present invention. The invention can be divided into two parts: a 100 (a) two-dimensional secure free code encoder and a 100 (b) two-dimensional secure free code decoder; the purpose of the encoder is to The bit string represented by or 1 is converted into a 600 (3) two-dimensional secure free code sample 弍 'and an error correction code is added through step 300 (a), step 100! «Read the precautions on the back before filling in this (Page)-In--I nn-_-Order ------ 泉 -----

—5 as家標荜:cns ; 咩.::ί d 5_ϋ Ο 經濟部中央標隼局員工消费合作讧ipTi 藏入機密資料,再經步骑5wa)產生二維安全自由瑪;而 解碼器的目的是要將600ib)之二维安全自由碼樣式轉換成 2〇=b)之以〇或1表示的位元事,5其=會透過步驟500 (b) 先讀取二維安全自由碼,再經步驟400 (b)取出機密資料及 步驟300(b)作糾正錯誤。雖然目前在電腦内儲存資蚪的方 式可分為二進位模式和文字模式,在此,皆將其視為一長 串的位元串,其中母個位元以Q或1表示。如此可將二維 碼與其應用獨立開來,而使其應用更為廣泛。 明參考圖—,圖二為二維安全自由碼編瑪器之詳細流 程圖’首先將2 0 0 (a)之位元串經2 0 5 (a)組成字,當有機 密的需要時,先將資料分成210(a)之一般資料和220(a)之 機密資料,210(a)之{办名,…,gAW}為即將被編碼的一般 資料,經過310(3)之尺3(111,1^1)編碼器於一般資料後加入 錯誤糾正碼後,就可得到320(a)之丨尽^名丨…”茗^丨為編碼 後之一般資料,於此之^ RS(nl, U)為一個可以糾正 tl = (nl-kl)/2個錯誤的編碼方法,並旦假設實際使用二維 安全自由碼時,最多會錯誤的字碼數為tp個;另外,在機 密資料方面,220(a)t { i *^1 ? · - ? ^}為即將被編碼之機 密資料,透過另一個410(a)之RS(n2. k'2)編碼器(其中 n2&lt; = tl-tp且2ΐρ&lt; = η2-1ί2)於機密資料後加入錯誤糾正碼 得到4 2 0 (a)之...,兄,於此之SS ( n2,k2)則為一個 可以糾正t2 = (n2-k2)/2個錯誤的編碍方法:接著,經由 4 3 0 (£〇之密蹲敛_岛心.[0 (a 之I數i:生S的禮子(seed ),產 ----^------A々-------訂 (诗先閱讀背面之注意事項再填寫本頁) 經濟部中夬樣率局員工消費合作.社印製 456110 生出n2個介於〇到nW且不重覆的值潋為45〇(a)之資钭 隱藏器將420(a)之n2個字碼覆蓋到32〇(a)之ηί個字碼的 位置1進而得到460(a)之機密資料-藏後之資料 { 接下來,則是500(a)之產生二维安全自由 S的部份,先將460(a)之資料視為一位元串,步驟52〇(a) 會將每一位元用一單位的黑(位元值為υ或白(位元值為〇) 的小方格表示,依照由左而右,由上而下之順序排列成一 長方形二維碼樣式,步驟530(a)到步驟550(a)則為本發明 加於二維碼外圍之三個重要特徵,此三個特徵將幫助讀取 時決定方向、減少複雜背景影響、減低歪斜的影響'不受 .旋轉與縮放的影響並且可被更快速的讀取,步驟53〇(3)於 -維碼外圍之左上角加入—個用來決定方向且大小為1單 位的黑色方向指示方格,步驟54〇(a)加入了寬度為ι單位 且距離也為-單位的兩黑色長方形外框,步驟55〇⑷則加 入寬度為5單位的白色邊界框,1後,就得到了 600(a)之 一維女·全自由碼,並且可由一般的雷射印表機印製此二維 安全自由碼。 圖二為製作一個二維安全自由碼之實施例,圖三(A) 之文子内谷中可分為機密資料和一般資料’家中之電話屬 於較為隱私之資訊,因此” TEL(H): (02)240-5290,,即為所謂 的機Ϊ6資料,其餘則為一般資料,圖三(B)之二維安全自由 瑪樣式即為圖三(A)文字内容經圖二之程序後轉換成黑白 方格之寛64單位、高32單位之二維安全自由碼樣式,而 囷三(C)為將圖三(B)加入三個待徵後之一實施例,其中 請先閱讀背面之注意事項再填寫本f) 灵-------訂---f I In - I - '鈴明説明:。' 0 1 531(a)為方向指示方格、541(a)為兩長方部外框、55I(a、 為白色邊界框。 請參考圖四,圖四為二維安全自由碼解碍器之諄細流 程圖’首先,由影像擷取機取得二維安全自由碼影像,經 由步驟500(b)之讀取二維安全貞虫属(由於步驟500(幻包 含許多程序,將於下段文章中配合圖五做詳細說明),轉換 成460(b)之字碼資料,接下來,如果是一般的使用者/直 接利用310(匕)之1?5(111,1?1)解碼器做錯誤糾正,進而得到 210(b)之一般資料;至於擁有密碼之授權使用者,除了透 過31 0(b)可得到一般資料外,還可_利用其430( b)灸密碼當 作440(b)之亂數產生器的種子,以產生出編碼後之機密資 料在460 (b)中之位置,再由450 (b)之資料擷取器取出 420(b)之資料,經由410(b)之RS(n2,k2)做錯誤糾正後, 經濟部中央標準局貝工消費合作.--fct印製 則可得到220(b)之機密資料=由上可見,經由本發明方法 ,在將機密資料藏入的情況下,一般使用者依然可完整得 到一般資料,如此便大大降低了一般使用者對本資料之好 奇心,此乃本發明對機密資料之第一道防護,即使—般使 用者得知有機密資料藏於其中,在沒有密碼的情況之下, 也很難取出機密資料,此乃本發明對機密資料之第二道防 護。另外,本發明也強調機密資料的穩定度,也就是說當 藏入的機密資料發生錯誤時,也要可將錯誤纠正.而寻到 正碹的機密資料。 請參考圖五,圖五是讀取二維安全自由碼的流程圊, 主要目的是要將圖五600(b)之二維安全自由巧經甴5:.). b 經濟部中央標ia局員工消,合作;;一印U* 以求得二維碼樣式與水二軸之 45 6 110 之b像摘取機摘取到51丨(b )之二維安全自由择影像(圖六 (A )顯示了一個二线碼影嗥之實施例),經過圊五岬示之各 步驟後,讀取其所代表的46Q(b)之字碼資料:以下就一步 一步的說明二維安全自由碼讀取的流程。步驟512(b)之轉 換成黑...白..景久像是採用區成士.左—化G〇ca 1 threshoI d '· ng)法 ’圖六(B)即為一經過轉換成黑白影像之實施例,圊五μ 3 (b) 包括了四個步驟,其主要目的是求二維安全自由碼樣式之 四個頂點坐標,步驟514(b)之找尋邊界點是利用540(a)加 入之兩長方形外框特徵及550(a)加入之白色邊界框特徵, 分別從四個方向:由左而右、由右而左、由上而下、由下而 上,分別發射出多绦平行之掃瞄線,在每條掃瞄線中,每 當遇到黑點(b 1 ack p i xe 1),則計算之前連續白點之長度以 及從此點開始算起的連磧三段黑點、白點'黑點之長度, 如果符合m: n: n: n( m&gt; = 5n),則記錄此點為一邊界點且停止 此掃猫線之掃睡,圖六(C)即為一個二維安全自由碼邊界點 之實施例,步驟515 ( b)之求近似頂點則是由所找到之邊界 點,利用Hough transform求出代表四個邊界之四條直線 方程式z,、i:' A、4 ’並由此四條直線方程式求其四個交 點Α、 δ , C、D, 為所要求之四個近似頂點圖(D) 顯示了一個包含所求之四直線方程式及四近似頂點之實施 例。由於目前之四個过似頂點A、β、C、d只是四個全標 .沒有任何次序,歹够ο 16 ( b)之近夂頂點排序的目的是要 給予四個近似頂點一定之次序’以了解其相對之位置並藉 芎·其合步聪.51 6(卜共包 -------------#.----^---'IT------ i-.tr先閎讀背面之注意事項再填寫本育) -9 - 4 5 6 1 10 經濟部令央標糸局員工消费合作社印^ 泛明説芸M〇 ) 括了下列之四個步驟: 步驟,將取左a,也洗是x坐標最,卜的#記錄為人 點= 步驟二,分別求A點與其他:=E „ —點的距離,取π的記錄 為D點’最短的記錄為C點,剩下的介於中間 的則記錄為B點。 步驟三,如果從冗到无是順時鐘方向,那此Α、β' c ' D即為所要之次序,否則,A與C交換,b 與D交換。 步驟四由A g兩點可戈ψ — 网J』孓出一維碼樣,式與水平坐標之 夹角4。 接著,步驟517(b)之求精痛頂點則是在四個近似頂點 的小區域範圍内以樣式比對(pattern邮士⑻的方式做 細部的調整’以求得更精喊的頂點坐標。其中步隸川⑻ 包括下列四個步驟: 步驟一,將四個基本角落樣式Pa(i)、Pb(^j、 Pc(iI5)、pd(^]),分別對應到 A、B、c、 D四頂點。 分別對Pa、Pb、pc、pd旋轉二維碼樣式與 水平坐標之夹角 分別以旋轉後之Pa、Pb、Pc、P.d在A、B 、C、D四近似頂點的小區域範圍作樣式比對 步驟二 步驟三 10 本成择尺度通用今家漂準(CN:S ) ,.u規洛、 -&quot; . I ^^1 «I &lt;^^1 I I I - - 1 1^^ .^n f ί-f.t-r先閲讀背面之注意事項再填寫本買) ' ,ιτ 4 5 61 1 Ο ll 步驟四,將比對結果較佳之四頂點^ 為精確頂點: 步驟5 1 8 (b.)之求所有方詻泣置是利用p 匕知的四諠頂$ 坐標,以内插的觀念求取代表資料位元夕* 、^ ^ ^ ^ 〈各個方格所對庳 之坐標,進而判斷其為黑方格滅白方格卷 ^ ^ ^ ^ ’篇我們要求第i 的坐標時,只要 C,、£).¾ 列、第j行的方格對應於二維碼影像所在 代入下列的公式: 〇,&gt;〇 ^COL-jVROlV-i]^ r j ΥΛΟίΓ-Λ„, (COL~i\f ' 翅濟部中夬樣準局具工消贽合作.社印1 COL A ROW 其十ROW為包括長方形外框之高度的單位數而c〇l則為包 括長方形外框之寬度的單位數,以圖三(c)為例,R⑽為 而C0L為72 ,當所有方格的位置都求出則可判斷其為累方 袼或白方格,進而轉換回1或〇之位元串,但在此之前 乂驟519(b)之決疋方向是利用圖二(C.)中之待徵53i(a)的 位置來決定讀取之方向,如果此特徵為靠近A點,則讀取 時是依照由A到B的方向,且由A到C 一列一列的讀取並轉 換成位元串,如果此特徵為靠近D點,則讀取時是依照由D 到c的方命,且由D到B —列一列的讀取並轉換成位元串, 如此,便得到5 2 0 (b)之位元串,最後,經由5 21 (b)之形成 子碼步驟將位元串組合成其所代表之460(b)之字碼資料, 最後,以一實例及其一些實際的數據來說明本發明的 聋料安全部份,當有機密的需要時,先將資訊分成埼密資 ’料和~般資料,於此,假設有1 6 by tes的機密資料和i 2 7 bytes的一般資料,其中每一偕bvte都視鸟一闼字碼且 -Π _ -Γί先閏讀背面之注意事項再填寫本頁) CNS ; Λ4^-&gt; 經濟部中央橾逸局|工消,合;-.&quot;&quot;$ 45 6110 ,、12 ' 假設實際使用過程中,最多會錯誤的字碼數為16個,—般 資.1:红由R S ( 2 5 5' 12 I )編碼_如八錯誤纠正碼後就得到 二5 5 by tes的編碼後之一般資料,也因此,只要錯誤的字嗎 個數不大於(255-127)/2 = 64個’則經由RS( 255,127)解碼 器,可得到正確之一般資料,而機密資料則經由另—個同 樣以一個byte為一個字碼的RS(48,16)編碼器加入錯誤糾 正碼後得48 bytes的編碼後之機密資料,接著,經由密碼 做為亂數產生器的種子(seed),產生出48個介於〇到254 且不重覆的值做為48個字碼覆蓋到255個字碼的位置,此 過红即為步驟資料隱藏,此過程對編碼後之一般資料而言 ’代表有4 8個子碼發生錯誤,之前提到,一般資料之解碼 器最多允許64個字碼錯誤,也就是就算加上實際上最多的 16個字碼錯誤,依然可得到正確的一般資料,這對一般使 用者而言’無論是否經過資料隱藏過程,都會得到正確的 一般資料’也就是一般使用者無法察覺有機密資料隱藏於 其中,這也就是本發明對資料安全的第一道防護,至於本 發明對資料安全的第二道防護則是即使一般使用者發覺機 密資料隱藏於其中,而想要非法硿解,也會因為缺少密碼 而難以達成,最後,合法的使用者可用密碼當做亂數產生 器的種子,進而經由資料擷取過程取出隱藏後之資料,經 由RS( 4 8,1 6 )解碼,只要錯誤字碣數不大於(6 ) /2 = 1 6 ,則可得到機密資料、由比也可看由機密言枓的容错性. 因為即使實際上可能發生的最多I 6字碼皆發生在藏入的 核;密貨奸部分,枚在、矛Ή· +ί衣然可4正確復受: 1 HI —i I In Is - - - -I I.Λ1 -- - 1--: I - '1τ -..-&gt;『讀背s之注意w-項再填寫太J } ~ I:-—5 as home mark 荜: cns; 咩. :: ί d 5_ϋ Ο Employees ’cooperation cooperation with the Central Bureau of Standards of the Ministry of Economic Affairs (ipTi hides confidential information, and then rides 5wa) to generate a two-dimensional secure freema; while the decoder ’s The purpose is to convert the two-dimensional secure free code pattern of 600ib) into 2 = 0 = b) the bit matter expressed by 0 or 1. 5 == will read the two-dimensional secure free code first through step 500 (b), Then retrieve the confidential information through step 400 (b) and step 300 (b) to correct the error. Although the current way of storing resources in the computer can be divided into binary mode and text mode, here they are all considered as a long string of bits, in which the mother bits are represented by Q or 1. This separates the QR code from its application, making it more widely used. Refer to Figure —, Figure 2 is a detailed flow chart of a two-dimensional secure free code encoder. 'First, the bit string of 2 0 (a) is composed of 2 5 (a) to form a word. When confidentiality is required, First divide the data into general information of 210 (a) and confidential information of 220 (a). {Office name, ..., gAW} of 210 (a) is the general information to be coded. After 310 (3) rule 3 ( 111, 1 ^ 1) After adding the error correction code to the general data, the encoder can get 320 (a) of the 丨 name ^ ... "" ^ ^ is the general data after encoding, where ^ RS (nl , U) is an encoding method that can correct tl = (nl-kl) / 2 errors, and assuming that when the two-dimensional secure free code is actually used, the maximum number of characters that can be wrong is tp; In addition, in terms of confidential information , 220 (a) t {i * ^ 1? ·-? ^} Is the confidential data to be encoded, through another RS (n2. K'2) encoder of 410 (a) (where n2 &lt; = tl- tp and 2ΐρ &lt; = η2-1ί 2) Add the error correction code after the confidential information to get 4 2 0 (a) ..., sir, here SS (n2, k2) is a correctable t2 = (n2- k2) / 2 wrong ways of editing: Then, via 4 3 0 (£ 〇 之 密 Squat Convergence _ Island Heart. [0 (I number of a: seed of S), produce ---- ^ ------ A々 ------- order (Read the notes on the back of the poem before filling out this page) The consumer cooperation of the sample rate bureau in the Ministry of Economic Affairs. The company prints 456110 to produce n2 values between 0 and nW without repeating 潋 45 (a). The asset concealer will cover the n2 characters of 420 (a) to the position of n characters of 32 (a) and obtain the confidential information of 460 (a)-post-hidden information {Next, 500 (a) ) To generate the two-dimensional safety and freedom S, first treat the data of 460 (a) as a bit string, and step 52 (a) will use one unit of black for each bit (the bit value is υ Or white (bit value is 0) small squares, arranged in a rectangular two-dimensional code pattern in order from left to right and top to bottom. Steps 530 (a) to 550 (a) are the invention Three important features added to the periphery of the QR code. These three features will help to determine the direction when reading, reduce the influence of complex backgrounds, reduce the influence of skew. It is not affected by rotation and zoom and can be read faster. Step 53 (3) in the upper left corner of the outer dimension of the -dimensional code Enter a black direction indicator with a size of 1 unit to determine the direction. Step 54 (a) adds two black rectangular frames with a width of ι units and a distance of-units. Step 55: Add A white bounding box with a width of 5 units. After 1, a one-dimensional female full-free code of 600 (a) is obtained, and this two-dimensional secure free code can be printed by a general laser printer. Figure 2 is an example of making a two-dimensional secure free code. The text in Figure 3 (A) can be divided into confidential information and general information. 'The phone at home is more private information, so "TEL (H): (02 ) 240-5290, which is the so-called machine 6 data, and the rest are general information. The two-dimensional security freema pattern in Figure 3 (B) is the text in Figure 3 (A), which is converted to black and white after the procedure in Figure 2. The two-dimensional security free code pattern of 寛 64 units and 32 units high is a square, and 囷 三 (C) is an example after adding Figure 3 (B) to the three pending applications. Please read the notes on the back first. Fill in this again f) Spirit ------- Order --- f I In-I-'Zing Ming Explanation:' 0 1 531 (a) is a direction indicator box, and 541 (a) is two rectangular boxes The outer frame, 55I (a, is a white bounding box. Please refer to Figure 4. Figure 4 is a detailed flowchart of a two-dimensional secure free code solver. First, a two-dimensional secure free code image is obtained by an image capture machine. Read the two-dimensional security chlamydomonas via step 500 (b) (since step 500 (the magic contains many programs, it will be explained in detail in the next paragraph with Figure 5) Convert it into 460 (b) code data. Next, if it is an ordinary user / directly use 310 (dagger) 1 ~ 5 (111, 1 ~ 1) decoder to make error correction, and then get 210 (b). General information; as for authorized users with passwords, in addition to general information through 3 0 (b), they can also use their 430 (b) moxibustion password as the seed of the random number generator of 440 (b) to Generate the encoded confidential data position in 460 (b), then extract the data of 420 (b) by the data extractor of 450 (b), and correct the error by RS (n2, k2) of 410 (b). After that, the Central Bureau of Standards of the Ministry of Economics and the People ’s Republic of China cooperated with shellfish consumption.-Fct printing can get 220 (b) confidential information = visible from above. Through the method of the present invention, when the confidential information is hidden, ordinary users The general information can still be obtained completely, which greatly reduces the curiosity of ordinary users about this information. This is the first protection of the invention for confidential information, even if the general user knows that the confidential information is hidden in it. In the case of a password, it is also difficult to retrieve confidential information. Two protections. In addition, the present invention also emphasizes the stability of confidential information, that is, when there is an error in the hidden confidential information, the error must also be corrected. The correct confidential information can be found. Please refer to Figure 5, Figure 5 is the process of reading the two-dimensional secure free code. The main purpose is to read the two-dimensional secure free code in Figure 5 600 (b) (5 :.). B The staff of the Central Bureau of the Ministry of Economy eliminates and cooperates; ; One print U * to get the two-dimensional code style and the 45 6 110 b image picker of the second axis of the water to pick a 51 丨 (b) two-dimensional safe freely selected image (Figure 6 (A) shows a Example of two-line code shadowing) After reading the five points, read the 46Q (b) code data it represents: The following is a step-by-step description of the two-dimensional secure free code reading process. Step 512 (b) is converted to black ... white ... Jingjiu seems to be using Cheng Chengshi. Left-Hua Goca 1 threshoI d '· ng) method' Figure 6 (B) is converted to black and white In the example of the image, 圊 μ 3 (b) includes four steps, the main purpose of which is to find the coordinates of the four vertices of the two-dimensional secure free code pattern. The step 514 (b) is to find the boundary point by using 540 (a) The two rectangular outer frame features and the 550 (a) white border frame feature are added from four directions: left to right, right to left, top to bottom, and bottom to top. Parallel scan lines. In each scan line, whenever a black dot (b 1 ack pi xe 1) is encountered, the length of the previous continuous white dot and the three consecutive black dots from this point are calculated. , The length of the white dot 'black dot, if it meets m: n: n: n (m &gt; = 5n), then record this point as a boundary point and stop the sweeping of this cat line. Figure 6 (C) is An example of a two-dimensional secure free code boundary point. The approximate vertices of step 515 (b) are obtained from the found boundary points, and the Hough transform is used to find four of the four boundary points. The linear equations z ,, i: 'A, 4' and the four linear equations to find its four intersection points A, δ, C, D, for the required four approximate vertex graphs (D) shows a graph containing the requested Examples of four-line equations and four approximate vertices. Because the current four apex-like vertices A, β, C, and d are just four full scales. There is no order, and the order of the nearest vertex of 16 (b) is to give the four approximate vertices a certain order. In order to understand its relative position, and borrowed its qi, He Bicong. 51 6 (Bu Gongbao ------------- # .---- ^ --- 'IT ---- -i-.tr first read the notes on the back before filling in this education) -9-4 5 6 1 10 Printed by the Ministry of Economic Affairs and the Central Bureau of Labor Standards Consumer Consumption Cooperatives Steps: Step, take the left a, also wash the x coordinate is the most, ## is recorded as a person point = Step two, find the distance between point A and the other: = E „— points, take π record as the point D 'The shortest record is point C, and the rest in the middle is recorded as point B. Step three, if from redundant to nothing is clockwise, then A, β' c 'D is the desired order, otherwise , A is exchanged with C, b is exchanged with D. Step 4 A two-dimensional code of A g — — net J ′ is used to draw a one-dimensional code sample, the angle 4 between the formula and the horizontal coordinate. Next, the calculation of step 517 (b) The painful vertex is sampled within a small area of four approximate vertices Make detailed adjustments to the vertex coordinates (pattern) in order to obtain more precise vertex coordinates. Step Li Chuanxi includes the following four steps: Step one, the four basic corner styles Pa (i), Pb (^ j, Pc (iI5), pd (^)) respectively correspond to the four vertices of A, B, c, and D. The angles between the two-dimensional code style and the horizontal coordinates are rotated respectively for Pa, Pb, pc, and pd. After rotation, Pa, Pb, Pc, and Pd are compared in a small area range of four approximate vertices of A, B, C, and D. Step 2 Step 3 10 This standard is universally drifted (CN: S). u 洛洛,-&quot;. I ^^ 1 «I &lt; ^^ 1 III--1 1 ^^. ^ nf ί-ft-r Please read the precautions on the back before filling in this purchase) ', ιτ 4 5 61 1 Ο ll Step four, the four vertices with better comparison result ^ are the exact vertices: The solution of step 5 1 8 (b.) Is to use the coordinates of the four tops known by p, interpolated. The concept seeks to replace the table data bits Yuan Xi *, ^ ^ ^ ^ <the coordinates of the squares facing each other, and then judge it to be the black square and the white square volume ^ ^ ^ ^ 'When we ask for the coordinates of the ith, As long as C ,, £). ¾ columns, The box on line j corresponds to the following formula where the QR code image is located: 〇, &gt; 〇 ^ COL-jVROlV-i] ^ rj ΥΛΟίΓ-Λ „, (COL ~ i \ f ' Collaboration with quasi-stationary tools. Co-print 1 COL A ROW 10 ROW is the number of units including the height of the rectangular frame and c0l is the number of units including the width of the rectangular frame. Figure 3 (c) is For example, R ⑽ is and C0L is 72. When the positions of all the squares are obtained, it can be judged as a square or white square, and then converted back to a bit string of 1 or 0, but before step 519 ( The decisive direction of b) is to determine the reading direction by using the position of 53i (a) in Figure 2 (C.). If this feature is close to point A, the reading is based on A to B. Direction and read from A to C one by one and convert it into a bit string. If this feature is close to point D, the reading is based on the order from D to c and from D to B. Read and convert it into a bit string. In this way, a bit string of 5 2 0 (b) is obtained. Finally, the bit string is combined into the 460 (b) it represents through the subcode forming step of 5 21 (b). ) Zip code information, most Let ’s take an example and some actual data to explain the safety part of the deaf material of the present invention. When there is a confidential need, first divide the information into confidential information and general information. Here, it is assumed that there are 1 6 by tes's confidential information and i 2 7 bytes of general information, where each 偕 bvte is a bird's character code and -Π _ -Γί read the precautions on the back before filling out this page) CNS; Λ4 ^-&gt; Economy Department of the Central Government Bureau | Industrial consumption, combined;-. &Quot; &quot; $ 45 6110 , 12 'Assume that in actual use, the maximum number of characters that can be wrong is 16—general capital.1: 红 由 RS ( 2 5 5 '12 I) Encoding _ If eight error correction codes are obtained, the general information after encoding 5 5 by tes will be obtained. Therefore, as long as the number of incorrect words is not greater than (255-127) / 2 = 64 A 'is obtained through the RS (255, 127) decoder to obtain correct general information, while confidential data is obtained by adding another error correction code to another RS (48, 16) encoder, which also uses a byte as a character code. 48 bytes of encoded confidential information, then, using the password as the seed of the random number generator, 48 pieces are generated From 0 to 254 and the value that is not repeated is covered by the position of 48 characters to 255 characters. This red is the step data hiding. For the general data after encoding, this means that 4 8 subcodes occur. Error, as mentioned earlier, the decoder for general data allows up to 64 code errors, that is, even if the actual maximum of 16 code errors are added, the correct general data can still be obtained, which is for the average user 'whether or not After the data hiding process, the correct general information will be obtained, that is, the general user cannot detect that the confidential data is hidden in it. This is the first protection of the data security of the present invention, and the second protection of the data security of the present invention. The protection is that even if the average user finds that the confidential data is hidden in it and wants to illegally decrypt it, it will be difficult to achieve because of the lack of a password. Finally, the legitimate user can use the password as the seed of the random number generator, and then retrieve it through the data. The fetching process takes the hidden data and decodes it through RS (4, 8, 6). As long as the number of error characters is not greater than (6) / 2 = 1 6, then Obtaining confidential information, you can also see the fault-tolerance of secret words. Because even the most I 6 characters that may occur are in the hidden core; the secret part of the seizure, in the spear, the spear ί + ί Yiran Can be 4 replied correctly: 1 HI —i I In Is----I I.Λ1--1--: I-'1τ -..- &> J} ~ I:-

456110 請參考圖七,圖七顯示了在不同讀取條件下及發生錯 誤的情況下還可正確讀取的例子·包括(A )旋轉、(B )放π 、(C)破損、(D)磨損、(Ε)污損、?/投影變形、頂點污 損' (H)邊污損。 诗先閱讀背面之注意事項再填寫本頁) ---^------士衣------11--- 經濟部中央標準局員工消费合诈-」印製 ^11 - -m--— i^E - I 二· 本纸汝尺度逍用申g II家標隼.:CNS ) A·^洛(2:0 29-公变456110 Please refer to Figure 7. Figure 7 shows examples that can be read correctly under different reading conditions and errors. Including (A) rotation, (B) put π, (C) damage, (D) Abrasion, (Ε) defacement,? / Projection distortion, vertex contamination '(H) Edge contamination. Read the notes on the back of the poem before filling out this page) --- ^ ------ Shiyi ------ 11 --- Consumption fraud of employees of the Central Standards Bureau of the Ministry of Economic Affairs- "Printed ^ 11- -m --— i ^ E-I II. This paper is a standard for easy use. II Family standard 隼.: CNS) A · ^ 洛 (2: 0 29- 公 变

Claims (1)

ο 11 6 5 4 X: P—K, ABCD 經濟部中央標準局員工消費合作社印裝 六、申請專利範圍 1. 一種可儲存任意形式資料且爲機器可讀之二維安全自 由碼之設計;其中二維安全自由碼係含由表示資料之 黑白小方格所組成之長方形二維碼及用來幫助讀取時 決定方向、減少複雜背景影響、減低歪斜的影響、不受 旋轉與縮放的影響並且可被更快速讀取之三個重要特 徵,此三個重要特徵係包含: (a) 兩個黑色長方形外框:其中一長方形外框先以1單位 之間距框住表示資料之長方形二維碼,另一長方形 外框再以1單位之間距框住前述之長方形外框,二 長方形外框之寬度均爲1單位; (b) 方向指示黑方格:此方格位於二維安全自由碼之左 上角且介於二長方形外框間,其大小爲1單位; (c) 白色邊界框:此邊界框係包圍長方形外框且寬度爲5 個單位。 2. —種可儲存任意形式資料且爲機器可讀之二維安全自 由碼編碼器之製作方法;此方法係將0或1表示之位元 串,經由加入錯誤糾正碼及藏入機密資料等步驟,轉換 成二維安全自由碼,共含以下七個步驟: (a) 設定字碼長度爲m個位元,將位元串轉成字碼; (b) 將資料分成一般資料及機密資料: (c) 將一般資料{&amp;,&amp;,.··,&amp;_,}利用RS(nl,kl)編碼器加 入錯誤糾正碼成編碼後之一般資料{ % -14- 本紙張尺度適用中國國家榡準(CNS ) A4規格(2丨0X297公釐) (請先閱讀背面之注意事項再填寫本頁) 丁 45 6 1 1 0 A8 B8 C8 D8 經濟部中央揉準局貝工消费合作社印袋 六、申請專利範圍 (d) 將機密資料{心,\丨利用RS(n2,k2)編碼器加 入錯誤糾正碼成編碼後之機密資料 (e) 給一密碼利用亂數產生器產生亂數,依照亂數產生 位置將編碼後之機密資料隱藏於編碼 後之一般資料{心,义中; (f) 將字碼視爲位元串,將每一位元用一單位的黑(位元 値爲1)或白(位元値爲0)的小方格表示,依照由左而 右,由上而下之順序排列成一長方形二維碼; (g) 加入申請專利範圍第1項所述之三個重要特徵於長 方形二維碼之外圍,形成二維安全自由碼。 3. —種可儲存任意形式資料且爲機器可讀之二維安全自 由碼解碼器之製作方法,此方法係將_維安全自由碼 轉換成以〇或1表示的位元串,取出機密資料,再經由 錯誤糾正得到一般資料,此方法包含以下八個步驟: (a) 經由影像擷取機取得二維安全自由碼之影像; (b) 將二維安全自由碼影像用區域二元化法得到其對應 之黑白影像: (c) 求二維安全自由碼最外層之長方形黑外框之四頂點 在影像中之坐標; (d) 由四頂點求代表資料中各位元之各個方格在影像中 之坐標: (e) 決定其方向: (0轉換成其所對應之位元串,並依字碼長度爲m個位 -15- ---------1------IT------^ I (請先閱讀背面之注意事項再填寫本買) 本紙张尺度適用中國國家標率(CNS ) A4規格(210X297公釐) 456110 A8 B8 C8 D8 六、申請專利範圍 元,將位元串轉成字碼資料{知A; (g) 將字碼資料{知禹,…'-!}利用RS(nl,kl)解碼器做錯 誤糾正得到一般資料{心士,…,·^^}; (h) 給一密碼利用亂數產生器產生亂數,依照亂數產生 位置將編碼後之機密資料從字碼資料{} 中擷取出來,並利用RS(n2,k2)解碼器做錯誤糾正得 到機密資料{ Jq,,…,*^-1 }。 4. 根據申請專利範圍第3項之方法,其中步驟(c)之求二 維安全自由碼之四頂點在影像中之坐標係利用申請專 利範圍第1項之兩特徵:兩長方形外框和邊界框,以快 速找到四頂點且幫助二維碼快速且正確讀取,其中即使 加多外框數或改變邊界框之寬度,依然可用此法,此法 包含以下步驟: (cl)找尋邊界點,利用邊界點,找出長方形外框之四條 直線; (c2)求四條直線之交點設爲其近似頂點; (c3)將近似頂點排序; (c4)利用樣式比對方式找出精確頂點》 5. 根據申請專利範圍第3項之方法,其中步驟(d)之由四 頂點求代表資料中各位元之方格在影像中之坐標係利 用四頂點以內插的方式求各個方格之相對坐標,且以下 列公式求之: 一 16 — 本紙張尺度適用中國國家標準(CNS ) A4現格(210Χ297公釐) (請先閱讀背面之注意事項再填寫本頁) 訂 經濟部中央標準局貝工消費合作社印裝 4 5 6 110 as SB C8 D8 六、申請專利範圍 ^ : 其中A、B、C、D爲四頂點坐標,ROW爲二維安全自 由碼(不含白色邊界框)之高度而COL則爲二維安全自 由碼(不含白色邊界框)之寬度,(i,j)代表此方格爲第i 列第j行,(x,y)則爲其對應之坐標。 6. 根據申請專利範圍第3項之方法,其中步驟(e)之求其 方向係利用申請專利範園第1項之特徵:方向指示方格 之位置以判斷其方向。 7. —種透過RS碼進行資料隱藏之方法,該方法除了具有 隱藏機密資料之功能,以降低遭破解之好奇心,並且有 保護機密資料之功能,以增加遭破解之困難度;該方法 包含以下步驟: (a) 將資料分成機密資料和一般資料; (b) —般資料以原本之RS碼通道的編碼器加入錯誤糾 正碼,而機密資料則依據另一RS碼,以其編碼器加 入錯誤糾正碼; (c) 將編碼後之機密資料置於利用密碼及亂數產生器, 經濟部中央標準局貝工消費合作社印策 I - I - - :1 — I I 农- - II II - - —1^ (請先閲讀背面之注意事項再填寫本頁) 產生出所欲放置於編碼後之一般資料的位置,完成 資料隱藏的動作。 8. 根據申請專利範圍第7項之方法,其中步驟(b)所提到 之原本RS碼通道,乃指所有以RS碼做爲錯誤糾正碼 ,資料會先經RS編碼器加入錯誤糾正碼再傳輸,接收 端則會將接收到的資料先經RS解碼器做錯誤糾正的通 -17- 本纸張尺度適用中國國家標準(CNS ) Α4規格(2tOX297公釐) 4 5 6 1 1 0 A8 BS C8 D8 六、申請專利範圍 道,且此RS碼可爲公開的,也就是申請專利範圍第7 項之方法可在公開的編碼方式下,達到資料安全的目的 〇 9.根據申請專利範圍第7項之方法,其中步驟(c)完成了 資料隱藏之動作後,當合法的使用者要取得機密資料時 ,則以相反的次序,相同的方式,利用密碼及亂數產生 器,產生出編碼後之機密資料放置於編碼後之一般資料 中之位置,並將之取出,再經機密資料之RS解碼器做 錯誤糾正,即可得機密資料》 ----------^------訂-------線 I (請先閔讀背面之注意事項再填寫本頁〕 經濟部中央標率局貝Η消費合作社印製 -18- 尺度通用十國國家標準((:1^&gt;^4規格(210父297公釐&gt;ο 11 6 5 4 X: P—K, ABCD Printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs 6. Scope of patent application 1. A design that can store any form of data and is machine-readable two-dimensional secure free code; The two-dimensional secure free code includes a rectangular two-dimensional code composed of small black and white squares representing data and is used to help determine the direction when reading, reduce the influence of complex backgrounds, reduce the effect of skew, and not be affected by rotation and scaling. Three important features that can be read more quickly. These three important features are: (a) Two black rectangular frames: one of the rectangular frames is framed by a rectangular two-dimensional code representing data with a distance of 1 unit. , The other rectangular outer frame is framed by a distance of 1 unit from the aforementioned rectangular outer frame, and the width of the two rectangular outer frames is 1 unit; (b) the direction indicating black square: this square is located in the two-dimensional security free code The upper left corner is between two rectangular outer frames, and its size is 1 unit; (c) White bounding box: This bounding box surrounds the rectangular outer frame and has a width of 5 units. 2. —A method of making a two-dimensional secure free code encoder that can store any form of data and is machine-readable; this method involves adding a bit string represented by 0 or 1 by adding an error correction code and hiding confidential information, etc. Steps to convert to a two-dimensional secure free code, including the following seven steps: (a) Set the length of the code to m bits, and convert the bit string into a code; (b) Divide the data into general data and confidential data: ( c) General information {&amp;, &amp;, ..., &amp; _,} using RS (nl, kl) encoder to add error correction code into the encoded general information {% -14- This paper standard applies to China National Standards (CNS) A4 (2 丨 0X297 mm) (Please read the precautions on the back before filling out this page) Ding 45 6 1 1 0 A8 B8 C8 D8 Printed Bags by the Central Labor Bureau of the Ministry of Economic Affairs Sixth, the scope of patent application (d) adding confidential information {heart, \ 丨 using RS (n2, k2) encoder to add error correction code into the encoded confidential information (e) using a random number generator to generate random numbers for a password, Hidden the encoded confidential data in the encoded position according to the random number generation position General information {heart, meaning; (f) treat the word as a bit string, and represent each bit with a unit of black (bit 値 1) or white (bit 値 0) small squares , Arranged in a rectangular QR code from left to right and top to bottom; (g) adding the three important features described in item 1 of the scope of patent application to the periphery of the rectangular QR code to form a two-dimensional security and freedom code. 3. —A method of making a two-dimensional secure free code decoder that can store any form of data and is machine-readable. This method converts the _dimensional secure free code into a bit string represented by 0 or 1, and retrieves the confidential data. Then, the general information is obtained through error correction. This method includes the following eight steps: (a) Obtaining a two-dimensional secure free code image through an image capture machine; (b) Using the area binary method of two-dimensional secure free code image Obtain the corresponding black and white image: (c) Find the coordinates of the four vertices of the rectangular black outer frame of the outermost layer of the two-dimensional security free code in the image; (d) Find the squares of each element in the data from the four vertices in the image The coordinates in (e) determine its direction: (0 is converted to its corresponding bit string, and the length of the word is m bits -15- --------- 1 ------ IT ------ ^ I (Please read the notes on the back before filling in this purchase) This paper size applies to China National Standards (CNS) A4 specifications (210X297 mm) 456110 A8 B8 C8 D8 Yuan, to convert the bit string into character code data {知 A; (g) to convert the character code data {知 禹 ,… '-!} Use RS (nl, kl) decoder for error correction to get general information {心 士,…, · ^^}; (h) Use a random number generator to generate a random number for a password, and encode the encoded number according to the random number generation position. The confidential information is extracted from the character data {}, and the RS (n2, k2) decoder is used to correct the error to obtain the confidential information {Jq, ..., * ^-1}. 4. According to the third item of the scope of patent application Method, wherein the coordinate system of the four vertices of the two-dimensional secure free code in step (c) in the image uses two features of the first patent application scope: two rectangular outer frames and bounding boxes to quickly find the four vertices and help two The dimension code is read quickly and correctly. Even if you add more frames or change the width of the bounding box, this method can still be used. This method includes the following steps: (cl) Find the border points and use the border points to find the rectangular frame. Four straight lines; (c2) Find the intersection of the four straight lines as its approximate vertices; (c3) Sort the approximate vertices; (c4) Use pattern matching to find the exact vertices "5. According to the method in item 3 of the scope of patent application, In step (d), the representative information is obtained from the four vertices. The coordinate system of the squares in the middle of the image in the image uses four vertices to find the relative coordinates of each square in an interpolating manner, and the following formulas are used: One 16 — This paper scale applies the Chinese National Standard (CNS) A4 (210 × 297 mm) (Please read the notes on the back before filling in this page) Order printed by the Central Standards Bureau of the Ministry of Economic Affairs, printed by the Shellfish Consumer Cooperatives 4 5 6 110 as SB C8 D8 VI. Patent Application ^: Among them A, B, C and D are four-vertex coordinates, ROW is the height of the two-dimensional secure free code (excluding the white bounding box), and COL is the width of the two-dimensional secure free code (excluding the white bounding box). (I, j) represents this The square is the i-th column and the j-th column, and (x, y) is its corresponding coordinate. 6. The method according to item 3 of the scope of patent application, wherein the direction of step (e) is determined by using the feature of item 1 of the patent application park: the position of the direction indicator box to determine its direction. 7. — A method of data hiding through RS code, in addition to the function of hiding confidential data to reduce the curiosity of being cracked, and the function of protecting confidential data to increase the difficulty of being cracked; the method includes The following steps: (a) Divide the data into confidential data and general data; (b) —General data is added with the error correction code of the encoder of the original RS code channel, and confidential data is added by its encoder based on another RS code. Error correction code; (c) Place the encoded confidential information in a password and random number generator. The policy of the Central Laboratories of the Ministry of Economic Affairs, Shellfish Consumer Cooperatives, India I-I--: 1 — II Agriculture--II II-- —1 ^ (Please read the precautions on the back before filling in this page) Generate the position of the general data you want to place after encoding, and complete the action of data hiding. 8. The method according to item 7 of the scope of patent application, wherein the original RS code channel mentioned in step (b) refers to all RS code as error correction codes. The data will be added to the error correction code by the RS encoder first. For transmission, the receiving end will pass the received data to the RS decoder for error correction. -17- This paper size applies the Chinese National Standard (CNS) Α4 specification (2tOX297 mm) 4 5 6 1 1 0 A8 BS C8 D8 6. The scope of patent application, and this RS code can be published, that is, the method of item 7 of the scope of patent application can achieve the purpose of data security under the public coding method. 9. According to the seventh of the scope of patent application, Item method, where after step (c) completes the action of data hiding, when a legitimate user wants to obtain confidential data, the code and random number generator are used in the reverse order and in the same way to generate the encoded data. The confidential information is placed in the coded general information, and it is taken out, and then the RS decoder of the confidential information is used to correct the error, and the confidential information can be obtained. ---------- ^- ---- Order ------- Line I (please first Note on the back of Min Du, please fill in this page again]] Printed by the Belarus Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs -18- Standards for the Universal Ten National Standards
TW86109878A 1997-07-12 1997-07-12 Design of 2-D safe free code and coder-decoder manufacturing method thereof TW456110B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW86109878A TW456110B (en) 1997-07-12 1997-07-12 Design of 2-D safe free code and coder-decoder manufacturing method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW86109878A TW456110B (en) 1997-07-12 1997-07-12 Design of 2-D safe free code and coder-decoder manufacturing method thereof

Publications (1)

Publication Number Publication Date
TW456110B true TW456110B (en) 2001-09-21

Family

ID=21626791

Family Applications (1)

Application Number Title Priority Date Filing Date
TW86109878A TW456110B (en) 1997-07-12 1997-07-12 Design of 2-D safe free code and coder-decoder manufacturing method thereof

Country Status (1)

Country Link
TW (1) TW456110B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI570629B (en) * 2014-05-14 2017-02-11 Kyodo Printing Co Ltd Dimensional code, two-dimensional code of the analytical system and the two-dimensional code of the system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI570629B (en) * 2014-05-14 2017-02-11 Kyodo Printing Co Ltd Dimensional code, two-dimensional code of the analytical system and the two-dimensional code of the system
US9734443B2 (en) 2014-05-14 2017-08-15 Kyodo Printing Co., Ltd. Two-dimensional code, two-dimensional-code analysis system, and two-dimensional-code generation system

Similar Documents

Publication Publication Date Title
US9406010B2 (en) Producing, capturing and using visual identification tags for moving objects
JP6746158B2 (en) Two-dimensional code
CN100369059C (en) Matrix type two-dimensional bar code and its encoding and decoding method
TW312777B (en)
US5468953A (en) Dynamically variable machine readable binary code and method for reading and producing thereof
US5124536A (en) Dynamically variable machine readable binary code and method for reading and producing thereof
JP4122629B2 (en) 2D code generation method
ES2913399T3 (en) Procedure for authentication of an illustration
EP2849115B1 (en) Method for decoding matrix-type two-dimensional code
AU2014331291B2 (en) Data transmission using optical codes
JP2019505925A (en) Method for encoding and recognizing two-dimensional dot matrix code
CN106874819B (en) It can be by sparse horizontal and vertical parity check code control method of handset identity
AU2014331291A1 (en) Data transmission using optical codes
CN106650869A (en) Information hiding method based on two-dimensional code
CN102968654A (en) Method and system for producing information recognizable by naked eyes in plane of two-dimensional (2D) code and 2D code
JP2007241328A (en) Program, information storage medium, two-dimensional code generation system, image generation system and printed matter
CN104376307B (en) A kind of information in fingerprint coding method
CN110516775B (en) User secret information hiding method based on QR code
TW456110B (en) Design of 2-D safe free code and coder-decoder manufacturing method thereof
CN107203798B (en) A kind of generation and recognition methods limiting access type figure ground two dimensional code
CN111428532B (en) Coding and decoding method capable of encrypting three-dimensional code
CN113159255B (en) Digital watermark anti-counterfeiting method based on QR code and safety shading
Ayeleso et al. Identity card authentication system using qr code and smartphone
WO2018139701A1 (en) Coalzip for generating code and providing service through image rotation
Yeh et al. A system for a new two-dimensional code: Secure 2D code

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MK4A Expiration of patent term of an invention patent