CN101464627A - Anti-counterfeit method for recognizing computer data embedded in printing product by mobile phone - Google Patents

Anti-counterfeit method for recognizing computer data embedded in printing product by mobile phone Download PDF

Info

Publication number
CN101464627A
CN101464627A CNA200710151156XA CN200710151156A CN101464627A CN 101464627 A CN101464627 A CN 101464627A CN A200710151156X A CNA200710151156X A CN A200710151156XA CN 200710151156 A CN200710151156 A CN 200710151156A CN 101464627 A CN101464627 A CN 101464627A
Authority
CN
China
Prior art keywords
computer data
image
screening
piecemeal
printed matter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA200710151156XA
Other languages
Chinese (zh)
Inventor
樊晓青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING ZHONGKECHENGTONG TECHNOLOGY DEVELOPMENT Co Ltd
Original Assignee
BEIJING ZHONGKECHENGTONG TECHNOLOGY DEVELOPMENT Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING ZHONGKECHENGTONG TECHNOLOGY DEVELOPMENT Co Ltd filed Critical BEIJING ZHONGKECHENGTONG TECHNOLOGY DEVELOPMENT Co Ltd
Priority to CNA200710151156XA priority Critical patent/CN101464627A/en
Publication of CN101464627A publication Critical patent/CN101464627A/en
Pending legal-status Critical Current

Links

Images

Abstract

An anti-counterfeiting method of using a mobile phone to recognize computer data buried in a printed matter is characterized in that the computer data is buried in a prepress color separation image Y, or the computer data is buried in a prepress color separation screening image Y, or the computer data is buried in a screening image when images C, M, Y and K are screened, or the computer data is buried in a screening image after the images C, M, Y and K are screened; then unscreened images among the images C, M, K and Y are screened; through filming, plate making or direct plate making, and printing, screening images C, M, Y and K are manufactured as a printed matter in which the computer data are buried; during recognition, the mobile phone is used to uptake the printed matter in which the computer data are buried as an image, and the image is recognized; the recognized computer data with the original buried computer data are compared; and if the two are consistent with each other, the printed material is true, otherwise, the printed material is counterfeit. The method has the advantages of easy and convenient recognition, anti-counterfeiting information exclusiveness, strong security, and low cost.

Description

A kind of method for anti-counterfeit with the computer data that is embedded with in the handset identity printed matter
Technical field
The present invention relates to correlation techniques such as a kind of application mobile communication, printing, coding, Information hiding, the information that particularly relates to is imbedded the perfect adaptation of printing technology and mobile communication, makes that the user can really realize carrying out false proof Jianzhen to buying article whenever and wherever possible.
Background technology
In today that trade mark is on the increase, retaining a reputation is crucial thing.Yet, transaction issues about forgery best brand of product trade mark also is very serious, according to data, the dealing money of the annual fake products in the whole world can reach about 2,000 hundred million dollars, and at domestic 50,000,000,000 Renminbi that also reach of China, visible manufacturing and marketing the fake have become the second-biggest-in-the-world public hazards that are only second to traffic in drugs.
When producer from firing after the brand of researching and developing to that the marketing of going into operation works laboriously, it may will run into very pain in the neck feelings at once: this brand also not have just to become for oneself is commercial but very fast the prey that the counterfeiter chases.Hereafter, producer just have to a big chunk energy be placed on crack down on counterfeit goods on.But, manufacturer knows how many products he has produced himself, but be difficult to know, his product on earth by whom counterfeit and counterfeit what, so, cracked down on counterfeit goods into businessman's ten minutes pain in the neck feelings, if a solution can be arranged, cracking down on counterfeit goods of manufacturer's individual combat become the Jianzhen that all consumers participate in, so, thing has just become simply, and how many fake productss no matter who has made, and producer and businessman have been the genuine pieces of themselves production as long as help the consumer to identify which part product when buying commodity.
Replacing cracking down on counterfeit goods with Jianzhen is not new ideas, and the various solutions of similar thought also are that unrest is sewed in dim eyesight now, and are complete, but traditional Jianzhen's technology still exists many drawbacks in the circulation of commodities process, poor as technical monopoly and uniqueness; Easily forge and reveal core technology; Use inconvenient; The regular fee of anti-counterfeit recognition has been imputed to the consumer.Being embodied in of these problems:
(1) false proof, the fluorescence falsification preventing of the not high multiple laser anti-counterfeit of the technology content of anti-counterfeiting technology, a peacekeeping two-dimensional bar, anti-counterfeiting technology such as alternating temperature is false proof, visual watermark is false proof, really played better action in the early stage of development, but development afterwards is not fully up to expectations.Typical in laser anti-counterfeit, along with the development in market, counterfeit and shoddy goods have also adopted laser antifalsification technology.Other anti-counterfeiting technologies are as fluorescence falsification preventing, alternating temperature anti-false trademark.Visual watermark, concealed anti-false etc. because it is with low content of technology, very easily is decrypted and grasps, and are revealed easily and a large amount of fake products occur, even the imitated situation of anti-counterfeiting technology itself occurred.
(2) inquiry is inconvenient
Businessman often only emphasizes to have adopted any anti-counterfeiting technology in anti-counterfeit package, but how on earth discern or what effect different observational techniques has, most consumers are unknown, wherein some anti-counterfeiting technology is too loaded down with trivial details again, as import the bar code Help by Phone or by internet checking etc., this kind method for anti-counterfeit makes most consumers be difficult to identification and grasps, and is difficult to play anti-fake effect naturally.
3) can not buy before Jianzhen whenever and wherever possible
Traditional false proof service promptly allows to satisfy the function of true and false discriminating, as internet checking, SMS query etc., but because false proof plain code information must lean on visual identity after the strip of paper used for sealing of tearing, and all be to use once and cease to be in force automatically, so Jianzhen is and can only occurs in after the purchase, thing has been bought, and it is just pretty troublesome to return goods or handle relevant dispute.Such anti-counterfeiting technology is inequitable to the consumer.So those false proof producers are known as the preceding Jianzhen of the purchase that has realized now, in fact all are the deception consumer.
(4) technology innovation is slow, randomness is poor
In a single day many antiforge technology are used, and core technology is just unalterable.It can play anti-fake effect in a short time, but owing to not upgrading and improving, randomness is poor, is easy to be decoded by illegal molecule and utilize.Because the employed anti-counterfeiting mark of some anti-counterfeiting technologies does not change, no randomness, therefore, technology itself just is easy to be cracked and grasp.
(5) false proof market confusion
Present anti-counterfeiting technology produce market confusion, because most of anti-counterfeiting technologies need professional knowledge, common people are difficult for understanding in depth, and some anti-fake products that seem to be novel low performance are bait with the low price, and the people is had dust thrown into the eyes.This low-level anti-counterfeiting mark is easy to be palmed off at short notice.
Differentiate the method for genuine piece before the object of the present invention is to provide a kind of consumer of realization to buy whenever and wherever possible, the consumer uses according to service provided by the present invention, just can before buying, differentiate the true and false of commodity, this working of an invention, to play good fright effect to the fake producer, no matter make them have no exploits, be the goods producer, or businessman and consumer will therefrom benefit a great deal.
Technical solution of the present invention is to bury computer data in the printed matter of product, is the digital anti-fake method that identification terminal is discerned the computer data that buries with the mobile phone, and concrete grammar is as follows:
Before seal, imbed computer data (method one) in the color separated image Y image or before seal, imbed computer data (method two) in the screening color separations Y image or when C, M, Y, K screening, in Screening Image, imbed computer data (method three) or behind C, M, Y, K screening, in Screening Image, imbed computer data (method four), to not C, M, Y, the K image screening of screening, C, M, Y, K Screening Image are through going out the film, plate-making or directly making a plate, be printed as the printed matter that is embedded with computer data then; The printed matter that is embedded with computer data by mobile phone picked-up during identification is image and image discerned, the computer data that identifies and the computer data of originally imbedding relatively, printed matter representative product be true when both were consistent, otherwise was vacation.
Bury computer data method comprise:
Method one: feature is to the Y image block of color separated image C, M, Y, K image before the seal of printed matter and obtains the yellow mean value of each piecemeal, imbeds computer data by changing the yellow mean value of piecemeal.Method is: the Y image is carried out piecemeal, selected piecemeal and the yellow mean value of definite benchmark piecemeal as benchmark, set a yellow deviate, serving as the basis with yellow mean value of benchmark piecemeal and yellow deviate imbeds computer data by setting around the benchmark piecemeal the yellow mean value of piecemeal, then altered Y image is added C, M, K image through screening, go out the film, plate-making or directly make a plate, be printed as the printed matter of imbedding computer data or convert the RGB image to be printed as the printed matter of imbedding computer data through printer.
Method two: feature is that the piecemeal pixel quantity by the Y domain picture of C, M behind the screening before the seal that changes printed matter, Y, K comes the logger computer data.Method is: the Y domain behind the screening is looked like to carry out piecemeal and calculates each piecemeal pixel quantity, selected as the piecemeal of benchmark and the pixel quantity of definite benchmark piecemeal, set a piecemeal pixel deviate, pixel quantity, piecemeal pixel deviate with definite benchmark piecemeal serve as that computer data is imbedded by the pixel quantity of piecemeal around the setting benchmark piecemeal in the basis, then altered Y version Screening Image are added that C, M, K Screening Image are through going out the film, plate-making or directly making a plate, be printed as the printed matter of imbedding computer data.
Method three: feature is that the assigned address of Screening Image is imbedded computer data with special site screening when making color separated image screening before the seal of printed matter.Method is: by obtaining having the Screening Image of special site at assigned address with special site screening when the screening color separated image, special site is by with coded system logger computer data.Image behind the screening is through going out the film, plate-making or Computer To Plate, and being printed onto then becomes the printed matter that is embedded with computer data on the medium of undertaking the printing of.
Method four: feature is to make before the seal of printed matter behind the color separated image screening assigned address of Screening Image have special site to imbed computer data.Method is: the network point distribution by change assigned address after the screening color separated image is the Screening Image that special network point distribution obtains having special site, and special site is by using coded system logger computer data.Image behind the screening is through going out the film, plate-making or Computer To Plate, and being printed onto then becomes the printed matter that is embedded with computer data on the medium of undertaking the printing of.
Method with the computer data that is embedded with in the handset identity printed matter: with the local of the mobile phone picked-up printed matter that has camera function or all be image, by the image recognition of absorbing is obtained recognition result.The product of judging the printed matter representative by recognition result is compared with the computer data of imbedding originally true and false.If recognition result is identical with the computer data of imbedding originally, then this product is true, otherwise is false.
Described assigned address comprises any position in the Screening Image.
Described special site be can with the point distinguished mutually of site beyond the assigned address, line, figure etc. or their combination.
Described logger computer data comprise data such as various numerals, literal, figure, symbol, mark.
Data such as described various numeral, literal, figure, symbol, mark comprise encrypted mistake and the not encrypted data of crossing.
The described medium of undertaking the printing of comprises paper, plastics, rubber, cloth, timber, packing material surface etc.
The true and false method of the product of described judgement printed matter representative comprises:
(1) the handset identity result compare with the known computer data of imbedding originally judge true and false;
(2) the handset identity result is sent on the corresponding with service device by network, compares with the data that this server writes down in advance that it is true and false to judge, true and false result sends back mobile phone by network.
(3) mobile phone is sent to the mobile phone pickup image on the corresponding with service device by network and discerns, and recognition result is compared with the data that this server writes down in advance and judged true and falsely, and true and false result sends back mobile phone by network.
Described network load mode comprises note, the modes such as GPRS, CDMA of adopting.
Described color separated image screening method comprises that modulating FM, amplitude modulation AM, modulating FM such as mix at screening method with amplitude modulation AM.
Advantage of the present invention is:
1, nimble property: this also is one of most important properties of the present invention, and the identification of use mobile phone camera reaches direct false proof Jianzhen or network connection is inquired about automatically, and is convenient and swift, really realized false proof Jianzhen whenever and wherever possible.
2, anti-counterfeiting information monopoly: a whole set of anti-counterfeiting technology is monopolized proprietary by production manufacturer, therefore has high false proof fiduciary level.
3. security: in the present invention, the computer data of false proof usefulness is imbedded in the microcosmic printing screen, therefore forges very difficult.This technology macroscopical characteristics be exactly that vision is invisible, so be difficult to the diffusion.
4, low cost: saved the spending that enterprise cracks down on counterfeit goods, significantly reduced the human and material resources loss.Production and sales and consumer are participated in crack down on counterfeit goods, thereby can receive the effect of getting twice the result with half the effort.And the consumer has only bought an original mobile phone that just needs.
Below in conjunction with accompanying drawing this method is described in further detail:
Fig. 1 is for burying the image of computer data;
Fig. 2 is four fens chromatic graphs of C, M, Y, K that need bury the image of computer data;
Fig. 3 buries the computer data synoptic diagram for Y color separated image piecemeal;
Fig. 4 is the screening synoptic diagram that need bury the color separated image of computer data;
Fig. 5 is for imbedding the synoptic diagram of computer data in Fig. 4 Y1 Screening Image;
Fig. 6 is for to bury computer data image gray scale synoptic diagram of the same size with needs;
Fig. 7 is the screening synoptic diagram that buries computer data image gray-scale map of the same size with needs;
Fig. 8 specifies in the screening enlarged drawing of the gray-scale map of Fig. 7 and buries the computer data position;
Fig. 9 buries C, M, Y, the K screening synoptic diagram of computer data at assigned address;
The special site of Figure 10 synoptic diagram;
The special site of Figure 11 quaternary coding synoptic diagram;
C behind Figure 12 screening, M, Y, K enlarged image synoptic diagram;
Imbed the process of computer data in Figure 13 printed matter.
Concrete enforcement is as follows:
Method one: obtain to bury image such as Fig. 1 of computer data, convert this image color segmentation to C, M, Y, K four width of cloth color separated image such as Fig. 2, to Y image block such as Fig. 3 I (is enlarged drawing as the Y image of Fig. 2 as Fig. 3 I).Obtain average yellow value (full yellow is 0, and whole white is 255) as each piecemeal of Fig. 3 I.Set the benchmark piecemeal,, imbed computer data with 8 piecemeals around each benchmark piecemeal as A, B, the C... of Fig. 3 I.The method of imbedding computer data is to realize by the average yellow value that benchmark piecemeal 8 piecemeals on every side are set, the rule of imbedding computer data by the average yellow value of 8 piecemeals around the setting benchmark piecemeal is the average yellow value of piecemeal setting big certain setting value (yellow deviate) of average yellow value than benchmark piecemeal, this piecemeal is represented binary one, the average yellow value that certain piecemeal is set is than little certain setting value of average yellow value of benchmark piecemeal, this piecemeal is represented binary zero, perhaps the average yellow value of piecemeal setting is than average yellow certain setting value greatly that is worth of benchmark piecemeal, this piecemeal is represented binary zero, the average yellow value that certain piecemeal is set is than little certain setting value of average yellow value of benchmark piecemeal, this piecemeal is represented binary one, here might as well select the former with setting average yellow value representation computer data " 0 " " 1 " method, so just set up the corresponding relation of the average yellow value of binary computations machine data and benchmark piecemeal 8 piecemeals on every side.Average yellow value as the benchmark piecemeal can remain unchanged, and also can adjust.Now with as the benchmark piecemeal A of the I of Fig. 3 and around 8 piecemeals be that example describes the method for imbedding computer data in detail, for simplicity, 8 piecemeals around will reaching as the benchmark piecemeal A of Fig. 3 I are illustrated in the II place as Fig. 3 separately, No. 4 pieces (being benchmark piecemeal A piecemeal) are 0 for 9 piece piece numbers at center, 1,2,3,4,5,6,7,8, might as well establish the average yellow value of each piece and be respectively 100,120,140,130,160,180,105,125,190, the average yellow value of hence one can see that the center is No. 4 pieces is 160, set a yellow deviate and might as well be made as 40, average yellow value and yellow deviate that No. 4 pieces of benchmark piecemeal have been arranged just can have been buried computer data with 8 piecemeals around No. 4 pieces of benchmark piecemeal.The average yellow value setting of certain piecemeal in No. 4 pieces 8 piecemeals on every side is not less than 200 (the average yellow value 160 and yellow deviate 40 sums of benchmark piecemeal 4) and is set at binary one, is not more than 120 (the average yellow value 160 of benchmark piecemeal 4 is poor with yellow deviate 40) and is set at binary zero.Such as being the benchmark piecemeal with No. 4 pieces as Fig. 3 II now, it is 01010001 " Q " character that 8 piecemeals are on every side imbedded binary representation.Imbedding 01010001 order might as well be made as from left to right.Imbed so and be: first of 01010001 is " 0 ", the average yellow value of No. 0 piece is 100 to remain unchanged, because 100 less than 120, second of 01010001 is " 1 ", with the average yellow value of No. 1 piece is set is 200 to represent, the 3rd of 01010001 is " 0 ", with the average yellow value of No. 2 pieces is set is 120 to represent, the 4th of 01010001 is " 1 ", with the average yellow value of No. 3 pieces is set is 200 to represent, the 5th of 01010001 is " 0 ", with the average yellow value of No. 5 pieces is set is 120 to represent, the 6th of 01010001 is " 0 ", No. 6 the average yellow value of piece remains unchanged, because 105 less than 120, the 7th of 01010001 is " 0 ", with the average yellow value of No. 7 pieces is set is 120 to represent, the 8th of 01010001 is " 1 ", with the average yellow value of No. 8 pieces is set is 200 to represent, so just the binary number 01010001 of expression " Q " be embedded to the A piece be the center around in 8, as a same reason also can be with B, C... piece be the center around imbed computer data in 8, can imbed computer data in the whole Y image like this, the computer data that is embedded with can be encrypt or unencrypted, as above-mentioned " Q " just can be through cryptographic calculation and data.The Y image that is embedded with computer data with C, M, the K image is through screening, plate-making or directly make a plate, be printed as the printed matter that is embedded with computer data or convert the RGB image to is printed as the printed matter that is embedded with computer data through printer.
Method two: image such as Fig. 1 of obtaining to bury computer data, this image transitions is become C, M, Y, K four width of cloth image such as Fig. 2, to C, M, Y, the K image is made screening and is handled the C that obtains through screening, M, Y, the K image, for before the difference screening and afterwards C, M, Y, the K image, we might as well establish the C after the screening, M, Y, the K image is C1, M1, Y1, K1 image such as Fig. 4, to Y1 image block (I as Fig. 5 is the site partial enlarged drawing of Fig. 4 Y1), selected piecemeal as benchmark is such as A, B... piece and calculate each piecemeal yellow pixel quantity (pixel is the least unit of this image, yellow pixel is meant the black site as Fig. 5 I, because should print Yellow ink in the place during printing, so might as well be called yellow pixel), yellow pixel quantity as the benchmark piecemeal can remain unchanged, and also can adjust.Determine benchmark piecemeal average yellow pixel quantity and set a yellow pixel deviate, so just can imbed computer data by the yellow pixel quantity of 8 piecemeals around the setting benchmark piecemeal, it is the mean pixel quantity of piecemeal setting big certain setting value (yellow pixel deviate) of average yellow pixel quantity than benchmark piecemeal that the rule of imbedding computer data with the average yellow pixel quantity of 8 piecemeals is set, this piecemeal is represented binary one, the average yellow pixel quantity that certain piecemeal is set is than little certain setting value of average yellow pixel quantity of benchmark piecemeal, this piecemeal is represented binary zero, perhaps the average yellow pixel quantity of piecemeal setting is than big certain setting value of average yellow pixel quantity of benchmark piecemeal, this piecemeal is represented binary zero, the average yellow pixel quantity that certain piecemeal is set is than little certain setting value of average yellow pixel quantity of benchmark piecemeal, this piecemeal is represented binary one, here might as well select the former method, so just set up the one-to-one relationship of the average yellow pixel quantity of binary computations machine data and benchmark piecemeal 8 piecemeals on every side with average yellow pixel quantitaes binary zero " 1 ".Now with as the benchmark piecemeal A of the I of Fig. 5 and around 8 piecemeals be that example describes the method for imbedding computer data in detail, for simplicity, 8 piecemeals around will reaching as the benchmark piecemeal A of Fig. 5 I are illustrated in the II place as Fig. 5 separately, No. 4 pieces (being benchmark piecemeal A piecemeal) are 0 for 9 piece piece numbers at center, 1,2,3,4,5,6,7,8, might as well establish the average yellow pixel quantity of each piece and be respectively 170,170,170,170,150,125,170,95,170, the center is that the average yellow pixel quantity of No. 4 pieces is 150, set a yellow pixel volume deviation value and might as well be made as 40, average yellow pixel quantity and yellow pixel volume deviation value that No. 4 pieces of benchmark piecemeal have been arranged just can have been buried computer data with 8 piecemeals around No. 4 pieces of benchmark piecemeal.The average yellow pixel quantity of the piecemeal in No. 4 pieces 8 piecemeals on every side is set to be not less than 190 (the average yellow pixel quantity 150 and yellow pixel volume deviation value 40 sums of benchmark piecemeal 4) and is set at binary one, is not more than 110 (the average yellow pixel quantity 150 of benchmark piecemeal 4 is poor with yellow pixel volume deviation value 40) and is set at binary zero.Such as being the benchmark piecemeal with No. 4 pieces as Fig. 5 II now, it is 01010001 " Q " character that 8 piecemeals are on every side imbedded binary representation.Imbedding 01010001 order might as well be made as from left to right.01010001 first is " 0 " so, No. 0 average yellow pixel quantity of piece is 170 to change into 110 expression binary zeroes, second of 01010001 is " 1 ", No. 1 average yellow pixel quantity of piece is 170 to change into 190 expression binary ones, the 3rd of 01010001 is " 0 ", No. 2 average yellow pixel quantity of piece is 170 to change into 110 expression binary zeroes, the 4th of 01010001 is " 1 ", No. 3 average yellow pixel quantity of piece is 170 to change into 190 expression binary ones, the 5th of 01010001 is " 0 ", No. 5 average yellow pixel quantity of piece is 125 to change into 110 expression binary zeroes, the 6th of 01010001 is " 0 ", No. 6 average yellow pixel quantity of piece is 170 to change into 110 expression binary zeroes, the 7th of 01010001 is " 0 ", No. 7 average site of piece pixel quantities are the 95 expression binary zeroes that remain unchanged, the 8th of 01010001 is " 1 ", No. 8 piece mean pixel quantity is 170 to change into 190 expression binary ones, so just " Q " of Binary Zero 1010001 expression be embedded to the A piece be the center around in 8, as a same reason also can with the B... piece be the center around imbed computer data in 8, can imbed computer data in the whole Y image like this, the computer data that is embedded with can be encrypt or unencrypted, as above-mentioned " Q " just can be through cryptographic calculation and data.The Y Screening Image that is embedded with computer data with C, M, K Screening Image through going out the film, plate-making or directly making a plate, be printed as printed matter.
Be image with the mobile phone picked-up printed matter that has camera function during the printed matter recognition that obtains with method one, method two, obtain the Y color separated image by image color segmentation to picked-up, by identification obtains recognition result to the Y color separated image, and recognition result compared with the computer data of imbedding originally, if it is identical, then this product is true, otherwise is false.The mode that recognition result is compared with the computer data of imbedding originally has two kinds, and the one, the computer data of imbedding originally is known, and recognition result and known case compare, and consistent is true, otherwise is false, and recognition result directly shows on mobile phone.Another kind of situation is that the computer data of imbedding is originally known for having only the wright, and be placed in the map network server or in the application program of mobile phone, then the webserver that recognition result is sent to the wright by surfing Internet with cell phone is compared with original recorded content, consistent is true, otherwise be false, or compare with original recorded content in the application program of mobile phone, consistent be true, otherwise is vacation.And true and false result showed on mobile phone.
Method three: image such as Fig. 1 of obtaining to bury computer data, this image transitions is become C, M, Y, K four width of cloth image such as Fig. 2, make I, II, III, the IV of four width of cloth and C, M, Y, K four width of cloth images gray-scale map of the same size such as Fig. 6, to gray-scale map I, II, III, IV screening, add network parameters respectively with to color separation C, M, Y, that K adds network parameters is identical.Screening to gray-scale map I, II, III, IV can adopt amplitude modulation AM method, also can adopt the modulating FM method, can also adopt other screening method, be example with amplitude modulation AM method here, and amplitude modulation AM method screening is imbedded also suitable other screening method of computer data method and imbedded computer data.So just obtain I, II, III, IV such as Fig. 7 through screening, on I, the II of Fig. 7, III, IV, specify the position (we are called assigned address) of burying computer data, 9,10,11,12 of Fig. 8 IV as 1,2,3,4,5,6,7,8 of Fig. 8 I.Obtain to bury computer data image such as Fig. 1, this computer data image is carried out color separation obtain four color separated image of C, M, Y, K as Fig. 2, C, M, four color separated image screenings of Y, K are handled C, M, Y, the K that obtains Fig. 9, adopt special site to come screening in specified location during screening, special site be with assigned address beyond the different point of site form, line, figure, symbol etc., as 1,2,3,4,5,6,7,8 of Fig. 9 C, as 9,10,11,12 of Fig. 9 K.Special site can be distributed in the Screening Image and serve as a mark, and is equally distributed triangle as 12 of Fig. 9 K.Computer data can be buried by encoding with the form of different special sites in special site, as 101 of Figure 10,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117... be the form of different special sites, can from Figure 10, select the form of different special sites to encode, as selecting as 101 of Figure 10,102,107,108 encode represents that respectively the computing machine quaternary number is according to 0,1,2,3 as Figure 11, and like this 1 of Fig. 9 C, 2,3,4,5, the computer data of 6 expressions is that quaternary number is according to 112232; The computing machine quaternary number certificate of the expression of 9,10,11 on 7,8 and Fig. 9 K of Fig. 9 C is 13103.Because various numerals, literal, figure, symbol etc. can be with the computer data representations of various systems (such as the quaternary), the computer data of various systems (such as the quaternary) can be expressed as various special sites with coded system, these special sites can be embedded to again in C, M, Y, the K four-color image of screening, thereby realize computer data imbedding in four look Screening Image, the computer data that need imbed can be encrypt with unencrypted.Assigned address can be determined by the user, also can be set by the user rule determines, 12 assigned address rule such as Fig. 9 K is assigned addresses of two mesh point sets in lateral separation, and these C, M, Y, K images that are embedded with computer data are through going out the film, plate-making or directly making a plate, be printed as the printed matter that is embedded with computer data at last.
Method four: image such as Fig. 1 of obtaining needing printing and wishing to bury computer data, this computer data image is carried out color separation obtain four color separated image of C, M, Y, K as Fig. 2, C, M, four color separated image screenings of Y, K are handled C, M, Y, the K that obtains Figure 12, on C, the M of Figure 12, Y, K, specify the position of burying computer data, this position network point distribution replaces with special network point distribution, might as well also use as Fig. 9 explanation, as 1,2,3,4,5,6,7,8 of Fig. 9 C, as 9,10,11,12 of Fig. 9 K.Special site is for burying other point of site phase region beyond the position of computer data, line, figure, symbol etc. with appointment.Special site can be to be distributed in the Screening Image to serve as a mark, and is equally distributed triangle as 12 of Fig. 9 K.Computer data can be buried by encoding with the form of different special sites in special site, as 101 of Figure 10,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117... be the form of different special sites, can from Figure 10, select the form of different special sites to encode, as selecting as 101 of Figure 10,102,107,108 encode represents that respectively the computing machine quaternary number is according to 0,1,2,3 as Figure 11,1 of such words Fig. 9 C, 2,3,4,5, the computer data of 6 expressions is that quaternary number is according to 112232; The computing machine quaternary number certificate of the expression of 9,10,11 on 7,8 and the K of Fig. 9 C is 13103.Because various numerals, literal, figure, symbol etc. can be with the computer data representations of various systems (such as the quaternary), the computer data of various systems (such as the quaternary) can be expressed as various special sites with coded system, these special sites can be embedded to again in C, M, Y, the K four-color image of screening, thereby realize computer data imbedding in four look Screening Image, the computer data that need imbed can be encrypt with unencrypted.Assigned address can be determined by the user, also can be set by the user rule determines, 12 assigned address rule such as Fig. 9 K is assigned addresses of two mesh point sets in lateral separation, and these C, M, Y, K images that are embedded with computer data are through going out the film, plate-making or directly making a plate, be printed as the printed matter that is embedded with computer data at last.
Method three, four-function recognition method are as follows:
With the mobile phone that has camera function the printed matter photograph that is embedded with computer data is obtained image, the computer data of imbedding in the image is discerned.If the computer data that identification obtains is identical with the computer data of originally imbedding, then product is true, otherwise is false.The mode that recognition result is compared with the computer data of imbedding originally has two kinds, a kind of situation is that the computer data of imbedding originally is known, the promptly popular in advance computer data of having imbedded in the printed matter somewhere is apprised of (just as the somewhere of Renminbi has watermark to be apprised of), recognition result and known computer data comparison, consistent is true, otherwise is false.Another situation is that situation about imbedding originally has only the wright to know, and be placed on the webserver or in the application program of mobile phone, then on the webserver that recognition result is sent to the wright by surfing Internet with cell phone and the webserver in advance the content of record compare or compare (must the deciphering back compare) with recorded content on the webserver as encrypted recognition result by a certain rule, consistent is true, otherwise be false, perhaps in handset identity result and the application program of mobile phone in advance the content of record compare consistently for true, otherwise be vacation.The webserver that recognition result sends to the wright can adopt modes such as note, GPRS, CDMA to send to wright's the webserver; Comparative result can send to mobile phone by modes such as note, GPRS, CDMA.

Claims (9)

1, a kind of method for anti-counterfeit with the computer data that is embedded with in the handset identity printed matter, it is characterized in that: before seal, imbed computer data (method one) in the color separated image Y image or before seal, imbed computer data (method two) in the screening color separations Y image or at C, M, Y, in Screening Image, imbed computer data (method three) during the K screening or at C, M, Y, in Screening Image, imbed computer data (method four) behind the K screening, then to the C of screening not, M, Y, K image screening, C, M, Y, the K Screening Image is through going out the film, plate-making or directly plate-making, be printed as the printed matter that is embedded with computer data; The printed matter that is embedded with computer data by mobile phone picked-up during identification is image and image discerned, the computer data that identifies and the computer data of originally imbedding relatively, printed matter representative product be true when both were consistent, otherwise was vacation.Bury computer data method comprise:
Method one: feature is to the Y image block of color separated image C, M, Y, K image before the seal of printed matter and obtains the yellow mean value of each piecemeal, imbeds computer data by changing the yellow mean value of piecemeal.Method is: the Y image is carried out piecemeal, selected piecemeal and the yellow mean value of definite benchmark piecemeal as benchmark, set a yellow deviate, serving as the basis with yellow mean value of benchmark piecemeal and yellow deviate imbeds computer data by setting around the benchmark piecemeal the yellow mean value of piecemeal, then altered Y image is added C, M, K image through screening, go out the film, plate-making or directly make a plate, be printed as the printed matter of imbedding computer data or convert the RGB image to be printed as the printed matter of imbedding computer data through printer.
Method two: feature is that the piecemeal pixel quantity by the Y domain picture of C, M behind the screening before the seal that changes printed matter, Y, K comes the logger computer data.Method is: the Y domain behind the screening is looked like to carry out piecemeal and calculates each piecemeal pixel quantity, selected as the piecemeal of benchmark and the pixel quantity of definite benchmark piecemeal, set a piecemeal pixel deviate, pixel quantity, piecemeal pixel deviate with definite benchmark piecemeal serve as that computer data is imbedded by the pixel quantity of piecemeal around the setting benchmark piecemeal in the basis, then altered Y version Screening Image are added that C, M, K Screening Image are through going out the film, plate-making or directly making a plate, be printed as the printed matter of imbedding computer data.
Method three: feature is that the assigned address of Screening Image is imbedded computer data with special site screening when making color separated image screening before the seal of printed matter.Method is: by obtaining having the Screening Image of special site at assigned address with special site screening when the screening color separated image, special site is by with coded system logger computer data.Image behind the screening is through going out the film, plate-making or Computer To Plate, and being printed onto then becomes the printed matter that is embedded with computer data on the medium of undertaking the printing of.
Method four: feature is to make before the seal of printed matter behind the color separated image screening assigned address of Screening Image have special site to imbed computer data.Method is: the network point distribution by change assigned address after the screening color separated image is the Screening Image that special network point distribution obtains having special site, and special site is by using coded system logger computer data.Image behind the screening is through going out the film, plate-making or Computer To Plate, and being printed onto then becomes the printed matter that is embedded with computer data on the medium of undertaking the printing of.
Method with the computer data that is embedded with in the handset identity printed matter: with the local of the mobile phone picked-up printed matter that has camera function or all be image, by the image recognition of absorbing is obtained recognition result.The product of judging the printed matter representative by recognition result is compared with the computer data of imbedding originally true and false.If recognition result is identical with the computer data of imbedding originally, then this product is true, otherwise is false.
2, a kind of method for anti-counterfeit with the computer data that is embedded with in the handset identity printed matter according to claim 1, it is characterized in that: described assigned address comprises any position in the Screening Image.
3, a kind of method for anti-counterfeit with the computer data that is embedded with in the handset identity printed matter according to claim 1 is characterized in that: described special site be can with the point distinguished mutually of site beyond the assigned address, line, figure etc. or their combination.
4, a kind of method for anti-counterfeit with the computer data that is embedded with in the handset identity printed matter according to claim 1, it is characterized in that: the logger computer data comprise data such as various numerals, literal, figure, symbol, mark.
5, data such as various numeral according to claim 4, literal, figure, symbol, mark comprise encrypted mistake and the not encrypted data of crossing.
6, a kind of method for anti-counterfeit with the computer data that is embedded with in the handset identity printed matter according to claim 1, it is characterized in that: the described medium of undertaking the printing of comprises paper, plastics, rubber, cloth, timber, packing material surface etc.
7, a kind of method for anti-counterfeit with the computer data that is embedded with in the handset identity printed matter according to claim 1 is characterized in that: the true and false method of judging the product of printed matter representative comprises:
(1) the handset identity result compare with the known computer data of imbedding originally judge true and false;
(2) the handset identity result is sent on the corresponding with service device by network, compares with the data that this server writes down in advance that it is true and false to judge, true and false result sends back mobile phone by network.
(3) mobile phone is sent to the mobile phone pickup image on the corresponding with service device by network and discerns, and recognition result is compared with the data that this server writes down in advance and judged true and falsely, and true and false result sends back mobile phone by network.
8, comprise note, the modes such as GPRS, CDMA of adopting according to the described network load mode of claim 7.
9, a kind of method for anti-counterfeit with the computer data that is embedded with in the handset identity printed matter according to claim 1 is characterized in that: the color separated image screening method comprises that modulating FM, amplitude modulation AM, modulating FM such as mix at screening method with amplitude modulation AM.
CNA200710151156XA 2007-12-21 2007-12-21 Anti-counterfeit method for recognizing computer data embedded in printing product by mobile phone Pending CN101464627A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA200710151156XA CN101464627A (en) 2007-12-21 2007-12-21 Anti-counterfeit method for recognizing computer data embedded in printing product by mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA200710151156XA CN101464627A (en) 2007-12-21 2007-12-21 Anti-counterfeit method for recognizing computer data embedded in printing product by mobile phone

Publications (1)

Publication Number Publication Date
CN101464627A true CN101464627A (en) 2009-06-24

Family

ID=40805274

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA200710151156XA Pending CN101464627A (en) 2007-12-21 2007-12-21 Anti-counterfeit method for recognizing computer data embedded in printing product by mobile phone

Country Status (1)

Country Link
CN (1) CN101464627A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102466965A (en) * 2010-10-29 2012-05-23 方正国际软件(北京)有限公司 Method and system for color separation plate making
CN102782663A (en) * 2009-12-16 2012-11-14 T-数据系统(新加坡)有限公司 Method of converting digital data
CN103718212A (en) * 2011-08-05 2014-04-09 乐天株式会社 Color determination device, color determination system, color determination method, information recording medium, and program
CN105205777A (en) * 2015-08-28 2015-12-30 深圳市泰久信息系统股份有限公司 Encoding method of invisible image ciphers

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102782663A (en) * 2009-12-16 2012-11-14 T-数据系统(新加坡)有限公司 Method of converting digital data
CN102782663B (en) * 2009-12-16 2016-04-06 T-数据系统(新加坡)有限公司 The method of converting digital data
CN102466965A (en) * 2010-10-29 2012-05-23 方正国际软件(北京)有限公司 Method and system for color separation plate making
CN103718212A (en) * 2011-08-05 2014-04-09 乐天株式会社 Color determination device, color determination system, color determination method, information recording medium, and program
CN103718212B (en) * 2011-08-05 2016-10-12 乐天株式会社 Color determines that device, color determinate system and color determine method
CN105205777A (en) * 2015-08-28 2015-12-30 深圳市泰久信息系统股份有限公司 Encoding method of invisible image ciphers
CN105205777B (en) * 2015-08-28 2019-03-08 深圳市泰久信息系统股份有限公司 A kind of coding method of latent image password

Similar Documents

Publication Publication Date Title
CN104933586A (en) Anti-fake anti-channel conflict system based on public platform and inquiring method
JP5784237B2 (en) Detection of counterfeit printed matter using a computing device equipped with a camera
CN103761799B (en) A kind of bill anti-counterfeit method based on texture image feature and device
CA2504299A1 (en) System and method for decoding digital encoded images
US11587339B2 (en) Method for reading a code stored in a halftone image and comparison with a retrievable value
CN102194137A (en) Multi-dimensional encryption anti-counterfeiting printing technology based on shape of amplitude modified screen
JP2002511685A (en) Digital watermarks and banknotes
US20020146146A1 (en) Using digital watermarks to facilitate counterfeit inspection and inventory management
CN100375079C (en) Truth-identifying cellphone service method and system for purchase
CN109376832B (en) Triple anti-counterfeiting two-dimensional code embedded with anti-counterfeiting mark image and digital fluorescent image
Yahya et al. Steganography techniques
CN114022160A (en) Genuine insurance and anti-counterfeiting method
CN101464627A (en) Anti-counterfeit method for recognizing computer data embedded in printing product by mobile phone
CN109726788B (en) Light and shade double-code two-dimensional code with hidden metamerism
CN104182882B (en) A kind of product digital watermark anti-fake anti-channel conflict information and its application process
CN109376833B (en) Triple anti-counterfeiting two-dimensional code for pseudo-random information overprinting digital fluorescent image
WO2006042913A1 (en) Method for making secure transactions and authentication of objects or documents
CN101770729A (en) Two-dimension code anti-counterfeit Internet access product and method thereof
CN109711513B (en) Triple anti-counterfeiting two-dimensional code with double-code of digital fluorescent image overprinting bright and dark
US20230062427A1 (en) Method and system for protection against counterfeiting
CN109711514A (en) Hide the anti-fake two-dimension code of anti-pseudo-random information
CN100452884C (en) Method for detecting GIF infomration hidden
CN109572258A (en) The stealthy infrared complementary identification dimension code anti-counterfeit method of pseudo-code
CN109740713B (en) Triple anti-counterfeiting two-dimensional code with hidden digital signature and digital fluorescent image
CN109740712B (en) Two-dimensional code for hiding anti-counterfeiting mark image

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
DD01 Delivery of document by public notice

Addressee: Fu Chunqiang

Document name: Notification that Application Deemed not to be Proposed

Addressee: Beijing Zhongkechengtong Technology Development Co., Ltd.

Document name: Review of business letter

DD01 Delivery of document by public notice

Addressee: Fu Chunqiang

Document name: Notice of amendment

DD01 Delivery of document by public notice

Addressee: Fu Chunqiang

Document name: Notification of before Expiration of Request of Examination as to Substance

DD01 Delivery of document by public notice

Addressee: Fu Chunqiang

Document name: Review of business letter

DD01 Delivery of document by public notice

Addressee: Fu Chunqiang

Document name: Notification that Application Deemed to be Withdrawn

C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20090624