CN101488215B - Arc-shaped anti-fake method and arc-shaped anti-fake element - Google Patents

Arc-shaped anti-fake method and arc-shaped anti-fake element Download PDF

Info

Publication number
CN101488215B
CN101488215B CN2009100000053A CN200910000005A CN101488215B CN 101488215 B CN101488215 B CN 101488215B CN 2009100000053 A CN2009100000053 A CN 2009100000053A CN 200910000005 A CN200910000005 A CN 200910000005A CN 101488215 B CN101488215 B CN 101488215B
Authority
CN
China
Prior art keywords
icon
arc
class
secret image
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2009100000053A
Other languages
Chinese (zh)
Other versions
CN101488215A (en
Inventor
王道顺
董琳
李顺东
戴一奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tsinghua University
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Priority to CN2009100000053A priority Critical patent/CN101488215B/en
Publication of CN101488215A publication Critical patent/CN101488215A/en
Application granted granted Critical
Publication of CN101488215B publication Critical patent/CN101488215B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses an arc-like anti-counterfeiting method for concealing confidential image information and a manufacturing method of such kind of arc-like anti-counterfeiting element. The anti-counterfeiting method comprises the following steps: constructing two same or different rectangular encrypted icons by using visual sharing technology according to a confidential image, then the rectangular encrypted icons are mapped as arc-like encrypted icons, so that two arc-like encrypted icons are constructed; for two different encrypted icons, restoring a confidential image by matched overlapping of the two different encrypted icons; and for two same encrypted icons, restoring a confidential image by unmatched overlapping of the two same encrypted icons. The arc-like anti-counterfeiting element provided by the invention has more flexibility compared with rectangular anti-counterfeiting icons, can be printed on paper, plastics, transparent/semitransparent films, metal coatings, foils or other materials suitable for printing, can increase anti-counterfeiting and information concealing effects through integrally combining with special ink, melting silk screen, gravure or offset printing technology, and has the characteristics of easy recognition and difficult counterfeiting.

Description

Class arc method for anti-counterfeit and class arc Security element
Technical field
The present invention relates to false proof field, the particularly a kind of manufacture method that can hide class arc method for anti-counterfeit and such arc Security element of confidential image information.
Background technology
Illegal activities such as forgery, personation are of long duration, and are the products of competition of market economy.The adulterator is by forged certificate, product and external packing thereof, even forge mode such as " false proof " label and obscure commodity true and false, therefore the new anti-counterfeiting technology of research and development is extremely urgent, and it is particularly important that especially research and development are difficult to the safety anti-fake technology duplicating, be easy to recognize.Anti-counterfeiting technology at present commonly used comprises that holographic false proof, printing ink are false proof, paper false proof, digital code anti-false etc., they pattern (comprising figure, literal or numeral etc.) as anti-counterfeiting mark, by technical finesse or encryption to reach the false proof purpose of subject matter.In existing pattern anti-fake technical research, holographic false proof gradually to great visual angle, different transform, stereoscopic sensation be strong etc., and direction develops, antifalse effect is good, but the construction cycle is long, and low-level holographic technique is easily by imitated; The security pattern of paper false proof and the false proof generation of printing ink is easy to discrimination, but it forges difficulty and mainly be confined on starting material and the manufacture craft, and the fake producer might obtain starting material and manufacture craft lost efficacy security pattern by multiple channel; Digital false-proof technology utilizes encryption technology, coding techniques, mechanics of communication etc. to produce a unique Antiforge inquiry sign indicating number for each commodity, the consumer tells truth from falsehood by inquiry (phone or network etc.), solved the problem that is easy to forge, but its discrimination is not direct discrimination, but need inquire about, this has brought inconvenience to the consumer, and much the consumer is unwilling to investigate, and this also provides opportunity to the fake producer.
The visual separate-management technology is the emerging encryption technology that grows up the nineties in last century.It utilizes human eye as decoding tool secret image to be divided and deposits, and is characterized in that decrypting process does not need complicated calculating, directly utilizes human eye vision identification to recover secret image, simple and fast and safety.People such as Naor and Shamir has proposed this method first in European cryptography meeting in 1994, and constructed (the k of the close figure of black and white, n) threshold value visual cryptography scheme (or the vision branch is deposited or visual cryptography is learned), i.e. (k, n)-and visual separate-management method (Visual Cryptography Scheme, VCS).This method is encrypted image, obtains the n width of cloth and is called the image that branch is deposited figure (crying " encrypting figure " again), and figure is printed onto on the slide with this n width of cloth encryption, according to the overlapping any k width of cloth wherein of random order, the visually original secret image of reconstruct.But,, also can't obtain any information about original secret image even have infinitely-great arithmetic capability if it is overlapping to be less than k width of cloth encryption figure.Because the visual separate-management technology possesses good information (original secret image) hidden function, and is easy to the identification by the ordinary people, therefore the researcher for this technology also false proof field provides a kind of new research thinking.
Consider all limitation of existing anti-counterfeiting technology above-mentioned, the visual separate-management technology is combined with the pattern anti-fake technology, design easy to identify, the difficult class arc anti-fake scheme of copying, have important and practical meanings and using value.
Summary of the invention
The present invention utilizes the visual separate-management technology, design the novel false proof icon of class arc (being " encryption icon " again), make two different width of cloth icons overlap and to produce the icon of a width of cloth stealth, perhaps a certain width of cloth icon and its copy overlap, wherein the width of cloth rotated a certain angle produces stealthy icon, weakens along with angle increases sharpness.This stealth icon can observe directly by human eye, and it has characteristics such as easy to identify, difficult imitation.
According to an aspect of the present invention, a kind of class arc method for anti-counterfeit of hiding confidential image information is disclosed, this method may further comprise the steps: utilize the visual separate-management technology, generate two similar and different rectangles according to secret image and encrypt icon, then described rectangle is encrypted icon and be mapped as class arc encryption icon, thereby construct two similar and different class arcs and encrypt icon, wherein said class arc is encrypted in the icon and is concealed with described secret image; Encrypt icon for the class arc that two width of cloth are different, it is overlapping to encrypt icon by the class arc that described two width of cloth are different, recovers described secret image; And for two identical class arcs encryption icons, overlapping by described two identical class arcs are encrypted icons, and wherein width of cloth class arc encryption icon rotates predetermined angular around arc core, recovers described secret image.
Preferably, to encrypt icon be that rectangle is encrypted icon (center of circle is infinitely-great arc), arc and encrypted icon and annular and encrypt a kind of in the icon (radian is 360 ° a arc) for described class arc.
Preferably, described visual separate-management technology comprises: single width visual separate-management technology, the encryption insignificant visual separate-management technology of figure and the significant visual separate-management technology of encryption figure.
Preferably, described secret image comprises the pattern with at least a formation in letter, numeral or the figure.
Preferably, the described secret image image that can be any content of Any shape.
Preferably, the secret image after the described recovery can be discerned by human eye or machine.Described machine for example is a UV-lamp.
According to a further aspect in the invention, the method that a kind of manufacturing is concealed with the class arc Security element of secret image is disclosed, described class arc Security element is made by following steps: utilize the visual separate-management technology, generate two similar and different rectangles according to secret image and encrypt icon, then described rectangle is encrypted icon and be mapped as class arc encryption icon, thereby construct two similar and different class arcs and encrypt icon, wherein said class arc is encrypted in the icon and is concealed with described secret image; And printing has the class arc Security element that described class arc is encrypted icon; Wherein, encrypt icon for the class arc that two width of cloth are different, it is overlapping to encrypt icon by the class arc that described two width of cloth are different, recovers described secret image; Encrypt icon for two identical class arcs, overlapping by described two identical class arcs are encrypted icon, and wherein width of cloth class arc encryption icon rotates predetermined angular around arc core, recovers described secret image.
Preferably, described class arc Security element is Transparent Parts or opaque member.
Preferably, described class arc Security element selects for use in paper, plastics, film, metal coating, paillon foil or any other the suitable materials printed one or more as base material.
Preferably, described class arc Security element is the Security element of making by the carved gravure technology with stereoeffect.
Preferably, described class arc Security element not only can print with common ink, also can adopt the specialty inks with special-effect pigment, for example, and interfering layer or liquid crystal pigment, magnetic pigment, conduction pigment or luminescent pigment.In addition, also can use the printing ink of any metal vision.
Be to form with the ink printing with at least a following pigment, described pigment comprises: liquid crystal pigment, magnetic pigment, conduction pigment, luminescent pigment, metal visual pigment.
Preferably, on the described class arc Security element certain coating can be arranged, for example can be metal level or, metal effect layer or optically-variable layer, it is present in whole surface or with structured way wants can produce additional effect on the protected object.Coating can exist with any gabarit shape, and for example, pattern, character, sign etc. preferably form by printing.But these form the fundamental figure element random arrangement of coating, but can select for their size, make the observer observe coating as uniform colored surface.
Preferably, described class arc Security element is made of fundamental element, and fundamental element comprises: the fundamental element that is made of letter, the fundamental element that is made of numeral, the fundamental element that is made of any figure or the fundamental element that is made of dot matrix.
Above-mentioned class arc Security element (icon) can be used for the false proof of securities such as currency, check, passport, documentary evidence, forwarding document, costoms forms, lottery ticket, pass-check, coupons, deposit receipt or certificate card.Simultaneously, this false proof icon also is applicable to the product protection field.Can be with false proof icon or by the Security element that it is made, the label or the packing that are applied to product go up or directly are applied on the product.For example, the false proof icon of described class arc can be attached on the base material of different commodity by the mode with thermoprint, transfer printing, pad pasting after the carved gravure moulding.
The present invention utilizes the false proof icon of visual separate-management technical construction class arc, makes such arc icon and its copy are overlaped, and wherein a width of cloth rotates a certain angle around arc core, can recover the information of secret image; Perhaps that two width of cloth are the different false proof icons of class arc directly overlap, and can recover along with angle increases sharpness to weaken.The present invention has following advantage:
1. antifalse effect is good: because it makes principle, adopted the visual separate-management technology, the computation process more complicated has adopted random algorithm simultaneously, makes that computation process is difficult to be studied, and general layman can't make;
2. effect is controlled: because in manufacturing process, introduced the anglec of rotation, because the anglec of rotation can be controlled, along with the value that changes the anglec of rotation, can reach the effect that different rotation angle is observed out the secret icon of different sharpness;
3. be difficult to duplicate: in printing process,, can reach unique anti-print effect, increase its false proof and effect Information hiding by being incorporated into one with specialty inks and molten silk-screen, gravure and offset printing process because it is different from common printing;
4. easy to make, cost is low.
Class arc anti-fake scheme of the present invention, the method of the generation of false proof icon and the stealthy icon of overlapping generation all has unique characteristic, it not only has the characteristics difficult, that technology is unique, effect is controlled of copying, and possesses the false proof and false proof advantage in two wires of a line again, both be convenient to ordinary consumer identification, and can be manufacturer again and carry out the specialty discriminating.
Description of drawings
Fig. 1 shows the synoptic diagram according to the false proof icon of arc of the present invention;
Fig. 2 shows the synoptic diagram according to the false proof icon of rectangle of the present invention;
Fig. 3 shows the synoptic diagram according to the false proof icon of annular of the present invention;
Fig. 4 shows some complementary fundamental elements that constitute the arc icon;
Fig. 5 shows the original secret image according to first embodiment of the invention;
Fig. 6 shows according to first embodiment of the invention and encrypts (false proof) icon by the rectangle of the secret image generation of Fig. 5;
Fig. 7 shows according to the first embodiment of the invention results that overlapping two rectangles shown in Figure 6 encrypt icons that misplace;
Fig. 8 shows the original secret image according to second embodiment of the invention;
Fig. 9 shows according to second embodiment of the invention and encrypts (false proof) icon by the annular of the secret image generation of Fig. 8;
Figure 10 shows according to the second embodiment of the invention results that overlapping two annulars shown in Figure 9 encrypt icons that misplace;
Figure 11 shows the original secret image according to third embodiment of the invention;
Figure 12 shows according to third embodiment of the invention and encrypts (false proof) icon by the arc of the secret image generation of Figure 11;
Figure 13 shows according to the third embodiment of the invention results that overlapping two arcs shown in Figure 12 encrypt icons that misplace;
Figure 14 show according to the original secret image of fourth embodiment of the invention and two onesize cover up icon;
Figure 15 shows according to fourth embodiment of the invention and encrypts icon by the secret image of Figure 14 arc different with two width of cloth of covering up the icon generation;
Figure 16 shows according to overlapping two results that arc shown in Figure 15 is encrypted icon of fourth embodiment of the invention; And
Figure 17 shows a kind of computer program code that is used for rectangular image is mapped to annular image.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, embodiment of the present invention is described further in detail below in conjunction with accompanying drawing.
Fig. 1 shows the synoptic diagram according to the false proof icon of arc of the present invention.With reference to figure 1, shown arc encrypts icon (or crying arc false proof icon) E and E ' generates according to the secret image of a width of cloth.If two width of cloth arcs are encrypted icon difference (being that E is different with E '), then this two width of cloth arc icon is overlaped and promptly can be observed stealthy secret icon.If two width of cloth arcs are encrypted icon identical (being that E ' is the copy of E), then earlier these two identical arcs being encrypted icon overlaps, wherein a width of cloth is encrypted icon around arc core (promptly then, the center of circle of the pairing circle of arc) rotates a certain angle, promptly can be observed stealthy original secret image.When above-mentioned icon is rotated, when rotating, can observe hiding secret image, and when rotation arrived this predetermined angular, the secret image that manifests was the most clear near predetermined angular.Then, when the angle of rotation continued to increase, the sharpness of secret image weakened gradually, until secret picture drop-out.Here and hereinafter, term " overlapping " is meant aims at stack fully with two identical or different encryption icons.Especially, for two identical encryption icons, overlapping the two mirror image that refers to is superimposed." overlapping " action is equal to carries out the logical "or" computing to overlapping pixel in two width of cloth encryption icon.
Fig. 2 shows the synoptic diagram according to the false proof icon of rectangle of the present invention, and Fig. 3 shows the synoptic diagram according to the false proof icon of annular of the present invention.Especially, limiting case as the false proof icon of arc shown in Figure 1, the false proof icon of rectangle shown in Figure 2 can be regarded as corresponding radius of a circle is infinitely-great arc icon, and annular false proof icon shown in Figure 3 can be able to be regarded as radian be 360 ° arc icon.With above the explanation to Fig. 1 is similar, for rectangle and the annular icon of Fig. 2 and Fig. 3, also have the dual mode that recovers secret image: when 1) E was identical with E ', the overlapping recovery misplaced; And 2) E and E ' aim at overlapping the recovery not simultaneously.
Fig. 4 further shows some complementary fundamental elements that constitute the arc icon.As shown in Figure 4, the fundamental element of the false proof icon of formation arc comprises letter, numeral, any figure or dot matrix etc.
First embodiment
Below with reference to Fig. 5~7 first embodiment of the present invention is described.First embodiment discloses a kind of method of utilizing the false proof icon of single width visual separate-management technical construction rectangle.Specifically, Fig. 5 shows the original secret image according to first embodiment of the invention.As shown in Figure 5, original secret image be comprise monogram " Tsinghua ", highly be the secret image S of two-value (black and white) rectangle of col=471 for row=126, width.Horizontal offset and the vertical offset of target single width visual cryptography figure are respectively s=12 and t=12.Describing below according to first embodiment of the invention utilizes single width visual separate-management scheme (that is, only utilizing the single width branch to deposit the method that figure (encrypt figure) and copy thereof can recover secret image) to generate the concrete grammar that rectangle shown in Figure 6 is encrypted icon E according to secret image S shown in Figure 5.The concrete steps of this method are as follows:
1) input two-value confidential image information S, the height of wherein secret image S is row=126, width is col=471;
2) determine migration parameter s=12, t=12, wherein migration parameter s, t represent that respectively the encryption figure of single width visual separate-management scheme recovers the distance that secret image S need be offset on vertical direction and horizontal direction;
3) utilize the secret image S of [0,1] matrix representation two-value; Wherein the element in the matrix 0 is represented the white pixel of secret image S, the black picture element of the secret image S of element 1 expression in the matrix;
4) generate big or small two-value (black and white) the image R of a width of cloth (row+s) * (col+t) at random, random image R can use (row+s) * (col+t) matrix representation, element in this matrix is 0 and 1,0 white pixel of representing among the random image R wherein, and 1 represents the black picture element among the random image R;
5) to each pixel R of random image R (i, j) (R (i, j) pixel of the capable j row of expression random image R i) carries out following processing:
If 1≤i≤s or 1≤j≤t, (i j) is left intact to R;
If i>s and j>t, then with R (i, (i-s is j-t) with S (i-s, logic XOR result j-t), wherein S (i-s, j-t) pixel of expression secret image S (i-s) row (j-t) row j) to be revised as R;
Random image R is carried out finally obtaining after the above-mentioned processing as shown in Figure 6 encryption icon E (also being false proof icon E) by pixel, and wherein original secret image S is hidden among the encryption icon E.
As can be seen from Figure 6, encrypt icon E and it seems it only is artwork master information (snowflake figure) at random from human eye, people can't therefrom tell hiding original secret image S.Owing to encrypt the nonmeanings of icon E, make when it uses as false proof icon that forgery or imitation are got up very difficult.
The process (that is anti-counterfeit recognition process) of utilizing encryption icon E (being false proof icon again) shown in Figure 6 to recover original secret image S is described below with reference to Fig. 7.At first, will encrypt icon E preparation (or printing) and go up to form two Security elements at sheet material (for example film), wherein each Security element all comprises complete encryption icon E.According to one embodiment of present invention, described sheet material preferably transparent or translucent.Then, with two transparent Security elements overlapping (being equivalent to the logical OR computing), according to top definite migration parameter s, t, encrypt icon E with one and encrypt icon E displacement s on column direction with respect to another, and displacement t on line direction, thereby visually recover secret image S.
In sum, according to first embodiment of the invention,, can clearly recover original secret image S by two parts of encryption icon E dislocation is overlapping.Have good image concealing function owing to encrypt icon E, make to be difficult to be copied, thereby can play good antiforge function to encrypt the Security element that icon E forms (for example label etc.).
Although above described according to secret image S shown in Figure 5 and generated the concrete grammar that rectangle shown in Figure 6 is encrypted icon E, but the field of encryption those of ordinary skill can be known, and secret image S and random image R is carried out XOR be not limited to above-described concrete grammar.For example, with above-described to R (i, j) (the method difference of i>s and j>t) make amendment, according to another embodiment of the present invention, can be to R (i, j) (0<i<row and 0<j<col) make amendment and keep other parts of random image R motionless.The computer realm those of ordinary skill can also envision other suitable secret image S and the XOR method of random image R, encrypts icon E to generate.
Second embodiment
Below with reference to Fig. 8~10 second embodiment of the present invention is described.Second embodiment discloses a kind of method of utilizing the false proof icon of single width visual separate-management technical construction annular.Specifically, Fig. 8 shows the original secret image according to second embodiment of the invention.As shown in Figure 8, original secret image be comprise monogram " Tsinghua ", highly be the secret image S of two-value (black and white) rectangle of col=338 for row=76, width, wherein white pixel is represented with 0, black picture element is represented with 1.
The step of constructing annular false proof icon is as follows: at first similar with top disclosed first embodiment, structure two-value rectangle is encrypted icon E.Then, rectangle is encrypted icon E and be mapped to annular encryption icon (as shown in Figure 9).Here, the those of ordinary skill of image processing field can use multiple known image processing software, program, algorithm to realize the mapping from the rectangular image to the annular image.Figure 17 has specifically illustrated one section computer program writing with the MATLAB scientific language, and this program is used for rectangular image is mapped as annular image.After obtaining annular encryption (false proof) icon, utilize two parts of identical slide E and E ' of this annular image preparation.E and E ' are rotated after overlapping relative to one another, can observe stealthy encryption icon (as shown in figure 10) rotating to the predetermined angular place.As can be seen from Figure 10, the encryption icon after the recovery is annular, and its content is that the original secret image by rectangle shines upon one by one, and is consistent with the contained pattern-information of original secret image.Here, it is pointed out that when above-mentioned two overlapping annular icons are rotated relatively, when rotating, promptly can be observed hiding secret image, and when rotation arrived this predetermined angular, the secret image that manifests was the most clear near predetermined angular.Then, when the angle of rotation continued to increase, the sharpness of secret image weakened gradually, until secret picture drop-out.Wherein, the angle of rotation depends on the rectangle-annular mapping algorithm that is adopted, and (s t) has relation one to one to the migration parameter of determining when encrypting icon E with structure.
Utilize original secret image to generate rectangle encryption icon E although top embodiment has described, and then be mapped to the process that annular is encrypted icon 9.Yet the present invention is not limited to this.Those of ordinary skills are easy to expect, can utilize original secret image directly to construct annular and encrypt icon, and the mapping step in the middle of need not.For example, be circle or the situation that is mapped to circle for original secret image.
The 3rd embodiment
Below with reference to Figure 11~13 third embodiment of the present invention is described.The 3rd embodiment discloses a kind of method of utilizing the false proof icon of single width visual separate-management technical construction arc.Specifically, Figure 11 shows the original secret image according to third embodiment of the invention.As shown in figure 11, original secret image be comprise monogram " Tsinghua ", highly be the secret image S of two-value (black and white) rectangle of col=87 for row=76, width, wherein white pixel is represented with 0, black picture element is represented with 1.
The step of the false proof icon of structure arc is as follows: at first similar with aforesaid second embodiment, structure two-value rectangle is encrypted icon E.Then, utilize any known image processing software will encrypt icon E and be mapped to arc, and be made into two parts of identical slide E and E ' (as shown in figure 12).E and E dislocation is overlapping, promptly can be observed stealthy secret icon (as shown in figure 13), the secret image after recovering as can be seen is an arc, shines upon one by one but content is an original secret image by rectangle.
The 4th embodiment
Below with reference to Figure 14~16 fourth embodiment of the present invention is described.The 4th embodiment discloses a kind of method of encrypting the false proof icon of icon significant visual separate-management technical construction arc of utilizing.So-called " it is meaningful to encrypt icon " be meant with the foregoing description in the naked eyes described see that the encryption icon E of no any implication is different, have the pattern-information that naked eyes can identification among encryption icon (or the false proof icon) E according to the 4th embodiment formation.The original secret image of hiding in this cognizable pattern-information and the non-encrypted icon.
Specifically, Figure 14 shows the original secret image S (shown in Figure 14 (a)) according to fourth embodiment of the invention and covers up icon " 1 " (shown in Figure 14 (b)) and cover up icon " 2 " (shown in Figure 14 (c)).As shown in figure 14, original secret image all is highly to be that row=76, width are two-value (black and white) rectangular image of col=87 with covering up icon, and wherein white pixel is represented with 0, and black picture element is represented with 1.
Utilize secret image S and cover up icon " 1 ", two different arcs of " 2 " structure are encrypted icon E (shown in Figure 15 (a)) and E ' (shown in Figure 15 (b)).Concrete building method is as follows: at first the EVCS scheme that proposes with reference to Ateniese (being entitled as " Extended capabilitiesfor visual cryptography " literary composition what 143~161 pages of TheoreticalComputer Science calendar year 2001s 250 volumes were delivered referring to people such as Ateniese) is according to secret image S shown in Figure 14 with cover up icon " 1 ", and two of " 2 " structures show rectangle encrypted image E1 and the E2 that covers up icon " 1 " and " 2 " content respectively.Utilize any known image processing software that E1 and E2 are mapped to arc then, obtain two different arcs and encrypt icon E and E ' (as shown in figure 15).E and E ' have shown the pattern content of " 1 " and " 2 " respectively, then can be observed stealthy secret image S (as shown in figure 16) when E and E ' aim at after overlapping.Secret image after recovering as can be seen is an arc, shines upon one by one but content is an original secret image by rectangle.
The 5th embodiment
The 5th embodiment discloses a kind of method of encrypting the false proof icon of icon insignificant visual separate-management technical construction arc of utilizing.The 5th embodiment and above-described the 4th embodiment difference are that its rectangle according to two no implications of general visual separate-management technology (for example Naor and Shamir are at the visual separate-management drawing method of proposition in 1994) structure is encrypted icon E1 and E2.Other aspects and the 4th embodiment of the 5th embodiment are basic identical, therefore here repeat no more.
Foregoing description according to a plurality of embodiment of the present invention.Although among a plurality of embodiment of Miao Shuing, original secret image is the rectangular image that comprises monogram in the above.But those of ordinary skills are easy to recognize that the form of secret image is not limited thereto.In other embodiment, secret image can be the image of any content Any shape.
In addition, although the situation that it is the second order image that the above-mentioned embodiment that describes with reference to figure 1 only discloses secret image S.But, one skilled in the art will recognize that the present invention is not limited thereto.Secret image S can be the gray level image (being the second order image when g=2) with g level gray scale, thereby random image R and encryption icon E also are the gray level images with g level gray scale.According to one embodiment of present invention, can be with the gray level g-1 bit representation of each the pixel correspondence among g rank image S, R and the E, the complete 0 expression first order gray scale in g-1 position, the complete 1 expression g level gray scale in g-1 position, k level gray scale (1≤k≤g) represent with g-k individual 0 and k-1 individual 1.Certainly, the present invention is not limited to this to the binary representation of gray level.The those of ordinary skill of computer realm can be easy to envision other methods with the binary number representation gray level, and then the pixel of corresponding gray level is carried out logic (XOR) computing.
The Application in Anti-counterfeiting of the class arc Security element of foundation a plurality of embodiment structures of the present invention is as follows:
Two similar and different class arc Security elements are imprinted on the transparent film respectively.During use, two different transparent films alignings are overlaped, can observe out stealthy secret image; Two identical transparent films alignings are overlaped, in any case when not rotating, also can not get any information of relevant secret image, wherein a width of cloth transparent film rotates to an angle around the center of circle, observe with eyes, can observe out stealthy secret icon, continue to rotate to an angle, still can observe stealthy secret icon, along with the angle increase of rotation, but the identification variation.
Can realize the output of Security element by multiple mode of printing.Except that common printed mode, in the process of printing preparation Security element, can by with (for example comprise special pigment, interfering layer or liquid crystal pigment, magnetic pigment, conduction pigment or luminescent pigment, metal visual pigment) printing ink, molten silk-screen, gravure and offset printing process be incorporated into one, reach unique anti-print effect, increase its false proof and effect Information hiding.
In addition, Security element can select for use paper, plastics, film, metal coating, paillon foil or any other suitable materials printed as printing element.And be convenient identification, Security element can be the Security element of making by the carved gravure technology with stereoeffect.Security element can also have metallic coating, metal effect coating or optically-variable coating, thereby increases difficulty of reproduction, improves its false proof and Information hiding effect.At last, Security element can be attached on the base material of different commodity in the mode of thermoprint, transfer printing, pad pasting after by the carved gravure moulding, transport or sell with commodity as antifalsification label.
" embodiment " who is spoken of in this manual, " this embodiment ", " the first/the second/the 3rd/the 4th/the 5th embodiment " etc. refer to concrete feature, structure or the characteristics described in conjunction with this embodiment and are included among at least one embodiment of the application's generality description.Occurring this statement in instructions Anywhere is not to establish a capital to refer to this same embodiment.Further, when describing a concrete feature, structure or characteristics in conjunction with arbitrary embodiment, what advocate is to realize this feature, structure or characteristics in conjunction with other embodiment, drops in those skilled in the art's the scope.
Although invention has been described with reference to a plurality of explanatory embodiment of the present invention, but, should be appreciated that those skilled in the art can design a lot of other modification and embodiments, these are revised and embodiment will drop within the disclosed principle scope and spirit of the application.More particularly, in the scope of, accompanying drawing open and claim, can carry out multiple modification and improvement to the building block and/or the layout of subject combination layout in the application.Except modification that building block and/or layout are carried out with improving, to those skilled in the art, other purposes also will be tangible.

Claims (13)

1. the class arc method for anti-counterfeit of a hiding confidential image information may further comprise the steps:
Utilize the visual separate-management technology, generate two similar and different rectangles according to secret image and encrypt icon, then described rectangle is encrypted icon and be mapped as class arc encryption icon, thereby construct two similar and different class arcs and encrypt icon, wherein said class arc is encrypted in the icon and is concealed with described secret image;
Encrypt icon for the class arc that two width of cloth are different, it is overlapping to encrypt icon by the class arc that described two width of cloth are different, recovers described secret image; And
Encrypt icon for two identical class arcs, overlapping by described two identical class arcs are encrypted icon, and wherein width of cloth class arc encryption icon rotates predetermined angular around arc core, recovers described secret image.
2. class arc method for anti-counterfeit according to claim 1 is characterized in that, described class arc is encrypted icon and comprised that arc is encrypted icon and annular is encrypted icon.
3. class arc method for anti-counterfeit according to claim 1 is characterized in that, described visual separate-management technology comprises: single width visual separate-management technology, the encryption insignificant visual separate-management technology of figure and the significant visual separate-management technology of encryption figure.
4. class arc method for anti-counterfeit according to claim 1 is characterized in that, described secret image comprises the pattern with at least a formation in letter, numeral or the figure.
5. class arc method for anti-counterfeit according to claim 1 is characterized in that described secret image can be the image of any content of Any shape.
6. class arc method for anti-counterfeit according to claim 1 is characterized in that the secret image after the described recovery can be discerned by human eye or machine.
7. a manufacturing is concealed with the method for the class arc Security element of secret image, and described class arc Security element is made by following steps:
Utilize the visual separate-management technology, generate two similar and different rectangles according to secret image and encrypt icon, then described rectangle is encrypted icon and be mapped as class arc encryption icon, thereby construct two similar and different class arcs and encrypt icon, wherein said class arc is encrypted in the icon and is concealed with described secret image; And
Printing has the class arc Security element that described class arc is encrypted icon;
Wherein, encrypt icon for the class arc that two width of cloth are different, it is overlapping to encrypt icon by the class arc that described two width of cloth are different, can recover described secret image;
Encrypt icon for two identical class arcs, overlapping by described two identical class arcs are encrypted icon, and wherein width of cloth class arc encryption icon rotates predetermined angular around arc core, can recover described secret image.
8. manufacturing according to claim 7 is concealed with the method for the class arc Security element of secret image, and wherein, described class arc Security element is Transparent Parts or opaque member.
9. manufacturing according to claim 7 is concealed with the method for the class arc Security element of secret image, wherein, described class arc Security element selects for use in paper, plastics, film, metal coating, paillon foil or any other the suitable materials printed one or more as base material.
10. manufacturing according to claim 7 is concealed with the method for the class arc Security element of secret image, and wherein, described class arc Security element is the Security element of making by the carved gravure technology with stereoeffect.
11. manufacturing according to claim 7 is concealed with the method for the class arc Security element of secret image, wherein, described class arc Security element is to form with the ink printing with at least a following pigment, and described pigment comprises: liquid crystal pigment, magnetic pigment, conduction pigment, luminescent pigment, metal visual pigment.
12. manufacturing according to claim 7 is concealed with the method for the class arc Security element of secret image, wherein, described class arc Security element has at least a in metallic coating, metal effect coating and the optically-variable coating.
13. manufacturing according to claim 7 is concealed with the method for the class arc Security element of secret image, wherein, described class arc Security element is attached on the base material of different commodity in the mode of thermoprint, transfer printing, pad pasting after by the carved gravure moulding.
CN2009100000053A 2009-01-04 2009-01-04 Arc-shaped anti-fake method and arc-shaped anti-fake element Expired - Fee Related CN101488215B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009100000053A CN101488215B (en) 2009-01-04 2009-01-04 Arc-shaped anti-fake method and arc-shaped anti-fake element

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100000053A CN101488215B (en) 2009-01-04 2009-01-04 Arc-shaped anti-fake method and arc-shaped anti-fake element

Publications (2)

Publication Number Publication Date
CN101488215A CN101488215A (en) 2009-07-22
CN101488215B true CN101488215B (en) 2011-04-27

Family

ID=40891096

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100000053A Expired - Fee Related CN101488215B (en) 2009-01-04 2009-01-04 Arc-shaped anti-fake method and arc-shaped anti-fake element

Country Status (1)

Country Link
CN (1) CN101488215B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102496117A (en) * 2011-12-21 2012-06-13 张延坦 Network verification anti-counterfeiting system for images
CN102700290A (en) * 2012-01-13 2012-10-03 蒋月琴 Multimedia printing material
CN102700291A (en) * 2012-01-13 2012-10-03 蒋月琴 Novel digital multimedia printing material
CN102785029B (en) * 2012-08-05 2014-08-06 温州大学 Laser anti-counterfeit marking method for product with complex profile
JP6156586B2 (en) * 2015-03-19 2017-07-05 凸版印刷株式会社 IDENTIFICATION DEVICE, IDENTIFICATION METHOD, IDENTIFICATION PROGRAM, AND COMPUTER-READABLE MEDIUM CONTAINING IDENTIFICATION PROGRAM
CN106651387B (en) * 2015-10-30 2020-06-19 四川谦泰仁投资管理有限公司 Method for providing multi-bit random state code for commodity
CN105584240B (en) * 2015-12-14 2019-03-22 中国人民银行印制科学技术研究所 Figure line product and the printing process for preparing the figure line product
WO2017133503A1 (en) * 2016-02-05 2017-08-10 江峰 Method for providing binary random status code for commodity

Also Published As

Publication number Publication date
CN101488215A (en) 2009-07-22

Similar Documents

Publication Publication Date Title
CN101488215B (en) Arc-shaped anti-fake method and arc-shaped anti-fake element
CN101447071B (en) Method for visual cryptography and counterfeit prevention of patterns
CN101537751B (en) Novel method for processing anti-counterfeit printing
US10688822B1 (en) Embedding 3D information in documents
CN102795008B (en) Dynamic Mohr encryption method of anti-counterfeiting image
MXPA04001135A (en) System and method for encoding and decoding an image or document and document encoded thereby.
CN102831567B (en) Multilayer Moire encryption method for anti-counterfeiting images
CN106935131A (en) A kind of anti-fake two-dimension code
CN104992208A (en) Anti-counterfeiting method through comparison identification with encryption patterns by use of two-dimensional codes
EP3457323A1 (en) Data carrier and a method for producing such data carrier
CN106611205A (en) Multi-layer overprinted two-dimensional code anti-counterfeit label with gradually changed colors
CN103679241A (en) Generation method and identification method for invisible two-dimension code anti-counterfeit label
CN203503241U (en) Thermal-change two-dimension code showing printing structure
CN206353412U (en) A kind of 3 D antiforge label
CN106782042A (en) A kind of 3 D antiforge label
CN103065179A (en) Point code technology based composite layer product structure
CN2614370Y (en) False proof apparatus with multiple image concealing
RU2594280C2 (en) Multilayer polymer-based product protected against forgery
CN105096735A (en) Imaginary point security line anti-counterfeit technology
JP2011107605A (en) Secret sharing scheme of character information, and printed matter used for the same
JP6642117B2 (en) Matrix type 2D code
CN107590839A (en) A kind of method for anti-counterfeit of tracing to the source based on high-fidelity Tibetan figure
CN102880996A (en) Truecolor invisible encryption technique and product
CN112581147A (en) Commodity insurance fidelity anti-counterfeiting method
CN1140875C (en) 2D chaotic graphics method for security and antiforge purpose

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110427

Termination date: 20220104

CF01 Termination of patent right due to non-payment of annual fee