CN102945429B - Multiparameter dimensional binary encryption security printing method - Google Patents

Multiparameter dimensional binary encryption security printing method Download PDF

Info

Publication number
CN102945429B
CN102945429B CN201210402615.8A CN201210402615A CN102945429B CN 102945429 B CN102945429 B CN 102945429B CN 201210402615 A CN201210402615 A CN 201210402615A CN 102945429 B CN102945429 B CN 102945429B
Authority
CN
China
Prior art keywords
binary
set
information
security
cs
Prior art date
Application number
CN201210402615.8A
Other languages
Chinese (zh)
Other versions
CN102945429A (en
Inventor
张立君
Original Assignee
北京印刷学院
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京印刷学院 filed Critical 北京印刷学院
Priority to CN201210402615.8A priority Critical patent/CN102945429B/en
Publication of CN102945429A publication Critical patent/CN102945429A/en
Application granted granted Critical
Publication of CN102945429B publication Critical patent/CN102945429B/en

Links

Abstract

一种多参数三维加密二进制防伪印刷方法,该方法可将二进制防伪信息通过[? A multi-dimensional parametric binary encryption security printing method, the method may be a binary security information [? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? +++]加密运算和信道编码生成二进制调制信号,并通过循环查表法调制方式将防伪信息以调幅网点的形状的有序改变嵌入在整个页面中,可在印刷品识别时从任意一个碎片里识别防伪信息,可广泛应用于印刷品防伪领域。 +++] encryption algorithm to generate a binary channel coding and modulation signal by the modulation cycle look-up table information in an orderly manner to change the shape of the security AM dots embedded in the entire page may be from any debris in a print when the identification identifying security information, it can be widely used in the field of security prints.

Description

多参数Ξ维加密二进制防伪印刷方法 Multi-parameter Ξ dense binary security printing method Vega

技术领域: FIELD:

[0001] 本发明设及一种防伪印刷技术,特别是一种多参数Ξ维加密二进制防伪印刷技术,该防伪印刷技术可W用于各种印刷制品的防伪。 [0001] The present invention is provided a security printing technology and, particularly, to a multi-parameter Ξ Vega dense binary security printing technology, the security printing technique may be used for W various security printing products.

背景技术: Background technique:

[0002] 现有的较为普通的防伪方法有W下几种:第一种是激光防伪标志,用激光隐性油墨蛋光油墨印刷技术将产品的标徽或特殊的识别图案印制成产品的防伪标贴,且同一类产品使用同一种标贴,因防伪标贴较容易伪造,而伪造的防伪标贴又被用在假冒产品上,造成产品的真假混淆,因此难于有效防伪。 [0002] The conventional methods are more common security under several W: a first security signs laser, with laser light recessive egg ink printing technique ink printed product or logo of a particular pattern to identify the product anti-counterfeit labels, and stickers using the same type of product the same standard, because of security labels easier to forge, counterfeit security labels and has been used on counterfeit products, resulting in confusion genuine product, it is difficult to effective security. 第二种是密码防伪标贴,其所采用的方法是每件产品编一组数码,每件产品的编码都不相同,将此数码印制在标贴上并遮盖起来,同时将此数码存入可供消费者查询的计算机数据库中,消费者购买产品时,将标识上的数码通过电话或入网计算机输入计算机数据库进行比较识别,相同即为真,不同即为假,方法简单,识别容易,不易伪造,但实际使用中,因编码数据是计算机统一生成后印制标贴的。 The second is the password security labels, it uses a method of encoding a set of digital each product, each product code is not the same, this digital printing paste and covered up in the standard, while this digital memory for consumers to query into a computer database, when consumers buy the product, the digital on-identities identified by a telephone or computer network, computer database, the same shall be true, that is different from the false, the method is simple, easy to identify, difficult to forge, but the actual use, because the encoded data to generate a unified computer-printed label is. 代表产品真假编码数据可能被非法拷贝造假,同时,编码也可回收未查询的产品上的编码造标而贴在假产品上,防伪效果难于保证。 On behalf of genuine and fake products encoded data may be illegally copied fraud, meanwhile, also recyclable coding standard coding made on the product and not a query posted on the fake products, the effect is difficult to guarantee security. 第Ξ种是纹理防伪,W其标贴上的纹理特征防伪,虽然较难伪造,但由于只设标贴的序号码,且是明码,每枚标贴可反复查询,造假者可通过仓库保管员或售货员将标贴上的序号及查询时所反映的必要纹理特征即方格中的有无现象抄袭后按此特征批量伪造。 The first kind is the texture security Ξ, W characterized in that the security label of the texture, although more difficult to counterfeit, but the sequence number is only provided to the label, and is clearly, each costing label may be repeated inquiries, counterfeiters can be kept by the warehouse officer or clerk of the label of the number and characteristics necessary texture that is reflected in the query features Click the box whether the phenomenon of plagiarism in batch forgery. 综上所述,现有的防伪方法都存在一定的缺点,因而不能从根本防止假冒产品。 In summary, the existing anti-counterfeiting methods have some shortcomings, and therefore can not prevent counterfeit products from the root.

发明内容: SUMMARY:

[0003] 为了克服现有的各种印刷制品防伪印刷技术存在的缺点,本发明针对现有印刷制品防伪印刷技术存在的不足对现有技术进行了改进,提出了一种二进制加密信号调制印刷品调幅网点的形状的加密防伪印刷技术,该防伪印刷技术通过调幅网点的形状的改变将防伪信息嵌入在整个页面中,可在印刷品识别时从任意一个碎片里识别防伪信息,因此具有很强抗碎性,可从根本上杜绝采用照相、扫描等非法复制行为。 [0003] In order to overcome the various disadvantages of the prior art printing security printing products, the present invention is directed to the shortcomings of the prior art security printing products printed on the prior art has been improved, and a binary encryption print signal modulation amplitude encryption security printing technology outlets shape of a security printing technique by changing the shape of the AM network security information is embedded in the entire page may be from any of a fragment in identifying the security identification information when printed, it has a strong crush resistance , can essentially eliminate the use of illegal copying camera, scan.

[0004] 本发明解决其技术问题所采用的技术方案是:对柔性版印刷混合加网中的调幅网点和调频网点分开进行处理,利用图像信息、文字信息等防伪信息生成8位一组的二进制防伪信息表,为防止加密过程中产生信息溢出,将二进制防伪信息表中的8位一组二进制信息扩展为16位一组二进制信息,生成高8位全为0的16位一组二进制防伪信息表,将16位一组二进制防伪信息表中的第i组16位二进制信息记作Ni,i为大于0的正整数,八位二进制加密参数记作(:、。、〔2、〔3、〔4、〔5、〇3、(:7、(:8、〔9,加密参数(:、。、〔2、〔3、〔4、〔5、〇3、(:7、(:8、〔9为0到255中的整数,二位二进制算符控制变量记作k,算符控制变量k为0 ^k^ 3的整数,算符勘、觀:、叙、敏、礙、觀、咳;、觀-、敏、@f采用+、一、X、-四种算符,算符控制变量k=0 时、@著、、@J、@1。分 [0004] aspect of the present invention to solve the technical problem is that: for flexographic printing hybrid screening in the AM dots and the FM network treated separately, with the image information, textual information security information generation 8-bit binary group of security information table, in order to prevent the encryption process generates information overflow extended binary security information table 8 a set of binary information 16 a set of binary information, to generate the first 8 bits of 16-bit set of binary security information 0 table, the i-th group a 16-bit binary set of security information table, referred to as 16-bit binary information of Ni, i is a positive integer greater than 0, the bit binary encryption parameters denoted (:,, [2, [3,. [4, [5, 〇3, (: 7, (: 8, [9, encryption parameters (:.,, [2, [3, [4, [5, 〇3, (: 7, (: 8, [9 is an integer from 0 to 255, two binary operator control variable denoted as k, operator control variable k is an integer of 0 ^ k ^ 3, the survey operator, Viewpoint: Syria, Min, hinder, concept, cough; watch -, a sensitizer, a + F @, a, X-, - four kinds operator, operator control variable k = 0, the @ ,, @ J, @ 1 min. 别定义为+、X、+、-、_、X、_、-、 +、一,算符控制变量k= 1时@;、@支、@]- 分别定义为一、X、+、~ΐ·、+、X、一、~ΐ·、+、一,算符巧制变量k= 2时、起%、@完-、@;、@]、@是、完、@f分别定义为_、-、+、-、_、X、+、X、+、_, 算符控制变量k= 3 时@1、@ί、@f.、@ί、@t、@!、@!.、@&9、@Γ分别定义为+、一、 +、今、-、X、-、今、+、X,设定加密参数C、Cl、C2、C3、C4、(;、Ce、C,、如C9的初值,因加密参数C、C1、 C2、〇3、C4、Cs、〇5、(;、Cs、C9为0 到255 中的整数,在256 个数中任取C、C1、C2、C3、C4、(;、〇5、Cy、Cs、Q 十个不同的数字共有256! /但56-10) !种取法,设定算符控制变量k的初值k= 0,设定16位一组二进制防伪信息表中巧位二进制信息Ni的位置控制变量1 = 1,从化位一组二进制防伪信息表中第一组16位二进制信息Ni开始,对16位一组二进制防伪信息表中的每一组16 Do is defined as +, X, +, -, _, X, _, -, +, a, operator control variables @ When k = 1;, branched @, @] - are defined as a, X, +, ~ ΐ ·, +, X, a, ~ ΐ ·, +, a, How the system operator when the variable k = 2, from% @ End - @;, @] @ is finished, defined as F @ _, -, +, -, _, X, +, X, +, _, operator control when the variable k = 3 @ 1, @ ί, @ f, @ ί, @ t, @, @ !..! , @ & 9, @ Γ are defined as + a, +, now, -, X, -, now, +, X-, set ciphering parameter C, Cl, C2, C3, C4, (;, Ce, C, as C9 initial value, due to the encryption parameters C, C1, C2, 〇3, C4, Cs, 〇5, (;, Cs, C9 is an integer of 0 to 255, 256 to take any number of C, C1 , C2, C3, C4, (;, 〇5, Cy, Cs, Q total of ten different numbers 256! / but 56-10)! species emulated, the control operator to set the initial value of the variable k k = 0, setting a variable position control 16-bit set of binary information table, security information clever bit binary Ni = 1 1, begins a set of binary bits Conghua security information table of the first set of 16-bit binary information Ni, 16 to a set of binary security each group information table 16 二进制信息进行的麵-C+H姑ς敏C: +风热C;竣C/诞Q+Ni蜗ς搞C换〔',城CJ加密运算,并且在对每一组le位二进制信息进行的翅C+N敏ς感C; +Ν,蹈C,感感ς+巧蹈Q喊C敏Q锁C。]加密运算的同时进行i+l和k+l运算,通过对16位一组二进制防伪信息表中的每一组16位二进制信息进行的喊C+Ni感Q感C+Ni勉C,感。 Face binary information carried -C + H Min Gu ς C: + C hot air; Completion C / Q + Ni scroll ς birth do change [C ', the city CJ encryption algorithm, and each group of binary information bits le C + N wings sensitive ς sense C; + Ν, dance C, feeling a sense of ς + Q clever dance call Q-sensitive locking C. C] simultaneously cryptographic operation i + l and k + l operation, by a 16-bit each set of 16-bit binary set of binary information in the security information table performed call C + Ni sense of feeling Q C + Ni Mian C, sense. 錢仁5 +Ni喊Cs勉。 Qian Ren 5 + Ni call Cs Mian. 喊仁8勉X] 加密运算,生成16位一组的二进制加密防伪信息表,调幅网点的形状设置为两种:□和◊, 其中□定义为数字0、◊定义为数字1,利用生成的16位一组的二进制加密防伪信息通过循环查表法调制调幅网点,使其有规律的按照上述两种调幅网点的形状改变混合加网中调幅网点的形状,使混合加网中调幅网点的形状有规则的发生改变,调制后相邻16个调幅网点构成一组16位二进制信息,使其携带防伪信息,并使该防伪信息嵌入在整个页面网点中, 能更有效地对抗基于照相机、扫描仪、电子文档等非法复制行为。 8 kernel call Mian X] encryption algorithm, to generate 16-bit binary encryption security of a group information table, set the shape of two AM network: □ and ◊, □ which is defined as the number 0, ◊ defined as the number 1, using the generated 16-bit binary encryption security information set by a cyclic modulation amplitude lookup table outlets, so that the shape of a regular change in AM mixed screening dots in accordance with the shape of the two outlets of the AM, in the shape of hybrid AM screening dots regularly changed, AM modulated adjacent dots 16 constitute a set of 16-bit binary information, so as to carry the security information, and the security information is embedded in the entire page in the network, it can be more effective against based cameras, scanners , electronic documents and other illegal copying. 通过在印刷品中非显见地嵌入可提取的防伪信息,能够为真品提供有效证明,同时具有较强的抗伪造能力,且不增加额外的防伪成本。 By embedding security information in print Africa extractable apparent, it is possible to provide proof of genuine, and has strong anti-counterfeiting capabilities, security without additional cost.

[0005] 为解决上述的技术问题,首先对防伪信息进行数字化,生成8位一组的二进制防伪信息表,防伪信息可W是图像信息、文字信息,将二进制防伪信息表中的8位一组二进制信息扩展为16位一组二进制信息,生成高8位全为0的16位一组二进制防伪信息表,对16位一组二进制防伪信息表中的每一个16位二进制信息进行的减C+Ni敛q感Q+巧敎C;感C4感Cs+Ni錢Q越C7减Cs喊。 [0005] To solve the above technical problem, first security information is digitized to generate 8-bit binary security information form a set, the security information may be W is image information, character information, binary security information table 8 group binary information expanded to 16 bits a set of binary information, to generate the first 8 bits is 0 16 a set of binary security information table, for each 16-bit binary information 16 a set of binary security information table is minus C + Q + Ni Qiao convergence objective for sensing q C; Cs + Ni sense C4 sense the money Q Cs C7 Save call. Cg]加密运算,生成16位一组的二进制加密防伪信息表,利用生成的16位一组二进制加密防伪信息表中的16位二进制信息经过信道编码,生成具有检错和纠错功能的16位一组的二进制调制信号。 CG] encryption algorithm, to generate 16-bit binary encryption security information form a set, using the generated 16-bit set of binary encryption security information table, 16-bit binary information is channel-encoded, generating a error detection and correction functions 16 a group of binary modulated signals. 信道编码可W采用循环编码、卷积编码或化rbo编码等多种形式,将原始连续调图像信号经过栅格化处理巧I巧和混合加网输出半色调混合加网图像信号,其中包括调幅网点和调频网点图像信号,利用生成的16位一组二进制调制信号采用循环查表法调制方式调制半色调混合加网图像信号中调幅网点的形状,使调幅网点的形状按照□和◊有规律的发生改变,使半色调混合加网图像信号中相邻16个调幅网点通过形状的改变携带16位二进制防伪信息,从而生成在整个页面网点中嵌入防伪信息的半色调混合加网图像信号,实现防伪印刷。 W channel coding may be cyclic coding, convolutional coding, or other forms of coding rbo, the original continuous tone image signal through the rasterizing process I clever and clever hybrid screening hybrid screening halftone output image signals, including AM and FM halftone dot image dot signal generated using a set of 16-bit cyclic binary modulated signals modulated in a modulation look-up table shape of halftone dots AM mixed halftone image signal, in accordance with the shape of the AM network □ and regular ◊ change, hybrid screening halftone image signal of adjacent dots 16 AM 16 carries binary information by changing the shape of security, thereby generating the mixed halftone screening an image signal embedded in the security information in a network the entire page, the security implemented print.

[0006] 在提取防伪信息时,首先采集网点图像信号,经过对调幅网点的形状的模糊识别,分辨调幅网点的形状,提取调幅网点的边沿信号和形状信息,解调调幅网点的形状信息,输出16位一组的二进制调制信号。 [0006] When the security information is extracted, dot acquired first image signal, the shape of the AM network through a fuzzy recognition, resolution dot shape AM, AM network edge extraction signal and the shape information, the shape information outlets demodulated AM output a 16-bit binary modulation signal group. 对解调输出的16位一组的二进制调制信号进行信道解码,信道解码后生成16位一组的二进制解密防伪信息表,将二进制解密防伪信息表中的16位二进制信息记作Hi,通过加密过程可知Η尸的减C+Ni感Ct敎C: +N减仁3减。 16-bit binary modulation signal a set of demodulation output of channel decoding, generating a 16-bit binary decrypt the security information table group after channel decoding, the binary decrypted 16-bit binary information referred security information table for the Hi, by encrypting Save Η found dead during the C + Ni sense Ct objective for C: + N Save Save 3 kernel. 减Q+Ni盛Ce减C,减Cs鄉CYj,二进制解密防伪信息表中16位二进制信息Hi的位置控制变量初值设定为i= 1,从二进制解密防伪信息表中第一组Hi开始,对二进制解密防伪信息表中的每一组16位二进制信息进行巧=的獻C+N,據Cl據C:+Ni减Cj敏。 Save Save Q + Ni Ce Sheng C, Cs Save Township CYj, decrypting binary variable security position control information table 16 Hi binary information initial value is set to i = 1, the binary decrypt the security information table in the first group start Hi , 16-bit binary information for each set of binary security information table, decryption of offering clever = C + N, according to according Cl C: + Ni Min Cj Save. 减Cs+N,敏Cs滅。 Save Cs + N, Cs-sensitive off. 减Cg鄉C,]解密运算,解出二进制防伪信息Ni,生成高8位全为0的16位一组二进制防伪信息表,去掉高8位, 生成8位一组的二进制防伪信息表,恢复防伪信号并输出防伪信息。 Save Cg Township C,] and decryption operations, solving the binary security information Ni, generates high eight 16-bit set of binary security information table are all 0, and remove the upper 8 bits, to generate 8-bit binary security information form a set, recovery anti-counterfeit security information and outputs the signal.

附图说明 BRIEF DESCRIPTION

[0007] 下面结合附图对本发明进一步说明。 [0007] DRAWINGS The present invention is further described.

[0008] 图1加载防伪信息流程图。 [0008] The flowchart of FIG. 1 loaded security information.

[0009] 图2提取防伪f目息流程图。 [0009] FIG 2 f mesh security information extracted flowchart.

具体实施方式 Detailed ways

[0010] 在加载防伪信息流程图1中,原始防伪信息(图像、文字)经加密,生成8位一组的二进制防伪信息表,将二进制防伪信息表中的8位一组二进制信息扩展为16位一组二进制信息,生成高8位全为0的16位一组二进制防伪信息表,16位一组二进制防伪信息表中的第i组16位二进制信息记作Ni,i为大于0的正整数,八位二进制加密参数记作C、〇1、〇2、〇3、〇4、〇5、〇6、〇7、〇8、Cg,加密参数C、〇1、〇2、〇3、〇4、〇5、〇6、〇7、〇8、Cg为0 到255 中的整数,二位二进制算符控制变量记作k,算符控制变量k为0 ^k^ 3的整数,算符(麵、@;:、@重_、(麵、@真、風言、@;、@完、@完、采用+、_、X、今四种算符,算符控制变量k =0 时@;-、@置、@責、、@置、@是、、@f分别定义为+、X、+、今、_、X、_、今、 +、一,算符控制变量k= 1 时@[、@;2、@4、@;、@4、@4、@;、@夏、@完、@[ [0010] In Scheme 1 loading the security information, the security of the original information (image, text) encrypted, security information to generate a binary table of groups of eight bits, a set of 8-bit binary information Extended Binary security information table 16 bits a set of binary information, to generate the first 8 bits is 0 16 a set of binary security information table, the i-th group of 16-bit binary information note 16 a set of binary security information table as of Ni, i is positive larger than 0, integer, eight binary encryption parameter referred to as C, 〇1, 〇2, 〇3, 〇4, 〇5, 〇6, 〇7, 〇8, Cg, C encryption parameter, 〇1, 〇2, 〇3, 〇4, 〇5, 〇6, 〇7, 〇8, Cg is an integer of 0 to 255, two binary operator control variable denoted as k, operator control variable k is an integer of 0 ^ k ^ 3, count character (face, @;: @ _ weight, (face, @ true wind made, @;, @ End @ End using +, _, X, this four kinds of operators, operator control variable k = 0 when @; - @ home, @ ,, @ home responsibilities, @ ,, @ F is defined as + X-+, now, _, X-, _, now, + a, operator control variable k = 1 @ [@; 2, @ 4, @;, @ 4, @ 4, @;, @ summer End @, @ [ 分别定义为一、X、+、今、+、X、一、今、+、一,算符控制变量k= 2时@!-、@著、@至、真、@若、、@;s、@1。分别定义为_、今、+、今、_、X、+、X、 +、一,算符控制变量k= 3 时@1.、(麵―、@^@f分别定义为+、_、+、今、_、X、_、今、+、X,设定加密参数C、Cl、02、03、04、05、Ce、07、Cs、Cg的初值,因加密参数C、C1、C2、C3、C4、Q、Ce、。、Cs、Cg为0到化5中的整数,在256个数中任取C、Cl、C2、C3、C4、Cs、Ce、。、Cs、C9十个不同的数字共有化6! /但56-10) !种取法,设定算符控制变量k的初值k= 0,设定16位一组二进制防伪信息表中16位二进制信息Ni的位置控制变量i= 1,从16位一组二进制防伪信息表中第一组16位二进制信息Ni开始,对16位一组二进制防伪信息表中的每一组16位二进制信息进行 It is defined as a, X-+, now, +, X-a, this, + a, when the operator control variable k = 2 @ -, @ a, @ to, true, if @ ,, @;! S ., @ 1 are defined by _, this, +, now, _, X, +, X, +, a, operator control variable k = 3 @ when 1, (surface -., @ ^ @ f are defined as +, _, +, now, _, X-, _, now, +, X-, set ciphering parameter C, Cl, 02,03,04,05, Ce, 07, Cs, Cg initial value, due to the encryption parameters C, C1, C2, C3, C4, Q, Ce,., Cs, Cg is an integer of 0 to 5, 256 to take any number of C, Cl, C2, C3, C4, Cs, Ce ,. , Cs, C9 ten different total numbers of 6! / but 56-10)! species emulated, the control operator to set the initial value of the variable k k = 0, a set of 16-bit binary set of security information table 16 Ni binary information of the position control variables i = 1, starting from a set of 16-bit binary security information table of the first set of 16-bit binary information Ni, for each group of a set of binary 16-bit security information table, 16-bit binary information

[N,據C+H據Cl强C+N,狼G感。 [N, according to data C + H Cl strong C + N, Wolf G sense. 縣Q+N,叙Q感。 County Q + N, Q and Syria sense. 錢ς錢q加密运算,并且在对毎一组le 位二进制信息进行的减C+Ni盛C:跋。 Q ς money money encryption algorithm, and a group of every bit binary information le minus C + Ni Sheng C: Postscript. +Ni减Q感Q感Q+巧盛Q减。 Save Q Q + Ni sense of feeling Q + Q Qiao Sheng Save. 窥。 peep. 锁。 lock. ]加密运算的同时进行i+1和k+1运算,通过对16位一组二进制防伪信息表中的每一组16位二进制信息进行的勘C+Ni敎Q被C: +Ni錫。 ] To i + 1 and k + 1 arithmetic encrypt operation, each group 16 by a set of binary security information table, the 16-bit binary information C + Ni survey objective for Q is C: + Ni tin. 感Cj磁C, +Ni敎Cs勉C,(逆。敎"Cg] 加密运算,生成16位一组的二进制加密防伪信息表,调幅网点的形状设置为两种:□和◊, 其中□定义为数字0、◊定义为数字1,生成的16位二进制加密防伪信息经过信道编码,生成具有检错和纠错功能的二进制调制信号。信道编码可W采用循环编码、卷积编码或化rbo 编码等多种形式。将原始连续调图像信号经过栅格化处理巧I巧和混合加网输出半色调混合加网图像信号,其中包括调幅网点和调频网点图像信号。利用生成的二进制调制信号采用循环查表调制方式,调制半色调混合加网图像信号中调幅网点的形状,使混合加网中调幅网点的形状有规则发生改变,生成嵌入防伪信息的半色调混合加网图像信号,通过循环查表调制方式,使相邻16位调幅网点通过形状的改变生成一组16位二进制数据,使其携带防伪信息,并使该防 Magnetic sensing Cj C, + Ni objective for Cs Mian C, (reverse objective for "Cg] encryption algorithm, to generate 16-bit binary encryption security information table of a set of amplitude modulation of two shaped outlets:. □ and ◊, □ defined wherein a digital 0, ◊ defined as number 1, to generate 16-bit binary encryption security information after channel coding, generating a binary modulation signal having error detection and correction functions. channel encoding W cyclic coding, convolutional coding, or of rbo encoding and other forms. the original continuous tone image signal through the rasterizing process I clever and clever hybrid screening hybrid screening halftone output image signals, including AM and FM halftone dot image dot signals using the generated binary modulated cyclic signal modulation look-up table, the mixed modulation halftone screening an image signal AM dot shape, the shape of the AM mixed screening dots are regularly changed, generating a halftone image signal is embedded hybrid screening security information, by table look-up cycle modulation, amplitude modulation adjacent outlets 16 generate a set of 16-bit binary data by changing the shape, it carries security information, and the anti- 伪信息嵌入在整个页面网点中,实现防伪印刷。 The dummy information is embedded in the entire page in the network, to achieve security printing.

[0011] 在提取防伪信息流程图2中,在提取防伪信息时,首先采集网点图像信号,经过对调幅网点的形状的模糊识别,分辨调幅网点的形状,提取调幅网点的边沿信号和形状信息,解调调幅网点的形状信息,输出16位一组的二进制调制信号。 [0011] In Scheme 2 extracted security information in the security information is extracted, an image signal acquired first dot, blurred dot recognition of the shape of the amplitude modulation, the amplitude resolution dot shape, and the shape information extracted edge signal amplitude outlets, dot shape information AM demodulation, and outputs a 16-bit binary modulation signal group. 对解调输出的16 位一组的二进制调制信号进行信道解码,信道解码后生成16位一组的二进制解密防伪信息表,将二进制解密防伪信息表中的16位二进制信息记作Hi,通过加密过程可知巧=的戚C+巧魄q感C; +巧减C;感。 16-bit binary modulation signal a set of demodulation output of channel decoding, generating a 16-bit binary decrypt the security information table group after channel decoding, the binary decrypted 16-bit binary information referred security information table for the Hi, by encrypting process understood Qiao Qi = q C + clever soul sense C; + C Save Qiao; sense. 感Cs+巧喊Q滅C,减Cs减ηQ],二进制解密防伪信息表中16位二进制信息Hi的位置控制变量初值设定为i= 1,从二进制解密防伪信息表中第一组Hi开始,对二进制解密防伪信息表中的每一组16位二进制信息进行印=的殺C+Ni顧Ci感C: +巧敎。 Coincidence sensing Cs + Q call off C, Cs Save Save ηQ], decrypting binary control variable security position information table 16 Hi binary information initial value is set to i = 1, the binary decrypt the security information table in the first group start Hi , for each set of 16-bit binary decrypt the security information table of binary information is printed kill = C + Ni Gu Ci feeling C: + objective for coincidence. 感。 sense. 城Q+Ni颠C。 City Q + Ni Britain C. 喊C.,馈Q勒。 Shout C., Le Q feed. Cg]解密运算,解出二进制防伪信息Ni,生成高8位全为0的16位一组二进制防伪信息表,去掉高8位, 生成8位一组的二进制防伪信息表,恢复防伪信号并输出防伪信息。 CG] decryption operations, solving the binary security information Ni, generates high eight 16-bit set of binary security information table are all 0, and remove the upper 8 bits, to generate 8-bit binary security information form a set, to restore the security signal and outputs security information.

Claims (1)

1. 一种将防伪信息通过加密运算和信道编码生成二进制调制信号,并通过循环查表调制方式将防伪信息嵌入在整个页面中的多参数Ξ维加密二进制防伪印刷方法,其特征是:对防伪信息进行数字化,生成8位一组的二进制防伪信息表,防伪信息是图像信息、 文字信息,为防止加密过程中产生信息溢出,将二进制防伪信息表中的8位一组二进制信息扩展为16位一组二进制信息,生成高8位全为0的16位一组二进制防伪信息表,将16位一组二进制防伪信息表中的第i组16位二进制信息记作Ni,i为大于0的正整数, 八位二进制加密参数记作C、Cl、C2、C3、C4、Cs、Ce、〇7、Cs、Cg,加密参数C、Cl、C2、C3、C4、Cs、 Ce、C,、Cs、Cg为Ο到255中的整数,二位二进制算符控制变量记作k,算符控制变量k为0兰k= 3的整数,算符觀、觀、觀.、跋、觀、叙、觀―、觀、@f乂用+、-、X、 四 1. A security information generated by the encryption algorithm and channel coding binary modulation signal by the modulation cycle look-up table the security information is embedded in dense multi-parameter Ξ Vega binary security printing method in the whole page, characterized in that: anti-counterfeiting information is digitized to generate 8-bit binary security information form a set, the security information is image information, character information, in order to prevent the encryption process generates information overflow extended binary security information table 8 a set of binary information 16 a set of binary information, to generate the first 8 bits is 0 16 a set of binary security information table, the i-th group 16 a set of binary security information table, 16-bit binary information recorded as of Ni, i is greater than n 0 integer, eight binary encryption parameter referred to as C, Cl, C2, C3, C4, Cs, Ce, 〇7, Cs, Cg, encryption parameters C, Cl, C2, C3, C4, Cs, Ce, C ,, Cs , to 255 Ο Cg is an integer of two binary operator control variable denoted as k, k is 0 operator control variable Lan integer k = 3, operator View, Views, Views., Postscript, concept, Syria, outlook - and watch, @ f qe by +, -, X, four 算符,算符控制变量k=0时@1.扣、、@f分别定义为+、X、+、今、一、X、一、今、+、一,算符控制变量k= 1时敏、獻、诞、敏、敏、魄、敏、鄉、@1-、風。 Operator, operator control variable k = 0 @ When 1. Fastening ,, @ f are defined as +, X, +, now, a, X, a, this, + a, operator control when the variable k = 1 Min, offer, birthday, Min, Min, soul, sensitive, township, @ 1-, wind. 分别定义为-、x、+、今、+、X、-、今、+、-, 算符控制变量k=2时@1.、@;ί、@丢、、(新、@完、、(遊;、@f分别定义为一、-、 +、今、_、X、+、X、+、_,算符控制变量k= 3 时运;!-、@;2、@4、@;、戚-、@置、、叙。 分别定义为+、一、+、今、一、X、一、今、+、X,设定加密参数C、Cl、C2、C3、C4、Cs、Ce、Cy、 Cs、C9的初值,因加密参数C、C1、C2、C3、C4、Cs、Ce、C,、Cs、C9为ο到255中的整数,在256 个数中任取C、Cl、C2、C3、C4、Cs、Ce、C,、Cs、Cg十个不同的数字共有256 ! /(256-10) ! 种取法,设定算符控制变量k的初值k= 0,设定16位一组二进制防伪信息表中16位二进制信息Ni的位置控制变量i= 1,从16位一组二进制防伪信息表中第一组16位二进制信息Ni开始,对16位一组二进制防伪信息表中的每一组16位二进制信息进行的域C+H感ς感C+Ni热C,感。感Q+N;叙Q锁。慰。锁C,]加密运算,并且 Are defined as -, x, +, now, +, this X-,, + ,, operator control variable when k = 2 @ 1, @; ί, @ ,, lost (new, @ ,, finished. (travel;, @ F are defined as a, -, +, now, _, X, +, X, +, _, k = 3 operator control variable fortune; -!, @; 2, @ 4, @; , Qi -, @ ,, classification set are defined as + a, +, now, a, X, a, this, +, X, set ciphering parameter C, Cl, C2, C3, C4, Cs, Ce. , Cy, Cs, C9 initial value, due to the encryption parameters C, C1, C2, C3, C4, Cs, Ce, C ,, Cs, C9 is the integer ο 255, 256 take any number of C, cl, C2, C3, C4, Cs, Ce, C ,, different digital Cs, Cg ten total of 256! / (256-10)! species emulated, the control operator to set the initial value of the variable k k = 0, control variable setting position of a set of binary 16-bit security information table of 16-bit binary information Ni i = 1, from a set of 16-bit binary security information table start of the first set of 16-bit binary information Ni, a set of 16-bit binary each C group security domain information table, the 16-bit binary information sense ς + H C + Ni heat C sense, sense of feeling Q + N;... Q Syrian comfort lock lock C,] encryption operation, and 在对每一组!6位二进制信息进行的敏C+巧感Q感C;+Ni疫诉感Q感Q+N敏Q頸C:猛Q锁C。] 加密运算的同时进行i+1和k+1运算,通过对16位一组二进制防伪信息表中的每一组16 位二进制信息进行的錫C+Ni减Q喊C2+Ni叙。頗C.,感Cs+K城Q敎C,馈Cs锁C,] 加密运算,生成16位一组的二进制加密防伪信息表,调幅网点的形状设置为两种:□和◊, 其中□定义为数字0、◊定义为数字1,利用生成的16位一组的二进制加密防伪信息经过信道编码,生成具有检错和纠错功能的16位一组二进制调制信号,将原始连续调图像信号经过栅格化处理巧I巧和混合加网输出半色调混合加网图像信号,其中包括调幅网点和调频网点图像信号,利用生成的16位一组二进制调制信号采用循环查表法调制方式调制半色调混合加网图像信号中调幅网点的形状,使调幅网点的形状按照□和◊有规律的发生改变,使半 In each group of 6-bit binary information sensitive sense Q C + clever sense C; + Ni Phytophthora sense Q v Q + N-sensitive sense Q neck C:! I + 1 and for simultaneously locking C. Meng Q] cryptographic operation k + 1 operation, the tin C by 16-bit binary each group of a set of binary information 16 in the security information table performed C2 + Ni + Ni reduction Q call classification. quite C., sense Cs + K Q city objective for C , Cs feed lock C,] encryption algorithm, to generate 16-bit binary encryption security information table of a set of amplitude modulation of two shaped outlets: ◊ and □, where □ is defined as the number 0, ◊ defined as the number 1, using the generated the 16-bit binary encryption security information through a set of channel coding, to generate a 16-bit set of binary modulation signal having error detection and correction function, the original continuous tone image signal through the rasterizing process clever clever I output and hybrid screening hybrid screening halftone image signals, including AM and FM halftone dot image dot signal generated using a set of 16-bit cyclic binary modulated signals modulated in a modulation look-up table shape of halftone dots AM mixed screening an image signal, so that AM network in accordance with the shape and □ ◊ regular changes occur, the half 色调混合加网图像信号中相邻16个调幅网点通过形状的改变携带16位二进制加密防伪信息,从而生成在整个页面网点中嵌入防伪信息的半色调混合加网图像信号,实现防伪印刷。 Hybrid screening tone dot image signal 16 AM 16 carries adjacent binary encryption security by changing the shape information, thereby generating the entire page halftone dots embedded in hybrid screening an image signal information security, security printing realized.
CN201210402615.8A 2012-10-22 2012-10-22 Multiparameter dimensional binary encryption security printing method CN102945429B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210402615.8A CN102945429B (en) 2012-10-22 2012-10-22 Multiparameter dimensional binary encryption security printing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210402615.8A CN102945429B (en) 2012-10-22 2012-10-22 Multiparameter dimensional binary encryption security printing method

Publications (2)

Publication Number Publication Date
CN102945429A CN102945429A (en) 2013-02-27
CN102945429B true CN102945429B (en) 2016-03-16

Family

ID=47728368

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210402615.8A CN102945429B (en) 2012-10-22 2012-10-22 Multiparameter dimensional binary encryption security printing method

Country Status (1)

Country Link
CN (1) CN102945429B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102194137A (en) * 2011-04-25 2011-09-21 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on shape of amplitude modified screen

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8593688B2 (en) * 2008-10-20 2013-11-26 Hewlett-Packard Development Company, L.P. Method for enhancing security printing

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102194137A (en) * 2011-04-25 2011-09-21 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on shape of amplitude modified screen

Also Published As

Publication number Publication date
CN102945429A (en) 2013-02-27

Similar Documents

Publication Publication Date Title
Wu et al. Data hiding in digital binary image
Chang et al. A watermarking-based image ownership and tampering authentication scheme
Wang et al. A majority-voting based watermarking scheme for color image tamper detection and recovery
CN101366266B (en) Method and device for embedding and detecting digital watermark in text document
CN1928916B (en) Printing medium certificate documents and false proof handling method of copy thereof
CN101295343B (en) Two-dimensional code multi-enciphering anti-fake printing method
CN1209730C (en) Digital anti-fake method
CN101699845B (en) Encryption security printing technology pseudo random signal modulated FM network print spatial position
CN101777134B (en) Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN1430175A (en) Encryption antiforgery method based on substance characteristics
CN102184428B (en) Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102194137A (en) Multi-dimensional encryption anti-counterfeiting printing technology based on shape of amplitude modified screen
CN102225671A (en) Encrypted anti-counterfeit printing technology for modulating shape of printed matter amplitude-modulation screen dot by dual-encrypted signal
CN102402696A (en) Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
Zhang Digital watermarking technology: A review
JP4143441B2 (en) Information processing method and apparatus, computer program, and computer-readable storage medium
Lee et al. A secret-sharing-based method for authentication of grayscale document images via the use of the PNG image with a data repair capability
Li et al. A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure
Liu et al. Blind dual watermarking for color images’ authentication and copyright protection
JP2004214906A (en) Instrument and method for embedding electronic watermark, and instrument, method and program for electronic watermark detection
CN1933391A (en) Hidden code inserting and detecting method
CN1177472C (en) Digital watermark implanting and extracting method based on parth search
CN101030852B (en) Method for enciphering and deciphering human-body safety
Surekha et al. A multiple watermarking technique for images based on visual cryptography
CN101950407B (en) Method for realizing color image digital watermark for certificate anti-counterfeiting

Legal Events

Date Code Title Description
C06 Publication
C10 Entry into substantive examination
C14 Grant of patent or utility model
CF01