CN102945448B - Single parameter variable displacement single cycle binary encryption security printing method - Google Patents

Single parameter variable displacement single cycle binary encryption security printing method Download PDF

Info

Publication number
CN102945448B
CN102945448B CN201210402774.8A CN201210402774A CN102945448B CN 102945448 B CN102945448 B CN 102945448B CN 201210402774 A CN201210402774 A CN 201210402774A CN 102945448 B CN102945448 B CN 102945448B
Authority
CN
China
Prior art keywords
binary
information
set
security
encryption
Prior art date
Application number
CN201210402774.8A
Other languages
Chinese (zh)
Other versions
CN102945448A (en
Inventor
张立君
Original Assignee
北京印刷学院
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京印刷学院 filed Critical 北京印刷学院
Priority to CN201210402774.8A priority Critical patent/CN102945448B/en
Publication of CN102945448A publication Critical patent/CN102945448A/en
Application granted granted Critical
Publication of CN102945448B publication Critical patent/CN102945448B/en

Links

Abstract

一种单参数位移单变量循环加密二进制防伪印刷方法,该方法可将二进制防伪信息通过[+++]加密运算和信道编码生成二进制调制信号,并通过循环查表法调制方式将防伪信息以调幅网点的形状的有序改变嵌入在整个页面中,可在印刷品识别时从任意一个碎片里识别防伪信息,可广泛应用于印刷品防伪领域。 A single-loop parameter variable displacement single binary encryption security printing method, the method may be a binary security information [+++] encryption algorithm to generate a binary channel coding and modulation signal by the modulation cycle look-up table information security AM order to change the shape of dots embedded in the entire page may be from any security identification information in a fragment can be widely used in the field of security prints printed upon recognition.

Description

单参数位移单变量循环加密二进制防伪印刷方法 Single parameter variable displacement single cycle binary encryption security printing method

技术领域: FIELD:

[0001] 本发明涉及一种防伪印刷技术,特别是一种单参数位移单变量循环加密二进制防伪印刷技术,该防伪印刷技术可以用于各种印刷制品的防伪。 [0001] The present invention relates to a security printing technology, particularly to a single cycle of displacements univariate binary encryption security printing technology, the security printing techniques may be used a variety of security printing products.

背景技术: Background technique:

[0002] 现有的较为普通的防伪方法有以下几种:第一种是激光防伪标志,用激光隐性油墨萤光油墨印刷技术将产品的标徽或特殊的识别图案印制成产品的防伪标贴,且同一类产品使用同一种标贴,因防伪标贴较容易伪造,而伪造的防伪标贴又被用在假冒产品上,造成产品的真假混淆,因此难于有效防伪。 [0002] Existing more general anti-counterfeiting method are the following: The first is the security signs laser, a laser fluorescent ink recessive ink printing technique printed product or logo of a particular identification pattern into a security product labels, and stickers using the same type of product the same standard, because of security labels easier to forge, counterfeit security labels and has been used on counterfeit products, resulting in confusion genuine product, it is difficult to effective security. 第二种是密码防伪标贴,其所采用的方法是每件产品编一组数码,每件产品的编码都不相同,将此数码印制在标贴上并遮盖起来,同时将此数码存入可供消费者查询的计算机数据库中,消费者购买产品时,将标识上的数码通过电话或入网计算机输入计算机数据库进行比较识别,相同即为真,不同即为假,方法简单,识别容易,不易伪造,但实际使用中,因编码数据是计算机统一生成后印制标贴的。 The second is the password security labels, it uses a method of encoding a set of digital each product, each product code is not the same, this digital printing paste and covered up in the standard, while this digital memory for consumers to query into a computer database, when consumers buy the product, the digital on-identities identified by a telephone or computer network, computer database, the same shall be true, that is different from the false, the method is simple, easy to identify, difficult to forge, but the actual use, because the encoded data to generate a unified computer-printed label is. 代表产品真假编码数据可能被非法拷贝造假,同时,编码也可回收未查询的产品上的编码造标而贴在假产品上,防伪效果难于保证。 On behalf of genuine and fake products encoded data may be illegally copied fraud, meanwhile, also recyclable coding standard coding made on the product and not a query posted on the fake products, the effect is difficult to guarantee security. 第三种是纹理防伪,以其标贴上的纹理特征防伪,虽然较难伪造,但由于只设标贴的序号码,且是明码,每枚标贴可反复查询,造假者可通过仓库保管员或售货员将标贴上的序号及查询时所反映的必要纹理特征即方格中的有无现象抄袭后按此特征批量伪造。 The third is texture security, its security label of the texture features, although more difficult to counterfeit, but the sequence number is only provided to the label, and is clearly, each costing label may be repeated inquiries, counterfeiters can be kept by the warehouse officer or clerk of the label of the number and characteristics necessary texture that is reflected in the query features Click the box whether the phenomenon of plagiarism in batch forgery. 综上所述,现有的防伪方法都存在一定的缺点,因而不能从根本防止假冒广品。 In summary, the existing anti-counterfeiting methods have some shortcomings, and therefore can not prevent counterfeit products from a wide fundamental.

发明内容: SUMMARY:

[0003] 为了克服现有的各种印刷制品防伪印刷技术存在的缺点,本发明针对现有印刷制品防伪印刷技术存在的不足对现有技术进行了改进,提出了一种二进制加密信号调制印刷品调幅网点的形状的加密防伪印刷技术,该防伪印刷技术通过调幅网点的形状的改变将防伪信息嵌入在整个页面中,可在印刷品识别时从任意一个碎片里识别防伪信息,因此具有很强抗碎性,可从根本上杜绝采用照相、扫描等非法复制行为。 [0003] In order to overcome the various disadvantages of the prior art printing security printing products, the present invention is directed to the shortcomings of the prior art security printing products printed on the prior art has been improved, and a binary encryption print signal modulation amplitude encryption security printing technology outlets shape of a security printing technique by changing the shape of the AM network security information is embedded in the entire page may be from any of a fragment in identifying the security identification information when printed, it has a strong crush resistance , can essentially eliminate the use of illegal copying camera, scan.

[0004] 本发明解决其技术问题所采用的技术方案是:对柔性版印刷混合加网中的调幅网点和调频网点分开进行处理,利用图像信息、文字信息等防伪信息生成8位一组的二进制防伪信息表,为防止加密过程中产生信息溢出,将二进制防伪信息表中的8位一组二进制信息扩展为16位一组二进制信息,生成高8位全为0的16位一组二进制防伪信息表,将16位一组二进制防伪信息表中的第i组16位二进制信息记作N 1, i为大于0的正整数,八位二进制加密参数记作C,加密参数C为0 f C 5 255 的整数,二位二进制算符控制变量记作k,算符控制变量k为0 fk 5 3的整数,算符、@i2、@〗、@^采用+、X、一、+四种算符,算符控制变量k = 0时@丨、@^、@!、@ί 分别定义为" X "、" 一"、" + "运算,算符控制变量k = 1时@[、喊、@丨、私4 分别定义为" 一" " X " + "运算,算符控制变量k = 2时@丨、齡、@ [0004] aspect of the present invention to solve the technical problem is that: for flexographic printing hybrid screening in the AM dots and the FM network treated separately, with the image information, textual information security information generation 8-bit binary group of security information table, in order to prevent the encryption process generates information overflow extended binary security information table 8 a set of binary information 16 a set of binary information, to generate the first 8 bits of 16-bit set of binary security information 0 table, the i-th group a 16-bit binary set of security information table, information is recorded as 16-bit binary N 1, i is a positive integer greater than 0, the eight binary encryption parameter referred to as C, the encryption parameter to 0 f C 5 C integer 255, two binary operator control variable denoted as k, operator control variable k is an integer of 0 fk 5 3, operator, I2 @, @〗, using ^ @ +, X-, a, + four kinds operator symbol, operator control variable k = 0 when Shu @, @ ^, @!, @ ί are defined as "X-", "a", "+" operator, operator control variable K @ = 1 [, shouting, @ Shu, private 4 are defined as "a" "X" + "operator, operator control variable k = 2 @ Shu, age, @ 、歡分别定义为" 一"、" + "、"+"、" X "运算,算符控制变量k = 3时@丨、@〗、@〖、啦分别定义为" + 一"、"X"、"+"运算,算符控制变量k = O时加密运算定义为 Huan are defined as "a", "+", "+", "X" operation, operator control variable k = 3 @ When Shu,〗 @, @ 〖, respectively, it is defined as "a +", "X "," + "operator, operator control variable k = O encryption operation is defined as

Figure CN102945448BD00041

算符控制变量k = 1时加密运算定义为 Operator control variable encryption algorithm when k = 1 is defined as

Figure CN102945448BD00042

算符控制变量k =2时加密运算定义为 Operator control variable encryption algorithm when k = 2 is defined as

Figure CN102945448BD00043

算符控制变量k = 3时加密运算定义为 Operator control variable k = 3 is defined as the encryption operation

Figure CN102945448BD00044

设定加密参数C的初值,设定算符控制变量k的初值k = 0,设定16位一组二进制防伪信息表中16位二进制信息队的位置控制变量i = 1,从16位一组二进制防伪信息表中第一组16位二进制信息N1开始,循环采用上述四种不同的加密运算公式对二进制防伪信息表中16位二进制信息进行加密运算,并且在每一次加密运算的同时进行i+Ι和k+Ι运算,随着i和k的取值变化,通过对16位一组二进制防伪信息表中的每一组16位二进制信息进行加密运算,生成16位一组的二进制加密防伪信息表,调幅网点的形状设置为两种:□和<> ,其中□定义为数字0、义:※定义为数字1,利用生成的16位一组的二进制加密防伪信息通过循环查表法调制调幅网点,使其有规律的按照上述两种调幅网点的形状改变混合加网中调幅网点的形状,使混合加网中调幅网点的形状有规则的发生改变,调制后相 Setting the initial value of the ciphering parameter C, the control operator to set the initial value of the variable k k = 0, the set position of the control variable a set of binary 16-bit security information table of 16-bit binary information team i = 1, from 16 a set of binary security information table of the first set of 16-bit binary information N1 starts, the cycle of the above-described four different binary arithmetic expressions encryption security information table information is encrypted 16-bit binary arithmetic, and at the same time in each cryptographic operation i + Ι and k + Ι operation, with i and k values ​​of variation, each group 16 by a set of binary security information table, 16-bit binary information cryptographic operations generate a 16-bit binary encryption group security information table, the amplitude modulation of two shaped outlets: □ and <>, which is defined as the number 0 □, Yi: ※ is defined as the number 1, using the generated 16-bit binary encryption security information set by a look-up table cycles AM modulation outlets, so that the shape of a regular change in AM mixed screening dots in the shape of the two AM network, the shape of the AM network hybrid screening rules have changed, the phase modulated 邻16个调幅网点构成一组16位二进制信息,使其携带防伪信息,并使该防伪信息嵌入在整个页面网点中,能更有效地对抗基于照相机、扫描仪、电子文档等非法复制行为。 O 16 AM network composed of a set of 16-bit binary information, it carries security information, and security information is embedded in the network throughout the page, the more effective fight against illegal copying based cameras, scanners, and other electronic documents. 通过在印刷品中非显见地嵌入可提取的防伪信息,能够为真品提供有效证明,同时具有较强的抗伪造能力,且不增加额外的防伪成本。 By embedding security information in print Africa extractable apparent, it is possible to provide proof of genuine, and has strong anti-counterfeiting capabilities, security without additional cost.

[0005] 为解决上述的技术问题,首先对防伪信息进行数字化,生成8位一组的二进制防伪信息表,防伪信息可以是图像信息、文字信息等,将二进制防伪信息表中的8 位一组二进制信息扩展为16位一组二进制信息,生成高8位全为0的16位一组二进制防伪信息表,对16位一组二进制防伪信息表中的每一组16位二进制信息进行 [0005] To solve the above technical problem, first security information is digitized to generate 8-bit binary security information form a set, the security information may be image information, character information, binary security information table 8 group expanded to 16 bits of binary information is a set of binary information, to generate the first 8 bits of a 16-bit 0 of the binary set of security information table for each group of a set of binary 16-bit security information table, 16-bit binary information

Figure CN102945448BD00045

加密运算,生成16位一组的二进制加密防伪信息表,利用生成的16位一组二进制加密防伪信息表中的16位二进制信息经过信道编码,生成具有检错和纠错功能的16位一组的二进制调制信号。 Encryption operation to generate a 16-bit binary encryption security information form a set, a 16-bit binary information generated by the 16-bit set of binary encryption security information table, through the channel coding, to generate 16-bit group having error detection and correction functions binary modulation signal. 信道编码可以采用循环编码、卷积编码或Turbo编码等多种形式,将原始连续调图像信号经过栅格化处理(RIP)和混合加网输出半色调混合加网图像信号,其中包括调幅网点和调频网点图像信号,利用生成的16位一组二进制调制信号采用循环查表法调制方式调制半色调混合加网图像信号中调幅网点的形状,使调幅网点的形状按照□和C※有规律的发生改变,使半色调混合加网图像信号中相邻16个调幅网点通过形状的改变携带16位二进制防伪信息,从而生成在整个页面网点中嵌入防伪信息的半色调混合加网图像信号,实现防伪印刷。 Channel coding may be cyclic coding, convolutional coding, or other forms Turbo coding, the original continuous tone image signal through the rasterizing process (RIP) output halftone image signal and the hybrid screening hybrid screening, including outlets and AM FM halftone dot image signals, using the generated 16-bit set of binary modulation signal using a look-up table circular shape modulation modes AM halftone dots hybrid screening an image signal, according to the shape of the AM network □ and C ※ regular occurrence changing the halftone screening an image signal mixing of adjacent outlets 16 AM 16 carries binary information by changing the shape of security, thereby generating the mixed halftone screening an image signal embedded in the security information in a network in the entire page, printing to achieve security .

[0006] 在提取防伪信息时,首先采集网点图像信号,经过对调幅网点的形状的模糊识另IJ,分辨调幅网点的形状,提取调幅网点的边沿信号和形状信息,解调调幅网点的形状信息,输出16位一组的二进制调制信号。 [0006] When the security information is extracted, an image signal acquired first dot, blurred dot knowledge of the shape of another IJ AM, AM-resolution dot shape, dot edge extraction AM signal and the shape information, the shape information demodulated AM network , a set of 16-bit output binary modulated signals. 对解调输出的16位一组的二进制调制信号进行信道解码,信道解码后生成16位一组的二进制解密防伪信息表,将二进制解密防伪信息表中的16位二进制信息记作H 1,通过加密过程可知,算符控制变量k = O时 16-bit binary modulation signal a set of demodulation output of channel decoding, generating a 16-bit binary decrypt the security information table group after channel decoding, the binary decrypted 16-bit binary information referred security information table for H 1, by found encryption process, operator control variable when k = O

Figure CN102945448BD00051

算符控制变量k= 1时 Operator control variable k = 1 when

Figure CN102945448BD00052

算符控制变量k = 2时 Operator control variable when k = 2

Figure CN102945448BD00053

,算符控制变量k = 3时 , Operator control when the variable k = 3

Figure CN102945448BD00054

二进制解密防伪信息表中16位二进制信息H1的位置控制变量初值设定为i = 1,从二进制解密防伪信息表中第一组H1开始,对二进制解密防伪信息表中的每一组16位二进制信息进行 Decrypting the security information table, binary 16-bit binary information H1 position control variable is set to the initial value i = 1, the binary decrypt the security information table of the first group H1 starts, for each set of binary decrypt the security information table 16 binary information

Figure CN102945448BD00055

解密运算,解出二进制防伪信息N1,生成高8位全为O的16位一组二进制防伪信息表,去掉高8 位,生成8位一组的二进制防伪信息表,恢复防伪信号并输出防伪信息。 Decryption operations, solving the binary security information N1, generates the first 8 bits is O 16 a set of binary security information table, remove the upper 8 bits, to generate 8-bit binary security information form a set, to restore the security signal and outputs the security information .

附图说明 BRIEF DESCRIPTION

[0007] 下面结合附图对本发明进一步说明。 [0007] DRAWINGS The present invention is further described.

[0008] 图1加载防伪信息流程图。 [0008] The flowchart of FIG. 1 loaded security information.

[0009] 图2提取防伪信息流程图。 [0009] 2 extract security information flow diagram of FIG.

具体实施方式 Detailed ways

[0010] 在加载防伪信息流程图1中,原始防伪信息(图像、文字)经数字化处理, 生成8位一组的二进制防伪信息表,将二进制防伪信息表中的8位一组二进制信息扩展为16位一组二进制信息,生成高8位全为0的16位一组二进制防伪信息表, 16位一组二进制防伪信息表中的第i组16位二进制信息记作N 1, i为大于0的正整数,八位二进制加密参数记作C,加密参数C为0 f C 5 255的整数,二位二进制算符控制变量记作k,算符控制变量k为0兰k兰3的整数,算符采用+、X、一、+四种算符,算符控制变量1^ = 0时@;.、@丨、破、@f分别定义为" + "、" X " " "运算,算符控制变量k = 1时献、@丨、@丨、@丨分别定义为" 一""X"、" + "、" + "运算,算符控制变量k = 2时分别定义为" 一"、" + "、"+"、" X "运算,算符控制变量k = 3时分别定义为" + 一"、"X"、"+"运算,算符控制变量k = 0时加密运算定义 [0010] In loading the security information of Scheme 1, the original security information (image, text) are digitized to generate 8-bit binary security information table of a group, the groups of eight bits of binary information Extended Binary security information table for 16 a set of binary information, to generate the first 8 bits of 16-bit set of binary security information table 0, the i-th group of 16-bit binary information note 16 a set of binary security information table for N 1, i is greater than 0 positive integer, eight binary encryption parameter referred to as C, the encryption parameter C is an integer of 0 f C 5 255, the two binary operator control variable denoted as k, k is 0 operator control variable k blue 3 blue integer, using operator +, X-, a, + four kinds of operators, operator control variables @ 1 ^ = 0;., @ Shu, broken, @ F are defined as "+", "X" "" operator, operator operator control variable k = 1 offered, @ Shu, Shu @, @ Shu defined as "a" "X", "+", "+" operator, operator control variable when k = 2 are defined as "a" , "+", "+", "X-'operation, operator control variable k = 3 are defined as" a + "," X-, "," + "operator, operator control variable k = 0 is defined when the encryption computation

Figure CN102945448BD00056

,算符控制变量k= 1时加密运算定义为 , Operator control variable k = 1 is defined as the encryption operation

Figure CN102945448BD00057

算符控制变量k = 2时加密运算定义为 Operator control variable encryption algorithm when k = 2 is defined as

Figure CN102945448BD00061

算符控制变量k = 3时加密运算定义为 Operator control variable k = 3 is defined as the encryption operation

Figure CN102945448BD00062

设定加密参数C的初值,设定算符控制变量k的初值k = 0,设定16位一组二进制防伪信息表中16位二进制信息队的位置控制变量i = 1,从16位一组二进制防伪信息表中第一组16位二进制信息N1开始,循环采用上述四种不同的加密运算公式对二进制防伪信息表中16位二进制信息进行加密运算,并且在每一次加密运算的同时进行i+Ι和k+Ι运算,随着i和k的取值变化,通过对16位一组二进制防伪信息表中的每一组16位二进制信息进行加密运算,生成16位一组的二进制加密防伪信息表,调幅网点的形状设置为两种:□和其中□定义为数字0、C? S定义为数字1,生成的16位二进制加密防伪信息经过信道编码,生成具有检错和纠错功能的二进制调制信号。 Setting the initial value of the ciphering parameter C, the control operator to set the initial value of the variable k k = 0, the set position of the control variable a set of binary 16-bit security information table of 16-bit binary information team i = 1, from 16 a set of binary security information table of the first set of 16-bit binary information N1 starts, the cycle of the above-described four different binary arithmetic expressions encryption security information table information is encrypted 16-bit binary arithmetic, and at the same time in each cryptographic operation i + Ι and k + Ι operation, with i and k values ​​of variation, each group 16 by a set of binary security information table, 16-bit binary information cryptographic operations generate a 16-bit binary encryption group security information table, a shape AM network to set two: and wherein □ □ defined as number 0, C S is defined as number 1, to generate 16-bit binary encryption security information after channel coding, error detection and correction generates a function? binary modulation signal. 信道编码可以采用循环编码、卷积编码或Turbo编码等多种形式。 Channel coding may be cyclic coding, convolutional coding and Turbo coding forms. 将原始连续调图像信号经过栅格化处理(RIP)和混合加网输出半色调混合加网图像信号,其中包括调幅网点和调频网点图像信号。 The original continuous tone image signal through the rasterizing process (RIP), and hybrid screening hybrid screening halftone output image signals, including AM and FM halftone dot image dot signal. 利用生成的二进制调制信号采用循环查表调制方式,调制半色调混合加网图像信号中调幅网点的形状,使混合加网中调幅网点的形状有规则发生改变,生成嵌入防伪信息的半色调混合加网图像信号,通过循环查表调制方式,使相邻16位调幅网点通过形状的改变生成一组16位二进制数据,使其携带防伪信息,并使该防伪信息嵌入在整个页面网点中,实现防伪印刷。 Using the generated look-up table binary modulated cyclic modulation signal, modulation halftone dot shape hybrid screening an image signal amplitude, the shape of the AM mixed screening dots in a regular change, the embedded security information to generate a half-tone mixing plus net image signal, by a look-up table cyclic modulation, amplitude modulation adjacent outlets 16 generate a set of 16-bit binary data by changing the shape, it carries security information, and the security information is embedded in the entire page in the network, the security implemented print.

[0011] 在提取防伪彳目息流程图2中,在提取防伪彳目息时,首先米集网点图像彳目号,经过对调幅网点的形状的模糊识别,分辨调幅网点的形状,提取调幅网点的边沿信号和形状信息, 解调调幅网点的形状信息,输出16位一组的二进制调制信号。 [0011] In the information extraction Scheme 2 mesh security left foot, the left foot mesh security information is extracted, the first set of dot image left foot meter mesh number, shape recognition of blurred dots of AM, AM-resolution dot shape, dot extraction AM the edge signal and the shape information, the shape information demodulated AM network outputs a 16-bit binary modulation signal group. 对解调输出的16位一组的二进制调制信号进行信道解码,信道解码后生成16位一组的二进制解密防伪信息表,将二进制解密防伪信息表中的16位二进制信息记作H 1,通过加密过程可知,算符控制变量k = 0 时 16-bit binary modulation signal a set of demodulation output of channel decoding, generating a 16-bit binary decrypt the security information table group after channel decoding, the binary decrypted 16-bit binary information referred security information table for H 1, by found encryption process, operator control when the variable k = 0

Figure CN102945448BD00063

算符控制变量k = 1时 Operator control variable k = 1 when

Figure CN102945448BD00064

算符控制变量k=2时 Operator control variable when k = 2

Figure CN102945448BD00065

算符控制变量k = 3时 Operator control variable when k = 3

Figure CN102945448BD00066

二进制解密防伪信息表中16位二进制信息H1的位置控制变量初值设定为i = 1,从二进制解密防伪信息表中第一组H1开始,对二进制解密防伪信息表中的每一组16位二进制信息进行 Decrypting the security information table, binary 16-bit binary information H1 position control variable is set to the initial value i = 1, the binary decrypt the security information table of the first group H1 starts, for each set of binary decrypt the security information table 16 binary information

Figure CN102945448BD00067

:解密运算,解出二进制防伪信息N1,生成高8位全为0的16位一组二进制防伪信息表,去掉高8 位,生成8位一组的二进制防伪信息表,恢复防伪信号并输出防伪信息。 : Decryption operations, solving the binary security information N1, generates high eight 16-bit set of binary security information table are all 0, and remove the upper 8 bits, to generate 8-bit binary security information form a set, to restore the security signal and outputs the security information.

Claims (1)

1. 一种将防伪信息通过加密运算和信道编码生成二进制调制信号,并通过循环查表调制方式将防伪信息嵌入在整个页面中的单参数位移单变量循环加密二进制防伪印刷方法, 其特征是:对防伪信息进行数字化,生成8位一组的二进制防伪信息表,防伪信息是图像信息、文字信息或商标信息,为防止加密过程中产生信息溢出,将二进制防伪信息表中的8位一组二进制信息扩展为16位一组二进制信息,生成高8位全为0的16位一组二进制防伪信息表,将16位一组二进制防伪信息表中的第i组16位二进制信息记作Ni,i为大于0的正整数,八位二进制加密参数记作C,加密参数C为0 ^C^ 255的整数,二位二进制算符控制变量记作k,算符控制变量k为0兰k兰3的整数,算巧 1. A security information generated by the encryption algorithm and channel coding binary modulation signal by the modulation cycle look-up table the security information is embedded in a single univariate displacements entire page binary cycle encrypted security printing method, characterized in that: anti-counterfeiting information is digitized to generate 8-bit binary security information form a set, the security information is image information, character information, or trademark information, in order to prevent the encryption process generates information overflow binary security information table 8 a set of binary information expanded to 16 bits a set of binary information, to generate the first 8 bits of 16-bit set of binary security information table 0, the i-th group 16 a set of binary security information table, 16-bit binary information recorded as of Ni, i is a positive integer greater than 0, eight binary encryption parameter referred to as C, the encryption parameter C is an integer of 0 ^ C ^ 255, the two binary operator control variable denoted as k, k is 0 operator control variable k blue blue 3 integer count clever
Figure CN102945448BC00021
采用+、X、一、今四种算符,算符控制变量k= 0时 Employed +, X, a, this four kinds of operators, operator control when the variable k = 0
Figure CN102945448BC00022
分别定义为" +X"、"一"、"今"运算, 算符控制变量k= 1时 Are defined as "+ X", "a", "this" operation, operator control when the variable k = 1
Figure CN102945448BC00023
分别定义为"一""X 今"运算,算符控制变量k= 2时風―、诞、敏、谢分别定义为X"运算,算符控制变量k= 3时親、觀―、叙、热分别定义为"^ "、"一"、"X "运算,算符控制变量k= 0时加密运算定义为 They are defined as "a," "X-this" operation, operator control variable wind when k = 2 -, birth, Min, Xie are defined as X "operation, operator control variable k = 3 pro, Concept -, Syria, are defined as heat, "^", "a", "X-" operation, when the operator control variable k = 0 is defined as the encryption computation
Figure CN102945448BC00024
算符控制变量k=l时加密运算定义关 Operator control variable k = l When the encryption computation defined Off
Figure CN102945448BC00025
算符控制变量k= 2 时加密运算定义呆 Operator control variables defined during the encryption operation k = 2 stay
Figure CN102945448BC00026
算符控制变量k= 3时加密运算定义夫 Operator control variable k = 3 is defined encryption operation Cardiff
Figure CN102945448BC00027
设定加密参数C的初值,设定算符控制变量k的初值k= 0,设定16位一组二进制防伪信息表中16位二进制信息Ni的位置控制变量i= 1,从16位一组二进制防伪信息表中第一组16 位二进制信息Ni开始,循环采用上述四种不同的加密运算公式对二进制防伪信息表中16 位二进制信息进行加密运算,并且在每一次加密运算的同时进行i+1和k+1运算,随着i和k的取值变化,通过对16位一组二进制防伪信息表中的每一组16位二进制信息进行加密运算,生成16位一组的二进制加密防伪信息表,调幅网点的形状设置为两种:tl和其中:己带义为数字0、冷::兴定义为数字1,利用生成的16位一组的二进制加密防伪信息经过信道编码,生成具有检错和纠错功能的16位一组二进制调制信号,将原始连续调图像信号经过栅格化处理巧I巧和混合加网输出半色调混合加网图像信号,其中包括调幅网 Setting the initial value of the ciphering parameter C, the control operator to set the initial value of the variable k k = 0, the set position of the control variable a set of binary 16-bit security information table of 16-bit binary information Ni i = 1, from 16 a set of binary security information table of the first set of 16-bit binary information Ni start cycle of the above-described four different binary arithmetic expressions encryption security information table information is encrypted 16-bit binary arithmetic, and at the same time in each cryptographic operation i + 1 and k + 1 operation, with the values ​​of i and k is the change, each group 16 by a set of binary security information table, 16-bit binary information cryptographic operations generate a 16-bit binary encryption group security information table, the amplitude modulation of two shaped outlets: tl and wherein: hexyl defined as band number 0, defined as the number of cold Xing :: 1, using the generated 16-bit binary encryption security information of a set of channel-encoded, generating 16 a set of binary modulation signal having error detection and correction function, the original continuous tone image signal through the rasterizing process I clever and clever hybrid screening hybrid screening halftone output image signal, which comprises amplitude modulation network 和调频网点图像信号,利用生成的16位一组二进制调制信号采用循环查表法调制方式调制混合加网图像信号中调幅网点的形状,使调幅网点的形状按腮□和0有规律的发生改变,使混合加网图像信号中相邻16个调幅网点通过形状的改变携带16位二进制加密防伪信息, 从而生成在整个页面网点中嵌入防伪信息的混合加网图像信号,实现防伪印刷。 And FM halftone dot image signals, using the generated 16-bit set of binary modulation signal using a look-up table circular shape modulation modes AM mixed halftone dot image signal, the shape of the dots is changed by amplitude gills □ regular and 0 , 16 AM mixed halftone dots adjacent image signal carries 16-bit binary encryption security by changing the shape information, thereby generating embedded in the entire page dot image signals hybrid screening information security, security printing realized.
CN201210402774.8A 2012-10-22 2012-10-22 Single parameter variable displacement single cycle binary encryption security printing method CN102945448B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210402774.8A CN102945448B (en) 2012-10-22 2012-10-22 Single parameter variable displacement single cycle binary encryption security printing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210402774.8A CN102945448B (en) 2012-10-22 2012-10-22 Single parameter variable displacement single cycle binary encryption security printing method

Publications (2)

Publication Number Publication Date
CN102945448A CN102945448A (en) 2013-02-27
CN102945448B true CN102945448B (en) 2016-02-10

Family

ID=47728387

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210402774.8A CN102945448B (en) 2012-10-22 2012-10-22 Single parameter variable displacement single cycle binary encryption security printing method

Country Status (1)

Country Link
CN (1) CN102945448B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2479473B (en) * 2008-10-20 2014-04-16 Hewlett Packard Development Co Method for enhancing security printing

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal

Also Published As

Publication number Publication date
CN102945448A (en) 2013-02-27

Similar Documents

Publication Publication Date Title
Chang et al. A watermarking-based image ownership and tampering authentication scheme
JP4557866B2 (en) Mixed code, and a method and apparatus generating a mixed code, the recording medium
Wu et al. Data hiding in digital binary image
US7512249B2 (en) System and method for decoding digital encoded images
JP3804012B2 (en) Alteration determination method of the document image and the system, and a control program thereof
US7028902B2 (en) Barcode having enhanced visual quality and systems and methods thereof
Deguillaume et al. Secure hybrid robust watermarking resistant against tampering and copy attack
CN101366266B (en) Method and device for embedding and detecting digital watermark in text document
JP2006014280A (en) Secure recorded document
CN101699845B (en) Encryption security printing technology pseudo random signal modulated FM network print spatial position
CN101295343A (en) Two-dimensional code multi-enciphering anti-fake printing method
CN101777134B (en) Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
JP2011147114A (en) Document authentication for detecting alteration of barcode by using hierarchical barcode stamp
CN102184428B (en) Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102194137A (en) Multi-dimensional encryption anti-counterfeiting printing technology based on shape of amplitude modified screen
CN102225671A (en) Encrypted anti-counterfeit printing technology for modulating shape of printed matter amplitude-modulation screen dot by dual-encrypted signal
Tkachenko et al. Two-level QR code for private message sharing and document authentication
JP5718556B2 (en) Document authentication method and program
JP2010191944A (en) Creation and placement of two-dimensional barcode stamp on printed document for storing authentication information
JP2010160794A (en) Creation and placement of two-dimensional barcode stamp on printed document for storing authentication information
JP4595014B2 (en) Electronic watermark embedding device and the detection device
CN101834726A (en) Safe encryption method based on bi-dimensional codes
US20100142756A1 (en) Document security method
CN1691087B (en) System and method for decoding digital coding image
JP2003152979A (en) Apparatus and method for printing document

Legal Events

Date Code Title Description
C06 Publication
C10 Entry into substantive examination
C14 Grant of patent or utility model
CF01