CN103049779A - Method for generating and recognizing food safety liability insurance electronic policy two-dimensional code voucher - Google Patents

Method for generating and recognizing food safety liability insurance electronic policy two-dimensional code voucher Download PDF

Info

Publication number
CN103049779A
CN103049779A CN2012105887192A CN201210588719A CN103049779A CN 103049779 A CN103049779 A CN 103049779A CN 2012105887192 A CN2012105887192 A CN 2012105887192A CN 201210588719 A CN201210588719 A CN 201210588719A CN 103049779 A CN103049779 A CN 103049779A
Authority
CN
China
Prior art keywords
image
code
dimension code
dimensional code
digital watermark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012105887192A
Other languages
Chinese (zh)
Other versions
CN103049779B (en
Inventor
郑莹娜
刘扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201210588719.2A priority Critical patent/CN103049779B/en
Publication of CN103049779A publication Critical patent/CN103049779A/en
Application granted granted Critical
Publication of CN103049779B publication Critical patent/CN103049779B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention provides a method for generating and recognizing a food safety liability insurance electronic policy two-dimensional code voucher. The method for generating the food safety liability insurance electronic policy two-dimensional code voucher comprises the following steps: 1) generating an electronic policy two-dimensional code image which is a two-dimensional code binary image with M*M pixels; 2) encrypting the two-dimensional code binary image in the two-dimensional code image; and 3) embedding a digital watermark into the two-dimensional code image. According to the method for generating the food safety liability insurance electronic policy two-dimensional code voucher, a method of encrypting the two-dimensional code binary value in the two-dimensional code image and embedding the digital watermark into the two-dimensional code image is adopted, so that read-in and verification can be convenient, and the use safety is ensured. The method for generating and recognizing the food safety liability insurance electronic policy two-dimensional code voucher can be used for ensuring the safety, reliability and forgery prevention of the food safety liability insurance electronic policy.

Description

Generation and the recognition methods of food security liability insurance electronic insurance policy two-dimension code credential
Technical field
The present invention is a kind of generation and recognition methods of food security liability insurance electronic insurance policy two-dimension code credential, belongs to the generation of food security liability insurance electronic insurance policy two-dimension code credential and the innovative technology of recognition methods.
Background technology
Food security is the common issue with that developed country and developing country face.Because food security relates to a plurality of links such as production, processing, transportation, making and sale.Therefore, food safety management is a systems engineering.For guaranteeing the food safety management of the whole society, on the basis that various legislations perfect, the tight supervisory system that food quality supervision department, educational institution, the food enterprises, food security liability insurance and consumer combine must establish a government, strengthen business accountability consciousness, the food security Emergency System of Erecting and improving and liability insurance security system work the tight defence line of taking precautions against food safety risk with new science and technology and market means and food tracing system and arranging." State Council is about strengthening the decision of food security work " (No. [2012] 20, the promulgated by the State Council) promulgated in June, 2012, about " actively developing food security responsibility compulsory insurance system pilot ", will greatly promote on this basis the construction of China's food security Fame Mechanism, food security credit system and food safety risk management and control system.
Food security liability insurance is defined as the insurant and produces and sells food in the management place that insurance contract is listed, perhaps on-the-spot when providing with food that its nature of business conforms to, because of carelessness or fault causes the consumer to poison by food or other diseases caused by food-borne bacteria or cause consumer's damage to person or property loss because being mixed with foreign matter in the food, victim or its procurator lodge claims to the insurant first, the liability insurance of insurer's liable for compensation in the limit of indemnity of contract engagement.Food security liability insurance relates to the determining of the classification of the assessment of food security liability exposure, the food of accepting insurance, the mode of accepting insurance, rate, risk management and a plurality of links such as settlement of insurance claim, procedural intervention, has higher requirement for the management level of insurance company.As having legal effect and guarantee the voucher of insurant's legitimate rights and interests, the authenticity of insurance document, can not tamper and non repudiation very important.Declaration form exists mainly with the form of papery now, yet the case of insurance fraud, false declaration form happens occasionally, and in a single day declaration form goes wrong, and insurance company's inspection and processing procedure are very complicated and slow.Along with developing rapidly of computer and network technologies, particularly planar bar code technology is in the application in food security traceability field, safe and efficient electronic insurance policy is emerging fortune and giving birth to, and this will further promote carrying out of food security responsibility compulsory insurance system pilot work.Simultaneously, realization is to abundant identification, evaluation and tight monitoring and the control of food safety risk, build diversification, at many levels, food security liability exposure management and control system by all kinds of means, for the strategic high ground that makes up China's food security liability insurance system and seize international professional financial development provides strong support.
Comprehensive relatively papery declaration form Main Problems, electronic insurance policy apparently decrease cost and strengthen that it is ageing, antifalsification and traceability.But electronic insurance policy need to solve following key issue technically: (1) be in conformity with law the reading in and checking and electronic anti-fogery verification (being perfectly safe property) of paper-based form of electronic insurance policy of foundation; (2) have by electronics sending modes (extensively compatible) such as vast customer support and the file layout that can read and mail transmission, faxes.
Summary of the invention
The object of the invention is to consider the problems referred to above and provide a kind of being convenient to read in and verify, and guarantee generation and the recognition methods of the food security liability insurance electronic insurance policy two-dimension code credential of safety in utilization.The present invention can guarantee the safe, reliable and false proof of food security liability insurance two-dimensional code electronic declaration form.
Technical scheme of the present invention is: the generation method of food security liability insurance electronic insurance policy two-dimension code credential of the present invention includes following steps:
1) generate the electronic insurance policy image in 2 D code, image in 2 D code is the two-dimension code binary map of M * M pixel;
2) the two-dimension code binary map in the image in 2 D code is encrypted;
3) embed digital watermark in image in 2 D code.
Above-mentioned steps 2) method that in the two-dimension code binary map in the image in 2 D code is encrypted is that the application of chaos sequence is encrypted the two-dimension code binary map, specifically comprises the steps:
21) image in 2 D code is carried out pre-service, remove clear area and position coordinate detection figure, produce a carrier figure, and add up its embeddable capacity;
22) utilize chaos sequence to the susceptibility of starting condition, by inputting initial value x to every group iIncrease side-play amount and form the path that the method for new input initial value is revised distribute keys automatically, destroying the correlativity in chaotic key path, thereby the two-dimension code binary map is divided into N group, every group of (M/N) * M pixel;
23) choose initial value x iWith the system parameter values that meets the requirement of generation chaos sequence μ, produce a Rochester binary chaotic sequence that length is (M/N) * M;
24) read the pixel value of two-dimension code bianry image in every group, two-dimension code pixel value and the chaotic binary sequences that has generated are carried out the XOR cryptographic calculation;
25) one group of (M/N) * M pixel of every encryption is namely at current input initial value x iValue adds a side-play amount t, and this side-play amount be one with current group of number N iMake the variable of linear change, so consist of new input initial value x I+1=x i+ N iT substitution chaos sequence equation is finished the XOR cryptographic calculation to N group two-dimension code binary map;
26) XOR is encrypted the BMP picture format that data are afterwards write as standard, so that will encrypted two-dimension code bianry image storage and transmission.
Above-mentioned steps 3) in image in 2 D code embed digital watermark be to use spatial domain method to the image in 2 D code embed digital watermark as carrier, the step of embed digital watermark is as follows:
31) use the Gaussian Blur algorithm encrypted two-dimension code is blured pre-service, to obtain the gray level image of carrier;
32) decision is adopted last two embed digital watermark informations of all pixels as the least significant bit (LSB) of the two-dimension code gray level image of carrier and the figure place of embedding, and is predisposed to zero;
33) produce digital watermarking image, and adjust size and the number of bits of digital watermarking image, to satisfy the requirement of the digital watermarking image data volume that carrier embeds;
34) on the least significant bit (LSB) of each pixel of carrier, a position of embed digital watermark data;
35) finish successively the embedding of all digital watermarking numerical digits;
36) two-dimension code of the embed digital watermark that generated carried out a series of anti-challenge trial, by its being perfectly safe property of comparison, analysis and demonstration validation, thereby finished the process that encryption and digital watermarking embed two-dimension code.
The recognition methods of food security liability insurance electronic insurance policy two-dimension code credential of the present invention comprises the steps:
1) after receiving two-dimensional code electronic declaration form voucher, at first extracts image in 2 D code, carry out the pre-service of image in 2 D code;
2) effectively extract digital watermarking according to Digital Watermarking Embedded Algorithm and step;
3) extract key and deciphering according to chaos encryption algorithm and step, recover original two dimensional code information;
4) the entrained whole valid data information of image in 2 D code are obtained in decoding;
5) correctness and the validity of identification and verifying digital watermark and two-dimension code primary data information (pdi) through the identification checking, to legal two-dimension code figure voucher, continue to carry out subsequent transaction; To illegal two-dimension code figure voucher, forbid immediately carrying out subsequent transaction, and carry out the total system caution.
The present invention owing to adopt is encrypted and the method for embed digital watermark in image in 2 D code the two-dimension code binary map in the image in 2 D code, therefore can be convenient to read in and verify, and guarantee safety in utilization, the present invention is a kind of generation and recognition methods of guaranteeing safe, the reliable and false proof food security liability insurance electronic insurance policy two-dimension code credential of food security liability insurance two-dimensional code electronic declaration form.
Description of drawings
Fig. 1 is that the food security liability insurance is insured and the flow process of accepting insurance;
Fig. 2 is food security liability insurance electronic insurance policy two-dimension code credential product process;
Fig. 3 is food security liability insurance electronic insurance policy two-dimension code credential checking identification process;
Fig. 4 is food security liability insurance Two-dimensional electron declaration form structural representation.
Embodiment
Embodiment:
The food security liability insurance insure, examine, accept insurance flow process as shown in Figure 1.After the full detail that comprises the food enterprises essential information, food security responsibility insurance kind, insured amount information, risk assessment and management and control information, msu message and the information of accepting insurance of insuring enters computer management system, at the end of food security liability insurance electronic insurance policy product process, system generates the two-dimensional code electronic declaration form automatically.
The generation method flow diagram of food security liability insurance electronic insurance policy two-dimension code credential of the present invention includes following steps as shown in Figure 2:
1) generate the electronic insurance policy image in 2 D code, image in 2 D code is the two-dimension code binary map of M * M pixel;
2) the two-dimension code binary map in the image in 2 D code is encrypted;
3) embed digital watermark in image in 2 D code.
The key issue that electronic insurance policy needs to solve technically is electronic anti-fogery and the checking of electronic insurance policy.Chaos sequence is owing to having non-linear, pseudo-randomness, non-convergency, complicacy and to characteristics such as the starting condition value are very responsive and so that system is unpredictable, thereby is applicable to the occasion of electronic insurance policy information encryption.After food security liability insurance electronic insurance policy two-dimension code generates, supposing to carry the accept insurance two-dimension code of information of food security liability insurance is the bianry image of M * M pixel, the chaos sequence of application enhancements is as follows to the key step that the two-dimension code binary map is encrypted: 21) at first two-dimension code is carried out pre-service, remove clear area and position coordinate detection figure, produce a carrier figure, and add up its embeddable capacity; 22) utilize chaos sequence to the susceptibility of starting condition, by inputting initial value x to every group iIncrease side-play amount and form the path that the method for new input initial value is revised distribute keys automatically, to destroy the correlativity in chaotic key path.Thereby the two-dimension code binary map is divided into N group, every group of (M/N) * M pixel; 23) choose initial value x iWith the system parameter values that meets the requirement of generation chaos sequence μ, Rochester (Logistic) binary chaotic sequence that to produce a length be (M/N) * M; 24) read every group of interior two-dimension code bianry image pixel value, two-dimension code pixel value and the chaotic binary sequences that has generated are carried out the XOR cryptographic calculation; 25) one group of (M/N) * M pixel of every encryption is namely at current input initial value x iValue adds a side-play amount t, and this side-play amount be one with current group of number N iMake the variable of linear change, so consist of new input initial value x I+1=x i+ N iT substitution chaos sequence equation is finished the XOR cryptographic calculation to N group two-dimension code binary map; 26) XOR is encrypted the BMP picture format that data are afterwards write as standard, so that the storage of encrypted two-dimension code bianry image and transmission.
In view of in recent years digital watermarking in the widespread use in the fields such as Information hiding, digital anti-counterfeiting, consider with chaos encryption and digital watermarking carry out organically, cleverly combination.Therefore, improve at two-dimension code on the basis of encrypted chaotic array, the application enhancements spatial domain method is to the image in 2 D code embed digital watermark as carrier, with security performance and the anti-counterfeiting performance of further raising two-dimension code.Above-mentioned steps 3) the embedding algorithm step is as follows in: 31) use the Gaussian Blur algorithm encrypted two-dimension code is blured pre-service, to obtain the gray level image of carrier; 32) decision is adopted last two embed digital watermark informations of all pixels as the least significant bit (LSB) of the two-dimension code gray level image of carrier and the figure place of embedding, and is predisposed to zero; 33) produce digital watermarking image, and suitably adjust size and the number of bits of digital watermarking image, to satisfy the requirement of the digital watermarking image data volume that carrier embeds; 34) on the least significant bit (LSB) position of each pixel of carrier, a position of embed digital watermark data; 35) finish successively the embedding of all digital watermarking numerical digits; 36) two-dimension code of the embed digital watermark that generated carried out a series of anti-challenge trial, by its being perfectly safe property of comparison, analysis and demonstration validation, thereby finished the process that encryption and digital watermarking embed two-dimension code.This shows, in fact the food security liability insurance electronic insurance policy image in 2 D code voucher that relates to has here comprised two layer data: namely by the visual information layer of two-dimension code lift-launch and the layer that hides Info that is carried by digital watermarking.This two-layer separate data message is through organically blending and a series of mathematic(al) manipulations are processed, and formed the food security liability insurance electronic insurance policy image in 2 D code voucher of can be by key and implicit information checking identification but can not copying and forging.
Food security liability insurance electronic insurance policy two-dimension code credential checking identifying is the inverse process of food security liability insurance electronic insurance policy two-dimension code credential product process.Its flow process as shown in Figure 3.Food security liability insurance electronic insurance policy two-dimension code credential checking identification step is as follows: 1) after receiving two-dimensional code electronic declaration form voucher, at first extract image in 2 D code, carry out the pre-service of image in 2 D code; 2) effectively extract digital watermarking according to Digital Watermarking Embedded Algorithm and step; 3) extract key and deciphering according to chaos encryption algorithm and step, recover original two dimensional code information; 4) the entrained whole valid data information of image in 2 D code are obtained in decoding; 5) correctness and the validity of identification and verifying digital watermark and two-dimension code primary data information (pdi).Through the identification checking, to legal two-dimension code figure voucher, continue to carry out subsequent transaction; To illegal two-dimension code figure voucher, forbid immediately carrying out subsequent transaction, and carry out the total system caution.Such identification checking can occur in any node that food security liability insurance electronic insurance policy forms, to guarantee the safe, reliable and false proof of food security liability insurance two-dimensional code electronic declaration form.
The food security liability insurance two-dimensional code electronic declaration form structural representation of the present invention's design as shown in Figure 4.The electronic insurance policy Design of Main Structure is four parts: the essential information of the food enterprises of 1) insuring, and essential information mainly comprises enterprise name, attribute, address and contact person etc.; 2) the insure enterprise qualification information of the food enterprises, the enterprise qualification information spinner will comprise the production permit of scope of the enterprise, leading organ, registered capital, production kind, food safety Regulation department and the sincere degree of health operative norm, economic and social benefit and enterprise etc.; 3) the food security liability insurance of the food enterprises information of insuring of insuring, the information spinner of insuring will comprise the insurance kind of insuring, insured amount information, examine guarantor's information and the information etc. of accepting insurance; 4) express the information indicating of informing necessity.

Claims (4)

1. the generation method of a food security liability insurance electronic insurance policy two-dimension code credential is characterized in that including following steps:
1) generate the electronic insurance policy image in 2 D code, image in 2 D code is the two-dimension code binary map of M * M pixel;
2) the two-dimension code binary map in the image in 2 D code is encrypted;
3) embed digital watermark in image in 2 D code.
2. method according to claim 1 is characterized in that above-mentioned steps 2) in method that the two-dimension code binary map in the image in 2 D code is encrypted be that the application of chaos sequence is encrypted the two-dimension code binary map, specifically comprise the steps:
21) image in 2 D code is carried out pre-service, remove clear area and position coordinate detection figure, produce a carrier figure, and add up its embeddable capacity;
22) utilize chaos sequence to the susceptibility of starting condition, by inputting initial value x to every group iIncrease side-play amount and form the path that the method for new input initial value is revised distribute keys automatically, destroying the correlativity in chaotic key path, thereby the two-dimension code binary map is divided into N group, every group of (M/N) * M pixel;
23) choose initial value x iWith the system parameter values that meets the requirement of generation chaos sequence μ, produce a Rochester binary chaotic sequence that length is (M/N) * M;
24) read the pixel value of two-dimension code bianry image in every group, two-dimension code pixel value and the chaotic binary sequences that has generated are carried out the XOR cryptographic calculation;
25) one group of (M/N) * M pixel of every encryption is namely at current input initial value x iValue adds a side-play amount t, and this side-play amount be one with current group of number N iMake the variable of linear change, so consist of new input initial value x I+1=x i+ N iT substitution chaos sequence equation is finished the XOR cryptographic calculation to N group two-dimension code binary map;
26) XOR is encrypted the BMP picture format that data are afterwards write as standard, so that will encrypted two-dimension code bianry image storage and transmission.
3. method according to claim 1 is characterized in that above-mentioned steps 3) in image in 2 D code embed digital watermark be to use spatial domain method to the image in 2 D code embed digital watermark as carrier, the step of embed digital watermark is as follows:
31) use the Gaussian Blur algorithm encrypted two-dimension code is blured pre-service, to obtain the gray level image of carrier;
32) decision is adopted last two embed digital watermark informations of all pixels as the least significant bit (LSB) of the two-dimension code gray level image of carrier and the figure place of embedding, and is predisposed to zero;
33) produce digital watermarking image, and adjust size and the number of bits of digital watermarking image, to satisfy the requirement of the digital watermarking image data volume that carrier embeds;
34) on the least significant bit (LSB) of each pixel of carrier, a position of embed digital watermark data;
35) finish successively the embedding of all digital watermarking numerical digits;
36) two-dimension code of the embed digital watermark that generated carried out a series of anti-challenge trial, by its being perfectly safe property of comparison, analysis and demonstration validation, thereby finished the process that encryption and digital watermarking embed two-dimension code.
4. the recognition methods of a food security liability insurance electronic insurance policy two-dimension code credential is characterized in that comprising the steps:
1) after receiving two-dimensional code electronic declaration form voucher, at first extracts image in 2 D code, carry out the pre-service of image in 2 D code;
2) effectively extract digital watermarking according to Digital Watermarking Embedded Algorithm and step;
3) extract key and deciphering according to chaos encryption algorithm and step, recover original two dimensional code information;
4) the entrained whole valid data information of image in 2 D code are obtained in decoding;
5) correctness and the validity of identification and verifying digital watermark and two-dimension code primary data information (pdi) through the identification checking, to legal two-dimension code figure voucher, continue to carry out subsequent transaction; To illegal two-dimension code figure voucher, forbid immediately carrying out subsequent transaction, and carry out the total system caution.
CN201210588719.2A 2012-12-31 2012-12-31 The generation of food safety liability insurance electronic insurance policy two-dimension code credential and recognition methods Expired - Fee Related CN103049779B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210588719.2A CN103049779B (en) 2012-12-31 2012-12-31 The generation of food safety liability insurance electronic insurance policy two-dimension code credential and recognition methods

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210588719.2A CN103049779B (en) 2012-12-31 2012-12-31 The generation of food safety liability insurance electronic insurance policy two-dimension code credential and recognition methods

Publications (2)

Publication Number Publication Date
CN103049779A true CN103049779A (en) 2013-04-17
CN103049779B CN103049779B (en) 2016-12-28

Family

ID=48062411

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210588719.2A Expired - Fee Related CN103049779B (en) 2012-12-31 2012-12-31 The generation of food safety liability insurance electronic insurance policy two-dimension code credential and recognition methods

Country Status (1)

Country Link
CN (1) CN103049779B (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103414549A (en) * 2013-07-16 2013-11-27 广东工业大学 QR two-dimensional code binary image partition-based key varying chaotic encryption method
CN104239838A (en) * 2013-06-19 2014-12-24 广州市人民印刷厂股份有限公司 Anti-fake verification method for color two-dimensional code with digital watermark
CN104680218A (en) * 2015-02-12 2015-06-03 航天信息股份有限公司 Multi-space two-dimensional code, and generation method and decoding method of multi-space two-dimensional code
CN104854597A (en) * 2013-07-03 2015-08-19 At信息股份有限公司 Authentication server, authentication system, authentication method, and program
CN105187428A (en) * 2015-09-15 2015-12-23 重庆智韬信息技术中心 Method for realizing third-party safety authentication detection of two-dimensional code
CN105389708A (en) * 2015-11-05 2016-03-09 成都天星印务股份有限公司 Anti-counterfeiting method based on combination of digital watermark and two-dimensional code and verification method thereof
CN107104790A (en) * 2017-03-20 2017-08-29 上海师范大学 Optical encryption method based on QR codes and array fingerprint key
CN108921262A (en) * 2018-04-26 2018-11-30 中国海洋大学 A kind of three primary colours bar code and its generation and reading method
CN109190339A (en) * 2018-09-13 2019-01-11 中国农业银行股份有限公司 A kind of webpage digital watermarking image generates, identification, Method of printing and device
CN109740927A (en) * 2018-12-29 2019-05-10 重庆工商大学融智学院 The assessment of institution of higher learning's legal risk and crime prevention system
CN110570218A (en) * 2018-09-13 2019-12-13 拍拍看(海南)人工智能有限公司 genuine product responsibility insurance policy setting method and inquiry and registration system
CN111489173A (en) * 2020-03-03 2020-08-04 四川飨誉食界供应链管理有限公司 Food safety tracing system and method based on full ecological monitoring
CN112016937A (en) * 2019-09-01 2020-12-01 海南亚元防伪技术研究所(有限合伙) Insurance fidelity anti-fake method and its mark

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101355684A (en) * 2007-07-24 2009-01-28 中国移动通信集团公司 Method for transmitting and receiving image series digital content as well as transmitter and receiver
CN101377837A (en) * 2007-08-29 2009-03-04 北京方维银通科技有限公司 Method for generating and checking electronic check two-dimension code credence
CN101706946A (en) * 2009-11-26 2010-05-12 大连大学 Digital image encryption method based on DNA sequence and multi-chaotic mapping
CN101751658A (en) * 2009-12-09 2010-06-23 清华大学 Image visual separate-management method with minimum pixel expansion and optimal contrast
CN101930588A (en) * 2009-06-22 2010-12-29 夏普株式会社 Image processing apparatus, image read-out, image processing system and disposal route
CN102609890A (en) * 2011-01-20 2012-07-25 北京中盈信安科技发展有限责任公司 Image digital watermark embedding and detecting system
CN102664727A (en) * 2012-04-11 2012-09-12 南京邮电大学 Virtual optical encryption method based on chaotic mapping

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101355684A (en) * 2007-07-24 2009-01-28 中国移动通信集团公司 Method for transmitting and receiving image series digital content as well as transmitter and receiver
CN101377837A (en) * 2007-08-29 2009-03-04 北京方维银通科技有限公司 Method for generating and checking electronic check two-dimension code credence
CN101930588A (en) * 2009-06-22 2010-12-29 夏普株式会社 Image processing apparatus, image read-out, image processing system and disposal route
CN101706946A (en) * 2009-11-26 2010-05-12 大连大学 Digital image encryption method based on DNA sequence and multi-chaotic mapping
CN101751658A (en) * 2009-12-09 2010-06-23 清华大学 Image visual separate-management method with minimum pixel expansion and optimal contrast
CN102609890A (en) * 2011-01-20 2012-07-25 北京中盈信安科技发展有限责任公司 Image digital watermark embedding and detecting system
CN102664727A (en) * 2012-04-11 2012-09-12 南京邮电大学 Virtual optical encryption method based on chaotic mapping

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104239838A (en) * 2013-06-19 2014-12-24 广州市人民印刷厂股份有限公司 Anti-fake verification method for color two-dimensional code with digital watermark
US9654291B2 (en) 2013-07-03 2017-05-16 A.T Communications Co., Ltd. Authentication server, authentication system, authentication method, and program
CN104854597A (en) * 2013-07-03 2015-08-19 At信息股份有限公司 Authentication server, authentication system, authentication method, and program
CN104854597B (en) * 2013-07-03 2017-03-08 At信息股份有限公司 Certificate server, Verification System and authentication method
CN103414549A (en) * 2013-07-16 2013-11-27 广东工业大学 QR two-dimensional code binary image partition-based key varying chaotic encryption method
CN103414549B (en) * 2013-07-16 2016-12-28 广东工业大学 A kind of QR two-dimensional code binary image partition becomes key chaos encrypting method
CN104680218A (en) * 2015-02-12 2015-06-03 航天信息股份有限公司 Multi-space two-dimensional code, and generation method and decoding method of multi-space two-dimensional code
CN104680218B (en) * 2015-02-12 2018-07-31 航天信息股份有限公司 A kind of more space two-dimensional codes and its generation, coding/decoding method
CN105187428A (en) * 2015-09-15 2015-12-23 重庆智韬信息技术中心 Method for realizing third-party safety authentication detection of two-dimensional code
CN105389708A (en) * 2015-11-05 2016-03-09 成都天星印务股份有限公司 Anti-counterfeiting method based on combination of digital watermark and two-dimensional code and verification method thereof
CN107104790A (en) * 2017-03-20 2017-08-29 上海师范大学 Optical encryption method based on QR codes and array fingerprint key
CN108921262A (en) * 2018-04-26 2018-11-30 中国海洋大学 A kind of three primary colours bar code and its generation and reading method
CN109190339A (en) * 2018-09-13 2019-01-11 中国农业银行股份有限公司 A kind of webpage digital watermarking image generates, identification, Method of printing and device
CN110570218A (en) * 2018-09-13 2019-12-13 拍拍看(海南)人工智能有限公司 genuine product responsibility insurance policy setting method and inquiry and registration system
CN109740927A (en) * 2018-12-29 2019-05-10 重庆工商大学融智学院 The assessment of institution of higher learning's legal risk and crime prevention system
CN109740927B (en) * 2018-12-29 2023-04-18 重庆工商大学融智学院 Legal risk assessment and prevention system for colleges and universities
CN112016937A (en) * 2019-09-01 2020-12-01 海南亚元防伪技术研究所(有限合伙) Insurance fidelity anti-fake method and its mark
CN111489173A (en) * 2020-03-03 2020-08-04 四川飨誉食界供应链管理有限公司 Food safety tracing system and method based on full ecological monitoring

Also Published As

Publication number Publication date
CN103049779B (en) 2016-12-28

Similar Documents

Publication Publication Date Title
CN103049779B (en) The generation of food safety liability insurance electronic insurance policy two-dimension code credential and recognition methods
JP7093352B2 (en) Composite 2D barcodes, digital certificate media, generators, readers and methods
Sahu et al. Improving grayscale steganography to protect personal information disclosure within hotel services
CN104077624A (en) Methods and systems for generating and checking electronic note with anti-counterfeiting two-dimension code
US20050273628A1 (en) Registration and Verification System
WO2020006540A1 (en) System and method for facilitating legal review for commercial loan transactions
Uzougbo et al. Enhancing consumer protection in cryptocurrency transactions: legal strategies and policy recommendations
US20190095595A1 (en) Data Watermarking and Fingerprinting System and Method
Lou et al. Construction information authentication and integrity using blockchain-oriented watermarking techniques
CN117314424B (en) Block chain transaction system and method for big financial data
CN1691087B (en) System and method for decoding digital coding image
Shope The bill of lading on the blockchain: an analysis of its compatibility with international rules on commercial transactions
Arora et al. Privacy Protection of Digital Images Using Watermarking and QR Code‐based Visual Cryptography
Kapadia Blockchain Technology: Application in the Financial Industry.
Sale et al. Graduation certificate verification model: a preliminary study
Karim et al. Identifying and overcoming the risk of fraud in the Malaysian electronic land administration system
Mantoro et al. Real-time printed document authentication using watermarked qr code
CN116566624B (en) Processing method for electronic seal encryption and decryption reverse true verification
Mandolkar RSE for electronic text document protection
US11816756B1 (en) Anti-leak digital document marking system and method using distributed ledger
TWI518598B (en) A barcode tamper-proofing system and method thereof
Das An article on Food Supply Chain: find risk of system disruptions through Blockchain Technology
Abbasi et al. Information security in e-commerce law
Bagherian et al. The Role of Electronic Signature in the Third Millennium of the Development of International Trade Transactions
Wu et al. An Innovative Method for Securing QR Codes against Counterfeits in Supply Chain Management

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Liu Zexi

Inventor after: Liu Yang

Inventor after: Zheng Yingna

Inventor before: Zheng Yingna

Inventor before: Liu Yang

COR Change of bibliographic data
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20161228

Termination date: 20171231

CF01 Termination of patent right due to non-payment of annual fee