CN103049779A - Method for generating and recognizing food safety liability insurance electronic policy two-dimensional code voucher - Google Patents
Method for generating and recognizing food safety liability insurance electronic policy two-dimensional code voucher Download PDFInfo
- Publication number
- CN103049779A CN103049779A CN2012105887192A CN201210588719A CN103049779A CN 103049779 A CN103049779 A CN 103049779A CN 2012105887192 A CN2012105887192 A CN 2012105887192A CN 201210588719 A CN201210588719 A CN 201210588719A CN 103049779 A CN103049779 A CN 103049779A
- Authority
- CN
- China
- Prior art keywords
- image
- code
- dimension code
- dimensional code
- digital watermark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The invention provides a method for generating and recognizing a food safety liability insurance electronic policy two-dimensional code voucher. The method for generating the food safety liability insurance electronic policy two-dimensional code voucher comprises the following steps: 1) generating an electronic policy two-dimensional code image which is a two-dimensional code binary image with M*M pixels; 2) encrypting the two-dimensional code binary image in the two-dimensional code image; and 3) embedding a digital watermark into the two-dimensional code image. According to the method for generating the food safety liability insurance electronic policy two-dimensional code voucher, a method of encrypting the two-dimensional code binary value in the two-dimensional code image and embedding the digital watermark into the two-dimensional code image is adopted, so that read-in and verification can be convenient, and the use safety is ensured. The method for generating and recognizing the food safety liability insurance electronic policy two-dimensional code voucher can be used for ensuring the safety, reliability and forgery prevention of the food safety liability insurance electronic policy.
Description
Technical field
The present invention is a kind of generation and recognition methods of food security liability insurance electronic insurance policy two-dimension code credential, belongs to the generation of food security liability insurance electronic insurance policy two-dimension code credential and the innovative technology of recognition methods.
Background technology
Food security is the common issue with that developed country and developing country face.Because food security relates to a plurality of links such as production, processing, transportation, making and sale.Therefore, food safety management is a systems engineering.For guaranteeing the food safety management of the whole society, on the basis that various legislations perfect, the tight supervisory system that food quality supervision department, educational institution, the food enterprises, food security liability insurance and consumer combine must establish a government, strengthen business accountability consciousness, the food security Emergency System of Erecting and improving and liability insurance security system work the tight defence line of taking precautions against food safety risk with new science and technology and market means and food tracing system and arranging." State Council is about strengthening the decision of food security work " (No. [2012] 20, the promulgated by the State Council) promulgated in June, 2012, about " actively developing food security responsibility compulsory insurance system pilot ", will greatly promote on this basis the construction of China's food security Fame Mechanism, food security credit system and food safety risk management and control system.
Food security liability insurance is defined as the insurant and produces and sells food in the management place that insurance contract is listed, perhaps on-the-spot when providing with food that its nature of business conforms to, because of carelessness or fault causes the consumer to poison by food or other diseases caused by food-borne bacteria or cause consumer's damage to person or property loss because being mixed with foreign matter in the food, victim or its procurator lodge claims to the insurant first, the liability insurance of insurer's liable for compensation in the limit of indemnity of contract engagement.Food security liability insurance relates to the determining of the classification of the assessment of food security liability exposure, the food of accepting insurance, the mode of accepting insurance, rate, risk management and a plurality of links such as settlement of insurance claim, procedural intervention, has higher requirement for the management level of insurance company.As having legal effect and guarantee the voucher of insurant's legitimate rights and interests, the authenticity of insurance document, can not tamper and non repudiation very important.Declaration form exists mainly with the form of papery now, yet the case of insurance fraud, false declaration form happens occasionally, and in a single day declaration form goes wrong, and insurance company's inspection and processing procedure are very complicated and slow.Along with developing rapidly of computer and network technologies, particularly planar bar code technology is in the application in food security traceability field, safe and efficient electronic insurance policy is emerging fortune and giving birth to, and this will further promote carrying out of food security responsibility compulsory insurance system pilot work.Simultaneously, realization is to abundant identification, evaluation and tight monitoring and the control of food safety risk, build diversification, at many levels, food security liability exposure management and control system by all kinds of means, for the strategic high ground that makes up China's food security liability insurance system and seize international professional financial development provides strong support.
Comprehensive relatively papery declaration form Main Problems, electronic insurance policy apparently decrease cost and strengthen that it is ageing, antifalsification and traceability.But electronic insurance policy need to solve following key issue technically: (1) be in conformity with law the reading in and checking and electronic anti-fogery verification (being perfectly safe property) of paper-based form of electronic insurance policy of foundation; (2) have by electronics sending modes (extensively compatible) such as vast customer support and the file layout that can read and mail transmission, faxes.
Summary of the invention
The object of the invention is to consider the problems referred to above and provide a kind of being convenient to read in and verify, and guarantee generation and the recognition methods of the food security liability insurance electronic insurance policy two-dimension code credential of safety in utilization.The present invention can guarantee the safe, reliable and false proof of food security liability insurance two-dimensional code electronic declaration form.
Technical scheme of the present invention is: the generation method of food security liability insurance electronic insurance policy two-dimension code credential of the present invention includes following steps:
1) generate the electronic insurance policy image in 2 D code, image in 2 D code is the two-dimension code binary map of M * M pixel;
2) the two-dimension code binary map in the image in 2 D code is encrypted;
3) embed digital watermark in image in 2 D code.
Above-mentioned steps 2) method that in the two-dimension code binary map in the image in 2 D code is encrypted is that the application of chaos sequence is encrypted the two-dimension code binary map, specifically comprises the steps:
21) image in 2 D code is carried out pre-service, remove clear area and position coordinate detection figure, produce a carrier figure, and add up its embeddable capacity;
22) utilize chaos sequence to the susceptibility of starting condition, by inputting initial value x to every group
iIncrease side-play amount and form the path that the method for new input initial value is revised distribute keys automatically, destroying the correlativity in chaotic key path, thereby the two-dimension code binary map is divided into N group, every group of (M/N) * M pixel;
23) choose initial value x
iWith the system parameter values that meets the requirement of generation chaos sequence
μ, produce a Rochester binary chaotic sequence that length is (M/N) * M;
24) read the pixel value of two-dimension code bianry image in every group, two-dimension code pixel value and the chaotic binary sequences that has generated are carried out the XOR cryptographic calculation;
25) one group of (M/N) * M pixel of every encryption is namely at current input initial value x
iValue adds a side-play amount t, and this side-play amount be one with current group of number N
iMake the variable of linear change, so consist of new input initial value x
I+1=x
i+ N
iT substitution chaos sequence equation is finished the XOR cryptographic calculation to N group two-dimension code binary map;
26) XOR is encrypted the BMP picture format that data are afterwards write as standard, so that will encrypted two-dimension code bianry image storage and transmission.
Above-mentioned steps 3) in image in 2 D code embed digital watermark be to use spatial domain method to the image in 2 D code embed digital watermark as carrier, the step of embed digital watermark is as follows:
31) use the Gaussian Blur algorithm encrypted two-dimension code is blured pre-service, to obtain the gray level image of carrier;
32) decision is adopted last two embed digital watermark informations of all pixels as the least significant bit (LSB) of the two-dimension code gray level image of carrier and the figure place of embedding, and is predisposed to zero;
33) produce digital watermarking image, and adjust size and the number of bits of digital watermarking image, to satisfy the requirement of the digital watermarking image data volume that carrier embeds;
34) on the least significant bit (LSB) of each pixel of carrier, a position of embed digital watermark data;
35) finish successively the embedding of all digital watermarking numerical digits;
36) two-dimension code of the embed digital watermark that generated carried out a series of anti-challenge trial, by its being perfectly safe property of comparison, analysis and demonstration validation, thereby finished the process that encryption and digital watermarking embed two-dimension code.
The recognition methods of food security liability insurance electronic insurance policy two-dimension code credential of the present invention comprises the steps:
1) after receiving two-dimensional code electronic declaration form voucher, at first extracts image in 2 D code, carry out the pre-service of image in 2 D code;
2) effectively extract digital watermarking according to Digital Watermarking Embedded Algorithm and step;
3) extract key and deciphering according to chaos encryption algorithm and step, recover original two dimensional code information;
4) the entrained whole valid data information of image in 2 D code are obtained in decoding;
5) correctness and the validity of identification and verifying digital watermark and two-dimension code primary data information (pdi) through the identification checking, to legal two-dimension code figure voucher, continue to carry out subsequent transaction; To illegal two-dimension code figure voucher, forbid immediately carrying out subsequent transaction, and carry out the total system caution.
The present invention owing to adopt is encrypted and the method for embed digital watermark in image in 2 D code the two-dimension code binary map in the image in 2 D code, therefore can be convenient to read in and verify, and guarantee safety in utilization, the present invention is a kind of generation and recognition methods of guaranteeing safe, the reliable and false proof food security liability insurance electronic insurance policy two-dimension code credential of food security liability insurance two-dimensional code electronic declaration form.
Description of drawings
Fig. 1 is that the food security liability insurance is insured and the flow process of accepting insurance;
Fig. 2 is food security liability insurance electronic insurance policy two-dimension code credential product process;
Fig. 3 is food security liability insurance electronic insurance policy two-dimension code credential checking identification process;
Fig. 4 is food security liability insurance Two-dimensional electron declaration form structural representation.
Embodiment
Embodiment:
The food security liability insurance insure, examine, accept insurance flow process as shown in Figure 1.After the full detail that comprises the food enterprises essential information, food security responsibility insurance kind, insured amount information, risk assessment and management and control information, msu message and the information of accepting insurance of insuring enters computer management system, at the end of food security liability insurance electronic insurance policy product process, system generates the two-dimensional code electronic declaration form automatically.
The generation method flow diagram of food security liability insurance electronic insurance policy two-dimension code credential of the present invention includes following steps as shown in Figure 2:
1) generate the electronic insurance policy image in 2 D code, image in 2 D code is the two-dimension code binary map of M * M pixel;
2) the two-dimension code binary map in the image in 2 D code is encrypted;
3) embed digital watermark in image in 2 D code.
The key issue that electronic insurance policy needs to solve technically is electronic anti-fogery and the checking of electronic insurance policy.Chaos sequence is owing to having non-linear, pseudo-randomness, non-convergency, complicacy and to characteristics such as the starting condition value are very responsive and so that system is unpredictable, thereby is applicable to the occasion of electronic insurance policy information encryption.After food security liability insurance electronic insurance policy two-dimension code generates, supposing to carry the accept insurance two-dimension code of information of food security liability insurance is the bianry image of M * M pixel, the chaos sequence of application enhancements is as follows to the key step that the two-dimension code binary map is encrypted: 21) at first two-dimension code is carried out pre-service, remove clear area and position coordinate detection figure, produce a carrier figure, and add up its embeddable capacity; 22) utilize chaos sequence to the susceptibility of starting condition, by inputting initial value x to every group
iIncrease side-play amount and form the path that the method for new input initial value is revised distribute keys automatically, to destroy the correlativity in chaotic key path.Thereby the two-dimension code binary map is divided into N group, every group of (M/N) * M pixel; 23) choose initial value x
iWith the system parameter values that meets the requirement of generation chaos sequence
μ, Rochester (Logistic) binary chaotic sequence that to produce a length be (M/N) * M; 24) read every group of interior two-dimension code bianry image pixel value, two-dimension code pixel value and the chaotic binary sequences that has generated are carried out the XOR cryptographic calculation; 25) one group of (M/N) * M pixel of every encryption is namely at current input initial value x
iValue adds a side-play amount t, and this side-play amount be one with current group of number N
iMake the variable of linear change, so consist of new input initial value x
I+1=x
i+ N
iT substitution chaos sequence equation is finished the XOR cryptographic calculation to N group two-dimension code binary map; 26) XOR is encrypted the BMP picture format that data are afterwards write as standard, so that the storage of encrypted two-dimension code bianry image and transmission.
In view of in recent years digital watermarking in the widespread use in the fields such as Information hiding, digital anti-counterfeiting, consider with chaos encryption and digital watermarking carry out organically, cleverly combination.Therefore, improve at two-dimension code on the basis of encrypted chaotic array, the application enhancements spatial domain method is to the image in 2 D code embed digital watermark as carrier, with security performance and the anti-counterfeiting performance of further raising two-dimension code.Above-mentioned steps 3) the embedding algorithm step is as follows in: 31) use the Gaussian Blur algorithm encrypted two-dimension code is blured pre-service, to obtain the gray level image of carrier; 32) decision is adopted last two embed digital watermark informations of all pixels as the least significant bit (LSB) of the two-dimension code gray level image of carrier and the figure place of embedding, and is predisposed to zero; 33) produce digital watermarking image, and suitably adjust size and the number of bits of digital watermarking image, to satisfy the requirement of the digital watermarking image data volume that carrier embeds; 34) on the least significant bit (LSB) position of each pixel of carrier, a position of embed digital watermark data; 35) finish successively the embedding of all digital watermarking numerical digits; 36) two-dimension code of the embed digital watermark that generated carried out a series of anti-challenge trial, by its being perfectly safe property of comparison, analysis and demonstration validation, thereby finished the process that encryption and digital watermarking embed two-dimension code.This shows, in fact the food security liability insurance electronic insurance policy image in 2 D code voucher that relates to has here comprised two layer data: namely by the visual information layer of two-dimension code lift-launch and the layer that hides Info that is carried by digital watermarking.This two-layer separate data message is through organically blending and a series of mathematic(al) manipulations are processed, and formed the food security liability insurance electronic insurance policy image in 2 D code voucher of can be by key and implicit information checking identification but can not copying and forging.
Food security liability insurance electronic insurance policy two-dimension code credential checking identifying is the inverse process of food security liability insurance electronic insurance policy two-dimension code credential product process.Its flow process as shown in Figure 3.Food security liability insurance electronic insurance policy two-dimension code credential checking identification step is as follows: 1) after receiving two-dimensional code electronic declaration form voucher, at first extract image in 2 D code, carry out the pre-service of image in 2 D code; 2) effectively extract digital watermarking according to Digital Watermarking Embedded Algorithm and step; 3) extract key and deciphering according to chaos encryption algorithm and step, recover original two dimensional code information; 4) the entrained whole valid data information of image in 2 D code are obtained in decoding; 5) correctness and the validity of identification and verifying digital watermark and two-dimension code primary data information (pdi).Through the identification checking, to legal two-dimension code figure voucher, continue to carry out subsequent transaction; To illegal two-dimension code figure voucher, forbid immediately carrying out subsequent transaction, and carry out the total system caution.Such identification checking can occur in any node that food security liability insurance electronic insurance policy forms, to guarantee the safe, reliable and false proof of food security liability insurance two-dimensional code electronic declaration form.
The food security liability insurance two-dimensional code electronic declaration form structural representation of the present invention's design as shown in Figure 4.The electronic insurance policy Design of Main Structure is four parts: the essential information of the food enterprises of 1) insuring, and essential information mainly comprises enterprise name, attribute, address and contact person etc.; 2) the insure enterprise qualification information of the food enterprises, the enterprise qualification information spinner will comprise the production permit of scope of the enterprise, leading organ, registered capital, production kind, food safety Regulation department and the sincere degree of health operative norm, economic and social benefit and enterprise etc.; 3) the food security liability insurance of the food enterprises information of insuring of insuring, the information spinner of insuring will comprise the insurance kind of insuring, insured amount information, examine guarantor's information and the information etc. of accepting insurance; 4) express the information indicating of informing necessity.
Claims (4)
1. the generation method of a food security liability insurance electronic insurance policy two-dimension code credential is characterized in that including following steps:
1) generate the electronic insurance policy image in 2 D code, image in 2 D code is the two-dimension code binary map of M * M pixel;
2) the two-dimension code binary map in the image in 2 D code is encrypted;
3) embed digital watermark in image in 2 D code.
2. method according to claim 1 is characterized in that above-mentioned steps 2) in method that the two-dimension code binary map in the image in 2 D code is encrypted be that the application of chaos sequence is encrypted the two-dimension code binary map, specifically comprise the steps:
21) image in 2 D code is carried out pre-service, remove clear area and position coordinate detection figure, produce a carrier figure, and add up its embeddable capacity;
22) utilize chaos sequence to the susceptibility of starting condition, by inputting initial value x to every group
iIncrease side-play amount and form the path that the method for new input initial value is revised distribute keys automatically, destroying the correlativity in chaotic key path, thereby the two-dimension code binary map is divided into N group, every group of (M/N) * M pixel;
23) choose initial value x
iWith the system parameter values that meets the requirement of generation chaos sequence
μ, produce a Rochester binary chaotic sequence that length is (M/N) * M;
24) read the pixel value of two-dimension code bianry image in every group, two-dimension code pixel value and the chaotic binary sequences that has generated are carried out the XOR cryptographic calculation;
25) one group of (M/N) * M pixel of every encryption is namely at current input initial value x
iValue adds a side-play amount t, and this side-play amount be one with current group of number N
iMake the variable of linear change, so consist of new input initial value x
I+1=x
i+ N
iT substitution chaos sequence equation is finished the XOR cryptographic calculation to N group two-dimension code binary map;
26) XOR is encrypted the BMP picture format that data are afterwards write as standard, so that will encrypted two-dimension code bianry image storage and transmission.
3. method according to claim 1 is characterized in that above-mentioned steps 3) in image in 2 D code embed digital watermark be to use spatial domain method to the image in 2 D code embed digital watermark as carrier, the step of embed digital watermark is as follows:
31) use the Gaussian Blur algorithm encrypted two-dimension code is blured pre-service, to obtain the gray level image of carrier;
32) decision is adopted last two embed digital watermark informations of all pixels as the least significant bit (LSB) of the two-dimension code gray level image of carrier and the figure place of embedding, and is predisposed to zero;
33) produce digital watermarking image, and adjust size and the number of bits of digital watermarking image, to satisfy the requirement of the digital watermarking image data volume that carrier embeds;
34) on the least significant bit (LSB) of each pixel of carrier, a position of embed digital watermark data;
35) finish successively the embedding of all digital watermarking numerical digits;
36) two-dimension code of the embed digital watermark that generated carried out a series of anti-challenge trial, by its being perfectly safe property of comparison, analysis and demonstration validation, thereby finished the process that encryption and digital watermarking embed two-dimension code.
4. the recognition methods of a food security liability insurance electronic insurance policy two-dimension code credential is characterized in that comprising the steps:
1) after receiving two-dimensional code electronic declaration form voucher, at first extracts image in 2 D code, carry out the pre-service of image in 2 D code;
2) effectively extract digital watermarking according to Digital Watermarking Embedded Algorithm and step;
3) extract key and deciphering according to chaos encryption algorithm and step, recover original two dimensional code information;
4) the entrained whole valid data information of image in 2 D code are obtained in decoding;
5) correctness and the validity of identification and verifying digital watermark and two-dimension code primary data information (pdi) through the identification checking, to legal two-dimension code figure voucher, continue to carry out subsequent transaction; To illegal two-dimension code figure voucher, forbid immediately carrying out subsequent transaction, and carry out the total system caution.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210588719.2A CN103049779B (en) | 2012-12-31 | 2012-12-31 | The generation of food safety liability insurance electronic insurance policy two-dimension code credential and recognition methods |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210588719.2A CN103049779B (en) | 2012-12-31 | 2012-12-31 | The generation of food safety liability insurance electronic insurance policy two-dimension code credential and recognition methods |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103049779A true CN103049779A (en) | 2013-04-17 |
CN103049779B CN103049779B (en) | 2016-12-28 |
Family
ID=48062411
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210588719.2A Expired - Fee Related CN103049779B (en) | 2012-12-31 | 2012-12-31 | The generation of food safety liability insurance electronic insurance policy two-dimension code credential and recognition methods |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103049779B (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103414549A (en) * | 2013-07-16 | 2013-11-27 | 广东工业大学 | QR two-dimensional code binary image partition-based key varying chaotic encryption method |
CN104239838A (en) * | 2013-06-19 | 2014-12-24 | 广州市人民印刷厂股份有限公司 | Anti-fake verification method for color two-dimensional code with digital watermark |
CN104680218A (en) * | 2015-02-12 | 2015-06-03 | 航天信息股份有限公司 | Multi-space two-dimensional code, and generation method and decoding method of multi-space two-dimensional code |
CN104854597A (en) * | 2013-07-03 | 2015-08-19 | At信息股份有限公司 | Authentication server, authentication system, authentication method, and program |
CN105187428A (en) * | 2015-09-15 | 2015-12-23 | 重庆智韬信息技术中心 | Method for realizing third-party safety authentication detection of two-dimensional code |
CN105389708A (en) * | 2015-11-05 | 2016-03-09 | 成都天星印务股份有限公司 | Anti-counterfeiting method based on combination of digital watermark and two-dimensional code and verification method thereof |
CN107104790A (en) * | 2017-03-20 | 2017-08-29 | 上海师范大学 | Optical encryption method based on QR codes and array fingerprint key |
CN108921262A (en) * | 2018-04-26 | 2018-11-30 | 中国海洋大学 | A kind of three primary colours bar code and its generation and reading method |
CN109190339A (en) * | 2018-09-13 | 2019-01-11 | 中国农业银行股份有限公司 | A kind of webpage digital watermarking image generates, identification, Method of printing and device |
CN109740927A (en) * | 2018-12-29 | 2019-05-10 | 重庆工商大学融智学院 | The assessment of institution of higher learning's legal risk and crime prevention system |
CN110570218A (en) * | 2018-09-13 | 2019-12-13 | 拍拍看(海南)人工智能有限公司 | genuine product responsibility insurance policy setting method and inquiry and registration system |
CN111489173A (en) * | 2020-03-03 | 2020-08-04 | 四川飨誉食界供应链管理有限公司 | Food safety tracing system and method based on full ecological monitoring |
CN112016937A (en) * | 2019-09-01 | 2020-12-01 | 海南亚元防伪技术研究所(有限合伙) | Insurance fidelity anti-fake method and its mark |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101355684A (en) * | 2007-07-24 | 2009-01-28 | 中国移动通信集团公司 | Method for transmitting and receiving image series digital content as well as transmitter and receiver |
CN101377837A (en) * | 2007-08-29 | 2009-03-04 | 北京方维银通科技有限公司 | Method for generating and checking electronic check two-dimension code credence |
CN101706946A (en) * | 2009-11-26 | 2010-05-12 | 大连大学 | Digital image encryption method based on DNA sequence and multi-chaotic mapping |
CN101751658A (en) * | 2009-12-09 | 2010-06-23 | 清华大学 | Image visual separate-management method with minimum pixel expansion and optimal contrast |
CN101930588A (en) * | 2009-06-22 | 2010-12-29 | 夏普株式会社 | Image processing apparatus, image read-out, image processing system and disposal route |
CN102609890A (en) * | 2011-01-20 | 2012-07-25 | 北京中盈信安科技发展有限责任公司 | Image digital watermark embedding and detecting system |
CN102664727A (en) * | 2012-04-11 | 2012-09-12 | 南京邮电大学 | Virtual optical encryption method based on chaotic mapping |
-
2012
- 2012-12-31 CN CN201210588719.2A patent/CN103049779B/en not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101355684A (en) * | 2007-07-24 | 2009-01-28 | 中国移动通信集团公司 | Method for transmitting and receiving image series digital content as well as transmitter and receiver |
CN101377837A (en) * | 2007-08-29 | 2009-03-04 | 北京方维银通科技有限公司 | Method for generating and checking electronic check two-dimension code credence |
CN101930588A (en) * | 2009-06-22 | 2010-12-29 | 夏普株式会社 | Image processing apparatus, image read-out, image processing system and disposal route |
CN101706946A (en) * | 2009-11-26 | 2010-05-12 | 大连大学 | Digital image encryption method based on DNA sequence and multi-chaotic mapping |
CN101751658A (en) * | 2009-12-09 | 2010-06-23 | 清华大学 | Image visual separate-management method with minimum pixel expansion and optimal contrast |
CN102609890A (en) * | 2011-01-20 | 2012-07-25 | 北京中盈信安科技发展有限责任公司 | Image digital watermark embedding and detecting system |
CN102664727A (en) * | 2012-04-11 | 2012-09-12 | 南京邮电大学 | Virtual optical encryption method based on chaotic mapping |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104239838A (en) * | 2013-06-19 | 2014-12-24 | 广州市人民印刷厂股份有限公司 | Anti-fake verification method for color two-dimensional code with digital watermark |
US9654291B2 (en) | 2013-07-03 | 2017-05-16 | A.T Communications Co., Ltd. | Authentication server, authentication system, authentication method, and program |
CN104854597A (en) * | 2013-07-03 | 2015-08-19 | At信息股份有限公司 | Authentication server, authentication system, authentication method, and program |
CN104854597B (en) * | 2013-07-03 | 2017-03-08 | At信息股份有限公司 | Certificate server, Verification System and authentication method |
CN103414549A (en) * | 2013-07-16 | 2013-11-27 | 广东工业大学 | QR two-dimensional code binary image partition-based key varying chaotic encryption method |
CN103414549B (en) * | 2013-07-16 | 2016-12-28 | 广东工业大学 | A kind of QR two-dimensional code binary image partition becomes key chaos encrypting method |
CN104680218A (en) * | 2015-02-12 | 2015-06-03 | 航天信息股份有限公司 | Multi-space two-dimensional code, and generation method and decoding method of multi-space two-dimensional code |
CN104680218B (en) * | 2015-02-12 | 2018-07-31 | 航天信息股份有限公司 | A kind of more space two-dimensional codes and its generation, coding/decoding method |
CN105187428A (en) * | 2015-09-15 | 2015-12-23 | 重庆智韬信息技术中心 | Method for realizing third-party safety authentication detection of two-dimensional code |
CN105389708A (en) * | 2015-11-05 | 2016-03-09 | 成都天星印务股份有限公司 | Anti-counterfeiting method based on combination of digital watermark and two-dimensional code and verification method thereof |
CN107104790A (en) * | 2017-03-20 | 2017-08-29 | 上海师范大学 | Optical encryption method based on QR codes and array fingerprint key |
CN108921262A (en) * | 2018-04-26 | 2018-11-30 | 中国海洋大学 | A kind of three primary colours bar code and its generation and reading method |
CN109190339A (en) * | 2018-09-13 | 2019-01-11 | 中国农业银行股份有限公司 | A kind of webpage digital watermarking image generates, identification, Method of printing and device |
CN110570218A (en) * | 2018-09-13 | 2019-12-13 | 拍拍看(海南)人工智能有限公司 | genuine product responsibility insurance policy setting method and inquiry and registration system |
CN109740927A (en) * | 2018-12-29 | 2019-05-10 | 重庆工商大学融智学院 | The assessment of institution of higher learning's legal risk and crime prevention system |
CN109740927B (en) * | 2018-12-29 | 2023-04-18 | 重庆工商大学融智学院 | Legal risk assessment and prevention system for colleges and universities |
CN112016937A (en) * | 2019-09-01 | 2020-12-01 | 海南亚元防伪技术研究所(有限合伙) | Insurance fidelity anti-fake method and its mark |
CN111489173A (en) * | 2020-03-03 | 2020-08-04 | 四川飨誉食界供应链管理有限公司 | Food safety tracing system and method based on full ecological monitoring |
Also Published As
Publication number | Publication date |
---|---|
CN103049779B (en) | 2016-12-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103049779B (en) | The generation of food safety liability insurance electronic insurance policy two-dimension code credential and recognition methods | |
JP7093352B2 (en) | Composite 2D barcodes, digital certificate media, generators, readers and methods | |
Sahu et al. | Improving grayscale steganography to protect personal information disclosure within hotel services | |
CN104077624A (en) | Methods and systems for generating and checking electronic note with anti-counterfeiting two-dimension code | |
US20050273628A1 (en) | Registration and Verification System | |
WO2020006540A1 (en) | System and method for facilitating legal review for commercial loan transactions | |
Uzougbo et al. | Enhancing consumer protection in cryptocurrency transactions: legal strategies and policy recommendations | |
US20190095595A1 (en) | Data Watermarking and Fingerprinting System and Method | |
Lou et al. | Construction information authentication and integrity using blockchain-oriented watermarking techniques | |
CN117314424B (en) | Block chain transaction system and method for big financial data | |
CN1691087B (en) | System and method for decoding digital coding image | |
Shope | The bill of lading on the blockchain: an analysis of its compatibility with international rules on commercial transactions | |
Arora et al. | Privacy Protection of Digital Images Using Watermarking and QR Code‐based Visual Cryptography | |
Kapadia | Blockchain Technology: Application in the Financial Industry. | |
Sale et al. | Graduation certificate verification model: a preliminary study | |
Karim et al. | Identifying and overcoming the risk of fraud in the Malaysian electronic land administration system | |
Mantoro et al. | Real-time printed document authentication using watermarked qr code | |
CN116566624B (en) | Processing method for electronic seal encryption and decryption reverse true verification | |
Mandolkar | RSE for electronic text document protection | |
US11816756B1 (en) | Anti-leak digital document marking system and method using distributed ledger | |
TWI518598B (en) | A barcode tamper-proofing system and method thereof | |
Das | An article on Food Supply Chain: find risk of system disruptions through Blockchain Technology | |
Abbasi et al. | Information security in e-commerce law | |
Bagherian et al. | The Role of Electronic Signature in the Third Millennium of the Development of International Trade Transactions | |
Wu et al. | An Innovative Method for Securing QR Codes against Counterfeits in Supply Chain Management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Liu Zexi Inventor after: Liu Yang Inventor after: Zheng Yingna Inventor before: Zheng Yingna Inventor before: Liu Yang |
|
COR | Change of bibliographic data | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20161228 Termination date: 20171231 |
|
CF01 | Termination of patent right due to non-payment of annual fee |