CN103106429A - Single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark - Google Patents

Single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark Download PDF

Info

Publication number
CN103106429A
CN103106429A CN2013100221866A CN201310022186A CN103106429A CN 103106429 A CN103106429 A CN 103106429A CN 2013100221866 A CN2013100221866 A CN 2013100221866A CN 201310022186 A CN201310022186 A CN 201310022186A CN 103106429 A CN103106429 A CN 103106429A
Authority
CN
China
Prior art keywords
binary system
binary
group
variable
trade mark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013100221866A
Other languages
Chinese (zh)
Other versions
CN103106429B (en
Inventor
郭庆云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN201310022186.6A priority Critical patent/CN103106429B/en
Publication of CN103106429A publication Critical patent/CN103106429A/en
Application granted granted Critical
Publication of CN103106429B publication Critical patent/CN103106429B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

Provided is a single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark. The single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark is capable of transforming binary system anti-fake information into a binary system modulating signal through ternary variable circulation encryption and channel coding, capable of embedding anti-fake information into the whole trademark page by changing conductivity of an amplitude modulation website in a circulation look-up table modulation method, capable of identifying the anti-fake information from any fragment when a trademark is identified and capable of being used in various anti-fake trademarks.

Description

Single variable parameter transmutation ternary variable circulates anti-fake information storage trademark
Art:
The present invention relates to a kind of anti-false trademark, particularly a kind of single variable parameter transmutation ternary variable circulation anti-fake information storage trademark, binary system encryption anti-fake information can be stored on the trade mark page and realize the false proof of trade mark by the trade mark, the trade mark can be used for extensive stock it is false proof in.
Background technology:
Anti-false trademark, also known as antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, are a kind of proof labels discerned the false from the genuine, prevent personation, are mark true and false, that distinguish marketing quality quality of the people for distinguishing merchandise resources during commodity circulation.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and the interests of client.The trade mark of China is audaciously innovated; employ laser anti-counterfeit, core micropore are false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but false proof is high-tech trial of strength with struggle that is faking; advanced anti-counterfeiting technology has certain ageing again; so; trade mark anti-fake technique must constantly be lifted; could be false proof with being maintained the leading position forever in faking, this is also the basic assurance for protecting the interests of businessman and client to maintain commodity circulation safety.
The content of the invention:
In order to improve the reliability and security of trademark anti-counterfeit, the present invention is improved existing trade mark anti-fake technique for the deficiency that existing trademark anti-counterfeit is present, propose a kind of anti-counterfeiting information storage trade mark, the trade mark passes through the change to amplitude electric conductivity in brand printing, encryption anti-fake information is embedded on the whole trade mark page in binary system coded signal form, encryption anti-fake information can be recognized in any one fragment in brand recognition, therefore with very strong disguised and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information stores trade mark, is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, the image and word on trade mark page paper are made up of amplitude,
According to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, and the horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
The horizontal scanning line being printed on trade mark page paper has N bars, the column scan line being printed on trade mark page paper has M bars, the amplitude being printed on trade mark page paper is divided into N rows M row on trade mark paper, amplitude is neat arranged in arrays on trade mark page paper paper, i is allowed to take 1 to arrive N, j is allowed to take 1 to arrive M, j-th strip column scan line on trade mark page paper is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper, i-th horizontal scanning line on trade mark page paper is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper
When the binary message for needing to store the trade mark page is read, the 1st article on trade mark page paper is set to high level successively to the N articles horizontal scanning line,
When the 1st article of horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported with 0,1 code form from the 1st bar of column scan line to the M bars column scan line, the amplitude that the 1st row on trade mark page paper is printed by electrically conductive ink exports binary message 1, the amplitude that the 1st row on trade mark page paper is printed by dielectric ink exports binary message 0, above-mentioned readout is repeated to other rows on trade mark page paper
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 2013100221866100002DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and binary system encryption parameter is denoted as respectively
Figure 2013100221866100002DEST_PATH_IMAGE002
Figure DEST_PATH_IMAGE004
Figure DEST_PATH_IMAGE005
Figure DEST_PATH_IMAGE006
Figure DEST_PATH_IMAGE008
With
Figure DEST_PATH_IMAGE009
, encryption parameter
Figure 991757DEST_PATH_IMAGE002
Figure 846580DEST_PATH_IMAGE003
Figure 564000DEST_PATH_IMAGE004
Figure 395428DEST_PATH_IMAGE005
Figure 147483DEST_PATH_IMAGE006
Figure 907629DEST_PATH_IMAGE007
Figure 112345DEST_PATH_IMAGE008
WithFor 0 to 256 binary system positive integer, binary system encryption variables are denoted as q, j, d, e, f, g, h, r and p, encryption variables q, j, d, e, f, g, h, r and p are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure DEST_PATH_IMAGE010
Figure DEST_PATH_IMAGE011
Figure DEST_PATH_IMAGE013
Figure DEST_PATH_IMAGE014
Figure DEST_PATH_IMAGE015
Figure DEST_PATH_IMAGE016
Figure DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 433144DEST_PATH_IMAGE011
Figure 125156DEST_PATH_IMAGE012
Figure 260920DEST_PATH_IMAGE014
Figure 519097DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 100251DEST_PATH_IMAGE010
Figure 868706DEST_PATH_IMAGE011
Figure 987469DEST_PATH_IMAGE014
Figure 195334DEST_PATH_IMAGE015
Figure 83656DEST_PATH_IMAGE016
Figure 903844DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 256328DEST_PATH_IMAGE010
Figure 136560DEST_PATH_IMAGE011
Figure 13642DEST_PATH_IMAGE012
Figure 371942DEST_PATH_IMAGE013
Figure 782195DEST_PATH_IMAGE014
Figure 833328DEST_PATH_IMAGE015
Figure 758558DEST_PATH_IMAGE016
Figure 419085DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 418265DEST_PATH_IMAGE010
Figure 640298DEST_PATH_IMAGE011
Figure 990508DEST_PATH_IMAGE012
Figure 698418DEST_PATH_IMAGE015
Figure 535924DEST_PATH_IMAGE016
Figure 538252DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 777604DEST_PATH_IMAGE010
Figure 75861DEST_PATH_IMAGE011
Figure 400663DEST_PATH_IMAGE012
Figure 209613DEST_PATH_IMAGE013
Figure 37891DEST_PATH_IMAGE014
Figure 772629DEST_PATH_IMAGE015
Figure 928859DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 877223DEST_PATH_IMAGE010
Figure 845179DEST_PATH_IMAGE011
Figure 878994DEST_PATH_IMAGE012
Figure 528281DEST_PATH_IMAGE013
Figure 826758DEST_PATH_IMAGE014
Figure 903298DEST_PATH_IMAGE015
Figure 424409DEST_PATH_IMAGE016
Figure 611808DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 597082DEST_PATH_IMAGE010
Figure 343059DEST_PATH_IMAGE011
Figure 351466DEST_PATH_IMAGE012
Figure 120019DEST_PATH_IMAGE014
Figure 332268DEST_PATH_IMAGE016
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 759018DEST_PATH_IMAGE010
Figure 348262DEST_PATH_IMAGE011
Figure 162689DEST_PATH_IMAGE013
Figure 649166DEST_PATH_IMAGE014
Figure 674890DEST_PATH_IMAGE015
Be respectively defined as+, ×, × ,-,+,-,-, ×, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure DEST_PATH_IMAGE018
Figure DEST_PATH_IMAGE019
Figure 446743DEST_PATH_IMAGE011
Figure DEST_PATH_IMAGE020
Figure 138756DEST_PATH_IMAGE012
Figure 813451DEST_PATH_IMAGE019
Figure 775984DEST_PATH_IMAGE013
Figure 971845DEST_PATH_IMAGE015
Figure 552999DEST_PATH_IMAGE019
Figure 825848DEST_PATH_IMAGE016
Figure 571267DEST_PATH_IMAGE017
Figure 502533DEST_PATH_IMAGE019
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure DEST_PATH_IMAGE022
Figure 883967DEST_PATH_IMAGE010
Figure 37868DEST_PATH_IMAGE020
Figure 526990DEST_PATH_IMAGE012
Figure 902608DEST_PATH_IMAGE021
Figure 762373DEST_PATH_IMAGE013
Figure 172625DEST_PATH_IMAGE022
Figure DEST_PATH_IMAGE023
Figure 821093DEST_PATH_IMAGE015
Figure 481619DEST_PATH_IMAGE022
Figure 746378DEST_PATH_IMAGE016
Figure 968412DEST_PATH_IMAGE022
Figure 318622DEST_PATH_IMAGE017
Figure 514330DEST_PATH_IMAGE022
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure DEST_PATH_IMAGE024
Figure 571279DEST_PATH_IMAGE010
Figure 866366DEST_PATH_IMAGE021
Figure 840138DEST_PATH_IMAGE012
Figure 403975DEST_PATH_IMAGE024
Figure 728777DEST_PATH_IMAGE013
Figure 272147DEST_PATH_IMAGE023
Figure 366005DEST_PATH_IMAGE014
Figure 163060DEST_PATH_IMAGE024
Figure 709579DEST_PATH_IMAGE015
Figure DEST_PATH_IMAGE025
Figure 953139DEST_PATH_IMAGE024
Figure 858779DEST_PATH_IMAGE017
Figure 892594DEST_PATH_IMAGE024
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure DEST_PATH_IMAGE026
Figure 843287DEST_PATH_IMAGE026
Figure 919827DEST_PATH_IMAGE011
Figure 440939DEST_PATH_IMAGE026
Figure 70337DEST_PATH_IMAGE023
Figure 388503DEST_PATH_IMAGE026
Figure 379593DEST_PATH_IMAGE014
Figure 655591DEST_PATH_IMAGE025
Figure 73934DEST_PATH_IMAGE015
Figure 304058DEST_PATH_IMAGE026
Figure 98839DEST_PATH_IMAGE016
Figure 232273DEST_PATH_IMAGE027
Figure 821518DEST_PATH_IMAGE017
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure DEST_PATH_IMAGE028
Figure 60104DEST_PATH_IMAGE028
Figure 85829DEST_PATH_IMAGE011
Figure 290545DEST_PATH_IMAGE028
Figure 657155DEST_PATH_IMAGE012
Figure 326033DEST_PATH_IMAGE028
Figure 949093DEST_PATH_IMAGE025
Figure 889367DEST_PATH_IMAGE014
Figure 848970DEST_PATH_IMAGE028
Figure 950919DEST_PATH_IMAGE015
Figure 130227DEST_PATH_IMAGE027
Figure 608613DEST_PATH_IMAGE016
Figure 425653DEST_PATH_IMAGE028
Figure 964081DEST_PATH_IMAGE017
Figure DEST_PATH_IMAGE029
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure DEST_PATH_IMAGE030
Figure 302790DEST_PATH_IMAGE010
Figure DEST_PATH_IMAGE031
Figure 21085DEST_PATH_IMAGE011
Figure 456746DEST_PATH_IMAGE031
Figure 116714DEST_PATH_IMAGE031
Figure 432508DEST_PATH_IMAGE013
Figure 722675DEST_PATH_IMAGE031
Figure 337327DEST_PATH_IMAGE014
Figure 712945DEST_PATH_IMAGE027
Figure 835359DEST_PATH_IMAGE015
Figure 980033DEST_PATH_IMAGE031
Figure 31165DEST_PATH_IMAGE016
Figure 894079DEST_PATH_IMAGE029
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure DEST_PATH_IMAGE032
Figure DEST_PATH_IMAGE034
Figure 502860DEST_PATH_IMAGE011
Figure 228555DEST_PATH_IMAGE012
Figure 621490DEST_PATH_IMAGE032
Figure 458996DEST_PATH_IMAGE013
Figure 464255DEST_PATH_IMAGE032
Figure 438027DEST_PATH_IMAGE014
Figure 123403DEST_PATH_IMAGE015
Figure 758019DEST_PATH_IMAGE032
Figure 304538DEST_PATH_IMAGE017
Figure 150134DEST_PATH_IMAGE030
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 594104DEST_PATH_IMAGE034
Figure 562060DEST_PATH_IMAGE010
Figure DEST_PATH_IMAGE035
Figure 533558DEST_PATH_IMAGE011
Figure DEST_PATH_IMAGE037
Figure 619064DEST_PATH_IMAGE012
Figure 764054DEST_PATH_IMAGE013
Figure 911712DEST_PATH_IMAGE014
Figure 82111DEST_PATH_IMAGE015
Figure 261157DEST_PATH_IMAGE035
Figure 252247DEST_PATH_IMAGE016
Figure 29710DEST_PATH_IMAGE030
Figure 510370DEST_PATH_IMAGE017
Figure 501679DEST_PATH_IMAGE035
, set encryption parameter
Figure 30880DEST_PATH_IMAGE002
Figure 928429DEST_PATH_IMAGE003
Figure 517673DEST_PATH_IMAGE004
Figure 671312DEST_PATH_IMAGE005
Figure 4204DEST_PATH_IMAGE006
Figure 756259DEST_PATH_IMAGE007
Figure 17870DEST_PATH_IMAGE008
With
Figure 222586DEST_PATH_IMAGE009
Initial value, setting encryption variables q, j, d, e, f, g, h, r and p initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 359169DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure DEST_PATH_IMAGE038
Carry out H1=
Figure DEST_PATH_IMAGE039
Figure 80799DEST_PATH_IMAGE019
Figure 772812DEST_PATH_IMAGE011
Figure 713086DEST_PATH_IMAGE040
Figure 672689DEST_PATH_IMAGE012
Figure 953946DEST_PATH_IMAGE013
Figure 494649DEST_PATH_IMAGE042
Figure 810224DEST_PATH_IMAGE014
Figure 268721DEST_PATH_IMAGE015
Figure 550798DEST_PATH_IMAGE019
Figure 720879DEST_PATH_IMAGE016
Figure 928744DEST_PATH_IMAGE019
Ternary variable circulation cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 989738DEST_PATH_IMAGE038
Carry out H1=
Figure 869969DEST_PATH_IMAGE039
Figure 747052DEST_PATH_IMAGE010
Figure 370931DEST_PATH_IMAGE019
Figure 515605DEST_PATH_IMAGE011
Figure 566738DEST_PATH_IMAGE040
Figure 928186DEST_PATH_IMAGE012
Figure 90178DEST_PATH_IMAGE019
Figure 354937DEST_PATH_IMAGE013
Figure 311391DEST_PATH_IMAGE042
Figure 122889DEST_PATH_IMAGE019
Figure 242155DEST_PATH_IMAGE015
Figure 635090DEST_PATH_IMAGE019
Figure 269333DEST_PATH_IMAGE016
Figure 511014DEST_PATH_IMAGE017
Figure 74850DEST_PATH_IMAGE019
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while ternary variable circulation cryptographic calculation, next ternary variable circulation cryptographic calculation is pointed to H2=
Figure 134073DEST_PATH_IMAGE022
Figure 943022DEST_PATH_IMAGE010
Figure 2013100221866100002DEST_PATH_IMAGE043
Figure 974564DEST_PATH_IMAGE011
Figure 709301DEST_PATH_IMAGE022
Figure 318137DEST_PATH_IMAGE012
Figure 662269DEST_PATH_IMAGE044
Figure 610633DEST_PATH_IMAGE013
Figure 516272DEST_PATH_IMAGE022
Figure 550087DEST_PATH_IMAGE014
Figure DEST_PATH_IMAGE046
Figure 694980DEST_PATH_IMAGE015
Figure 497851DEST_PATH_IMAGE022
Figure 574391DEST_PATH_IMAGE016
Figure 95502DEST_PATH_IMAGE022
Figure 47016DEST_PATH_IMAGE017
Figure 704393DEST_PATH_IMAGE022
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure DEST_PATH_IMAGE047
Carry out H2=
Figure 889518DEST_PATH_IMAGE022
Figure 399390DEST_PATH_IMAGE010
Figure 390480DEST_PATH_IMAGE043
Figure 167943DEST_PATH_IMAGE011
Figure 580525DEST_PATH_IMAGE012
Figure 109726DEST_PATH_IMAGE044
Figure 741696DEST_PATH_IMAGE013
Figure 596519DEST_PATH_IMAGE022
Figure 809545DEST_PATH_IMAGE014
Figure 142437DEST_PATH_IMAGE046
Figure 894493DEST_PATH_IMAGE015
Figure 357890DEST_PATH_IMAGE016
Figure 556790DEST_PATH_IMAGE022
Figure 163352DEST_PATH_IMAGE017
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while ternary variable circulation cryptographic calculation, next ternary variable circulation cryptographic calculation is pointed to H3=
Figure 962571DEST_PATH_IMAGE010
Figure 423639DEST_PATH_IMAGE024
Figure 970475DEST_PATH_IMAGE012
Figure 681817DEST_PATH_IMAGE024
Figure 262971DEST_PATH_IMAGE013
Figure DEST_PATH_IMAGE049
Figure 473504DEST_PATH_IMAGE014
Figure 471651DEST_PATH_IMAGE024
Figure 488149DEST_PATH_IMAGE015
Figure 861493DEST_PATH_IMAGE016
Figure 69358DEST_PATH_IMAGE024
Figure 19996DEST_PATH_IMAGE017
Figure 840185DEST_PATH_IMAGE024
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this ternary variable circulation cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesCarry out ternary variable circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, valid certificates can be provided for true trade mark, there is stronger anti-forgery ability simultaneously.
To solve above-mentioned technical problem, processing is digitized to image false-proof information and character anti-counterfeiting information first, the binary system anti-counterfeiting information table of 8 one group of generation, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, ternary variable circulation cryptographic calculation is carried out to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables, the binary system encryption anti-fake information table of 32 one group of generation, pass through channel coding using 32 binary system encryption anti-fake informations in binary system encryption anti-fake information table, 32 one group of binary modulated signal of the generation with error detecting and error correcting function, channel coding can use loop coding, convolutional encoding or Turbo coding diversified forms, picture signal is adjusted to be handled by rasterizing trade mark page original continuous(RIP)Halftoning hybrid screening picture signal is exported with hybrid screening, including amplitude and FM screened image signal, the electric conductivity of amplitude in hybrid screening picture signal is modulated using circulation look-up table modulation system using 32 one group of binary modulated signals of generation, make the electric conductivity of amplitude according to dielectric ink amplitude and electrically conductive ink amplitude is regular changes, adjacent 32 amplitudes in hybrid screening picture signal are made to carry 32 binary system anti-counterfeiting information by the change of electric conductivity, so as to generate the hybrid screening picture signal of the embedded anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, trade mark page site electric conductivity signal is gathered first, by the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding, decrypts i-th group of 32 binary message in anti-counterfeiting information table by binary system and is denoted as Mi
Binary system is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, set encryption parameter
Figure 10583DEST_PATH_IMAGE002
Figure 887666DEST_PATH_IMAGE003
Figure 245966DEST_PATH_IMAGE004
Figure 656218DEST_PATH_IMAGE005
Figure 707351DEST_PATH_IMAGE006
Figure 68800DEST_PATH_IMAGE007
With
Figure 229971DEST_PATH_IMAGE009
Initial value for encryption when initial value, initial value when setting encryption variables q, j, d, e, f, g, h, r and p initial value as encryption, it is k=0 that binary operator, which controls variable k initial value design, by ternary variable circulation ciphering process, and it is M that binary operator, which controls decryption computing during variable k=0,i=
Figure 452005DEST_PATH_IMAGE018
Figure 382768DEST_PATH_IMAGE011
Figure 510124DEST_PATH_IMAGE020
Figure 846165DEST_PATH_IMAGE012
Figure 651627DEST_PATH_IMAGE013
Figure 949885DEST_PATH_IMAGE021
Figure 274687DEST_PATH_IMAGE014
Figure 911915DEST_PATH_IMAGE015
Figure 646653DEST_PATH_IMAGE019
Figure 193172DEST_PATH_IMAGE016
Figure 802882DEST_PATH_IMAGE019
Figure 656886DEST_PATH_IMAGE019
, it is M that binary operator, which controls decryption computing during variable k=1,i=
Figure 835593DEST_PATH_IMAGE010
Figure 715005DEST_PATH_IMAGE011
Figure 236116DEST_PATH_IMAGE022
Figure 922050DEST_PATH_IMAGE012
Figure 92448DEST_PATH_IMAGE013
Figure 100856DEST_PATH_IMAGE022
Figure 154262DEST_PATH_IMAGE014
Figure 433190DEST_PATH_IMAGE023
Figure 851533DEST_PATH_IMAGE015
Figure 81657DEST_PATH_IMAGE022
Figure 876438DEST_PATH_IMAGE016
Figure 6943DEST_PATH_IMAGE022
Figure 596187DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=2,i=
Figure 974396DEST_PATH_IMAGE024
Figure 644893DEST_PATH_IMAGE010
Figure 670618DEST_PATH_IMAGE024
Figure 875334DEST_PATH_IMAGE011
Figure 11918DEST_PATH_IMAGE021
Figure 871943DEST_PATH_IMAGE012
Figure 760582DEST_PATH_IMAGE013
Figure 497594DEST_PATH_IMAGE023
Figure 738454DEST_PATH_IMAGE015
Figure 216840DEST_PATH_IMAGE025
Figure 797994DEST_PATH_IMAGE016
Figure 133160DEST_PATH_IMAGE024
Figure 301230DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=3,i=
Figure 753388DEST_PATH_IMAGE026
Figure 197139DEST_PATH_IMAGE010
Figure 959930DEST_PATH_IMAGE026
Figure 840161DEST_PATH_IMAGE012
Figure 711385DEST_PATH_IMAGE023
Figure 69685DEST_PATH_IMAGE013
Figure 479937DEST_PATH_IMAGE026
Figure 788931DEST_PATH_IMAGE015
Figure 53690DEST_PATH_IMAGE026
Figure 275724DEST_PATH_IMAGE016
Figure 127399DEST_PATH_IMAGE027
Figure 827502DEST_PATH_IMAGE017
Figure 9084DEST_PATH_IMAGE026
, it is M that binary operator, which controls decryption computing during variable k=4,i=
Figure 402019DEST_PATH_IMAGE028
Figure 239525DEST_PATH_IMAGE010
Figure 241854DEST_PATH_IMAGE028
Figure 215626DEST_PATH_IMAGE011
Figure 779463DEST_PATH_IMAGE028
Figure 104265DEST_PATH_IMAGE012
Figure 208487DEST_PATH_IMAGE028
Figure 797951DEST_PATH_IMAGE013
Figure 532688DEST_PATH_IMAGE025
Figure 190383DEST_PATH_IMAGE028
Figure 637283DEST_PATH_IMAGE015
Figure 542922DEST_PATH_IMAGE027
Figure 576737DEST_PATH_IMAGE016
Figure 960445DEST_PATH_IMAGE028
Figure 530360DEST_PATH_IMAGE017
Figure 606900DEST_PATH_IMAGE029
, it is M that binary operator, which controls decryption computing during variable k=5,i=
Figure 128011DEST_PATH_IMAGE030
Figure 315410DEST_PATH_IMAGE010
Figure 736902DEST_PATH_IMAGE031
Figure 984344DEST_PATH_IMAGE011
Figure 52138DEST_PATH_IMAGE031
Figure 820691DEST_PATH_IMAGE031
Figure 758077DEST_PATH_IMAGE013
Figure 988201DEST_PATH_IMAGE031
Figure 782982DEST_PATH_IMAGE014
Figure 414952DEST_PATH_IMAGE027
Figure 502731DEST_PATH_IMAGE015
Figure 485730DEST_PATH_IMAGE031
Figure 818623DEST_PATH_IMAGE016
Figure 832289DEST_PATH_IMAGE017
Figure 37005DEST_PATH_IMAGE031
, it is M that binary operator, which controls decryption computing during variable k=6,i=
Figure 908009DEST_PATH_IMAGE032
Figure 576888DEST_PATH_IMAGE010
Figure 773514DEST_PATH_IMAGE034
Figure 698482DEST_PATH_IMAGE011
Figure 201773DEST_PATH_IMAGE032
Figure 876687DEST_PATH_IMAGE013
Figure 417390DEST_PATH_IMAGE032
Figure 732965DEST_PATH_IMAGE014
Figure 672419DEST_PATH_IMAGE015
Figure 453031DEST_PATH_IMAGE029
Figure 548660DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=7,i=
Figure 160480DEST_PATH_IMAGE034
Figure 150750DEST_PATH_IMAGE035
Figure 774629DEST_PATH_IMAGE011
Figure 417838DEST_PATH_IMAGE037
Figure 331884DEST_PATH_IMAGE035
Figure 254240DEST_PATH_IMAGE035
Figure 476274DEST_PATH_IMAGE014
Figure 560905DEST_PATH_IMAGE035
Figure 526587DEST_PATH_IMAGE015
Figure 144388DEST_PATH_IMAGE035
Figure 537323DEST_PATH_IMAGE016
Figure 374829DEST_PATH_IMAGE030
Figure 878623DEST_PATH_IMAGE017
Figure 353860DEST_PATH_IMAGE035
, first M from binary system decryption anti-counterfeiting information table1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiCorresponding decryption computing is carried out, binary system anti-counterfeiting information is solved
Figure 917696DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 is the overall structure figure of the present invention.
Fig. 2 is A-A sectional views of the present invention.
Fig. 3 loads anti-counterfeiting information flow chart.
Fig. 4 extracts anti-counterfeiting information flow chart.
Embodiment
As in Fig. 1 and Fig. 2, anti-fake information storage trademark, it is made up of trade mark page paper 7-1, amplitude 6-1 to the 6-150 being printed on trade mark page paper 7-1, horizontal scanning line 1-1 to the 1-15 being printed on trade mark page paper 7-1, column scan line 2-1 to the 2-10 being printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 are made up of amplitude 6-1 to 6-150
According to storage binary system encryption anti-fake information, a part of amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, another part amplitude on trade mark page paper 7-1 is formed by dielectric ink printing, horizontal scanning line 1-1 to 1-15 and column scan line 2-1 to 2-10 on trade mark page paper 7-1 are formed by the printing of electrically conducting transparent ink
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, and the light amplitude on trade mark page paper 7-1 is formed by dielectric ink printing,
The amplitude being printed on trade mark page paper 7-1 is divided into 15 rows 10 on trade mark paper and arranged, amplitude 6-1 to 6-150 is neat arranged in arrays on trade mark page paper 7-1, i is allowed to take 1 to 15, j is allowed to take 1 to 10, j-th strip column scan line on trade mark page paper 7-1 is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper 7-1, i-th horizontal scanning line on trade mark page paper 7-1 is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper 7-1
When the binary system encryption anti-fake information for needing to store the trade mark page is read, the 1st article of horizontal scanning line on trade mark page paper 7-1 is set to high level successively to the 15th article of horizontal scanning line,
When the 1st article of horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary system encryption anti-fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is exported from the 1st bar of column scan line to the 10th bar of column scan line, the 1st row on trade mark page paper 7-1 exports binary message 1 by electrically conductive ink printing into amplitude, the 1st row on trade mark page paper 7-1 exports binary message 0 by dielectric ink printing into amplitude, therefore the binary system encryption anti-fake information 1100001000 that the 1st row is read, above-mentioned readout is repeated to other rows on trade mark page paper 7-1.
In loading anti-counterfeiting information flow chart 3, original anti-counterfeiting information(Image, word)It is digitized into processing, the binary system anti-counterfeiting information table of 8 one group of generation, 8 one group of binary messages in binary system anti-counterfeiting information table are expanded into 32 one group of binary messages, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary message in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 39236DEST_PATH_IMAGE001
, i is the positive integer more than 0, from first 32 binary system encryption anti-fake information in 32 one group of binary system anti-counterfeiting information tables
Figure 346720DEST_PATH_IMAGE038
Start, to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesCarry out ternary variable circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize that trademark anti-counterfeit prints, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, realize trademark anti-counterfeit.
In anti-counterfeiting information flow chart 4 is extracted, when extracting anti-counterfeiting information, the electric conductivity signal of trade mark page halftone dot image is gathered first, by the electric conductivity identification to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding.
The binary system generated after decoding is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting the initial value of encryption parameter as encryption, initial value when setting the initial value of encryption variables as encryption, it is k=0 that binary operator, which controls variable k initial value design, first M from the binary system decryption anti-counterfeiting information table of generation1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiComputing is decrypted, binary system anti-counterfeiting information is solved
Figure 611534DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.

Claims (1)

1. a kind of generate binary modulated signal by anti-counterfeiting information by cryptographic calculation and channel coding, and the single variable parameter transmutation ternary variable being embedded in anti-counterfeiting information in full page by circulating tabling look-up modulation mode circulates anti-fake information storage trademark,It is characterized in that:Anti-counterfeiting information stores trade mark, it is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, according to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and binary system encryption parameter is denoted as respectively
Figure 926639DEST_PATH_IMAGE002
Figure 875003DEST_PATH_IMAGE003
Figure 780642DEST_PATH_IMAGE004
Figure 814457DEST_PATH_IMAGE005
Figure 962280DEST_PATH_IMAGE006
Figure 30730DEST_PATH_IMAGE007
Figure 107270DEST_PATH_IMAGE008
With, encryption parameter
Figure 878097DEST_PATH_IMAGE002
Figure 320097DEST_PATH_IMAGE003
Figure 567538DEST_PATH_IMAGE004
Figure 310366DEST_PATH_IMAGE005
Figure 301456DEST_PATH_IMAGE006
Figure 577455DEST_PATH_IMAGE007
With
Figure 491501DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, binary system encryption variables are denoted as q, j, d, e, f, g, h, r and p, encryption variables q, j, d, e, f, g, h, r and p are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 419716DEST_PATH_IMAGE011
Figure 8960DEST_PATH_IMAGE012
Figure 59273DEST_PATH_IMAGE014
Figure 309864DEST_PATH_IMAGE015
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 411309DEST_PATH_IMAGE010
Figure 513476DEST_PATH_IMAGE011
Figure 136535DEST_PATH_IMAGE013
Figure 76810DEST_PATH_IMAGE014
Figure 36413DEST_PATH_IMAGE015
Figure 138361DEST_PATH_IMAGE016
Figure 317670DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 613095DEST_PATH_IMAGE011
Figure 151524DEST_PATH_IMAGE012
Figure 552550DEST_PATH_IMAGE013
Figure 212573DEST_PATH_IMAGE016
Figure 100895DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 921083DEST_PATH_IMAGE010
Figure 706855DEST_PATH_IMAGE011
Figure 587087DEST_PATH_IMAGE012
Figure 962704DEST_PATH_IMAGE013
Figure 586584DEST_PATH_IMAGE014
Figure 229793DEST_PATH_IMAGE015
Figure 280925DEST_PATH_IMAGE016
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 305830DEST_PATH_IMAGE010
Figure 72054DEST_PATH_IMAGE011
Figure 28509DEST_PATH_IMAGE012
Figure 378719DEST_PATH_IMAGE013
Figure 962202DEST_PATH_IMAGE015
Figure 927064DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 430857DEST_PATH_IMAGE010
Figure 729651DEST_PATH_IMAGE012
Figure 788873DEST_PATH_IMAGE013
Figure 96358DEST_PATH_IMAGE014
Figure 423489DEST_PATH_IMAGE016
Figure 970008DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 265433DEST_PATH_IMAGE011
Figure 171073DEST_PATH_IMAGE012
Figure 204888DEST_PATH_IMAGE013
Figure 854175DEST_PATH_IMAGE014
Figure 155581DEST_PATH_IMAGE015
Figure 753233DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 206211DEST_PATH_IMAGE010
Figure 382631DEST_PATH_IMAGE011
Figure 638480DEST_PATH_IMAGE013
Figure 629570DEST_PATH_IMAGE014
Figure 323911DEST_PATH_IMAGE016
Figure 819614DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 348816DEST_PATH_IMAGE010
Figure 482250DEST_PATH_IMAGE011
Figure 54494DEST_PATH_IMAGE013
Figure 637977DEST_PATH_IMAGE015
Figure 398123DEST_PATH_IMAGE016
Be respectively defined as+, ×, × ,-,+,-,-, ×, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 739422DEST_PATH_IMAGE018
Figure 841590DEST_PATH_IMAGE010
Figure 464649DEST_PATH_IMAGE011
Figure 139344DEST_PATH_IMAGE020
Figure 98947DEST_PATH_IMAGE012
Figure 466475DEST_PATH_IMAGE019
Figure 645783DEST_PATH_IMAGE013
Figure 858590DEST_PATH_IMAGE021
Figure 941209DEST_PATH_IMAGE014
Figure 214059DEST_PATH_IMAGE019
Figure 897161DEST_PATH_IMAGE019
Figure 540686DEST_PATH_IMAGE019
Figure 429008DEST_PATH_IMAGE017
Figure 249197DEST_PATH_IMAGE019
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 34969DEST_PATH_IMAGE022
Figure 915200DEST_PATH_IMAGE010
Figure 290818DEST_PATH_IMAGE020
Figure 649118DEST_PATH_IMAGE011
Figure 557906DEST_PATH_IMAGE022
Figure 609039DEST_PATH_IMAGE012
Figure 633944DEST_PATH_IMAGE013
Figure 134588DEST_PATH_IMAGE022
Figure 356622DEST_PATH_IMAGE014
Figure 706832DEST_PATH_IMAGE023
Figure 672514DEST_PATH_IMAGE015
Figure 290315DEST_PATH_IMAGE022
Figure 255177DEST_PATH_IMAGE022
Figure 758971DEST_PATH_IMAGE017
Figure 493928DEST_PATH_IMAGE022
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 792185DEST_PATH_IMAGE024
Figure 116987DEST_PATH_IMAGE010
Figure 424472DEST_PATH_IMAGE024
Figure 751285DEST_PATH_IMAGE011
Figure 486023DEST_PATH_IMAGE021
Figure 32542DEST_PATH_IMAGE012
Figure 143718DEST_PATH_IMAGE024
Figure 499186DEST_PATH_IMAGE023
Figure 533001DEST_PATH_IMAGE014
Figure 483694DEST_PATH_IMAGE015
Figure 560235DEST_PATH_IMAGE025
Figure 268745DEST_PATH_IMAGE024
Figure 770686DEST_PATH_IMAGE024
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 770183DEST_PATH_IMAGE010
Figure 133797DEST_PATH_IMAGE026
Figure 424183DEST_PATH_IMAGE012
Figure 56153DEST_PATH_IMAGE023
Figure 645397DEST_PATH_IMAGE013
Figure 459824DEST_PATH_IMAGE014
Figure 946300DEST_PATH_IMAGE025
Figure 34342DEST_PATH_IMAGE015
Figure 239058DEST_PATH_IMAGE026
Figure 218089DEST_PATH_IMAGE027
Figure 414715DEST_PATH_IMAGE017
Figure 106727DEST_PATH_IMAGE026
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 843739DEST_PATH_IMAGE028
Figure 304808DEST_PATH_IMAGE010
Figure 170870DEST_PATH_IMAGE028
Figure 84600DEST_PATH_IMAGE011
Figure 144139DEST_PATH_IMAGE012
Figure 912594DEST_PATH_IMAGE028
Figure 641516DEST_PATH_IMAGE013
Figure 658014DEST_PATH_IMAGE025
Figure 537425DEST_PATH_IMAGE028
Figure 189861DEST_PATH_IMAGE015
Figure 10049DEST_PATH_IMAGE027
Figure 300216DEST_PATH_IMAGE016
Figure 242765DEST_PATH_IMAGE028
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 888400DEST_PATH_IMAGE030
Figure 536867DEST_PATH_IMAGE031
Figure 197393DEST_PATH_IMAGE011
Figure 20075DEST_PATH_IMAGE031
Figure 242109DEST_PATH_IMAGE012
Figure 592319DEST_PATH_IMAGE031
Figure 292422DEST_PATH_IMAGE013
Figure 306087DEST_PATH_IMAGE014
Figure 143593DEST_PATH_IMAGE027
Figure 709704DEST_PATH_IMAGE015
Figure 683476DEST_PATH_IMAGE031
Figure 70650DEST_PATH_IMAGE029
Figure 112555DEST_PATH_IMAGE017
Figure 206413DEST_PATH_IMAGE031
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 460194DEST_PATH_IMAGE032
Figure 69030DEST_PATH_IMAGE010
Figure 180205DEST_PATH_IMAGE033
Figure 128570DEST_PATH_IMAGE011
Figure 504242DEST_PATH_IMAGE012
Figure 887950DEST_PATH_IMAGE032
Figure 956400DEST_PATH_IMAGE013
Figure 534406DEST_PATH_IMAGE032
Figure 55517DEST_PATH_IMAGE014
Figure 165872DEST_PATH_IMAGE015
Figure 911849DEST_PATH_IMAGE029
Figure 982573DEST_PATH_IMAGE016
Figure 973663DEST_PATH_IMAGE032
Figure 169469DEST_PATH_IMAGE030
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 895199DEST_PATH_IMAGE033
Figure 384266DEST_PATH_IMAGE034
Figure 973510DEST_PATH_IMAGE011
Figure 956510DEST_PATH_IMAGE018
Figure 787937DEST_PATH_IMAGE012
Figure 274414DEST_PATH_IMAGE034
Figure 300138DEST_PATH_IMAGE013
Figure 504855DEST_PATH_IMAGE034
Figure 877324DEST_PATH_IMAGE014
Figure 546202DEST_PATH_IMAGE034
Figure 742828DEST_PATH_IMAGE015
Figure 169262DEST_PATH_IMAGE034
Figure 109536DEST_PATH_IMAGE016
Figure 69139DEST_PATH_IMAGE030
Figure 171088DEST_PATH_IMAGE017
Figure 350396DEST_PATH_IMAGE034
, set encryption parameter
Figure 891099DEST_PATH_IMAGE002
Figure 206674DEST_PATH_IMAGE003
Figure 240708DEST_PATH_IMAGE004
Figure 641733DEST_PATH_IMAGE005
Figure 923810DEST_PATH_IMAGE006
Figure 359471DEST_PATH_IMAGE007
Figure 301757DEST_PATH_IMAGE008
With
Figure 517974DEST_PATH_IMAGE009
Initial value, setting encryption variables q, j, d, e, f, g, h, r and p initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 338163DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 628330DEST_PATH_IMAGE035
Carry out H1=
Figure 242982DEST_PATH_IMAGE036
Figure 120065DEST_PATH_IMAGE010
Figure 743944DEST_PATH_IMAGE019
Figure 888617DEST_PATH_IMAGE011
Figure 939750DEST_PATH_IMAGE037
Figure 864981DEST_PATH_IMAGE012
Figure 525507DEST_PATH_IMAGE019
Figure 662703DEST_PATH_IMAGE013
Figure 403780DEST_PATH_IMAGE038
Figure 488410DEST_PATH_IMAGE014
Figure 454092DEST_PATH_IMAGE019
Figure 573358DEST_PATH_IMAGE015
Figure 28610DEST_PATH_IMAGE019
Figure 364651DEST_PATH_IMAGE016
Figure 868445DEST_PATH_IMAGE019
Figure 842217DEST_PATH_IMAGE017
Figure 406054DEST_PATH_IMAGE019
Ternary variable circulation cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is rightCarry out H1=
Figure 274226DEST_PATH_IMAGE036
Figure 368084DEST_PATH_IMAGE010
Figure 711658DEST_PATH_IMAGE011
Figure 55789DEST_PATH_IMAGE037
Figure 4153DEST_PATH_IMAGE012
Figure 909793DEST_PATH_IMAGE019
Figure 943608DEST_PATH_IMAGE013
Figure 219267DEST_PATH_IMAGE014
Figure 295808DEST_PATH_IMAGE019
Figure 4318DEST_PATH_IMAGE019
Figure 416079DEST_PATH_IMAGE017
Figure 469486DEST_PATH_IMAGE019
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while ternary variable circulation cryptographic calculation, next ternary variable circulation cryptographic calculation is pointed to H2=
Figure 246949DEST_PATH_IMAGE022
Figure 166757DEST_PATH_IMAGE010
Figure 662460DEST_PATH_IMAGE039
Figure 191662DEST_PATH_IMAGE011
Figure 89211DEST_PATH_IMAGE022
Figure 740772DEST_PATH_IMAGE012
Figure 289620DEST_PATH_IMAGE013
Figure 801821DEST_PATH_IMAGE014
Figure 502142DEST_PATH_IMAGE041
Figure 638726DEST_PATH_IMAGE015
Figure 307604DEST_PATH_IMAGE022
Figure 238651DEST_PATH_IMAGE016
Figure 930664DEST_PATH_IMAGE022
Figure 369473DEST_PATH_IMAGE017
Figure 830542DEST_PATH_IMAGE022
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure DEST_PATH_IMAGE042
Carry out H2=
Figure 111798DEST_PATH_IMAGE010
Figure 91649DEST_PATH_IMAGE039
Figure 407224DEST_PATH_IMAGE011
Figure 945653DEST_PATH_IMAGE022
Figure 346678DEST_PATH_IMAGE012
Figure 297371DEST_PATH_IMAGE013
Figure 6701DEST_PATH_IMAGE022
Figure 829776DEST_PATH_IMAGE014
Figure 649965DEST_PATH_IMAGE041
Figure 940132DEST_PATH_IMAGE015
Figure 882680DEST_PATH_IMAGE022
Figure 258298DEST_PATH_IMAGE016
Figure 318395DEST_PATH_IMAGE022
Figure 525386DEST_PATH_IMAGE017
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while ternary variable circulation cryptographic calculation, next ternary variable circulation cryptographic calculation is pointed to H3=
Figure 896158DEST_PATH_IMAGE024
Figure 120466DEST_PATH_IMAGE010
Figure 385225DEST_PATH_IMAGE024
Figure 341680DEST_PATH_IMAGE011
Figure DEST_PATH_IMAGE043
Figure 128108DEST_PATH_IMAGE012
Figure 93790DEST_PATH_IMAGE024
Figure DEST_PATH_IMAGE044
Figure 605991DEST_PATH_IMAGE014
Figure 679383DEST_PATH_IMAGE024
Figure DEST_PATH_IMAGE045
Figure 544123DEST_PATH_IMAGE017
Figure 851607DEST_PATH_IMAGE024
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this ternary variable circulation cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 945465DEST_PATH_IMAGE001
Carry out ternary variable circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN201310022186.6A 2013-01-22 2013-01-22 Single variable parameter transmutation ternary variable circulation anti-fake information storage trademark Expired - Fee Related CN103106429B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310022186.6A CN103106429B (en) 2013-01-22 2013-01-22 Single variable parameter transmutation ternary variable circulation anti-fake information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310022186.6A CN103106429B (en) 2013-01-22 2013-01-22 Single variable parameter transmutation ternary variable circulation anti-fake information storage trademark

Publications (2)

Publication Number Publication Date
CN103106429A true CN103106429A (en) 2013-05-15
CN103106429B CN103106429B (en) 2015-10-28

Family

ID=48314275

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310022186.6A Expired - Fee Related CN103106429B (en) 2013-01-22 2013-01-22 Single variable parameter transmutation ternary variable circulation anti-fake information storage trademark

Country Status (1)

Country Link
CN (1) CN103106429B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101537751A (en) * 2009-04-10 2009-09-23 顾泽苍 Novel method for processing anti-counterfeit printing
US20100060942A1 (en) * 2008-09-10 2010-03-11 Xerox Corporation Encoding message data in a cover contone image via halftone dot orientation
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100060942A1 (en) * 2008-09-10 2010-03-11 Xerox Corporation Encoding message data in a cover contone image via halftone dot orientation
CN101537751A (en) * 2009-04-10 2009-09-23 顾泽苍 Novel method for processing anti-counterfeit printing
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Also Published As

Publication number Publication date
CN103106429B (en) 2015-10-28

Similar Documents

Publication Publication Date Title
CN103106442A (en) Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106460A (en) Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark
CN103106513A (en) Multi-parameter univariate poly encryption anti-fake information storage trademark
CN103106429A (en) Single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark
CN103106448A (en) Single variable parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103106517A (en) Parameter transmutation ternary encryption anti-fake information storage trademark
CN103116774B (en) Parameter transmutation unary circulation encryption anti-fake information storage trademark
CN103106518A (en) Parameter transmutation one-element encryption anti-fake information storage trademark
CN103106479B (en) Parameter transmutation binary circulation encryption anti-fake information storage trademark
CN103116788A (en) Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark
CN103116790A (en) Parameter transmutation binary encryption anti-fake information storage trademark
CN103116796A (en) One-parameter variation transmutation unary encryption anti-fake information storage trademark
CN103106449B (en) Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103106457A (en) Single parameter ternary circulation encryption anti-counterfeiting information storage trademark
CN103106512A (en) Multiparameter multivariable ternary encryption anti-fake information storage trademark
CN103106447A (en) Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark
CN103106451A (en) Multi-variable-parameter gradient ternary-variant circulating encryption anti-fake information storage brand
CN103106432A (en) Multi-parametric-variable gradient unitary circulating encryption anti-fake information storage trademark
CN103106453A (en) Multi-parameter ternary variant circulating encryption anti-fake information storage brand
CN103106438A (en) Parameter-gradient multivariable multi-encryption anti-fake information storage trademark
CN103106452A (en) Multivariate parameter gradation unitary circulating encryption anti-fake information storage trademark
CN103106439A (en) Multiparameter multivariable binary encryption anti-fake information storage trademark
CN103106450A (en) Single parameter multivariable unitary circulation encryption anti-counterfeiting information storage trademark
CN103116797A (en) Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark
CN103106464B (en) Single parameter variable transmutation ternary variable circulation encryption anti-counterfeiting information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20151028

Termination date: 20160122

EXPY Termination of patent right or utility model