CN103106437B - One-parameter variation transmutation multivariable anti-fake information storage trademark - Google Patents

One-parameter variation transmutation multivariable anti-fake information storage trademark Download PDF

Info

Publication number
CN103106437B
CN103106437B CN201310022392.7A CN201310022392A CN103106437B CN 103106437 B CN103106437 B CN 103106437B CN 201310022392 A CN201310022392 A CN 201310022392A CN 103106437 B CN103106437 B CN 103106437B
Authority
CN
China
Prior art keywords
scale
group
trade mark
control variable
counterfeiting information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310022392.7A
Other languages
Chinese (zh)
Other versions
CN103106437A (en
Inventor
张明鸣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN201310022392.7A priority Critical patent/CN103106437B/en
Publication of CN103106437A publication Critical patent/CN103106437A/en
Application granted granted Critical
Publication of CN103106437B publication Critical patent/CN103106437B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

A kind of One-parameter variation transmutation multivariable anti-fake information storage trademark, scale-of-two anti-counterfeiting information can be generated binary modulated signal by polynary encryption and chnnel coding by this trade mark, and by circulation look-up table modulation system, anti-counterfeiting information is embedded in the whole trade mark page with the orderly change of amplitude electric conductivity, anti-counterfeiting information can be identified when brand recognition from any one fragment, may be used in various false proof trade mark.

Description

One-parameter variation transmutation multivariable anti-fake information storage trademark
Technical field:
The present invention relates to a kind of anti-false trademark, particularly a kind of One-parameter variation transmutation multivariable anti-fake information storage trademark, scale-of-two encryption anti-fake information can be kept on the trade mark page and realize the false proof of trade mark by this trade mark, this trade mark may be used for extensive stock false proof in.
Background technology:
Anti-false trademark, also known as antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, is a kind ofly to discern the false from the genuine, prevent the proof label palmed off, be in commodity circulation process people for distinguishing true and false, the mark of distinguishing commercial quality quality of merchandise resources.Trademark anti-counterfeit is related to businessman, client and market safety, is related to the interests of protection businessman and client.The trade mark of China has carried out innovating audaciously; have employed laser anti-counterfeit, core micropore is false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof; but the false proof struggle with faking is high-tech trial of strength; anti-counterfeiting technology advanced again has certain ageing; so; constantly must promote trade mark anti-fake technique; could false proof with fraud in forever maintain the leading position, this is also the basic assurance that protection businessman and the interests of client maintain commodity circulation safety.
Summary of the invention:
In order to improve reliability and the security of trademark anti-counterfeit, the deficiency that the present invention is directed to the existence of existing trademark anti-counterfeit is improved existing trade mark anti-fake technique, propose a kind of anti-counterfeiting information and store trade mark, this trade mark is by the change to amplitude electric conductivity in brand printing, encryption anti-fake information is embedded on the whole trade mark page with scale-of-two coded signal form, encryption anti-fake information can be identified when brand recognition from any one fragment, therefore there is very strong disguised and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information stores trade mark, and be made up of trade mark page paper, the amplitude be printed on trade mark page paper, the horizontal scanning line be printed on trade mark page paper, the column scan line be printed on trade mark page paper, the image on trade mark page paper and word are made up of amplitude,
According to the scale-of-two encryption anti-fake information stored, a part of amplitude on trade mark page paper is printed by electrically conductive ink and is formed, another part amplitude on trade mark page paper is printed by dielectric ink and is formed, and the horizontal scanning line on trade mark page paper and column scan line are printed by electrically conducting transparent ink and formed
The horizontal scanning line be printed on trade mark page paper has N bar, the column scan line be printed on trade mark page paper has M bar, the amplitude be printed on trade mark page paper is divided into the capable M row of N on trade mark paper, amplitude is the neat arrangement in matrix on trade mark page paper paper, i is allowed to get 1 to N, j is allowed to get 1 to M, the basal surface of each amplitude that the jth bar column scan line on trade mark page paper arranges with the jth on trade mark page paper is electrically connected, i-th horizontal scanning line on trade mark page paper is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper
When the binary message needing the trade mark page to store reads, the 1st on trade mark page paper article is set to high level successively to N article of horizontal scanning line,
When article horizontal scanning line of the 1st on trade mark page paper is set to high level, the binary message that the 1st row on trade mark page paper stores exports to M bar of column scan line from the 1st bar of column scan line with 0,1 code form, the amplitude that the 1st row on trade mark page paper is printed by electrically conductive ink exports binary message 1, the amplitude that the 1st row on trade mark page paper is printed by dielectric ink exports binary message 0, above-mentioned readout can be repeated to other row on trade mark page paper
In order to realize the cryptographic storage of trademark anti-counterfeit information, first digitized processing is carried out to image false-proof information and character anti-counterfeiting information, image false-proof information and character anti-counterfeiting information is utilized to generate the scale-of-two anti-counterfeiting information table of 8 group, for preventing producing information spillover in ciphering process, each in scale-of-two anti-counterfeiting information table 8 one group of scale-of-two anti-counterfeiting information are expanded to 32 one group of scale-of-two anti-counterfeiting information, generate high 24 be entirely 0 32 one group scale-of-two anti-counterfeiting information table, i-th group of 32 scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table are denoted as N i, i-th group of 32 scale-of-two encryption anti-fake information in 32 one group scale-of-two encryption anti-fake information table are denoted as H ii be greater than 0 positive integer, eight-digit binary number encryption parameter is denoted as C, encryption parameter C is the scale-of-two positive integer of 0≤C≤256, eight-digit binary number encryption variables is denoted as q, j, d, e, f, g, h, r and p respectively, and encryption variables q, j, d, e, f, g, h, r and p are the scale-of-two positive integer of 0 to 256, and binary operator control variable is denoted as k, binary operator control variable k is the bigit of 0≤k≤7, operator adopt+,-, × tri-kinds of operators, during binary operator control variable k=0 be defined as respectively-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1 be defined as respectively+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2 be defined as respectively-, × ,+,+, × ,-,+,-, during binary operator control variable k=3 be defined as respectively-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4 be defined as respectively+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5 be defined as respectively × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6 be defined as respectively × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7 be defined as respectively+, ×, × ,-,+,-,-, ×, during binary operator control variable k=0, polynary cryptographic calculation is defined as H i = ( N i + q ) @ k 1 ( c + j ) @ k 2 ( N i + q ) @ k 3 ( c + j ) @ k 4 ( N i + q ) @ k 5 ( c + j ) @ k 6 ( N i + q ) @ k 7 ( c + j ) @ k 8 ( N i + q ) , During binary operator control variable k=1, polynary cryptographic calculation is defined as H i = ( N i + j ) @ k 1 ( c + d ) @ k 2 ( N i + j ) @ k 3 ( c + d ) @ k 4 ( N i + j ) @ k 5 ( c + d ) @ k 6 ( N i + j ) @ k 7 ( c + d ) @ k 8 ( N i + j ) , During binary operator control variable k=2, polynary cryptographic calculation is defined as H i = ( N i + d ) @ k 1 ( c + e ) @ k 2 ( N i + d ) @ k 3 ( c + e ) @ k 4 ( N i + d ) @ k 5 ( c + e ) @ k 6 ( N i + d ) @ k 7 ( c + e ) @ k 8 ( N i + d ) , During binary operator control variable k=3, polynary cryptographic calculation is defined as H i = ( N i + e ) @ k 1 ( c + f ) @ k 2 ( N i + e ) @ k 3 ( c + f ) @ k 4 ( N i + e ) @ k 5 ( c + f ) @ k 6 ( N i + e ) @ k 7 ( c + f ) @ k 8 ( N i + e ) , During binary operator control variable k=4, polynary cryptographic calculation is defined as H i = ( N i + f ) @ k 1 ( c + g ) @ k 2 ( N i + f ) @ k 3 ( c + g ) @ k 4 ( N i + f ) @ k 5 ( c + g ) @ k 6 ( N i + f ) @ k 7 ( c + g ) @ k 8 ( N i + f ) , During binary operator control variable k=5, polynary cryptographic calculation is defined as H i = ( N i + g ) @ k 1 ( c + h ) @ k 2 ( N i + g ) @ k 3 ( c + h ) @ k 4 ( N i + g ) @ k 5 ( c + h ) @ k 6 ( N i + g ) @ k 7 ( c + h ) @ k 8 ( N i + g ) , During binary operator control variable k=6, polynary cryptographic calculation is defined as H i = ( N i + h ) @ k 1 ( c + r ) @ k 2 ( N i + h ) @ k 3 ( c + r ) @ k 4 ( N i + h ) @ k 5 ( c + r ) @ k 6 ( N i + h ) @ k 7 ( c + r ) @ k 8 ( N i + h ) , During binary operator control variable k=7, polynary cryptographic calculation is defined as H i = ( N i + r ) @ k 1 ( c + p ) @ k 2 ( N i + r ) @ k 3 ( c + p ) @ k 4 ( N i + r ) @ k 5 ( c + p ) @ k 6 ( N i + r ) @ k 7 ( c + p ) @ k 8 ( N i + r ) , The initial value of setting encryption parameter C, the initial value of setting encryption variables q, j, d, e, f, g, h, r and p, the initial value of setting binary operator control variable k is k=0, sets 32 scale-of-two anti-counterfeiting information N in 32 one group scale-of-two anti-counterfeiting information table iposition control variable i=1, set 32 scale-of-two encryption anti-fake information H in 32 one group scale-of-two encryption anti-fake information table iposition control variable i=1, to N 1carry out H 1 = ( N 1 + q ) @ k 1 ( c + j ) @ k 2 ( N 1 + q ) @ k 3 ( c + j ) @ k 4 ( N 1 + q ) @ k 5 ( c + j ) @ k 6 ( N 1 + q ) @ k 7 ( c + j ) @ k 8 ( N 1 + q ) Polynary cryptographic calculation, wherein k=0, generate first group of scale-of-two encryption anti-fake information H in the scale-of-two encryption anti-fake information table of 32 group 1, to N 1carry out H 1 = ( N 1 + q ) @ k 1 ( c + j ) @ k 2 ( N 1 + q ) @ k 3 ( c + j ) @ k 4 ( N 1 + q ) @ k 5 ( c + j ) @ k 6 ( N 1 + q ) @ k 7 ( c + j ) @ k 8 ( N 1 + q ) Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H 2 = ( N 2 + j ) @ k 1 ( c + d ) @ k 2 ( N 2 + j ) @ k 3 ( c + d ) @ k 4 ( N 2 + j ) @ k 5 ( c + d ) @ k 6 ( N 2 + j ) @ k 7 ( c + d ) @ k 8 ( N 2 + j ) , Wherein k=1, generates second group of scale-of-two encryption anti-fake information H in the scale-of-two encryption anti-fake information table of 32 group 2, to N 2carry out H 2 = ( N 2 + j ) @ k 1 ( c + d ) @ k 2 ( N 2 + j ) @ k 3 ( c + d ) @ k 4 ( N 2 + j ) @ k 5 ( c + d ) @ k 6 ( N 2 + j ) @ k 7 ( c + d ) @ k 8 ( N 2 + j ) Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H 3 = ( N 3 + d ) @ k 1 ( c + e ) @ k 2 ( N 3 + d ) @ k 3 ( c + e ) @ k 4 ( N 3 + d ) @ k 5 ( c + e ) @ k 6 ( N 3 + d ) @ k 7 ( c + e ) @ k 8 ( N 3 + d ) , Wherein k=2, generates the 3rd group of scale-of-two encryption anti-fake information H in the scale-of-two encryption anti-fake information table of 32 group 3, above-mentioned cryptographic calculation goes on always until last in scale-of-two anti-counterfeiting information table organizes 32 scale-of-two anti-counterfeiting information, by organizing 32 scale-of-two anti-counterfeiting information N to each in 32 one group scale-of-two anti-counterfeiting information table icarry out polynary cryptographic calculation, generate 32 the one group scale-of-two encryption anti-fake information table corresponding with 32 one group scale-of-two anti-counterfeiting information table, digitized processing is carried out to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, in label printing process, utilize the scale-of-two encryption anti-fake information of 32 group of generation by the printing process of the amplitude on the circulation look-up table modulation trade mark page, printing amplitude by selecting dielectric ink and electrically conductive ink makes the regular electric conductivity according to above-mentioned two kinds of amplitudes of the amplitude on the trade mark page change, after modulation, on the trade mark page, adjacent 32 amplitudes form one group of 32 binary message, make the trade mark page carries anti-counterfeiting information by the change of amplitude electric conductivity, and make this anti-counterfeiting information be embedded in whole trade mark page site, realize trademark anti-counterfeit, obvious extractible anti-counterfeiting information is embedded by non-in the trade mark page, valid certificates can be provided for true trade mark, there is stronger anti-forgery ability simultaneously.
For solving above-mentioned technical matters, first digitized processing is carried out to image false-proof information and character anti-counterfeiting information, generate the scale-of-two anti-counterfeiting information table of 8 group, each in scale-of-two anti-counterfeiting information table 8 one group of scale-of-two anti-counterfeiting information are expanded to 32 one group of scale-of-two anti-counterfeiting information, generate high 24 be entirely 0 32 one group scale-of-two anti-counterfeiting information table, polynary cryptographic calculation is carried out to each 32 the scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table, generate the scale-of-two encryption anti-fake information table of 32 group, utilize 32 scale-of-two encryption anti-fake information in scale-of-two encryption anti-fake information table through chnnel coding, generate the binary modulated signal with 32 group of error detecting and error correcting function, chnnel coding can adopt loop coding, convolutional encoding or Turbo coding various ways, image signal of trade mark page original continuous being changed the line map exports shadow tone hybrid screening picture signal through rasterizing process (RIP) and hybrid screening, comprising amplitude and FM screened image signal, 32 the one group of binary modulated signals generated are utilized to adopt the electric conductivity of amplitude in circulation look-up table modulation system modulation hybrid screening picture signal, make the electric conductivity of amplitude according to dielectric ink amplitude and electrically conductive ink amplitude is regular changes, adjacent 32 amplitudes in hybrid screening picture signal are made to carry 32 scale-of-two anti-counterfeiting information by the change of electric conductivity, thus be created on the hybrid screening picture signal embedding anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, first trade mark page site electric conductivity signal is gathered, through the identification to the electric conductivity of amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, channel-decoding is carried out to the binary modulated signal of 32 group that demodulation exports, generate scale-of-two deciphering anti-counterfeiting information table after channel-decoding, i-th group of 32 binary message of being deciphered by scale-of-two in anti-counterfeiting information table are denoted as M i.
Scale-of-two is deciphered 32 binary message M in anti-counterfeiting information table ithe initial value design of position control variable i be i=1, the initial value when initial value of setting encryption parameter C is encryption, the initial value when initial value of setting encryption variables q, j, d, e, f, g, h, r and p is encryption, the initial value design of binary operator control variable k is k=0, known by polynary ciphering process, during binary operator control variable k=0, decrypt operation is M i = ( N i + q ) @ k 1 ( c + j ) @ k 2 ( N i + q ) @ k 3 ( c + j ) @ k 4 ( N i + q ) @ k 5 ( c + j ) @ k 6 ( N i + q ) @ k 7 ( c + j ) @ k 8 ( N i + q ) , During binary operator control variable k=1, decrypt operation is M i = ( N i + j ) @ k 1 ( c + d ) @ k 2 ( N i + j ) @ k 3 ( c + d ) @ k 4 ( N i + j ) @ k 5 ( c + d ) @ k 6 ( N i + j ) @ k 7 ( c + d ) @ k 8 ( N i + j ) , During binary operator control variable k=2, decrypt operation is M i = ( N i + d ) @ k 1 ( c + e ) @ k 2 ( N i + d ) @ k 3 ( c + e ) @ k 4 ( N i + d ) @ k 5 ( c + e ) @ k 6 ( N i + d ) @ k 7 ( c + e ) @ k 8 ( N i + d ) , During binary operator control variable k=3, decrypt operation is M i = ( N i + e ) @ k 1 ( c + f ) @ k 2 ( N i + e ) @ k 3 ( c + f ) @ k 4 ( N i + e ) @ k 5 ( c + f ) @ k 6 ( N i + e ) @ k 7 ( c + f ) @ k 8 ( N i + e ) , During binary operator control variable k=4, decrypt operation is M i = ( N i + f ) @ k 1 ( c + g ) @ k 2 ( N i + f ) @ k 3 ( c + g ) @ k 4 ( N i + f ) @ k 5 ( c + g ) @ k 6 ( N i + f ) @ k 7 ( c + g ) @ k 8 ( N i + f ) , During binary operator control variable k=5, decrypt operation is M i = ( N i + g ) @ k 1 ( c + h ) @ k 2 ( N i + g ) @ k 3 ( c + h ) @ k 4 ( N i + g ) @ k 5 ( c + h ) @ k 6 ( N i + g ) @ k 7 ( c + h ) @ k 8 ( N i + g ) , During binary operator control variable k=6, decrypt operation is M i = ( N i + h ) @ k 1 ( c + r ) @ k 2 ( N i + h ) @ k 3 ( c + r ) @ k 4 ( N i + h ) @ k 5 ( c + r ) @ k 6 ( N i + h ) @ k 7 ( c + r ) @ k 8 ( N i + h ) , During binary operator control variable k=7, decrypt operation is M i = ( N i + r ) @ k 1 ( c + p ) @ k 2 ( N i + r ) @ k 3 ( c + p ) @ k 4 ( N i + r ) @ k 5 ( c + p ) @ k 6 ( N i + r ) @ k 7 ( c + p ) @ k 8 ( N i + r ) , First M from scale-of-two deciphering anti-counterfeiting information table 1start, to each 32 the binary message M in scale-of-two deciphering anti-counterfeiting information table icarry out corresponding decrypt operation, solve scale-of-two anti-counterfeiting information N i, generate high 24 be entirely 0 32 one group scale-of-two anti-counterfeiting information table, remove high 24, recover the scale-of-two anti-counterfeiting information table of generation 8 group, recover anti-counterfeiting signal and also export anti-counterfeiting information.
Accompanying drawing explanation
Below in conjunction with accompanying drawing, the present invention is further described.
Fig. 1 is one-piece construction figure of the present invention.
Fig. 2 is A-A cut-open view of the present invention.
Fig. 3 loads anti-counterfeiting information process flow diagram.
Fig. 4 extracts anti-counterfeiting information process flow diagram.
Embodiment
As in Fig. 1 and Fig. 2, anti-fake information storage trademark, by trade mark page paper 7-1, be printed on amplitude 6-1 to the 6-150 on trade mark page paper 7-1, be printed on horizontal scanning line 1-1 to the 1-15 on trade mark page paper 7-1, column scan line 2-1 to the 2-10 be printed on trade mark page paper 7-1 is formed, image on trade mark page paper 7-1 and word are made up of amplitude 6-1 to 6-150, according to storage scale-of-two encryption anti-fake information, a part of amplitude on trade mark page paper 7-1 is printed by electrically conductive ink and is formed, another part amplitude on trade mark page paper 7-1 is printed by dielectric ink and is formed, horizontal scanning line 1-1 to 1-15 on trade mark page paper 7-1 and column scan line 2-1 to 2-10 is printed by electrically conducting transparent ink and forms,
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is printed by electrically conductive ink and is formed, and the light amplitude on trade mark page paper 7-1 is printed by dielectric ink and formed,
The amplitude be printed on trade mark page paper 7-1 is divided into 15 row 10 and arranges on trade mark paper, amplitude 6-1 to 6-150 is the neat arrangement in matrix on trade mark page paper 7-1, i is allowed to get 1 to 15, j is allowed to get 1 to 10, the basal surface of each amplitude that the jth bar column scan line on trade mark page paper 7-1 arranges with the jth on trade mark page paper 7-1 is electrically connected, i-th horizontal scanning line on trade mark page paper 7-1 is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper 7-1
When the scale-of-two encryption anti-fake information needing the trade mark page to store reads, the 1st article of horizontal scanning line on trade mark page paper 7-1 is set to high level successively to the 15th article of horizontal scanning line,
When the 1st article of horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the scale-of-two encryption anti-fake information that the 1st row on trade mark page paper 7-1 stores is with 0, 1 code form exports from the 1st bar of column scan line to the 10th bar of column scan line, the 1st row on trade mark page paper 7-1 is printed by electrically conductive ink and is formed amplitude output binary message 1, the 1st row on trade mark page paper 7-1 is printed by dielectric ink and is formed amplitude output binary message 0, therefore the scale-of-two encryption anti-fake information 1100001000 of the 1st row reading, above-mentioned readout can be repeated to other row on trade mark page paper 7-1.
In loading anti-counterfeiting information process flow diagram 3, original anti-counterfeiting information (image, word) is through digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, in scale-of-two anti-counterfeiting information table 8 one group of binary message is expanded to 32 one group of binary messages, generate high 24 be entirely 0 32 one group scale-of-two anti-counterfeiting information table, i-th group of 32 binary message in 32 one group scale-of-two anti-counterfeiting information table are denoted as N i, i be greater than 0 positive integer, from first 32 scale-of-two encryption anti-fake information N 32 one group scale-of-two anti-counterfeiting information table 1start, to 32 the scale-of-two anti-counterfeiting information N of each in 32 one group scale-of-two anti-counterfeiting information table icarry out polynary cryptographic calculation, generate 32 the one group scale-of-two encryption anti-fake information table corresponding with 32 one group scale-of-two anti-counterfeiting information table, digitized processing is carried out to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, in label printing process, utilize the scale-of-two encryption anti-fake information of 32 group of generation by the printing process of the amplitude on the circulation look-up table modulation trade mark page, printing amplitude by selecting dielectric ink and electrically conductive ink makes the regular electric conductivity according to above-mentioned two kinds of amplitudes of the amplitude on the trade mark page change, after modulation, on the trade mark page, adjacent 32 amplitudes form one group of 32 binary message, make the trade mark page carries anti-counterfeiting information by the change of amplitude electric conductivity, and make this anti-counterfeiting information be embedded in whole trade mark page site, realize trademark anti-counterfeit printing, obvious extractible anti-counterfeiting information is embedded by non-in the trade mark page, realize trademark anti-counterfeit.
In extraction anti-counterfeiting information process flow diagram 4, when extracting anti-counterfeiting information, first the electric conductivity signal of trade mark page halftone dot image is gathered, through the electric conductivity identification to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, channel-decoding is carried out to the binary modulated signal of 32 group that demodulation exports, after channel-decoding, generates scale-of-two deciphering anti-counterfeiting information table.
The scale-of-two generated after decoding is deciphered 32 binary message M in anti-counterfeiting information table ithe initial value design of position control variable i be i=1, the initial value when initial value of setting encryption parameter is encryption, the initial value when initial value of setting encryption variables is encryption, the initial value design of binary operator control variable k is k=0, first M from the scale-of-two deciphering anti-counterfeiting information table generated 1start, to each 32 the binary message M in scale-of-two deciphering anti-counterfeiting information table ibe decrypted computing, solve scale-of-two anti-counterfeiting information N i, generate high 24 be entirely 0 32 one group scale-of-two anti-counterfeiting information table, remove high 24, recover the scale-of-two anti-counterfeiting information table of generation 8 group, recover anti-counterfeiting signal and also export anti-counterfeiting information.

Claims (1)

1. anti-counterfeiting information is generated binary modulated signal by cryptographic calculation and chnnel coding by one kind, and anti-counterfeiting information is embedded in the One-parameter variation transmutation multivariable anti-fake information storage trademark in full page by modulation system of tabling look-up by circulating, it is characterized in that: anti-counterfeiting information stores trade mark, by trade mark page paper, be printed on the amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper is formed, according to the scale-of-two encryption anti-fake information stored, a part of amplitude on trade mark page paper is printed by electrically conductive ink and is formed, another part amplitude on trade mark page paper is printed by dielectric ink and is formed, horizontal scanning line on trade mark page paper and column scan line are printed by electrically conducting transparent ink and are formed,
In order to realize the cryptographic storage of trademark anti-counterfeit information, first digitized processing is carried out to image false-proof information and character anti-counterfeiting information, image false-proof information and character anti-counterfeiting information is utilized to generate the scale-of-two anti-counterfeiting information table of 8 group, for preventing producing information spillover in ciphering process, each in scale-of-two anti-counterfeiting information table 8 one group of scale-of-two anti-counterfeiting information are expanded to 32 one group of scale-of-two anti-counterfeiting information, generate high 24 be entirely 0 32 one group scale-of-two anti-counterfeiting information table, i-th group of 32 scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table are denoted as N i, i-th group of 32 scale-of-two encryption anti-fake information in 32 one group scale-of-two encryption anti-fake information table are denoted as H ii be greater than 0 positive integer, eight-digit binary number encryption parameter is denoted as C, encryption parameter C is the scale-of-two positive integer of 0≤C≤256, eight-digit binary number encryption variables is denoted as q, j, d, e, f, g, h, r and p respectively, and encryption variables q, j, d, e, f, g, h, r and p are the scale-of-two positive integer of 0 to 256, and binary operator control variable is denoted as k, binary operator control variable k is the bigit of 0≤k≤7, operator adopt+,-, × tri-kinds of operators, during binary operator control variable k=0 be defined as respectively-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1 be defined as respectively+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2 be defined as respectively-, × ,+,+, × ,-,+,-, during binary operator control variable k=3 be defined as respectively-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4 be defined as respectively+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5 be defined as respectively × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6 be defined as respectively × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7 be defined as respectively+, ×, × ,-,+,-,-, ×, during binary operator control variable k=0, polynary cryptographic calculation is defined as H i = ( N i + q ) @ k 1 ( c + j ) @ k 2 ( N i + q ) @ k 3 ( c + j ) @ k 4 ( N i + q ) @ k 5 ( c + j ) @ k 6 ( N i + q ) @ k 7 ( c + j ) @ k 8 ( N i + q ) , During binary operator control variable k=1, polynary cryptographic calculation is defined as H i = ( N i + j ) @ k 1 ( c + d ) @ k 2 ( N i + j ) @ k 3 ( c + d ) @ k 4 ( N i + j ) @ k 5 ( c + d ) @ k 6 ( N i + j ) @ k 7 ( c + d ) @ k 8 ( N i + j ) , During binary operator control variable k=2, polynary cryptographic calculation is defined as H i = ( N i + d ) @ k 1 ( c + e ) @ k 2 ( N i + d ) @ k 3 ( c + e ) @ k 4 ( N i + d ) @ k 5 ( c + e ) @ k 6 ( N i + d ) @ k 7 ( c + e ) @ k 8 ( N i + d ) , During binary operator control variable k=3, polynary cryptographic calculation is defined as H i = ( N i + e ) @ k 1 ( c + f ) @ k 2 ( N i + e ) @ k 3 ( c + f ) @ k 4 ( N i + e ) @ k 5 ( c + f ) @ k 6 ( N i + e ) @ k 7 ( c + f ) @ k 8 ( N i + e ) , During binary operator control variable k=4, polynary cryptographic calculation is defined as H i = ( N i + f ) @ k 1 ( c + g ) @ k 2 ( N i + f ) @ k 3 ( c + g ) @ k 4 ( N i + f ) @ k 5 ( c + g ) @ k 6 ( N i + f ) @ k 7 ( c + g ) @ k 8 ( N i + f ) During binary operator control variable k=5, polynary cryptographic calculation is defined as H i = ( N i + g ) @ k 1 ( c + h ) @ k 2 ( N i + g ) @ k 3 ( c + h ) @ k 4 ( N i + g ) @ k 5 ( c + h ) @ k 6 ( N i + g ) @ k 7 ( c + h ) @ k 8 ( N i + g ) , During binary operator control variable k=6, polynary cryptographic calculation is defined as H i = ( N i + h ) @ k 1 ( c + r ) @ k 2 ( N i + h ) @ k 3 ( c + r ) @ k 4 ( N i + h ) @ k 5 ( c + r ) @ k 6 ( N i + h ) @ k 7 ( c + r ) @ k 8 ( N i + h ) , During binary operator control variable k=7, polynary cryptographic calculation is defined as H i = ( N i + r ) @ k 1 ( c + p ) @ k 2 ( N i + r ) @ k 3 ( c + p ) @ k 4 ( N i + r ) @ k 5 ( c + p ) @ k 6 ( N i + r ) @ k 7 ( c + p ) @ k 8 ( N i + r ) , The initial value of setting encryption parameter C, the initial value of setting encryption variables q, j, d, e, f, g, h, r and p, the initial value of setting binary operator control variable k is k=0, sets 32 scale-of-two anti-counterfeiting information N in 32 one group scale-of-two anti-counterfeiting information table iposition control variable i=1, set 32 scale-of-two encryption anti-fake information H in 32 one group scale-of-two encryption anti-fake information table iposition control variable i=1, to N 1carry out H 1 = ( N 1 + q ) @ k 1 ( c + j ) @ k 2 ( N 1 + q ) @ k 3 ( c + j ) @ k 4 ( N 1 + q ) @ k 5 ( c + j ) @ k 6 ( N 1 + q ) @ k 7 ( c + j ) @ k 8 ( N 1 + q ) Polynary cryptographic calculation, wherein k=0, generate first group of scale-of-two encryption anti-fake information H in the scale-of-two encryption anti-fake information table of 32 group 1, to N 1carry out H 1 = ( N 1 + q ) @ k 1 ( c + j ) @ k 2 ( N 1 + q ) @ k 3 ( c + j ) @ k 4 ( N 1 + q ) @ k 5 ( c + j ) @ k 6 ( N 1 + q ) @ k 7 ( c + j ) @ k 8 ( N 1 + q ) Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H 2 = ( N 2 + j ) @ k 1 ( c + d ) @ k 2 ( N 2 + j ) @ k 3 ( c + d ) @ k 4 ( N 2 + j ) @ k 5 ( c + d ) @ k 6 ( N 2 + j ) @ k 7 ( c + d ) @ k 8 ( N 2 + j ) , Wherein k=1, generates second group of scale-of-two encryption anti-fake information H in the scale-of-two encryption anti-fake information table of 32 group 2, to N 2carry out H 2 = ( N 2 + j ) @ k 1 ( c + d ) @ k 2 ( N 2 + j ) @ k 3 ( c + d ) @ k 4 ( N 2 + j ) @ k 5 ( c + d ) @ k 6 ( N 2 + j ) @ k 7 ( c + d ) @ k 8 ( N 2 + j ) Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H 3 = ( N 3 + d ) @ k 1 ( c + e ) @ k 2 ( N 3 + d ) @ k 3 ( c + e ) @ k 4 ( N 3 + d ) @ k 5 ( c + e ) @ k 6 ( N 3 + d ) @ k 7 ( c + e ) @ k 8 ( N 3 + d ) , Wherein k=2, generates the 3rd group of scale-of-two encryption anti-fake information H in the scale-of-two encryption anti-fake information table of 32 group 3, above-mentioned cryptographic calculation goes on always until last in scale-of-two anti-counterfeiting information table organizes 32 scale-of-two anti-counterfeiting information, by organizing 32 scale-of-two anti-counterfeiting information N to each in 32 one group scale-of-two anti-counterfeiting information table icarry out polynary cryptographic calculation, generate 32 the one group scale-of-two encryption anti-fake information table corresponding with 32 one group scale-of-two anti-counterfeiting information table, digitized processing is carried out to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, in label printing process, utilize the scale-of-two encryption anti-fake information of 32 group of generation by the printing process of the amplitude on the circulation look-up table modulation trade mark page, printing amplitude by selecting dielectric ink and electrically conductive ink makes the regular electric conductivity according to above-mentioned two kinds of amplitudes of the amplitude on the trade mark page change, after modulation, on the trade mark page, adjacent 32 amplitudes form one group of 32 binary message, make the trade mark page carries anti-counterfeiting information by the change of amplitude electric conductivity, and make this anti-counterfeiting information be embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN201310022392.7A 2013-01-22 2013-01-22 One-parameter variation transmutation multivariable anti-fake information storage trademark Expired - Fee Related CN103106437B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310022392.7A CN103106437B (en) 2013-01-22 2013-01-22 One-parameter variation transmutation multivariable anti-fake information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310022392.7A CN103106437B (en) 2013-01-22 2013-01-22 One-parameter variation transmutation multivariable anti-fake information storage trademark

Publications (2)

Publication Number Publication Date
CN103106437A CN103106437A (en) 2013-05-15
CN103106437B true CN103106437B (en) 2015-08-19

Family

ID=48314283

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310022392.7A Expired - Fee Related CN103106437B (en) 2013-01-22 2013-01-22 One-parameter variation transmutation multivariable anti-fake information storage trademark

Country Status (1)

Country Link
CN (1) CN103106437B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8023160B2 (en) * 2008-09-10 2011-09-20 Xerox Corporation Encoding message data in a cover contone image via halftone dot orientation

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
一种多重加密的算法及其实现方案;姚旭罡等;《通信技术》;20030630;全文 *
基于身份的十进制加密技术研究;刘连浩;《计算机工程与应用》;20050821;全文 *

Also Published As

Publication number Publication date
CN103106437A (en) 2013-05-15

Similar Documents

Publication Publication Date Title
CN103106442B (en) Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106430B (en) One-parameter double-variant multi-variant encryption anti-fake information storage brand
CN103106437B (en) One-parameter variation transmutation multivariable anti-fake information storage trademark
CN103106501B (en) Multiparameter transmutation multivariable multielement encryption anti-fake information storage trademark
CN103116776B (en) One-parameter double variant multivariable circulation encryption anti-fake information storage trademark
CN103106471B (en) Single parameter variable transmutation ternary anti-fake information storage trademark
CN103123693B (en) One-parameter binary-encryption anti-fake information storage trademark
CN103136564B (en) Multi-parametric-vargradient gradient polynary circulation anti-fake information storage trademark
CN103106438B (en) Parameter-gradient multivariable multi-encryption anti-fake information storage trademark
CN103106524B (en) Multi-parametric-vargradient gradient polynary encryption anti-fake information storage trademark
CN103106429B (en) Single variable parameter transmutation ternary variable circulation anti-fake information storage trademark
CN103106509B (en) Single variable parameter transmutation multi-element variable circulation anti-fake information storage trademark
CN103106474B (en) Multivariate multi-parameter gradient unitary encryption anti-fake information storage trademark
CN103106456B (en) One-parameter polytomy variable cycle encryption anti-fake information storage trademark
CN103106478B (en) Single variable parameter transmutation ternary circulation anti-fake information storage trademark
CN103106457B (en) One-parameter ternary circulation encryption anti-fake information storage trademark
CN103116775B (en) One-parameter double variant binary variable circulation encryption anti-fake information storage trademark
CN103106450B (en) Single parameter multivariable unitary circulation anti-fake information storage trademark
CN103116792B (en) One-parameter double variant ternary variable circulation anti-fake information storage trademark
CN103106485B (en) One-parameter double-variant unary circulation anti-fake information storage trademark
CN103106465B (en) Multivariate multi-parameter gradient ternary encryption anti-fake information storage trademark
CN103116793B (en) Multivariable multi-parameter gradient binary circulation encryption anti-fake information storage trademark
CN103116777B (en) One-parameter multivariate multivariable circulation encryption anti-fake information storage trademark
CN103116778B (en) One-parameter multivariate binary variable circulation encryption anti-fake information storage trademark
CN103106499B (en) Parametric variation multi-layer gradient multi-encryption anti-fake information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150819

Termination date: 20160122

EXPY Termination of patent right or utility model