CN103106487A - Single parameter variable transmutation unitary circulation encryption anti-counterfeiting information storage trademark - Google Patents

Single parameter variable transmutation unitary circulation encryption anti-counterfeiting information storage trademark Download PDF

Info

Publication number
CN103106487A
CN103106487A CN2013100235727A CN201310023572A CN103106487A CN 103106487 A CN103106487 A CN 103106487A CN 2013100235727 A CN2013100235727 A CN 2013100235727A CN 201310023572 A CN201310023572 A CN 201310023572A CN 103106487 A CN103106487 A CN 103106487A
Authority
CN
China
Prior art keywords
binary
counterfeiting information
trade mark
group
operator control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100235727A
Other languages
Chinese (zh)
Inventor
张明鸣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN2013100235727A priority Critical patent/CN103106487A/en
Publication of CN103106487A publication Critical patent/CN103106487A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Inspection Of Paper Currency And Valuable Securities (AREA)

Abstract

A single parameter variable transmutation unitary circulation encryption anti-counterfeiting information storage trademark can enable binary anti-counterfeiting information to be generated into binary modulation signals through unitary circulation encryption and channel coding, and enable the anti-counterfeiting information to be embedded into a whole trademark page through ordered changing of conductivity of amplitude modulation dots. The anti-counterfeiting information can be identified from any fragment during trademark identification, and the single parameter variable transmutation circulation encryption anti-counterfeiting information storage trademark can be applied to all kinds of anti-counterfeiting trademarks.

Description

One-parameter variable alternation monobasic circulation encryption anti-counterfeiting information storage trade mark
affiliated technical field:
The present invention relates to a kind of anti-false trademark, particularly a kind of one-parameter variable alternation monobasic circulation encryption anti-counterfeiting information is stored trade mark, this trade mark can be kept at binary add tight defense fake information on the trade mark page and realize the false proof of trade mark, and what this trade mark can be for extensive stock is false proof.
background technology:
Anti-false trademark, claim again antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, is a kind of proof label of discerning the false from the genuine, preventing personation, be in the commodity process of circulation people for distinguishing true and false, the sign of distinguishing the commercial quality quality of merchandise resources.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and client's interests.The trade mark of China has carried out innovation audaciously; adopted laser anti-counterfeit, the core micropore is false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but the false proof struggle with fraud is high-tech trial of strength; advanced anti-counterfeiting technology has certain ageing again; so; must constantly promote trade mark anti-fake technique; could false proof with fake in forever maintain the leading position, this is also that protection businessman and client's interests are maintained the commodity safe basic assurance that circulates.
summary of the invention:
For reliability and the security that improves trademark anti-counterfeit, the deficiency that the present invention is directed to existing trademark anti-counterfeit existence is improved existing trade mark anti-fake technique, a kind of anti-counterfeiting information storage trade mark has been proposed, this trade mark is by the change to amplitude electric conductivity in brand printing, encryption anti-counterfeiting information is embedded on the whole trade mark page with scale-of-two coded signal form, can identify encryption anti-counterfeiting information when brand recognition from any one fragment, therefore there is very strong disguise and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, image and word on trade mark page paper consist of amplitude,
Binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, and the horizontal scanning line on trade mark page paper and column scan line are printed and formed by electrically conducting transparent printing ink
The horizontal scanning line be printed on trade mark page paper has the N bar, the column scan line be printed on trade mark page paper has the M bar, the amplitude be printed on trade mark page paper is divided into the capable M row of N on the trade mark paper, amplitude neatly is matrix and arranges on trade mark page paper paper, allow i get 1 to N, allow j get 1 to M, j bar column scan line on trade mark page paper is electrically connected to the basal surface of each amplitude of the row of the j on trade mark page paper, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper is capable with i on trade mark page paper is electrically connected to
In the time the binary message of trade mark page stores need to being read, be set to successively high level to N bar horizontal scanning line by the 1st on trade mark page paper,
When the 1st horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported from the 1st column scan line to M bar column scan line with 0,1 code form, the 1st row on trade mark page paper is printed the amplitude output binary message 1 formed by electrically conductive ink, the 1st row on trade mark page paper is printed the amplitude output binary message 0 formed by dielectric ink, can repeat above-mentioned readout to other row on trade mark page paper
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 175983DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H ii is greater than 0 positive integer, binary system is encrypted parameter and is denoted as C, the binary system positive integer that encryption parameter C is 0<=C<=256, binary system is encrypted variable and is denoted as respectively q, j, d, e, f, g, h, r and p, the binary system positive integer that encryption variables q, j, d, e, f, g, h, r and p are 0 to 256, and the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 211459DEST_PATH_IMAGE002
Figure 346774DEST_PATH_IMAGE003
Figure 314730DEST_PATH_IMAGE004
Figure 535496DEST_PATH_IMAGE005
Figure 371734DEST_PATH_IMAGE006
Figure 630064DEST_PATH_IMAGE007
Figure 893556DEST_PATH_IMAGE008
Figure 211404DEST_PATH_IMAGE009
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 851333DEST_PATH_IMAGE002
Figure 961240DEST_PATH_IMAGE003
Figure 398563DEST_PATH_IMAGE004
Figure 328341DEST_PATH_IMAGE005
Figure 506382DEST_PATH_IMAGE006
Figure 203653DEST_PATH_IMAGE008
Figure 10941DEST_PATH_IMAGE009
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 730022DEST_PATH_IMAGE002
Figure 939156DEST_PATH_IMAGE003
Figure 715351DEST_PATH_IMAGE004
Figure 723848DEST_PATH_IMAGE005
Figure 243691DEST_PATH_IMAGE006
Figure 132723DEST_PATH_IMAGE008
Figure 399756DEST_PATH_IMAGE009
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 723290DEST_PATH_IMAGE002
Figure 516802DEST_PATH_IMAGE003
Figure 516693DEST_PATH_IMAGE005
Figure 519284DEST_PATH_IMAGE006
Figure 167303DEST_PATH_IMAGE007
Figure 822461DEST_PATH_IMAGE009
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 868619DEST_PATH_IMAGE003
Figure 181975DEST_PATH_IMAGE005
Figure 907245DEST_PATH_IMAGE008
Figure 857883DEST_PATH_IMAGE009
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 865022DEST_PATH_IMAGE002
Figure 342140DEST_PATH_IMAGE003
Figure 412252DEST_PATH_IMAGE004
Figure 974820DEST_PATH_IMAGE005
Figure 785650DEST_PATH_IMAGE006
Figure 117274DEST_PATH_IMAGE007
Figure 358287DEST_PATH_IMAGE008
Figure 408152DEST_PATH_IMAGE009
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 757093DEST_PATH_IMAGE002
Figure 208803DEST_PATH_IMAGE003
Figure 355138DEST_PATH_IMAGE004
Figure 767665DEST_PATH_IMAGE005
Figure 920298DEST_PATH_IMAGE006
Figure 226514DEST_PATH_IMAGE007
Figure 806400DEST_PATH_IMAGE008
Figure 591645DEST_PATH_IMAGE009
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 157755DEST_PATH_IMAGE002
Figure 584058DEST_PATH_IMAGE003
Figure 334845DEST_PATH_IMAGE004
Figure 581018DEST_PATH_IMAGE005
Figure 78383DEST_PATH_IMAGE006
Figure 234558DEST_PATH_IMAGE007
Figure 156247DEST_PATH_IMAGE008
Figure 889716DEST_PATH_IMAGE009
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 922263DEST_PATH_IMAGE002
Figure 60508DEST_PATH_IMAGE003
Figure 28464DEST_PATH_IMAGE004
Figure 249230DEST_PATH_IMAGE005
Figure 75289DEST_PATH_IMAGE007
Figure 49772DEST_PATH_IMAGE009
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, monobasic circulation cryptographic calculation is defined as H i=
Figure 689701DEST_PATH_IMAGE010
Figure 971351DEST_PATH_IMAGE011
Figure 42075DEST_PATH_IMAGE003
Figure 220115DEST_PATH_IMAGE011
Figure 184529DEST_PATH_IMAGE004
Figure 789823DEST_PATH_IMAGE011
Figure 475407DEST_PATH_IMAGE005
Figure 191559DEST_PATH_IMAGE011
Figure 10479DEST_PATH_IMAGE006
Figure 52253DEST_PATH_IMAGE011
Figure 354763DEST_PATH_IMAGE011
Figure 293769DEST_PATH_IMAGE008
Figure 240866DEST_PATH_IMAGE011
Figure 632533DEST_PATH_IMAGE009
Figure 958996DEST_PATH_IMAGE011
, during binary operator control variables k=1, monobasic circulation cryptographic calculation is defined as H i=
Figure 627875DEST_PATH_IMAGE012
Figure 745873DEST_PATH_IMAGE002
Figure 2013100235727100002DEST_PATH_IMAGE013
Figure 749470DEST_PATH_IMAGE003
Figure 590607DEST_PATH_IMAGE012
Figure 113993DEST_PATH_IMAGE004
Figure 668471DEST_PATH_IMAGE012
Figure 34730DEST_PATH_IMAGE005
Figure 434487DEST_PATH_IMAGE012
Figure 205522DEST_PATH_IMAGE006
Figure 665322DEST_PATH_IMAGE012
Figure 518877DEST_PATH_IMAGE007
Figure 597692DEST_PATH_IMAGE012
Figure 220303DEST_PATH_IMAGE008
Figure 119513DEST_PATH_IMAGE012
Figure 201925DEST_PATH_IMAGE012
, during binary operator control variables k=2, monobasic circulation cryptographic calculation is defined as H i=
Figure 679043DEST_PATH_IMAGE014
Figure 749154DEST_PATH_IMAGE002
Figure 856973DEST_PATH_IMAGE003
Figure 329543DEST_PATH_IMAGE015
Figure 567626DEST_PATH_IMAGE004
Figure 620421DEST_PATH_IMAGE014
Figure 969362DEST_PATH_IMAGE005
Figure 155493DEST_PATH_IMAGE014
Figure 564478DEST_PATH_IMAGE006
Figure 977004DEST_PATH_IMAGE014
Figure 132567DEST_PATH_IMAGE007
Figure 438783DEST_PATH_IMAGE014
Figure 753090DEST_PATH_IMAGE008
Figure 777546DEST_PATH_IMAGE014
Figure 343657DEST_PATH_IMAGE009
Figure 772889DEST_PATH_IMAGE014
, during binary operator control variables k=3, monobasic circulation cryptographic calculation is defined as H i=
Figure 2013100235727100002DEST_PATH_IMAGE016
Figure 382731DEST_PATH_IMAGE002
Figure 894483DEST_PATH_IMAGE016
Figure 264285DEST_PATH_IMAGE003
Figure 245945DEST_PATH_IMAGE016
Figure 167633DEST_PATH_IMAGE004
Figure 901103DEST_PATH_IMAGE017
Figure 202159DEST_PATH_IMAGE005
Figure 337474DEST_PATH_IMAGE016
Figure 430064DEST_PATH_IMAGE006
Figure 526196DEST_PATH_IMAGE016
Figure 362434DEST_PATH_IMAGE007
Figure 355185DEST_PATH_IMAGE016
Figure 618676DEST_PATH_IMAGE008
Figure 326738DEST_PATH_IMAGE016
Figure 576454DEST_PATH_IMAGE009
Figure 686361DEST_PATH_IMAGE016
, during binary operator control variables k=4, monobasic circulation cryptographic calculation is defined as H i=
Figure 497082DEST_PATH_IMAGE018
Figure 336862DEST_PATH_IMAGE003
Figure 942155DEST_PATH_IMAGE018
Figure 362160DEST_PATH_IMAGE004
Figure 162811DEST_PATH_IMAGE005
Figure 939006DEST_PATH_IMAGE006
Figure 111886DEST_PATH_IMAGE018
Figure 631729DEST_PATH_IMAGE007
Figure 305156DEST_PATH_IMAGE018
Figure 517832DEST_PATH_IMAGE008
Figure 912428DEST_PATH_IMAGE018
Figure 235962DEST_PATH_IMAGE009
Figure 763896DEST_PATH_IMAGE018
, during binary operator control variables k=5, monobasic circulation cryptographic calculation is defined as H i=
Figure 147473DEST_PATH_IMAGE020
Figure 5928DEST_PATH_IMAGE002
Figure 867573DEST_PATH_IMAGE020
Figure 390959DEST_PATH_IMAGE003
Figure 945437DEST_PATH_IMAGE020
Figure 46117DEST_PATH_IMAGE004
Figure 714383DEST_PATH_IMAGE020
Figure 942288DEST_PATH_IMAGE020
Figure 427801DEST_PATH_IMAGE006
Figure 631250DEST_PATH_IMAGE021
Figure 253861DEST_PATH_IMAGE007
Figure 884562DEST_PATH_IMAGE020
Figure 100780DEST_PATH_IMAGE008
Figure 587967DEST_PATH_IMAGE009
Figure 655149DEST_PATH_IMAGE020
, during binary operator control variables k=6, monobasic circulation cryptographic calculation is defined as H i=
Figure DEST_PATH_IMAGE022
Figure 345280DEST_PATH_IMAGE002
Figure 890531DEST_PATH_IMAGE022
Figure 487735DEST_PATH_IMAGE003
Figure 460239DEST_PATH_IMAGE022
Figure 536470DEST_PATH_IMAGE004
Figure 760778DEST_PATH_IMAGE022
Figure 212488DEST_PATH_IMAGE005
Figure 621473DEST_PATH_IMAGE022
Figure 158634DEST_PATH_IMAGE006
Figure 48617DEST_PATH_IMAGE022
Figure 230199DEST_PATH_IMAGE007
Figure 810085DEST_PATH_IMAGE023
Figure 834542DEST_PATH_IMAGE008
Figure 315092DEST_PATH_IMAGE022
, during binary operator control variables k=7, monobasic circulation cryptographic calculation is defined as H i=
Figure 826845DEST_PATH_IMAGE024
Figure 55701DEST_PATH_IMAGE002
Figure 261128DEST_PATH_IMAGE003
Figure 994597DEST_PATH_IMAGE024
Figure 190349DEST_PATH_IMAGE006
Figure 445750DEST_PATH_IMAGE024
Figure 709241DEST_PATH_IMAGE007
Figure 420232DEST_PATH_IMAGE024
Figure 794582DEST_PATH_IMAGE008
Figure 2013100235727100002DEST_PATH_IMAGE025
Figure 338882DEST_PATH_IMAGE024
, the initial value of setting encryption parameter C, the initial value of setting encryption variables q, j, d, e, f, g, h, r and p, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 537169DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right
Figure 323730DEST_PATH_IMAGE026
Carry out H 1=
Figure 288144DEST_PATH_IMAGE027
Figure 313442DEST_PATH_IMAGE011
Figure 295174DEST_PATH_IMAGE003
Figure 989460DEST_PATH_IMAGE011
Figure 765655DEST_PATH_IMAGE004
Figure 938535DEST_PATH_IMAGE011
Figure 458378DEST_PATH_IMAGE005
Figure 131805DEST_PATH_IMAGE011
Figure 219847DEST_PATH_IMAGE006
Figure 611514DEST_PATH_IMAGE011
Figure 672398DEST_PATH_IMAGE007
Figure 465911DEST_PATH_IMAGE011
Figure 338238DEST_PATH_IMAGE011
Figure 116411DEST_PATH_IMAGE011
Monobasic circulation cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 405310DEST_PATH_IMAGE026
Carry out H 1=
Figure 771569DEST_PATH_IMAGE027
Figure 312272DEST_PATH_IMAGE002
Figure 814798DEST_PATH_IMAGE011
Figure 566544DEST_PATH_IMAGE003
Figure 154520DEST_PATH_IMAGE011
Figure 246159DEST_PATH_IMAGE011
Figure 879790DEST_PATH_IMAGE005
Figure 220642DEST_PATH_IMAGE011
Figure 227781DEST_PATH_IMAGE006
Figure 704899DEST_PATH_IMAGE011
Figure 381868DEST_PATH_IMAGE007
Figure 947366DEST_PATH_IMAGE011
Figure 758196DEST_PATH_IMAGE008
Figure 89820DEST_PATH_IMAGE011
Figure 327903DEST_PATH_IMAGE009
Figure 380697DEST_PATH_IMAGE011
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing in the time of monobasic circulation cryptographic calculation, make next monobasic circulation cryptographic calculation point to H 2=
Figure 729639DEST_PATH_IMAGE012
Figure 181349DEST_PATH_IMAGE002
Figure 590334DEST_PATH_IMAGE003
Figure 864845DEST_PATH_IMAGE012
Figure 17477DEST_PATH_IMAGE004
Figure 323694DEST_PATH_IMAGE012
Figure 903580DEST_PATH_IMAGE005
Figure 803402DEST_PATH_IMAGE012
Figure 497077DEST_PATH_IMAGE006
Figure 657799DEST_PATH_IMAGE012
Figure 408587DEST_PATH_IMAGE007
Figure 156225DEST_PATH_IMAGE012
Figure 653590DEST_PATH_IMAGE008
Figure 934399DEST_PATH_IMAGE012
Figure 731453DEST_PATH_IMAGE009
Figure 464923DEST_PATH_IMAGE012
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right Carry out H 2=
Figure 612277DEST_PATH_IMAGE012
Figure 704867DEST_PATH_IMAGE002
Figure 925633DEST_PATH_IMAGE028
Figure 761871DEST_PATH_IMAGE003
Figure 20201DEST_PATH_IMAGE012
Figure 283692DEST_PATH_IMAGE004
Figure 850809DEST_PATH_IMAGE012
Figure 621231DEST_PATH_IMAGE005
Figure 606504DEST_PATH_IMAGE012
Figure 794559DEST_PATH_IMAGE006
Figure 902378DEST_PATH_IMAGE007
Figure 20722DEST_PATH_IMAGE012
Figure 875284DEST_PATH_IMAGE008
Figure 685501DEST_PATH_IMAGE012
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing in the time of monobasic circulation cryptographic calculation, make next monobasic circulation cryptographic calculation point to H 3=
Figure 639179DEST_PATH_IMAGE014
Figure 546480DEST_PATH_IMAGE002
Figure 190956DEST_PATH_IMAGE014
Figure 257526DEST_PATH_IMAGE003
Figure 204622DEST_PATH_IMAGE030
Figure 596289DEST_PATH_IMAGE004
Figure 318817DEST_PATH_IMAGE006
Figure 448972DEST_PATH_IMAGE014
Figure 972357DEST_PATH_IMAGE007
Figure 510523DEST_PATH_IMAGE014
Figure 879712DEST_PATH_IMAGE008
Figure 47574DEST_PATH_IMAGE009
Figure 274418DEST_PATH_IMAGE014
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this monobasic circulation cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 865324DEST_PATH_IMAGE001
carry out monobasic circulation cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, can provide valid certificates for true trade mark, there is stronger anti-forgery ability simultaneously.
For solving above-mentioned technical matters, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, each 8 one group of scale-of-two anti-counterfeiting information in scale-of-two anti-counterfeiting information table are expanded to 32 one group of scale-of-two anti-counterfeiting information, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, each 32 scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table are carried out to monobasic circulation cryptographic calculation, generate the binary add tight defense fake information table of 32 group, utilize 32 binary add tight defense fake informations process chnnel codings in binary add tight defense fake information table, generation has the binary modulated signal of 32 group of error detecting and error correcting function, chnnel coding can adopt loop coding, convolutional encoding or Turbo coding various ways, trade mark page original continuous is changed the line map, and image signal is processed (RIP) through rasterizing and hybrid screening is exported shadow tone hybrid screening picture signal, comprising amplitude and FM screened image signal, utilize 32 one group of binary modulated signals that generate to adopt the electric conductivity of amplitude in circulation look-up table modulation system modulation hybrid screening picture signal, the electric conductivity that makes amplitude is according to the dielectric ink amplitude and the electrically conductive ink amplitude is regular changes, make adjacent 32 amplitudes in the hybrid screening picture signal carry 32 scale-of-two anti-counterfeiting information by the change of electric conductivity, thereby be created on the hybrid screening picture signal that embeds anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, at first gather trade mark page site electric conductivity signal, identification through the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generate scale-of-two deciphering anti-counterfeiting information table after channel-decoding, 32 binary messages of i group that scale-of-two is deciphered in the anti-counterfeiting information table are denoted as M i.
Binary system is deciphered to 32 binary message M in the anti-counterfeiting information table iThe initial value design of Position Control variable i be i=1, the initial value when initial value of setting encryption parameter C is encryption, the initial value when initial value of setting encryption variables q, j, d, e, f, g, h, r and p is encryption, the initial value design of binary operator control variables k is k=0, known by monobasic circulation ciphering process, during binary operator control variables k=0, decrypt operation is M i=
Figure 334352DEST_PATH_IMAGE010
Figure 691384DEST_PATH_IMAGE002
Figure 216693DEST_PATH_IMAGE011
Figure 167331DEST_PATH_IMAGE003
Figure 174470DEST_PATH_IMAGE011
Figure 651588DEST_PATH_IMAGE004
Figure 120206DEST_PATH_IMAGE005
Figure 931036DEST_PATH_IMAGE011
Figure 376109DEST_PATH_IMAGE011
Figure 425974DEST_PATH_IMAGE007
Figure 777845DEST_PATH_IMAGE011
Figure 229555DEST_PATH_IMAGE008
Figure 628088DEST_PATH_IMAGE011
Figure 40614DEST_PATH_IMAGE009
Figure 193247DEST_PATH_IMAGE011
, during binary operator control variables k=1, decrypt operation is M i=
Figure 499463DEST_PATH_IMAGE012
Figure 79349DEST_PATH_IMAGE002
Figure 841157DEST_PATH_IMAGE013
Figure 407267DEST_PATH_IMAGE003
Figure 833569DEST_PATH_IMAGE012
Figure 584356DEST_PATH_IMAGE004
Figure 830530DEST_PATH_IMAGE012
Figure 327895DEST_PATH_IMAGE005
Figure 608704DEST_PATH_IMAGE012
Figure 139228DEST_PATH_IMAGE012
Figure 171775DEST_PATH_IMAGE007
Figure 310020DEST_PATH_IMAGE012
Figure 402609DEST_PATH_IMAGE008
Figure 623375DEST_PATH_IMAGE012
Figure 459613DEST_PATH_IMAGE009
Figure 428927DEST_PATH_IMAGE012
, during binary operator control variables k=2, decrypt operation is M i=
Figure 692418DEST_PATH_IMAGE014
Figure 400480DEST_PATH_IMAGE002
Figure 915775DEST_PATH_IMAGE014
Figure 760103DEST_PATH_IMAGE003
Figure 197425DEST_PATH_IMAGE015
Figure 392783DEST_PATH_IMAGE004
Figure 570823DEST_PATH_IMAGE014
Figure 535237DEST_PATH_IMAGE005
Figure 143461DEST_PATH_IMAGE014
Figure 417633DEST_PATH_IMAGE014
Figure 236553DEST_PATH_IMAGE007
Figure 278328DEST_PATH_IMAGE014
Figure 185628DEST_PATH_IMAGE008
Figure 466940DEST_PATH_IMAGE014
, during binary operator control variables k=3, decrypt operation is M i=
Figure 185071DEST_PATH_IMAGE002
Figure 978583DEST_PATH_IMAGE016
Figure 96581DEST_PATH_IMAGE003
Figure 850910DEST_PATH_IMAGE016
Figure 712556DEST_PATH_IMAGE004
Figure 363504DEST_PATH_IMAGE017
Figure 917982DEST_PATH_IMAGE005
Figure 284242DEST_PATH_IMAGE016
Figure 683999DEST_PATH_IMAGE006
Figure 455033DEST_PATH_IMAGE016
Figure 643755DEST_PATH_IMAGE016
Figure 847203DEST_PATH_IMAGE008
Figure 469815DEST_PATH_IMAGE016
Figure 444297DEST_PATH_IMAGE016
, during binary operator control variables k=4, decrypt operation is M i=
Figure 451437DEST_PATH_IMAGE018
Figure 928554DEST_PATH_IMAGE002
Figure 22103DEST_PATH_IMAGE018
Figure 584672DEST_PATH_IMAGE003
Figure 602492DEST_PATH_IMAGE004
Figure 840576DEST_PATH_IMAGE018
Figure 893370DEST_PATH_IMAGE005
Figure 712793DEST_PATH_IMAGE018
Figure 249954DEST_PATH_IMAGE007
Figure 901405DEST_PATH_IMAGE018
Figure 925862DEST_PATH_IMAGE009
Figure 616606DEST_PATH_IMAGE018
, during binary operator control variables k=5, decrypt operation is M i=
Figure 45838DEST_PATH_IMAGE020
Figure 531046DEST_PATH_IMAGE002
Figure 918165DEST_PATH_IMAGE020
Figure 412600DEST_PATH_IMAGE003
Figure 85918DEST_PATH_IMAGE020
Figure 519359DEST_PATH_IMAGE020
Figure 614878DEST_PATH_IMAGE006
Figure 547248DEST_PATH_IMAGE007
Figure 519492DEST_PATH_IMAGE020
Figure 493974DEST_PATH_IMAGE020
Figure 868324DEST_PATH_IMAGE009
Figure 978231DEST_PATH_IMAGE020
, during binary operator control variables k=6, decrypt operation is M i=
Figure 664318DEST_PATH_IMAGE022
Figure 628732DEST_PATH_IMAGE003
Figure 651100DEST_PATH_IMAGE004
Figure 635761DEST_PATH_IMAGE022
Figure 454682DEST_PATH_IMAGE005
Figure 230877DEST_PATH_IMAGE022
Figure 400827DEST_PATH_IMAGE006
Figure 597026DEST_PATH_IMAGE007
Figure 685068DEST_PATH_IMAGE023
Figure 400269DEST_PATH_IMAGE022
Figure 931132DEST_PATH_IMAGE009
Figure 314709DEST_PATH_IMAGE022
, during binary operator control variables k=7, decrypt operation is M i=
Figure 193672DEST_PATH_IMAGE024
Figure 578703DEST_PATH_IMAGE024
Figure 136111DEST_PATH_IMAGE003
Figure 236791DEST_PATH_IMAGE024
Figure 902127DEST_PATH_IMAGE004
Figure 545598DEST_PATH_IMAGE024
Figure 5398DEST_PATH_IMAGE005
Figure 885321DEST_PATH_IMAGE024
Figure 88769DEST_PATH_IMAGE006
Figure 711380DEST_PATH_IMAGE024
Figure 342082DEST_PATH_IMAGE007
Figure 685863DEST_PATH_IMAGE024
Figure 568368DEST_PATH_IMAGE008
Figure 675237DEST_PATH_IMAGE024
, first M from binary system deciphering anti-counterfeiting information table 1Start, to each 32 the binary message M in binary system deciphering anti-counterfeiting information table iCarry out corresponding decrypt operation, solve the binary system anti-counterfeiting information
Figure 223417DEST_PATH_IMAGE001
, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, removes highly 24, recovers to generate the binary system anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.
The accompanying drawing explanation
Below in conjunction with accompanying drawing, the present invention is further described.
Fig. 1 is one-piece construction figure of the present invention.
Fig. 2 is A of the present invention-A cut-open view.
Fig. 3 loads the anti-counterfeiting information process flow diagram.
Fig. 4 extracts the anti-counterfeiting information process flow diagram.
Embodiment
In Fig. 1 and Fig. 2, encryption anti-counterfeiting information storage trade mark, by trade mark page paper 7-1, be printed on amplitude 6-1 on trade mark page paper 7-1 to 6-150, be printed on horizontal scanning line 1-1 on trade mark page paper 7-1 and form to 2-10 to 1-15, the column scan line 2-1 that is printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 consist of to 6-150 amplitude 6-1
According to storage binary add tight defense fake information, a part of amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper 7-1 is printed and is formed by dielectric ink, horizontal scanning line 1-1 on trade mark page paper 7-1 is printed and is formed by electrically conducting transparent printing ink to 2-10 to 1-15 and column scan line 2-1
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, and the light amplitude on trade mark page paper 7-1 is printed and formed by dielectric ink,
The amplitude be printed on trade mark page paper 7-1 is divided into 15 row 10 row on the trade mark paper, amplitude 6-1 neatly is matrix and arranges on trade mark page paper 7-1 to 6-150, allow i get 1 to 15, allow j get 1 to 10, j bar column scan line on trade mark page paper 7-1 is electrically connected to the basal surface of each amplitude of j on trade mark page paper 7-1 row, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper 7-1 is capable with i on trade mark page paper 7-1 is electrically connected to
In the time the binary add tight defense fake information of trade mark page stores need to being read, 15 horizontal scanning lines of the 1st horizontal scanning line to the on trade mark page paper 7-1 are set to high level successively,
When the 1st horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary add tight defense fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is from 10 column scan line outputs of the 1st column scan line to the, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 1 by electrically conductive ink, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 0 by dielectric ink, therefore the binary add tight defense fake information 1100001000 that the 1st row is read, can repeat above-mentioned readout to other row on trade mark page paper 7-1.
In loading anti-counterfeiting information process flow diagram 3, original anti-counterfeiting information (image, word) is through digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, 8 one group of binary messages in scale-of-two anti-counterfeiting information table are expanded to 32 one group of binary messages, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, and 32 binary messages of i group in 32 one group scale-of-two anti-counterfeiting information table are denoted as
Figure 820620DEST_PATH_IMAGE001
, i is greater than 0 positive integer, 32 binary add tight defense fake informations of first from 32 one group scale-of-two anti-counterfeiting information table
Figure 793125DEST_PATH_IMAGE026
start, to each 32 the scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table
Figure 842989DEST_PATH_IMAGE001
carry out monobasic circulation cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that scale-of-two anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize the trademark anti-counterfeit printing, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, realize trademark anti-counterfeit.
In extracting anti-counterfeiting information process flow diagram 4, when extracting anti-counterfeiting information, at first gather the electric conductivity signal of trade mark page halftone dot image, through the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generates scale-of-two deciphering anti-counterfeiting information table after channel-decoding.
By 32 binary message M in the scale-of-two deciphering anti-counterfeiting information table generated after decoding ithe initial value design of position control variable i be i=1, the initial value when initial value of setting encryption parameter is encryption, the initial value when initial value of setting encryption variables is encryption, the initial value design of binary operator control variable k is k=0, first M from the scale-of-two deciphering anti-counterfeiting information table generated 1start, to each 32 the binary message M in scale-of-two deciphering anti-counterfeiting information table ibe decrypted computing, solve the scale-of-two anti-counterfeiting information
Figure 194860DEST_PATH_IMAGE001
, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, removes highly 24, recovers to generate the scale-of-two anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.

Claims (1)

1. one kind generates the binary modulated signal by anti-counterfeiting information by cryptographic calculation and chnnel coding, and by the circulation modulation system of tabling look-up, anti-counterfeiting information is embedded in to the one-parameter variable alternation monobasic circulation encryption anti-counterfeiting information storage trade mark in full page, it is characterized in that:anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, horizontal scanning line on trade mark page paper and column scan line are printed and are formed by electrically conducting transparent printing ink
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as , 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H ii is greater than 0 positive integer, binary system is encrypted parameter and is denoted as C, the binary system positive integer that encryption parameter C is 0<=C<=256, binary system is encrypted variable and is denoted as respectively q, j, d, e, f, g, h, r and p, the binary system positive integer that encryption variables q, j, d, e, f, g, h, r and p are 0 to 256, and the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 2013100235727100001DEST_PATH_IMAGE002
Figure 2013100235727100001DEST_PATH_IMAGE003
Figure 2013100235727100001DEST_PATH_IMAGE004
Figure DEST_PATH_IMAGE005
Figure DEST_PATH_IMAGE006
Figure DEST_PATH_IMAGE007
Figure DEST_PATH_IMAGE008
Figure DEST_PATH_IMAGE009
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 651308DEST_PATH_IMAGE003
Figure 730735DEST_PATH_IMAGE004
Figure 719550DEST_PATH_IMAGE005
Figure 520147DEST_PATH_IMAGE006
Figure 619822DEST_PATH_IMAGE007
Figure 946898DEST_PATH_IMAGE008
Figure 109544DEST_PATH_IMAGE009
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 131858DEST_PATH_IMAGE002
Figure 92172DEST_PATH_IMAGE004
Figure 419861DEST_PATH_IMAGE005
Figure 195050DEST_PATH_IMAGE006
Figure 636527DEST_PATH_IMAGE007
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 294505DEST_PATH_IMAGE003
Figure 450680DEST_PATH_IMAGE004
Figure 123101DEST_PATH_IMAGE005
Figure 604373DEST_PATH_IMAGE006
Figure 387652DEST_PATH_IMAGE007
Figure 273700DEST_PATH_IMAGE008
Figure 117022DEST_PATH_IMAGE009
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 91450DEST_PATH_IMAGE002
Figure 678420DEST_PATH_IMAGE003
Figure 823411DEST_PATH_IMAGE005
Figure 16626DEST_PATH_IMAGE006
Figure 404357DEST_PATH_IMAGE007
Figure 264997DEST_PATH_IMAGE008
Figure 450122DEST_PATH_IMAGE009
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 85773DEST_PATH_IMAGE003
Figure 800919DEST_PATH_IMAGE004
Figure 156946DEST_PATH_IMAGE005
Figure 590332DEST_PATH_IMAGE006
Figure 54287DEST_PATH_IMAGE007
Figure 14153DEST_PATH_IMAGE008
Figure 541080DEST_PATH_IMAGE009
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 196184DEST_PATH_IMAGE002
Figure 466759DEST_PATH_IMAGE003
Figure 857256DEST_PATH_IMAGE005
Figure 999655DEST_PATH_IMAGE006
Figure 73922DEST_PATH_IMAGE007
Figure 483967DEST_PATH_IMAGE009
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 238296DEST_PATH_IMAGE002
Figure 515005DEST_PATH_IMAGE004
Figure 557566DEST_PATH_IMAGE005
Figure 90627DEST_PATH_IMAGE007
Figure 343885DEST_PATH_IMAGE008
Figure 817067DEST_PATH_IMAGE009
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 607933DEST_PATH_IMAGE004
Figure 254947DEST_PATH_IMAGE005
Figure 83881DEST_PATH_IMAGE006
Figure 841753DEST_PATH_IMAGE007
Figure 69603DEST_PATH_IMAGE008
Figure 887517DEST_PATH_IMAGE009
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, monobasic circulation cryptographic calculation is defined as H i=
Figure DEST_PATH_IMAGE010
Figure DEST_PATH_IMAGE011
Figure 634817DEST_PATH_IMAGE003
Figure 717174DEST_PATH_IMAGE011
Figure 685481DEST_PATH_IMAGE004
Figure 486078DEST_PATH_IMAGE011
Figure 585752DEST_PATH_IMAGE005
Figure 788195DEST_PATH_IMAGE011
Figure 679403DEST_PATH_IMAGE006
Figure 967296DEST_PATH_IMAGE011
Figure 995295DEST_PATH_IMAGE007
Figure 52244DEST_PATH_IMAGE011
Figure 382862DEST_PATH_IMAGE008
Figure 895402DEST_PATH_IMAGE011
Figure 336878DEST_PATH_IMAGE009
Figure 513913DEST_PATH_IMAGE011
, during binary operator control variables k=1, monobasic circulation cryptographic calculation is defined as H i=
Figure DEST_PATH_IMAGE012
Figure 887869DEST_PATH_IMAGE002
Figure DEST_PATH_IMAGE013
Figure 5309DEST_PATH_IMAGE012
Figure 39780DEST_PATH_IMAGE004
Figure 712201DEST_PATH_IMAGE012
Figure 196403DEST_PATH_IMAGE005
Figure 104316DEST_PATH_IMAGE012
Figure 990363DEST_PATH_IMAGE006
Figure 830756DEST_PATH_IMAGE012
Figure 389224DEST_PATH_IMAGE012
Figure 132708DEST_PATH_IMAGE008
Figure 22754DEST_PATH_IMAGE012
, during binary operator control variables k=2, monobasic circulation cryptographic calculation is defined as H i=
Figure DEST_PATH_IMAGE014
Figure 617815DEST_PATH_IMAGE002
Figure 800010DEST_PATH_IMAGE014
Figure 746100DEST_PATH_IMAGE003
Figure DEST_PATH_IMAGE015
Figure 268315DEST_PATH_IMAGE014
Figure 624341DEST_PATH_IMAGE005
Figure 57728DEST_PATH_IMAGE014
Figure 524612DEST_PATH_IMAGE006
Figure 91335DEST_PATH_IMAGE014
Figure 663579DEST_PATH_IMAGE014
Figure 934155DEST_PATH_IMAGE008
Figure 623893DEST_PATH_IMAGE014
Figure 324652DEST_PATH_IMAGE009
Figure 467051DEST_PATH_IMAGE014
, during binary operator control variables k=3, monobasic circulation cryptographic calculation is defined as H i=
Figure DEST_PATH_IMAGE016
Figure 541317DEST_PATH_IMAGE002
Figure 85562DEST_PATH_IMAGE016
Figure 951363DEST_PATH_IMAGE003
Figure 581058DEST_PATH_IMAGE016
Figure 193436DEST_PATH_IMAGE004
Figure 592188DEST_PATH_IMAGE017
Figure 22032DEST_PATH_IMAGE005
Figure 141954DEST_PATH_IMAGE016
Figure 292443DEST_PATH_IMAGE006
Figure 811280DEST_PATH_IMAGE016
Figure 21813DEST_PATH_IMAGE007
Figure 750735DEST_PATH_IMAGE016
Figure 75329DEST_PATH_IMAGE016
Figure 722342DEST_PATH_IMAGE009
Figure 548347DEST_PATH_IMAGE016
, during binary operator control variables k=4, monobasic circulation cryptographic calculation is defined as H i=
Figure 430852DEST_PATH_IMAGE018
Figure 638195DEST_PATH_IMAGE002
Figure 456109DEST_PATH_IMAGE018
Figure 65393DEST_PATH_IMAGE018
Figure 537963DEST_PATH_IMAGE004
Figure 523849DEST_PATH_IMAGE018
Figure 324446DEST_PATH_IMAGE005
Figure 424120DEST_PATH_IMAGE019
Figure 523630DEST_PATH_IMAGE018
Figure 936157DEST_PATH_IMAGE007
Figure 839522DEST_PATH_IMAGE018
Figure 896470DEST_PATH_IMAGE008
Figure 961510DEST_PATH_IMAGE018
Figure 733769DEST_PATH_IMAGE009
Figure 299880DEST_PATH_IMAGE018
, during binary operator control variables k=5, monobasic circulation cryptographic calculation is defined as H i=
Figure 476914DEST_PATH_IMAGE020
Figure 712855DEST_PATH_IMAGE002
Figure 975340DEST_PATH_IMAGE020
Figure 223437DEST_PATH_IMAGE003
Figure 114033DEST_PATH_IMAGE020
Figure 786454DEST_PATH_IMAGE004
Figure 270656DEST_PATH_IMAGE020
Figure 319514DEST_PATH_IMAGE005
Figure 202632DEST_PATH_IMAGE020
Figure 45954DEST_PATH_IMAGE006
Figure 397213DEST_PATH_IMAGE021
Figure 108817DEST_PATH_IMAGE007
Figure 846442DEST_PATH_IMAGE020
Figure 860665DEST_PATH_IMAGE008
Figure 319459DEST_PATH_IMAGE020
Figure 346275DEST_PATH_IMAGE009
Figure 331548DEST_PATH_IMAGE020
, during binary operator control variables k=6, monobasic circulation cryptographic calculation is defined as H i=
Figure 516673DEST_PATH_IMAGE022
Figure 462764DEST_PATH_IMAGE002
Figure 391536DEST_PATH_IMAGE022
Figure 752220DEST_PATH_IMAGE004
Figure 484684DEST_PATH_IMAGE022
Figure 54337DEST_PATH_IMAGE005
Figure 584194DEST_PATH_IMAGE022
Figure 504876DEST_PATH_IMAGE006
Figure 900086DEST_PATH_IMAGE022
Figure 324245DEST_PATH_IMAGE007
Figure 287653DEST_PATH_IMAGE023
Figure 427123DEST_PATH_IMAGE008
Figure 904689DEST_PATH_IMAGE009
Figure 38998DEST_PATH_IMAGE022
, during binary operator control variables k=7, monobasic circulation cryptographic calculation is defined as H i=
Figure DEST_PATH_IMAGE024
Figure 159367DEST_PATH_IMAGE024
Figure 433485DEST_PATH_IMAGE003
Figure 863329DEST_PATH_IMAGE024
Figure 711812DEST_PATH_IMAGE004
Figure 127881DEST_PATH_IMAGE024
Figure 646718DEST_PATH_IMAGE005
Figure 857251DEST_PATH_IMAGE024
Figure 543283DEST_PATH_IMAGE024
Figure 916626DEST_PATH_IMAGE007
Figure 298060DEST_PATH_IMAGE024
Figure 389644DEST_PATH_IMAGE008
Figure DEST_PATH_IMAGE025
Figure 144586DEST_PATH_IMAGE009
Figure 372436DEST_PATH_IMAGE024
, the initial value of setting encryption parameter C, the initial value of setting encryption variables q, j, d, e, f, g, h, r and p, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 190351DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right
Figure DEST_PATH_IMAGE026
Carry out H 1=
Figure DEST_PATH_IMAGE027
Figure 358510DEST_PATH_IMAGE002
Figure 654493DEST_PATH_IMAGE011
Figure 2429DEST_PATH_IMAGE003
Figure 725665DEST_PATH_IMAGE011
Figure 523333DEST_PATH_IMAGE004
Figure 950083DEST_PATH_IMAGE005
Figure 397693DEST_PATH_IMAGE006
Figure 38409DEST_PATH_IMAGE011
Figure 219991DEST_PATH_IMAGE007
Figure 550609DEST_PATH_IMAGE011
Figure 325799DEST_PATH_IMAGE008
Figure 767275DEST_PATH_IMAGE011
Figure 675801DEST_PATH_IMAGE009
Figure 177321DEST_PATH_IMAGE011
Monobasic circulation cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 564440DEST_PATH_IMAGE026
Carry out H 1=
Figure 544028DEST_PATH_IMAGE027
Figure 575569DEST_PATH_IMAGE002
Figure 250920DEST_PATH_IMAGE011
Figure 735122DEST_PATH_IMAGE003
Figure 783980DEST_PATH_IMAGE011
Figure 794662DEST_PATH_IMAGE004
Figure 637984DEST_PATH_IMAGE011
Figure 606552DEST_PATH_IMAGE005
Figure 927943DEST_PATH_IMAGE011
Figure 934077DEST_PATH_IMAGE006
Figure 72934DEST_PATH_IMAGE011
Figure 531728DEST_PATH_IMAGE007
Figure 659740DEST_PATH_IMAGE011
Figure 520380DEST_PATH_IMAGE008
Figure 705505DEST_PATH_IMAGE011
Figure 651595DEST_PATH_IMAGE009
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing in the time of monobasic circulation cryptographic calculation, make next monobasic circulation cryptographic calculation point to H 2=
Figure 773244DEST_PATH_IMAGE002
Figure DEST_PATH_IMAGE028
Figure 816418DEST_PATH_IMAGE003
Figure 673515DEST_PATH_IMAGE012
Figure 608963DEST_PATH_IMAGE012
Figure 529645DEST_PATH_IMAGE005
Figure 800221DEST_PATH_IMAGE012
Figure 221450DEST_PATH_IMAGE006
Figure 309492DEST_PATH_IMAGE012
Figure 451891DEST_PATH_IMAGE007
Figure 260579DEST_PATH_IMAGE012
Figure 804824DEST_PATH_IMAGE008
Figure 942062DEST_PATH_IMAGE012
Figure 306179DEST_PATH_IMAGE009
Figure 308770DEST_PATH_IMAGE012
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right Carry out H 2=
Figure 582888DEST_PATH_IMAGE012
Figure 619589DEST_PATH_IMAGE002
Figure 736581DEST_PATH_IMAGE028
Figure 277284DEST_PATH_IMAGE003
Figure 530542DEST_PATH_IMAGE012
Figure 6653DEST_PATH_IMAGE004
Figure 568052DEST_PATH_IMAGE005
Figure 66029DEST_PATH_IMAGE012
Figure 539047DEST_PATH_IMAGE012
Figure 293989DEST_PATH_IMAGE007
Figure 397205DEST_PATH_IMAGE012
Figure 949540DEST_PATH_IMAGE008
Figure 265771DEST_PATH_IMAGE012
Figure 951967DEST_PATH_IMAGE009
Figure 34324DEST_PATH_IMAGE012
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing in the time of monobasic circulation cryptographic calculation, make next monobasic circulation cryptographic calculation point to H 3=
Figure 23139DEST_PATH_IMAGE014
Figure 823736DEST_PATH_IMAGE002
Figure 920481DEST_PATH_IMAGE014
Figure 247557DEST_PATH_IMAGE003
Figure DEST_PATH_IMAGE030
Figure 282640DEST_PATH_IMAGE004
Figure 304954DEST_PATH_IMAGE014
Figure 187811DEST_PATH_IMAGE005
Figure 700012DEST_PATH_IMAGE006
Figure 475201DEST_PATH_IMAGE014
Figure 916678DEST_PATH_IMAGE007
Figure 825204DEST_PATH_IMAGE014
Figure 323629DEST_PATH_IMAGE014
Figure 568797DEST_PATH_IMAGE009
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this monobasic circulation cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 275689DEST_PATH_IMAGE001
Carry out monobasic circulation cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN2013100235727A 2013-01-22 2013-01-22 Single parameter variable transmutation unitary circulation encryption anti-counterfeiting information storage trademark Pending CN103106487A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100235727A CN103106487A (en) 2013-01-22 2013-01-22 Single parameter variable transmutation unitary circulation encryption anti-counterfeiting information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100235727A CN103106487A (en) 2013-01-22 2013-01-22 Single parameter variable transmutation unitary circulation encryption anti-counterfeiting information storage trademark

Publications (1)

Publication Number Publication Date
CN103106487A true CN103106487A (en) 2013-05-15

Family

ID=48314333

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100235727A Pending CN103106487A (en) 2013-01-22 2013-01-22 Single parameter variable transmutation unitary circulation encryption anti-counterfeiting information storage trademark

Country Status (1)

Country Link
CN (1) CN103106487A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101022499A (en) * 2007-03-06 2007-08-22 北京大学 Method for abstracting graph and text infromation utilizing half-hue image networking hiding
CN101079147A (en) * 2007-06-25 2007-11-28 中山大学 Multiple bit digital watermark method capable of resisting printing, scanning and geometric transformation
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101022499A (en) * 2007-03-06 2007-08-22 北京大学 Method for abstracting graph and text infromation utilizing half-hue image networking hiding
CN101079147A (en) * 2007-06-25 2007-11-28 中山大学 Multiple bit digital watermark method capable of resisting printing, scanning and geometric transformation
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯登国,裴定一: "《密码学导引》", 30 April 1999 *

Similar Documents

Publication Publication Date Title
CN103106427A (en) Single parameter multiple-encryption anti-counterfeiting information storage trademark
CN103106446A (en) One-parameter unary encryption anti-fake information storage brand
CN103106428A (en) One-parameter unary circulating encryption anti-fake information storage brand
CN103106487A (en) Single parameter variable transmutation unitary circulation encryption anti-counterfeiting information storage trademark
CN103106466A (en) Single parameter variable transmutation binary variable circulation encryption anti-counterfeiting information storage trademark
CN103106463A (en) Single parameter variable transmutation polytomized variable circulation encryption anti-counterfeiting information storage trademark
CN103106491A (en) Single parameter variable transmutation ternary encryption anti-counterfeiting information storage trademark
CN103106467A (en) Single parameter variable transmutation binary circulation encryption anti-counterfeiting information storage trademark
CN103106464A (en) Single parameter variable transmutation ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103106456A (en) Single parameter polymtized variable circulation encryption anti-counterfeiting information storage trademark
CN103106476A (en) Single variable parameter transmutation unitary circulation encryption anti-counterfeiting information storage trademark
CN103106489A (en) Single parameter ternary encryption anti-counterfeiting information storage trademark
CN103106471A (en) Single parameter variable transmutation ternary encryption anti-counterfeiting information storage trademark
CN103106486A (en) Single parameter multivariable ternary circulation encryption anti-counterfeiting information storage trademark
CN103106508A (en) Single parameter ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103106469A (en) Single parameter multivariable unitary encryption anti-counterfeiting information storage trademark
CN103116774A (en) Parameter transmutation unary circulation encryption anti-fake information storage trademark
CN103116783A (en) Parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103106445A (en) Single parameter multivariable binary encryption anti-counterfeiting information storage trademark
CN103106500A (en) Single variable parameter transmutation unitary encryption anti-counterfeiting information storage trademark
CN103116779A (en) One-parameter variation transmutation multivariable circulation encryption anti-fake information storage trademark
CN103106484A (en) Parameter transmutation multi-element circulation encryption anti-fake information storage trademark
CN103106509A (en) Single variable parameter transmutation multi-element variable circulation encryption anti-fake information storage trademark
CN103106437A (en) Single parameter variable transmutation polytomized variable anti-counterfeiting information storage trademark
CN103106433A (en) Single parameter multivariable multiple-encryption anti-counterfeiting information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130515