CN103116789A - One-parameter double variant ternary circulation encryption anti-fake information storage trademark - Google Patents

One-parameter double variant ternary circulation encryption anti-fake information storage trademark Download PDF

Info

Publication number
CN103116789A
CN103116789A CN2013100223289A CN201310022328A CN103116789A CN 103116789 A CN103116789 A CN 103116789A CN 2013100223289 A CN2013100223289 A CN 2013100223289A CN 201310022328 A CN201310022328 A CN 201310022328A CN 103116789 A CN103116789 A CN 103116789A
Authority
CN
China
Prior art keywords
binary
trade mark
counterfeiting information
group
operator control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100223289A
Other languages
Chinese (zh)
Inventor
刘志京
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN2013100223289A priority Critical patent/CN103116789A/en
Publication of CN103116789A publication Critical patent/CN103116789A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a one-parameter double variant ternary circulation encryption anti-fake information storage trademark. By the adoption of the trademark, binary system anti-fake information can produce a binary system modulating signal through a ternary circulation encryption and channel coding, and through a circulation look-up table modulation mode, the anti-fake information is inserted in a whole trademark page by changing the conductivity of an amplitude modulation dot in order. The anti-fake information can be recognized from any fragment when the trademark is recognized. The one-parameter double variant ternary circulation encryption anti-fake information storage trademark can be used in every kind of trademarks.

Description

One-parameter bivariate ternary circulation encryption anti-counterfeiting information storage trade mark
affiliated technical field:
The present invention relates to a kind of anti-false trademark, particularly a kind of one-parameter bivariate ternary circulation encryption anti-counterfeiting information is stored trade mark, this trade mark can be kept at binary add tight defense fake information on the trade mark page and realize the false proof of trade mark, and what this trade mark can be for extensive stock is false proof.
background technology:
Anti-false trademark, claim again antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, is a kind of proof label of discerning the false from the genuine, preventing personation, be in the commodity process of circulation people for distinguishing true and false, the sign of distinguishing the commercial quality quality of merchandise resources.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and client's interests.The trade mark of China has carried out innovation audaciously; adopted laser anti-counterfeit, the core micropore is false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but the false proof struggle with fraud is high-tech trial of strength; advanced anti-counterfeiting technology has certain ageing again; so; must constantly promote trade mark anti-fake technique; could false proof with fake in forever maintain the leading position, this is also that protection businessman and client's interests are maintained the commodity safe basic assurance that circulates.
summary of the invention:
For reliability and the security that improves trademark anti-counterfeit, the deficiency that the present invention is directed to existing trademark anti-counterfeit existence is improved existing trade mark anti-fake technique, a kind of anti-counterfeiting information storage trade mark has been proposed, this trade mark is by the change to amplitude electric conductivity in brand printing, encryption anti-counterfeiting information is embedded on the whole trade mark page with scale-of-two coded signal form, can identify encryption anti-counterfeiting information when brand recognition from any one fragment, therefore there is very strong disguise and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, image and word on trade mark page paper consist of amplitude,
Binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, and the horizontal scanning line on trade mark page paper and column scan line are printed and formed by electrically conducting transparent printing ink
The horizontal scanning line be printed on trade mark page paper has the N bar, the column scan line be printed on trade mark page paper has the M bar, the amplitude be printed on trade mark page paper is divided into the capable M row of N on the trade mark paper, amplitude neatly is matrix and arranges on trade mark page paper paper, allow i get 1 to N, allow j get 1 to M, j bar column scan line on trade mark page paper is electrically connected to the basal surface of each amplitude of the row of the j on trade mark page paper, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper is capable with i on trade mark page paper is electrically connected to
In the time the binary message of trade mark page stores need to being read, be set to successively high level to N bar horizontal scanning line by the 1st on trade mark page paper,
When the 1st horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported from the 1st column scan line to M bar column scan line with 0,1 code form, the 1st row on trade mark page paper is printed the amplitude output binary message 1 formed by electrically conductive ink, the 1st row on trade mark page paper is printed the amplitude output binary message 0 formed by dielectric ink, can repeat above-mentioned readout to other row on trade mark page paper
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 2013100223289100002DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H ii is greater than 0 positive integer, binary system is encrypted parameter and is denoted as C, the binary system positive integer that encryption parameter C is 0<=C<=256, binary system is encrypted variable and is denoted as respectively q, j, d, e, f, g, h and r, the binary system positive integer that encryption variables q, j, d, e, f, g, h and r are 0 to 256, and the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 2013100223289100002DEST_PATH_IMAGE002
Figure 2013100223289100002DEST_PATH_IMAGE003
Figure 2013100223289100002DEST_PATH_IMAGE005
Figure 2013100223289100002DEST_PATH_IMAGE006
Figure 2013100223289100002DEST_PATH_IMAGE007
Figure 2013100223289100002DEST_PATH_IMAGE008
Figure 2013100223289100002DEST_PATH_IMAGE009
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 970089DEST_PATH_IMAGE002
Figure 604650DEST_PATH_IMAGE004
Figure 186810DEST_PATH_IMAGE005
Figure 470024DEST_PATH_IMAGE006
Figure 761328DEST_PATH_IMAGE007
Figure 746470DEST_PATH_IMAGE008
Figure 414212DEST_PATH_IMAGE009
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 551932DEST_PATH_IMAGE002
Figure 743965DEST_PATH_IMAGE003
Figure 967136DEST_PATH_IMAGE004
Figure 165216DEST_PATH_IMAGE006
Figure 492478DEST_PATH_IMAGE008
Figure 236444DEST_PATH_IMAGE009
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 599795DEST_PATH_IMAGE004
Figure 147451DEST_PATH_IMAGE005
Figure 832379DEST_PATH_IMAGE006
Figure 72867DEST_PATH_IMAGE007
Figure 492347DEST_PATH_IMAGE008
Figure 92962DEST_PATH_IMAGE009
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 914287DEST_PATH_IMAGE002
Figure 325677DEST_PATH_IMAGE003
Figure 950562DEST_PATH_IMAGE004
Figure 781432DEST_PATH_IMAGE006
Figure 363723DEST_PATH_IMAGE007
Figure 7063DEST_PATH_IMAGE008
Figure 700212DEST_PATH_IMAGE009
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 699392DEST_PATH_IMAGE002
Figure 701852DEST_PATH_IMAGE003
Figure 583221DEST_PATH_IMAGE004
Figure 80061DEST_PATH_IMAGE005
Figure 730485DEST_PATH_IMAGE006
Figure 638267DEST_PATH_IMAGE007
Figure 475773DEST_PATH_IMAGE008
Figure 510725DEST_PATH_IMAGE009
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 530503DEST_PATH_IMAGE002
Figure 215879DEST_PATH_IMAGE004
Figure 54522DEST_PATH_IMAGE005
Figure 132069DEST_PATH_IMAGE006
Figure 397965DEST_PATH_IMAGE007
Figure 475642DEST_PATH_IMAGE008
Figure 367244DEST_PATH_IMAGE009
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 846767DEST_PATH_IMAGE002
Figure 283564DEST_PATH_IMAGE003
Figure 747092DEST_PATH_IMAGE005
Figure 81122DEST_PATH_IMAGE006
Figure 688821DEST_PATH_IMAGE007
Figure 990358DEST_PATH_IMAGE008
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 721554DEST_PATH_IMAGE005
Figure 697786DEST_PATH_IMAGE007
Figure 459068DEST_PATH_IMAGE008
Figure 785007DEST_PATH_IMAGE009
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, ternary circulation cryptographic calculation is defined as H i=
Figure 2013100223289100002DEST_PATH_IMAGE010
Figure 677963DEST_PATH_IMAGE002
Figure 2013100223289100002DEST_PATH_IMAGE011
Figure 985317DEST_PATH_IMAGE003
Figure 363526DEST_PATH_IMAGE004
Figure 381160DEST_PATH_IMAGE011
Figure 923186DEST_PATH_IMAGE010
Figure 59769DEST_PATH_IMAGE006
Figure 181178DEST_PATH_IMAGE011
Figure 908962DEST_PATH_IMAGE007
Figure 600975DEST_PATH_IMAGE011
Figure 56096DEST_PATH_IMAGE008
Figure 48323DEST_PATH_IMAGE011
, during binary operator control variables k=1, ternary circulation cryptographic calculation is defined as H i=
Figure 650708DEST_PATH_IMAGE011
Figure 231862DEST_PATH_IMAGE002
Figure 951742DEST_PATH_IMAGE003
Figure 499398DEST_PATH_IMAGE011
Figure 466217DEST_PATH_IMAGE004
Figure 690394DEST_PATH_IMAGE012
Figure 375454DEST_PATH_IMAGE005
Figure 266235DEST_PATH_IMAGE006
Figure 677625DEST_PATH_IMAGE012
Figure 584401DEST_PATH_IMAGE007
Figure 191969DEST_PATH_IMAGE011
Figure 133380DEST_PATH_IMAGE008
Figure 844164DEST_PATH_IMAGE009
Figure 786581DEST_PATH_IMAGE011
, during binary operator control variables k=2, ternary circulation cryptographic calculation is defined as H i=
Figure 804533DEST_PATH_IMAGE002
Figure 935169DEST_PATH_IMAGE011
Figure 166430DEST_PATH_IMAGE003
Figure 2013100223289100002DEST_PATH_IMAGE013
Figure 285695DEST_PATH_IMAGE004
Figure 296563DEST_PATH_IMAGE005
Figure 331515DEST_PATH_IMAGE013
Figure 85713DEST_PATH_IMAGE006
Figure 180708DEST_PATH_IMAGE011
Figure 952858DEST_PATH_IMAGE008
Figure 218754DEST_PATH_IMAGE011
Figure 483382DEST_PATH_IMAGE009
Figure 594558DEST_PATH_IMAGE011
, during binary operator control variables k=3, ternary circulation cryptographic calculation is defined as H i=
Figure 771865DEST_PATH_IMAGE002
Figure 930313DEST_PATH_IMAGE011
Figure 94447DEST_PATH_IMAGE003
Figure 694056DEST_PATH_IMAGE011
Figure 770596DEST_PATH_IMAGE004
Figure 72134DEST_PATH_IMAGE014
Figure 790691DEST_PATH_IMAGE005
Figure 741515DEST_PATH_IMAGE006
Figure 281081DEST_PATH_IMAGE014
Figure 803329DEST_PATH_IMAGE007
Figure 111951DEST_PATH_IMAGE011
Figure 310720DEST_PATH_IMAGE008
Figure 540844DEST_PATH_IMAGE014
Figure 866783DEST_PATH_IMAGE009
Figure 279179DEST_PATH_IMAGE011
, during binary operator control variables k=4, ternary circulation cryptographic calculation is defined as H i=
Figure 399582DEST_PATH_IMAGE011
Figure 913740DEST_PATH_IMAGE002
Figure 777790DEST_PATH_IMAGE011
Figure 44692DEST_PATH_IMAGE003
Figure 601576DEST_PATH_IMAGE011
Figure 337451DEST_PATH_IMAGE004
Figure 739613DEST_PATH_IMAGE011
Figure 126601DEST_PATH_IMAGE005
Figure 323227DEST_PATH_IMAGE006
Figure 1519DEST_PATH_IMAGE007
Figure 993746DEST_PATH_IMAGE015
Figure 95694DEST_PATH_IMAGE008
Figure 55429DEST_PATH_IMAGE011
Figure 911706DEST_PATH_IMAGE015
, during binary operator control variables k=5, ternary circulation cryptographic calculation is defined as H i=
Figure 981293DEST_PATH_IMAGE016
Figure 162745DEST_PATH_IMAGE002
Figure 942799DEST_PATH_IMAGE003
Figure 917708DEST_PATH_IMAGE011
Figure 852035DEST_PATH_IMAGE004
Figure 203382DEST_PATH_IMAGE011
Figure 24707DEST_PATH_IMAGE005
Figure 326562DEST_PATH_IMAGE006
Figure 481600DEST_PATH_IMAGE016
Figure 157432DEST_PATH_IMAGE007
Figure 864356DEST_PATH_IMAGE011
Figure 507696DEST_PATH_IMAGE008
Figure 669687DEST_PATH_IMAGE016
Figure 479784DEST_PATH_IMAGE011
, during binary operator control variables k=6, ternary circulation cryptographic calculation is defined as H i=
Figure 95573DEST_PATH_IMAGE011
Figure 592413DEST_PATH_IMAGE002
Figure 960947DEST_PATH_IMAGE003
Figure 288657DEST_PATH_IMAGE011
Figure 42855DEST_PATH_IMAGE005
Figure 728231DEST_PATH_IMAGE006
Figure 441158DEST_PATH_IMAGE007
Figure 707054DEST_PATH_IMAGE017
Figure 784732DEST_PATH_IMAGE008
Figure 161487DEST_PATH_IMAGE011
Figure 890277DEST_PATH_IMAGE009
Figure 327075DEST_PATH_IMAGE017
, during binary operator control variables k=7, ternary circulation cryptographic calculation is defined as H i=
Figure 892048DEST_PATH_IMAGE018
Figure 72494DEST_PATH_IMAGE002
Figure 921370DEST_PATH_IMAGE011
Figure 529069DEST_PATH_IMAGE003
Figure 315759DEST_PATH_IMAGE018
Figure 18005DEST_PATH_IMAGE004
Figure 472120DEST_PATH_IMAGE011
Figure 250720DEST_PATH_IMAGE005
Figure 524707DEST_PATH_IMAGE011
Figure 296222DEST_PATH_IMAGE006
Figure 604844DEST_PATH_IMAGE011
Figure 554345DEST_PATH_IMAGE007
Figure 581207DEST_PATH_IMAGE011
Figure 890835DEST_PATH_IMAGE008
Figure 319542DEST_PATH_IMAGE018
Figure 439945DEST_PATH_IMAGE009
Figure 688524DEST_PATH_IMAGE011
, the initial value of setting encryption parameter C, the initial value of setting encryption variables q, j, d, e, f, g, h and r, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 801842DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right
Figure 2013100223289100002DEST_PATH_IMAGE019
Carry out H 1=
Figure 553897DEST_PATH_IMAGE020
Figure 830344DEST_PATH_IMAGE011
Figure 635806DEST_PATH_IMAGE020
Figure 570450DEST_PATH_IMAGE011
Figure 34109DEST_PATH_IMAGE020
Figure 667216DEST_PATH_IMAGE006
Figure 626950DEST_PATH_IMAGE011
Figure 636495DEST_PATH_IMAGE007
Figure 483228DEST_PATH_IMAGE011
Figure 552815DEST_PATH_IMAGE008
Figure 734267DEST_PATH_IMAGE011
Figure 547502DEST_PATH_IMAGE009
Figure 717583DEST_PATH_IMAGE011
Ternary circulation cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 405459DEST_PATH_IMAGE019
Carry out H 1=
Figure 824939DEST_PATH_IMAGE020
Figure 176286DEST_PATH_IMAGE002
Figure 997612DEST_PATH_IMAGE011
Figure 219121DEST_PATH_IMAGE003
Figure 844006DEST_PATH_IMAGE020
Figure 999044DEST_PATH_IMAGE004
Figure 975276DEST_PATH_IMAGE005
Figure 962824DEST_PATH_IMAGE020
Figure 655973DEST_PATH_IMAGE006
Figure 701159DEST_PATH_IMAGE011
Figure 657613DEST_PATH_IMAGE007
Figure 538982DEST_PATH_IMAGE011
Figure 285090DEST_PATH_IMAGE008
Figure 935514DEST_PATH_IMAGE011
Figure 328449DEST_PATH_IMAGE009
Figure 149643DEST_PATH_IMAGE011
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1 and k+1 computing in the time of ternary circulation cryptographic calculation, make next ternary circulation cryptographic calculation point to H 2= ?
Figure 184596DEST_PATH_IMAGE011
Figure 955105DEST_PATH_IMAGE002
Figure 2013100223289100002DEST_PATH_IMAGE021
Figure 498037DEST_PATH_IMAGE003
Figure 88419DEST_PATH_IMAGE011
Figure 176329DEST_PATH_IMAGE004
Figure 67242DEST_PATH_IMAGE005
Figure 144919DEST_PATH_IMAGE011
Figure 719306DEST_PATH_IMAGE021
Figure 156104DEST_PATH_IMAGE007
Figure 970345DEST_PATH_IMAGE011
Figure 150790DEST_PATH_IMAGE008
Figure 484820DEST_PATH_IMAGE011
Figure 810628DEST_PATH_IMAGE009
Figure 862897DEST_PATH_IMAGE011
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure 847034DEST_PATH_IMAGE022
Carry out H 2=
Figure 35570DEST_PATH_IMAGE011
Figure 63438DEST_PATH_IMAGE002
Figure 603003DEST_PATH_IMAGE021
Figure 125252DEST_PATH_IMAGE003
Figure 433873DEST_PATH_IMAGE011
Figure 659504DEST_PATH_IMAGE021
Figure 719864DEST_PATH_IMAGE005
Figure 882992DEST_PATH_IMAGE011
Figure 518242DEST_PATH_IMAGE006
Figure 766820DEST_PATH_IMAGE021
Figure 630871DEST_PATH_IMAGE007
Figure 914085DEST_PATH_IMAGE011
Figure 454656DEST_PATH_IMAGE008
Figure 858273DEST_PATH_IMAGE009
Figure 995993DEST_PATH_IMAGE011
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1 and k+1 computing in the time of ternary circulation cryptographic calculation, make next ternary circulation cryptographic calculation point to H 3=
Figure 707466DEST_PATH_IMAGE011
Figure 930637DEST_PATH_IMAGE002
Figure 136491DEST_PATH_IMAGE011
Figure 128717DEST_PATH_IMAGE003
Figure 2013100223289100002DEST_PATH_IMAGE023
Figure 745512DEST_PATH_IMAGE004
Figure 918054DEST_PATH_IMAGE005
Figure 30366DEST_PATH_IMAGE023
Figure 834374DEST_PATH_IMAGE006
Figure 829061DEST_PATH_IMAGE007
Figure 795880DEST_PATH_IMAGE023
Figure 36368DEST_PATH_IMAGE008
Figure 455848DEST_PATH_IMAGE011
Figure 56463DEST_PATH_IMAGE009
Figure 877788DEST_PATH_IMAGE011
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this ternary circulation cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 758020DEST_PATH_IMAGE001
carry out ternary circulation cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, can provide valid certificates for true trade mark, there is stronger anti-forgery ability simultaneously.
For solving above-mentioned technical matters, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, each 8 one group of scale-of-two anti-counterfeiting information in scale-of-two anti-counterfeiting information table are expanded to 32 one group of scale-of-two anti-counterfeiting information, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, each 32 scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table are carried out to ternary circulation cryptographic calculation, generate the binary add tight defense fake information table of 32 group, utilize 32 binary add tight defense fake informations process chnnel codings in binary add tight defense fake information table, generation has the binary modulated signal of 32 group of error detecting and error correcting function, chnnel coding can adopt loop coding, convolutional encoding or Turbo coding various ways, trade mark page original continuous is changed the line map, and image signal is processed (RIP) through rasterizing and hybrid screening is exported shadow tone hybrid screening picture signal, comprising amplitude and FM screened image signal, utilize 32 one group of binary modulated signals that generate to adopt the electric conductivity of amplitude in circulation look-up table modulation system modulation hybrid screening picture signal, the electric conductivity that makes amplitude is according to the dielectric ink amplitude and the electrically conductive ink amplitude is regular changes, make adjacent 32 amplitudes in the hybrid screening picture signal carry 32 scale-of-two anti-counterfeiting information by the change of electric conductivity, thereby be created on the hybrid screening picture signal that embeds anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, at first gather trade mark page site electric conductivity signal, identification through the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generate scale-of-two deciphering anti-counterfeiting information table after channel-decoding, 32 binary messages of i group that scale-of-two is deciphered in the anti-counterfeiting information table are denoted as M i.
Binary system is deciphered to 32 binary message M in the anti-counterfeiting information table iThe initial value design of Position Control variable i be i=1, the initial value when initial value of setting encryption parameter C is encryption, the initial value when initial value of setting encryption variables q, j, d, e, f, g, h and r is encryption, the initial value design of binary operator control variables k is k=0, known by ternary circulation ciphering process, during binary operator control variables k=0, decrypt operation is M i=
Figure 914063DEST_PATH_IMAGE010
Figure 803522DEST_PATH_IMAGE002
Figure 744933DEST_PATH_IMAGE011
Figure 327224DEST_PATH_IMAGE003
Figure 970564DEST_PATH_IMAGE010
Figure 663713DEST_PATH_IMAGE004
Figure 194052DEST_PATH_IMAGE011
Figure 947244DEST_PATH_IMAGE005
Figure 89599DEST_PATH_IMAGE010
Figure 586439DEST_PATH_IMAGE006
Figure 236864DEST_PATH_IMAGE011
Figure 895378DEST_PATH_IMAGE007
Figure 787614DEST_PATH_IMAGE011
Figure 722257DEST_PATH_IMAGE011
, during binary operator control variables k=1, decrypt operation is M i=
Figure 560900DEST_PATH_IMAGE011
Figure 920338DEST_PATH_IMAGE002
Figure 435501DEST_PATH_IMAGE012
Figure 513179DEST_PATH_IMAGE003
Figure 155513DEST_PATH_IMAGE011
Figure 635036DEST_PATH_IMAGE004
Figure 321101DEST_PATH_IMAGE012
Figure 886074DEST_PATH_IMAGE005
Figure 66520DEST_PATH_IMAGE011
Figure 400549DEST_PATH_IMAGE006
Figure 257516DEST_PATH_IMAGE012
Figure 309785DEST_PATH_IMAGE007
Figure 28343DEST_PATH_IMAGE011
Figure 49891DEST_PATH_IMAGE009
Figure 572140DEST_PATH_IMAGE011
, during binary operator control variables k=2, decrypt operation is M i=
Figure 880761DEST_PATH_IMAGE011
Figure 79530DEST_PATH_IMAGE002
Figure 309654DEST_PATH_IMAGE011
Figure 635593DEST_PATH_IMAGE003
Figure 47989DEST_PATH_IMAGE013
Figure 168392DEST_PATH_IMAGE004
Figure 682550DEST_PATH_IMAGE011
Figure 546601DEST_PATH_IMAGE005
Figure 813503DEST_PATH_IMAGE013
Figure 11321DEST_PATH_IMAGE011
Figure 679062DEST_PATH_IMAGE007
Figure 551203DEST_PATH_IMAGE013
Figure 957280DEST_PATH_IMAGE009
Figure 949507DEST_PATH_IMAGE011
, during binary operator control variables k=3, decrypt operation is M i=
Figure 159777DEST_PATH_IMAGE011
Figure 604665DEST_PATH_IMAGE002
Figure 786203DEST_PATH_IMAGE014
Figure 412990DEST_PATH_IMAGE006
Figure 13605DEST_PATH_IMAGE014
Figure 834930DEST_PATH_IMAGE007
Figure 246320DEST_PATH_IMAGE011
Figure 871205DEST_PATH_IMAGE008
Figure 760664DEST_PATH_IMAGE014
Figure 702075DEST_PATH_IMAGE009
Figure 18787DEST_PATH_IMAGE011
, during binary operator control variables k=4, decrypt operation is M i=
Figure 662127DEST_PATH_IMAGE011
Figure 355276DEST_PATH_IMAGE002
Figure 151194DEST_PATH_IMAGE011
Figure 904386DEST_PATH_IMAGE003
Figure 35022DEST_PATH_IMAGE011
Figure 916707DEST_PATH_IMAGE011
Figure 840801DEST_PATH_IMAGE005
Figure 458733DEST_PATH_IMAGE015
Figure 493685DEST_PATH_IMAGE006
Figure 998616DEST_PATH_IMAGE011
Figure 93611DEST_PATH_IMAGE007
Figure 198839DEST_PATH_IMAGE015
Figure 865761DEST_PATH_IMAGE011
Figure 380925DEST_PATH_IMAGE009
, during binary operator control variables k=5, decrypt operation is M i=
Figure 100936DEST_PATH_IMAGE016
Figure 580459DEST_PATH_IMAGE002
Figure 266524DEST_PATH_IMAGE011
Figure 831497DEST_PATH_IMAGE003
Figure 746364DEST_PATH_IMAGE011
Figure 345972DEST_PATH_IMAGE004
Figure 202939DEST_PATH_IMAGE011
Figure 255209DEST_PATH_IMAGE005
Figure 973766DEST_PATH_IMAGE011
Figure 427881DEST_PATH_IMAGE006
Figure 455749DEST_PATH_IMAGE016
Figure 995314DEST_PATH_IMAGE007
Figure 517563DEST_PATH_IMAGE011
Figure 826184DEST_PATH_IMAGE008
Figure 786236DEST_PATH_IMAGE009
Figure 112175DEST_PATH_IMAGE011
, during binary operator control variables k=6, decrypt operation is M i=
Figure 644973DEST_PATH_IMAGE002
Figure 159131DEST_PATH_IMAGE017
Figure 471119DEST_PATH_IMAGE003
Figure 488754DEST_PATH_IMAGE011
Figure 45637DEST_PATH_IMAGE004
Figure 781512DEST_PATH_IMAGE011
Figure 901783DEST_PATH_IMAGE005
Figure 39504DEST_PATH_IMAGE011
Figure 974148DEST_PATH_IMAGE011
Figure 445580DEST_PATH_IMAGE007
Figure 437807DEST_PATH_IMAGE017
Figure 70914DEST_PATH_IMAGE008
Figure 748757DEST_PATH_IMAGE011
Figure 758302DEST_PATH_IMAGE009
, during binary operator control variables k=7, decrypt operation is M i=
Figure 923890DEST_PATH_IMAGE018
Figure 324915DEST_PATH_IMAGE002
Figure 138150DEST_PATH_IMAGE011
Figure 354237DEST_PATH_IMAGE003
Figure 138839DEST_PATH_IMAGE004
Figure 208295DEST_PATH_IMAGE011
Figure 29621DEST_PATH_IMAGE005
Figure 175431DEST_PATH_IMAGE011
Figure 82208DEST_PATH_IMAGE006
Figure 162345DEST_PATH_IMAGE007
Figure 744636DEST_PATH_IMAGE011
Figure 138708DEST_PATH_IMAGE008
Figure 81125DEST_PATH_IMAGE018
Figure 877043DEST_PATH_IMAGE009
Figure 630235DEST_PATH_IMAGE011
, first M from binary system deciphering anti-counterfeiting information table 1Start, to each 32 the binary message M in binary system deciphering anti-counterfeiting information table iCarry out corresponding decrypt operation, solve the binary system anti-counterfeiting information
Figure 246024DEST_PATH_IMAGE001
, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, removes highly 24, recovers to generate the binary system anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.
The accompanying drawing explanation
Below in conjunction with accompanying drawing, the present invention is further described.
Fig. 1 is one-piece construction figure of the present invention.
Fig. 2 is A of the present invention-A cut-open view.
Fig. 3 loads the anti-counterfeiting information process flow diagram.
Fig. 4 extracts the anti-counterfeiting information process flow diagram.
Embodiment
In Fig. 1 and Fig. 2, encryption anti-counterfeiting information storage trade mark, by trade mark page paper 7-1, be printed on amplitude 6-1 on trade mark page paper 7-1 to 6-150, be printed on horizontal scanning line 1-1 on trade mark page paper 7-1 and form to 2-10 to 1-15, the column scan line 2-1 that is printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 consist of to 6-150 amplitude 6-1
According to storage binary add tight defense fake information, a part of amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper 7-1 is printed and is formed by dielectric ink, horizontal scanning line 1-1 on trade mark page paper 7-1 is printed and is formed by electrically conducting transparent printing ink to 2-10 to 1-15 and column scan line 2-1
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, and the light amplitude on trade mark page paper 7-1 is printed and formed by dielectric ink,
The amplitude be printed on trade mark page paper 7-1 is divided into 15 row 10 row on the trade mark paper, amplitude 6-1 neatly is matrix and arranges on trade mark page paper 7-1 to 6-150, allow i get 1 to 15, allow j get 1 to 10, j bar column scan line on trade mark page paper 7-1 is electrically connected to the basal surface of each amplitude of j on trade mark page paper 7-1 row, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper 7-1 is capable with i on trade mark page paper 7-1 is electrically connected to
In the time the binary add tight defense fake information of trade mark page stores need to being read, 15 horizontal scanning lines of the 1st horizontal scanning line to the on trade mark page paper 7-1 are set to high level successively,
When the 1st horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary add tight defense fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is from 10 column scan line outputs of the 1st column scan line to the, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 1 by electrically conductive ink, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 0 by dielectric ink, therefore the binary add tight defense fake information 1100001000 that the 1st row is read, can repeat above-mentioned readout to other row on trade mark page paper 7-1.
In loading anti-counterfeiting information process flow diagram 3, original anti-counterfeiting information (image, word) is through digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, 8 one group of binary messages in scale-of-two anti-counterfeiting information table are expanded to 32 one group of binary messages, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, and 32 binary messages of i group in 32 one group scale-of-two anti-counterfeiting information table are denoted as
Figure 992132DEST_PATH_IMAGE001
, i is greater than 0 positive integer, 32 binary add tight defense fake informations of first from 32 one group scale-of-two anti-counterfeiting information table start, to each 32 the scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table
Figure 566650DEST_PATH_IMAGE001
carry out ternary circulation cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that scale-of-two anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize the trademark anti-counterfeit printing, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, realize trademark anti-counterfeit.
In extracting anti-counterfeiting information process flow diagram 4, when extracting anti-counterfeiting information, at first gather the electric conductivity signal of trade mark page halftone dot image, through the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generates scale-of-two deciphering anti-counterfeiting information table after channel-decoding.
By 32 binary message M in the scale-of-two deciphering anti-counterfeiting information table generated after decoding ithe initial value design of position control variable i be i=1, the initial value when initial value of setting encryption parameter C is encryption, the initial value when initial value of setting encryption variables q and j is encryption, the initial value design of binary operator control variable k is k=0, first M from the scale-of-two deciphering anti-counterfeiting information table generated 1start, to each 32 the binary message M in scale-of-two deciphering anti-counterfeiting information table ibe decrypted computing, solve the scale-of-two anti-counterfeiting information , generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, removes highly 24, recovers to generate the scale-of-two anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.

Claims (1)

1. one kind generates the binary modulated signal by anti-counterfeiting information by cryptographic calculation and chnnel coding, and by the circulation modulation system of tabling look-up, anti-counterfeiting information is embedded in to the one-parameter bivariate ternary circulation encryption anti-counterfeiting information storage trade mark in full page, it is characterized in that:anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, horizontal scanning line on trade mark page paper and column scan line are printed and are formed by electrically conducting transparent printing ink
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 2013100223289100001DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H ii is greater than 0 positive integer, binary system is encrypted parameter and is denoted as C, the binary system positive integer that encryption parameter C is 0<=C<=256, binary system is encrypted variable and is denoted as respectively q, j, d, e, f, g, h and r, the binary system positive integer that encryption variables q, j, d, e, f, g, h and r are 0 to 256, and the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 2013100223289100001DEST_PATH_IMAGE003
Figure 2013100223289100001DEST_PATH_IMAGE004
Figure 2013100223289100001DEST_PATH_IMAGE005
Figure 2013100223289100001DEST_PATH_IMAGE006
Figure 2013100223289100001DEST_PATH_IMAGE007
Figure 2013100223289100001DEST_PATH_IMAGE008
Figure 2013100223289100001DEST_PATH_IMAGE009
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 576621DEST_PATH_IMAGE002
Figure 799660DEST_PATH_IMAGE003
Figure 894655DEST_PATH_IMAGE004
Figure 485037DEST_PATH_IMAGE005
Figure 572947DEST_PATH_IMAGE006
Figure 197964DEST_PATH_IMAGE007
Figure 463860DEST_PATH_IMAGE008
Figure 259646DEST_PATH_IMAGE009
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 636401DEST_PATH_IMAGE002
Figure 552722DEST_PATH_IMAGE004
Figure 366963DEST_PATH_IMAGE005
Figure 547408DEST_PATH_IMAGE006
Figure 615858DEST_PATH_IMAGE007
Figure 472825DEST_PATH_IMAGE008
Figure 259515DEST_PATH_IMAGE009
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 243652DEST_PATH_IMAGE002
Figure 697767DEST_PATH_IMAGE003
Figure 468463DEST_PATH_IMAGE005
Figure 548600DEST_PATH_IMAGE007
Figure 498102DEST_PATH_IMAGE008
Figure 524963DEST_PATH_IMAGE009
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 585323DEST_PATH_IMAGE002
Figure 732140DEST_PATH_IMAGE003
Figure 852543DEST_PATH_IMAGE004
Figure 101121DEST_PATH_IMAGE005
Figure 214440DEST_PATH_IMAGE006
Figure 788957DEST_PATH_IMAGE008
Figure 242941DEST_PATH_IMAGE009
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 910683DEST_PATH_IMAGE002
Figure 48403DEST_PATH_IMAGE003
Figure 983047DEST_PATH_IMAGE005
Figure 454480DEST_PATH_IMAGE006
Figure 915548DEST_PATH_IMAGE007
Figure 809641DEST_PATH_IMAGE008
Figure 520108DEST_PATH_IMAGE009
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 529653DEST_PATH_IMAGE002
Figure 376386DEST_PATH_IMAGE003
Figure 96266DEST_PATH_IMAGE005
Figure 909501DEST_PATH_IMAGE006
Figure 860009DEST_PATH_IMAGE007
Figure 100497DEST_PATH_IMAGE008
Figure 519977DEST_PATH_IMAGE009
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 871324DEST_PATH_IMAGE002
Figure 410759DEST_PATH_IMAGE003
Figure 822148DEST_PATH_IMAGE004
Figure 728925DEST_PATH_IMAGE005
Figure 133230DEST_PATH_IMAGE006
Figure 809062DEST_PATH_IMAGE007
Figure 860195DEST_PATH_IMAGE008
Figure 503534DEST_PATH_IMAGE009
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 196684DEST_PATH_IMAGE002
Figure 198324DEST_PATH_IMAGE004
Figure 576533DEST_PATH_IMAGE006
Figure 945066DEST_PATH_IMAGE007
Figure 869160DEST_PATH_IMAGE008
Figure 972245DEST_PATH_IMAGE009
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, ternary circulation cryptographic calculation is defined as H i=
Figure 2013100223289100001DEST_PATH_IMAGE011
Figure 433499DEST_PATH_IMAGE003
Figure 777762DEST_PATH_IMAGE010
Figure 831802DEST_PATH_IMAGE005
Figure 346966DEST_PATH_IMAGE010
Figure 424644DEST_PATH_IMAGE006
Figure 270240DEST_PATH_IMAGE011
Figure 999030DEST_PATH_IMAGE007
Figure 594277DEST_PATH_IMAGE008
Figure 23990DEST_PATH_IMAGE011
Figure 358019DEST_PATH_IMAGE009
Figure 965718DEST_PATH_IMAGE011
, during binary operator control variables k=1, ternary circulation cryptographic calculation is defined as H i=
Figure 17988DEST_PATH_IMAGE011
Figure 251392DEST_PATH_IMAGE002
Figure 2013100223289100001DEST_PATH_IMAGE012
Figure 377611DEST_PATH_IMAGE003
Figure 467293DEST_PATH_IMAGE012
Figure 775914DEST_PATH_IMAGE005
Figure 986402DEST_PATH_IMAGE011
Figure 13264DEST_PATH_IMAGE006
Figure 542465DEST_PATH_IMAGE012
Figure 954861DEST_PATH_IMAGE007
Figure 985954DEST_PATH_IMAGE009
Figure 277258DEST_PATH_IMAGE011
, during binary operator control variables k=2, ternary circulation cryptographic calculation is defined as H i=
Figure 13133DEST_PATH_IMAGE011
Figure 680874DEST_PATH_IMAGE002
Figure 67862DEST_PATH_IMAGE011
Figure 530068DEST_PATH_IMAGE003
Figure 2013100223289100001DEST_PATH_IMAGE013
Figure 222080DEST_PATH_IMAGE004
Figure 677201DEST_PATH_IMAGE011
Figure 669428DEST_PATH_IMAGE005
Figure 568114DEST_PATH_IMAGE013
Figure 278581DEST_PATH_IMAGE006
Figure 271813DEST_PATH_IMAGE011
Figure 188134DEST_PATH_IMAGE013
Figure 385897DEST_PATH_IMAGE008
Figure 651662DEST_PATH_IMAGE011
Figure 858970DEST_PATH_IMAGE011
, during binary operator control variables k=3, ternary circulation cryptographic calculation is defined as H i=
Figure 527717DEST_PATH_IMAGE011
Figure 879064DEST_PATH_IMAGE002
Figure 700390DEST_PATH_IMAGE011
Figure 267823DEST_PATH_IMAGE011
Figure 2013100223289100001DEST_PATH_IMAGE014
Figure 567534DEST_PATH_IMAGE005
Figure 399093DEST_PATH_IMAGE011
Figure 793165DEST_PATH_IMAGE006
Figure 16653DEST_PATH_IMAGE007
Figure 19113DEST_PATH_IMAGE011
Figure 900482DEST_PATH_IMAGE008
Figure 47746DEST_PATH_IMAGE009
Figure 424370DEST_PATH_IMAGE011
, during binary operator control variables k=4, ternary circulation cryptographic calculation is defined as H i=
Figure 827986DEST_PATH_IMAGE002
Figure 847764DEST_PATH_IMAGE011
Figure 677179DEST_PATH_IMAGE003
Figure 533140DEST_PATH_IMAGE011
Figure 371783DEST_PATH_IMAGE004
Figure 980488DEST_PATH_IMAGE011
Figure 246384DEST_PATH_IMAGE005
Figure 2013100223289100001DEST_PATH_IMAGE015
Figure 684505DEST_PATH_IMAGE011
Figure 164027DEST_PATH_IMAGE007
Figure 600825DEST_PATH_IMAGE015
Figure 165798DEST_PATH_IMAGE008
Figure 595512DEST_PATH_IMAGE011
Figure 929541DEST_PATH_IMAGE009
Figure 537240DEST_PATH_IMAGE015
, during binary operator control variables k=5, ternary circulation cryptographic calculation is defined as H i=
Figure 2013100223289100001DEST_PATH_IMAGE016
Figure 37895DEST_PATH_IMAGE011
Figure 988719DEST_PATH_IMAGE011
Figure 50533DEST_PATH_IMAGE011
Figure 359155DEST_PATH_IMAGE005
Figure 557924DEST_PATH_IMAGE011
Figure 319206DEST_PATH_IMAGE006
Figure 645145DEST_PATH_IMAGE016
Figure 808273DEST_PATH_IMAGE007
Figure 177944DEST_PATH_IMAGE011
Figure 692102DEST_PATH_IMAGE008
Figure 556153DEST_PATH_IMAGE016
, during binary operator control variables k=6, ternary circulation cryptographic calculation is defined as H i=
Figure 115813DEST_PATH_IMAGE011
Figure 783555DEST_PATH_IMAGE002
Figure 2013100223289100001DEST_PATH_IMAGE017
Figure 373805DEST_PATH_IMAGE003
Figure 324760DEST_PATH_IMAGE004
Figure 530614DEST_PATH_IMAGE011
Figure 240950DEST_PATH_IMAGE005
Figure 139635DEST_PATH_IMAGE011
Figure 584523DEST_PATH_IMAGE006
Figure 843335DEST_PATH_IMAGE011
Figure 955648DEST_PATH_IMAGE007
Figure 754342DEST_PATH_IMAGE011
Figure 721161DEST_PATH_IMAGE009
, during binary operator control variables k=7, ternary circulation cryptographic calculation is defined as H i=
Figure 2013100223289100001DEST_PATH_IMAGE018
Figure 99239DEST_PATH_IMAGE002
Figure 450586DEST_PATH_IMAGE011
Figure 271911DEST_PATH_IMAGE003
Figure 683301DEST_PATH_IMAGE018
Figure 839345DEST_PATH_IMAGE004
Figure 728803DEST_PATH_IMAGE011
Figure 670215DEST_PATH_IMAGE005
Figure 986926DEST_PATH_IMAGE011
Figure 99108DEST_PATH_IMAGE006
Figure 572683DEST_PATH_IMAGE011
Figure 368601DEST_PATH_IMAGE007
Figure 121793DEST_PATH_IMAGE011
Figure 252429DEST_PATH_IMAGE008
Figure 952532DEST_PATH_IMAGE018
Figure 602956DEST_PATH_IMAGE009
, the initial value of setting encryption parameter C, the initial value of setting encryption variables q, j, d, e, f, g, h and r, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 144982DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right
Figure 2013100223289100001DEST_PATH_IMAGE019
Carry out H 1=
Figure 2013100223289100001DEST_PATH_IMAGE020
Figure 378603DEST_PATH_IMAGE002
Figure 883534DEST_PATH_IMAGE011
Figure 834490DEST_PATH_IMAGE020
Figure 656821DEST_PATH_IMAGE004
Figure 281837DEST_PATH_IMAGE011
Figure 547734DEST_PATH_IMAGE005
Figure 517013DEST_PATH_IMAGE006
Figure 433333DEST_PATH_IMAGE007
Figure 998307DEST_PATH_IMAGE011
Figure 162441DEST_PATH_IMAGE008
Figure 762049DEST_PATH_IMAGE011
Figure 140127DEST_PATH_IMAGE011
Ternary circulation cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 327526DEST_PATH_IMAGE019
Carry out H 1=
Figure 781641DEST_PATH_IMAGE020
Figure 871825DEST_PATH_IMAGE002
Figure 411391DEST_PATH_IMAGE011
Figure 182907DEST_PATH_IMAGE003
Figure 909871DEST_PATH_IMAGE004
Figure 246361DEST_PATH_IMAGE005
Figure 248001DEST_PATH_IMAGE006
Figure 95051DEST_PATH_IMAGE007
Figure 387678DEST_PATH_IMAGE008
Figure 123553DEST_PATH_IMAGE011
Figure 774983DEST_PATH_IMAGE009
Figure 912703DEST_PATH_IMAGE011
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1 and k+1 computing in the time of ternary circulation cryptographic calculation, make next ternary circulation cryptographic calculation point to H 2= ?
Figure 201340DEST_PATH_IMAGE011
Figure 158932DEST_PATH_IMAGE002
Figure 2013100223289100001DEST_PATH_IMAGE021
Figure 99206DEST_PATH_IMAGE003
Figure 289553DEST_PATH_IMAGE011
Figure 922659DEST_PATH_IMAGE004
Figure 633126DEST_PATH_IMAGE021
Figure 642671DEST_PATH_IMAGE005
Figure 738671DEST_PATH_IMAGE011
Figure 808259DEST_PATH_IMAGE006
Figure 553678DEST_PATH_IMAGE007
Figure 769764DEST_PATH_IMAGE011
Figure 744674DEST_PATH_IMAGE008
Figure 429733DEST_PATH_IMAGE011
Figure 781080DEST_PATH_IMAGE009
Figure 851673DEST_PATH_IMAGE011
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure 2013100223289100001DEST_PATH_IMAGE022
Carry out H 2=
Figure 935166DEST_PATH_IMAGE011
Figure 91210DEST_PATH_IMAGE002
Figure 246248DEST_PATH_IMAGE021
Figure 504371DEST_PATH_IMAGE011
Figure 840860DEST_PATH_IMAGE021
Figure 636778DEST_PATH_IMAGE005
Figure 108080DEST_PATH_IMAGE011
Figure 723869DEST_PATH_IMAGE006
Figure 220709DEST_PATH_IMAGE021
Figure 871133DEST_PATH_IMAGE007
Figure 413159DEST_PATH_IMAGE008
Figure 448111DEST_PATH_IMAGE011
Figure 953042DEST_PATH_IMAGE009
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1 and k+1 computing in the time of ternary circulation cryptographic calculation, make next ternary circulation cryptographic calculation point to H 3=
Figure 887686DEST_PATH_IMAGE011
Figure 726329DEST_PATH_IMAGE002
Figure 413028DEST_PATH_IMAGE004
Figure 987415DEST_PATH_IMAGE005
Figure 424212DEST_PATH_IMAGE023
Figure 418899DEST_PATH_IMAGE011
Figure 18507DEST_PATH_IMAGE007
Figure 95048DEST_PATH_IMAGE023
Figure 131006DEST_PATH_IMAGE008
Figure 115142DEST_PATH_IMAGE011
Figure 569257DEST_PATH_IMAGE009
Figure 347858DEST_PATH_IMAGE011
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this ternary circulation cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table carry out ternary circulation cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN2013100223289A 2013-01-22 2013-01-22 One-parameter double variant ternary circulation encryption anti-fake information storage trademark Pending CN103116789A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100223289A CN103116789A (en) 2013-01-22 2013-01-22 One-parameter double variant ternary circulation encryption anti-fake information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100223289A CN103116789A (en) 2013-01-22 2013-01-22 One-parameter double variant ternary circulation encryption anti-fake information storage trademark

Publications (1)

Publication Number Publication Date
CN103116789A true CN103116789A (en) 2013-05-22

Family

ID=48415159

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100223289A Pending CN103116789A (en) 2013-01-22 2013-01-22 One-parameter double variant ternary circulation encryption anti-fake information storage trademark

Country Status (1)

Country Link
CN (1) CN103116789A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1780933A1 (en) * 2005-10-25 2007-05-02 Cryptara Limited A method of generating a random key
CN101163007A (en) * 2007-09-17 2008-04-16 吴建明 Credit sign accidental streakline generating method
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1780933A1 (en) * 2005-10-25 2007-05-02 Cryptara Limited A method of generating a random key
CN101163007A (en) * 2007-09-17 2008-04-16 吴建明 Credit sign accidental streakline generating method
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯登国,裴定一: "《密码学导引》", 30 April 1999, article "AES候选算法简介", pages: 271-273 *

Similar Documents

Publication Publication Date Title
CN103106427A (en) Single parameter multiple-encryption anti-counterfeiting information storage trademark
CN103106430A (en) One-parameter double-variant multi-variant encryption anti-fake information storage brand
CN103116789A (en) One-parameter double variant ternary circulation encryption anti-fake information storage trademark
CN103116775A (en) One-parameter double variant binary variable circulation encryption anti-fake information storage trademark
CN103116778A (en) One-parameter multivariate binary variable circulation encryption anti-fake information storage trademark
CN103116792A (en) One-parameter double variant ternary variable circulation encryption anti-fake information storage trademark
CN103116776A (en) One-parameter double variant multivariable circulation encryption anti-fake information storage trademark
CN103116795A (en) One-parameter multivariate ternary encryption anti-fake information storage trademark
CN103116777A (en) One-parameter multivariate multivariable circulation encryption anti-fake information storage trademark
CN103116779A (en) One-parameter variation transmutation multivariable circulation encryption anti-fake information storage trademark
CN103106464A (en) Single parameter variable transmutation ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103106456A (en) Single parameter polymtized variable circulation encryption anti-counterfeiting information storage trademark
CN103106467A (en) Single parameter variable transmutation binary circulation encryption anti-counterfeiting information storage trademark
CN103106466A (en) Single parameter variable transmutation binary variable circulation encryption anti-counterfeiting information storage trademark
CN103106491A (en) Single parameter variable transmutation ternary encryption anti-counterfeiting information storage trademark
CN103116782A (en) Univariate parameter transmutation binary circulation encryption anti-fake information storage trademark
CN103106492A (en) Parameter-gradient multivariable circulating-encryption anti-fake information storage trademark
CN103106526A (en) Multiparameter multivariable ternary cycle encryption anti-fake information storage trademark
CN103106508A (en) Single parameter ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103116798A (en) Multi-parameter ternary cycle encryption anti-counterfeiting information storage trademark
CN103106486A (en) Single parameter multivariable ternary circulation encryption anti-counterfeiting information storage trademark
CN103106505A (en) One-parameter double-variant ternary encryption anti-fake information storage brand
CN103106481A (en) One-parameter double-variant binary circulating encryption anti-fake information storage brand
CN103106463A (en) Single parameter variable transmutation polytomized variable circulation encryption anti-counterfeiting information storage trademark
CN103106462A (en) One-parameter double-variant multi-variant circulating encryption anti-fake information storage brand

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130522