CN103116790A - Parameter transmutation binary encryption anti-fake information storage trademark - Google Patents

Parameter transmutation binary encryption anti-fake information storage trademark Download PDF

Info

Publication number
CN103116790A
CN103116790A CN2013100223310A CN201310022331A CN103116790A CN 103116790 A CN103116790 A CN 103116790A CN 2013100223310 A CN2013100223310 A CN 2013100223310A CN 201310022331 A CN201310022331 A CN 201310022331A CN 103116790 A CN103116790 A CN 103116790A
Authority
CN
China
Prior art keywords
binary
binary system
group
trade mark
counterfeiting information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013100223310A
Other languages
Chinese (zh)
Other versions
CN103116790B (en
Inventor
董武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN201310022331.0A priority Critical patent/CN103116790B/en
Publication of CN103116790A publication Critical patent/CN103116790A/en
Application granted granted Critical
Publication of CN103116790B publication Critical patent/CN103116790B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a parameter transmutation binary encryption anti-fake information storage trademark which can generate a binary system modulating signal from binary system anti-fake information through binary encryption and channel coding and embeds the anti-fake information into the whole trademark page through a circulation look-up table modulation method under the condition that conductivity of a network is modulated to be changed in order. In the process of trademark identification, anti-fake information can be identified from any fragment, and the parameter transmutation binary encryption anti-fake information storage trademark can be used for various anti-fake trademarks.

Description

Parameter transmutation binary encryption anti-fake information storage trademark
Art:
The present invention relates to a kind of anti-false trademark, particularly a kind of parameter transmutation binary encryption anti-fake information storage trademark, binary system encryption anti-fake information can be stored on the trade mark page and realize the false proof of trade mark by the trade mark, the trade mark can be used for extensive stock it is false proof in.
Background technology:
Anti-false trademark, also known as antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, are a kind of proof labels discerned the false from the genuine, prevent personation, are mark true and false, that distinguish marketing quality quality of the people for distinguishing merchandise resources during commodity circulation.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and the interests of client.The trade mark of China is audaciously innovated; employ laser anti-counterfeit, core micropore are false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but false proof is high-tech trial of strength with struggle that is faking; advanced anti-counterfeiting technology has certain ageing again; so; trade mark anti-fake technique must constantly be lifted; could be false proof with being maintained the leading position forever in faking, this is also the basic assurance for protecting the interests of businessman and client to maintain commodity circulation safety.
The content of the invention:
In order to improve the reliability and security of trademark anti-counterfeit, the present invention is improved existing trade mark anti-fake technique for the deficiency that existing trademark anti-counterfeit is present, propose a kind of anti-counterfeiting information storage trade mark, the trade mark passes through the change to amplitude electric conductivity in brand printing, encryption anti-fake information is embedded on the whole trade mark page in binary system coded signal form, encryption anti-fake information can be recognized in any one fragment in brand recognition, therefore with very strong disguised and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information stores trade mark, is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, the image and word on trade mark page paper are made up of amplitude,
According to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, and the horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
The horizontal scanning line being printed on trade mark page paper has N bars, the column scan line being printed on trade mark page paper has M bars, the amplitude being printed on trade mark page paper is divided into N rows M row on trade mark paper, amplitude is neat arranged in arrays on trade mark page paper paper, i is allowed to take 1 to arrive N, j is allowed to take 1 to arrive M, j-th strip column scan line on trade mark page paper is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper, i-th horizontal scanning line on trade mark page paper is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper
When the binary message for needing to store the trade mark page is read, the 1st article on trade mark page paper is set to high level successively to the N articles horizontal scanning line,
When the 1st article of horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported with 0,1 code form from the 1st bar of column scan line to the M bars column scan line, the amplitude that the 1st row on trade mark page paper is printed by electrically conductive ink exports binary message 1, the amplitude that the 1st row on trade mark page paper is printed by dielectric ink exports binary message 0, above-mentioned readout is repeated to other rows on trade mark page paper
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 2013100223310100002DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as respectively
Figure 2013100223310100002DEST_PATH_IMAGE002
Figure 2013100223310100002DEST_PATH_IMAGE003
Figure 2013100223310100002DEST_PATH_IMAGE005
Figure 2013100223310100002DEST_PATH_IMAGE006
Figure 2013100223310100002DEST_PATH_IMAGE007
Figure 2013100223310100002DEST_PATH_IMAGE008
With
Figure 2013100223310100002DEST_PATH_IMAGE009
, encryption parameter
Figure 513145DEST_PATH_IMAGE003
Figure 355199DEST_PATH_IMAGE004
Figure 625775DEST_PATH_IMAGE005
Figure 253196DEST_PATH_IMAGE006
Figure 137976DEST_PATH_IMAGE007
Figure 218058DEST_PATH_IMAGE008
WithFor 0 to 256 binary system positive integer, eight-digit binary number encryption variables are denoted as q, and encryption variables are the binary system positive integer of 0≤q≤256, and binary operator control variable is denoted as k, and binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 2013100223310100002DEST_PATH_IMAGE011
Figure 2013100223310100002DEST_PATH_IMAGE012
Figure 2013100223310100002DEST_PATH_IMAGE013
Figure 2013100223310100002DEST_PATH_IMAGE015
Figure 2013100223310100002DEST_PATH_IMAGE016
Figure 2013100223310100002DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 649619DEST_PATH_IMAGE010
Figure 456032DEST_PATH_IMAGE011
Figure 408441DEST_PATH_IMAGE014
Figure 651335DEST_PATH_IMAGE015
Figure 955278DEST_PATH_IMAGE016
Figure 105767DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 550569DEST_PATH_IMAGE010
Figure 948052DEST_PATH_IMAGE011
Figure 490023DEST_PATH_IMAGE012
Figure 631154DEST_PATH_IMAGE013
Figure 942181DEST_PATH_IMAGE014
Figure 776145DEST_PATH_IMAGE015
Figure 539833DEST_PATH_IMAGE016
Figure 484655DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 650188DEST_PATH_IMAGE010
Figure 655053DEST_PATH_IMAGE011
Figure 388971DEST_PATH_IMAGE013
Figure 674590DEST_PATH_IMAGE014
Figure 850356DEST_PATH_IMAGE015
Figure 688311DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 749808DEST_PATH_IMAGE010
Figure 96475DEST_PATH_IMAGE011
Figure 322051DEST_PATH_IMAGE012
Figure 412367DEST_PATH_IMAGE013
Figure 406999DEST_PATH_IMAGE014
Figure 658989DEST_PATH_IMAGE015
Figure 371861DEST_PATH_IMAGE016
Figure 288DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 177323DEST_PATH_IMAGE010
Figure 350947DEST_PATH_IMAGE011
Figure 800382DEST_PATH_IMAGE012
Figure 936146DEST_PATH_IMAGE014
Figure 546250DEST_PATH_IMAGE015
Figure 217403DEST_PATH_IMAGE016
Figure 215663DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 288661DEST_PATH_IMAGE010
Figure 69667DEST_PATH_IMAGE011
Figure 228115DEST_PATH_IMAGE012
Figure 752769DEST_PATH_IMAGE013
Figure 680273DEST_PATH_IMAGE014
Figure 632180DEST_PATH_IMAGE015
Figure 277925DEST_PATH_IMAGE016
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 644130DEST_PATH_IMAGE012
Figure 510586DEST_PATH_IMAGE013
Figure 61150DEST_PATH_IMAGE016
Figure 731297DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 487900DEST_PATH_IMAGE010
Figure 873193DEST_PATH_IMAGE012
Figure 330719DEST_PATH_IMAGE013
Figure 692562DEST_PATH_IMAGE014
Figure 842920DEST_PATH_IMAGE015
Figure 184220DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, binary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 2013100223310100002DEST_PATH_IMAGE018
Figure 462886DEST_PATH_IMAGE010
Figure 534878DEST_PATH_IMAGE018
Figure 351524DEST_PATH_IMAGE011
Figure 487287DEST_PATH_IMAGE012
Figure 718462DEST_PATH_IMAGE002
Figure 756826DEST_PATH_IMAGE013
Figure 110578DEST_PATH_IMAGE002
Figure 816365DEST_PATH_IMAGE014
Figure 964581DEST_PATH_IMAGE002
Figure 755820DEST_PATH_IMAGE015
Figure 647683DEST_PATH_IMAGE002
Figure 207978DEST_PATH_IMAGE016
Figure 527095DEST_PATH_IMAGE002
Figure 743312DEST_PATH_IMAGE017
, binary cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 915985DEST_PATH_IMAGE003
Figure 671582DEST_PATH_IMAGE010
Figure 171834DEST_PATH_IMAGE018
Figure 405500DEST_PATH_IMAGE011
Figure 940387DEST_PATH_IMAGE018
Figure 663623DEST_PATH_IMAGE012
Figure 401903DEST_PATH_IMAGE003
Figure 688528DEST_PATH_IMAGE013
Figure 828654DEST_PATH_IMAGE003
Figure 175321DEST_PATH_IMAGE014
Figure 400897DEST_PATH_IMAGE003
Figure 225634DEST_PATH_IMAGE015
Figure 220266DEST_PATH_IMAGE003
Figure 737835DEST_PATH_IMAGE016
Figure 450707DEST_PATH_IMAGE003
Figure 79134DEST_PATH_IMAGE017
, binary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 616743DEST_PATH_IMAGE004
Figure 816912DEST_PATH_IMAGE010
Figure 983451DEST_PATH_IMAGE004
Figure 139625DEST_PATH_IMAGE011
Figure 823765DEST_PATH_IMAGE018
Figure 245650DEST_PATH_IMAGE012
Figure 419143DEST_PATH_IMAGE018
Figure 752986DEST_PATH_IMAGE004
Figure 696803DEST_PATH_IMAGE015
Figure 897977DEST_PATH_IMAGE004
Figure 294454DEST_PATH_IMAGE016
Figure 91399DEST_PATH_IMAGE004
, binary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 224440DEST_PATH_IMAGE005
Figure 90896DEST_PATH_IMAGE010
Figure 286703DEST_PATH_IMAGE011
Figure 311607DEST_PATH_IMAGE012
Figure 532821DEST_PATH_IMAGE013
Figure 640455DEST_PATH_IMAGE018
Figure 836994DEST_PATH_IMAGE014
Figure 448104DEST_PATH_IMAGE005
Figure 411512DEST_PATH_IMAGE015
Figure 491595DEST_PATH_IMAGE005
Figure 487233DEST_PATH_IMAGE016
Figure 290421DEST_PATH_IMAGE017
Figure 592220DEST_PATH_IMAGE005
, binary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 657128DEST_PATH_IMAGE006
Figure 993563DEST_PATH_IMAGE010
Figure 220145DEST_PATH_IMAGE006
Figure 274819DEST_PATH_IMAGE011
Figure 877839DEST_PATH_IMAGE006
Figure 68780DEST_PATH_IMAGE012
Figure 731843DEST_PATH_IMAGE006
Figure 8234DEST_PATH_IMAGE013
Figure 414945DEST_PATH_IMAGE018
Figure 725972DEST_PATH_IMAGE014
Figure 323623DEST_PATH_IMAGE015
Figure 268445DEST_PATH_IMAGE006
Figure 433979DEST_PATH_IMAGE016
Figure 173265DEST_PATH_IMAGE006
Figure 424249DEST_PATH_IMAGE017
Figure 172762DEST_PATH_IMAGE006
, binary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 192801DEST_PATH_IMAGE007
Figure 368568DEST_PATH_IMAGE010
Figure 169165DEST_PATH_IMAGE007
Figure 206522DEST_PATH_IMAGE011
Figure 595915DEST_PATH_IMAGE007
Figure 517534DEST_PATH_IMAGE012
Figure 726798DEST_PATH_IMAGE007
Figure 567847DEST_PATH_IMAGE013
Figure 811746DEST_PATH_IMAGE007
Figure 80047DEST_PATH_IMAGE014
Figure 42187DEST_PATH_IMAGE018
Figure 421347DEST_PATH_IMAGE015
Figure 519753DEST_PATH_IMAGE018
Figure 958956DEST_PATH_IMAGE016
Figure 142813DEST_PATH_IMAGE007
Figure 325663DEST_PATH_IMAGE017
Figure 544155DEST_PATH_IMAGE007
, binary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 904992DEST_PATH_IMAGE008
Figure 576144DEST_PATH_IMAGE010
Figure 852099DEST_PATH_IMAGE008
Figure 833666DEST_PATH_IMAGE008
Figure 742848DEST_PATH_IMAGE012
Figure 516769DEST_PATH_IMAGE008
Figure 460585DEST_PATH_IMAGE013
Figure 486527DEST_PATH_IMAGE008
Figure 866693DEST_PATH_IMAGE014
Figure 195037DEST_PATH_IMAGE008
Figure 242628DEST_PATH_IMAGE015
Figure 427753DEST_PATH_IMAGE018
Figure 45947DEST_PATH_IMAGE016
Figure 161670DEST_PATH_IMAGE018
Figure 814500DEST_PATH_IMAGE017
Figure 422723DEST_PATH_IMAGE008
, binary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 731476DEST_PATH_IMAGE009
Figure 385311DEST_PATH_IMAGE010
Figure 158226DEST_PATH_IMAGE009
Figure 872104DEST_PATH_IMAGE011
Figure 464891DEST_PATH_IMAGE009
Figure 922417DEST_PATH_IMAGE012
Figure 538120DEST_PATH_IMAGE009
Figure 298265DEST_PATH_IMAGE013
Figure 378348DEST_PATH_IMAGE009
Figure 639565DEST_PATH_IMAGE014
Figure 121493DEST_PATH_IMAGE009
Figure 177174DEST_PATH_IMAGE015
Figure 744552DEST_PATH_IMAGE009
Figure 809460DEST_PATH_IMAGE016
Figure 145895DEST_PATH_IMAGE018
Figure 185526DEST_PATH_IMAGE017
Figure 489469DEST_PATH_IMAGE018
, set encryption parameter
Figure 843221DEST_PATH_IMAGE002
Figure 697224DEST_PATH_IMAGE004
Figure 160567DEST_PATH_IMAGE005
Figure 567277DEST_PATH_IMAGE006
Figure 675042DEST_PATH_IMAGE007
Figure 259738DEST_PATH_IMAGE008
With
Figure 85743DEST_PATH_IMAGE009
Initial value, setting encryption variables q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 30565DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is rightCarry out H1=
Figure 2013100223310100002DEST_PATH_IMAGE020
Figure 71464DEST_PATH_IMAGE010
Figure 327313DEST_PATH_IMAGE011
Figure 75826DEST_PATH_IMAGE002
Figure 158183DEST_PATH_IMAGE012
Figure 96401DEST_PATH_IMAGE002
Figure 83948DEST_PATH_IMAGE013
Figure 121305DEST_PATH_IMAGE002
Figure 510698DEST_PATH_IMAGE014
Figure 658411DEST_PATH_IMAGE002
Figure 170612DEST_PATH_IMAGE002
Figure 867173DEST_PATH_IMAGE017
Figure 246333DEST_PATH_IMAGE002
Binary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 423367DEST_PATH_IMAGE019
Carry out H1=
Figure 924887DEST_PATH_IMAGE020
Figure 323135DEST_PATH_IMAGE011
Figure 120190DEST_PATH_IMAGE002
Figure 604392DEST_PATH_IMAGE012
Figure 398353DEST_PATH_IMAGE013
Figure 428626DEST_PATH_IMAGE002
Figure 337807DEST_PATH_IMAGE014
Figure 789965DEST_PATH_IMAGE015
Figure 991139DEST_PATH_IMAGE002
Figure 387617DEST_PATH_IMAGE016
Figure 965229DEST_PATH_IMAGE002
Figure 497972DEST_PATH_IMAGE017
Figure 671378DEST_PATH_IMAGE002
I+1, q+1 and k+1 computing are carried out while binary cryptographic calculation, next binary cryptographic calculation is pointed to H2= 
Figure 670875DEST_PATH_IMAGE010
Figure 572972DEST_PATH_IMAGE011
Figure 866681DEST_PATH_IMAGE021
Figure 891586DEST_PATH_IMAGE003
Figure 648190DEST_PATH_IMAGE013
Figure 378379DEST_PATH_IMAGE003
Figure 220434DEST_PATH_IMAGE014
Figure 428692DEST_PATH_IMAGE003
Figure 305381DEST_PATH_IMAGE015
Figure 940893DEST_PATH_IMAGE003
Figure 270243DEST_PATH_IMAGE016
Figure 282193DEST_PATH_IMAGE003
Figure 13388DEST_PATH_IMAGE017
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 2013100223310100002DEST_PATH_IMAGE022
Carry out H2= 
Figure 511814DEST_PATH_IMAGE003
Figure 61875DEST_PATH_IMAGE010
Figure 647577DEST_PATH_IMAGE021
Figure 890471DEST_PATH_IMAGE011
Figure 194413DEST_PATH_IMAGE021
Figure 282586DEST_PATH_IMAGE012
Figure 988374DEST_PATH_IMAGE003
Figure 136590DEST_PATH_IMAGE013
Figure 819692DEST_PATH_IMAGE014
Figure 379986DEST_PATH_IMAGE003
Figure 964682DEST_PATH_IMAGE015
Figure 977638DEST_PATH_IMAGE003
Figure 99712DEST_PATH_IMAGE003
Figure 855310DEST_PATH_IMAGE017
I+1, q+1 and k+1 computing are carried out while binary cryptographic calculation, next binary cryptographic calculation is pointed to H3=
Figure 589227DEST_PATH_IMAGE004
Figure 124114DEST_PATH_IMAGE010
Figure 50613DEST_PATH_IMAGE004
Figure 38160DEST_PATH_IMAGE011
Figure 137835DEST_PATH_IMAGE012
Figure 12381DEST_PATH_IMAGE023
Figure 544939DEST_PATH_IMAGE004
Figure 796928DEST_PATH_IMAGE015
Figure 138228DEST_PATH_IMAGE016
Figure 252946DEST_PATH_IMAGE004
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this binary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 308123DEST_PATH_IMAGE001
Carry out binary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, valid certificates can be provided for true trade mark, there is stronger anti-forgery ability simultaneously.
To solve above-mentioned technical problem, processing is digitized to image false-proof information and character anti-counterfeiting information first, the binary system anti-counterfeiting information table of 8 one group of generation, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, binary cryptographic calculation is carried out to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables, the binary system encryption anti-fake information table of 32 one group of generation, pass through channel coding using 32 binary system encryption anti-fake informations in binary system encryption anti-fake information table, 32 one group of binary modulated signal of the generation with error detecting and error correcting function, channel coding can use loop coding, convolutional encoding or Turbo coding diversified forms, picture signal is adjusted to be handled by rasterizing trade mark page original continuous(RIP)Halftoning hybrid screening picture signal is exported with hybrid screening, including amplitude and FM screened image signal, the electric conductivity of amplitude in hybrid screening picture signal is modulated using circulation look-up table modulation system using 32 one group of binary modulated signals of generation, make the electric conductivity of amplitude according to dielectric ink amplitude and electrically conductive ink amplitude is regular changes, adjacent 32 amplitudes in hybrid screening picture signal are made to carry 32 binary system anti-counterfeiting information by the change of electric conductivity, so as to generate the hybrid screening picture signal of the embedded anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, trade mark page site electric conductivity signal is gathered first, by the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding, decrypts i-th group of 32 binary message in anti-counterfeiting information table by binary system and is denoted as Mi
Binary system is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting the initial value of encryption parameter as encryption, initial value when setting the initial value of encryption variables as encryption, it is k=0 that binary operator, which controls variable k initial value design, by binary ciphering process, it is M that binary operator, which controls decryption computing during variable k=0,i=
Figure 74085DEST_PATH_IMAGE018
Figure 684189DEST_PATH_IMAGE010
Figure 382838DEST_PATH_IMAGE012
Figure 292019DEST_PATH_IMAGE002
Figure 732459DEST_PATH_IMAGE002
Figure 933633DEST_PATH_IMAGE014
Figure 330110DEST_PATH_IMAGE002
Figure 642143DEST_PATH_IMAGE015
Figure 4247DEST_PATH_IMAGE002
Figure 127055DEST_PATH_IMAGE016
Figure 260096DEST_PATH_IMAGE002
Figure 126552DEST_PATH_IMAGE017
Figure 28649DEST_PATH_IMAGE002
, it is M that binary operator, which controls decryption computing during variable k=1,i=
Figure 322358DEST_PATH_IMAGE003
Figure 677116DEST_PATH_IMAGE010
Figure 347263DEST_PATH_IMAGE018
Figure 103867DEST_PATH_IMAGE011
Figure 568477DEST_PATH_IMAGE018
Figure 676111DEST_PATH_IMAGE012
Figure 884369DEST_PATH_IMAGE003
Figure 495479DEST_PATH_IMAGE013
Figure 725920DEST_PATH_IMAGE014
Figure 203486DEST_PATH_IMAGE015
Figure 275478DEST_PATH_IMAGE003
Figure 92125DEST_PATH_IMAGE016
Figure 653905DEST_PATH_IMAGE003
Figure 239607DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=2,i=
Figure 333913DEST_PATH_IMAGE004
Figure 936933DEST_PATH_IMAGE010
Figure 393453DEST_PATH_IMAGE004
Figure 790936DEST_PATH_IMAGE011
Figure 332907DEST_PATH_IMAGE018
Figure 474038DEST_PATH_IMAGE012
Figure 353450DEST_PATH_IMAGE013
Figure 953638DEST_PATH_IMAGE014
Figure 937085DEST_PATH_IMAGE015
Figure 437337DEST_PATH_IMAGE004
Figure 671003DEST_PATH_IMAGE016
Figure 205890DEST_PATH_IMAGE004
Figure 866809DEST_PATH_IMAGE017
Figure 854357DEST_PATH_IMAGE004
, it is M that binary operator, which controls decryption computing during variable k=3,i=
Figure 954031DEST_PATH_IMAGE005
Figure 94156DEST_PATH_IMAGE010
Figure 440824DEST_PATH_IMAGE005
Figure 479418DEST_PATH_IMAGE005
Figure 474050DEST_PATH_IMAGE012
Figure 991619DEST_PATH_IMAGE018
Figure 704491DEST_PATH_IMAGE013
Figure 332919DEST_PATH_IMAGE018
Figure 182057DEST_PATH_IMAGE014
Figure 70696DEST_PATH_IMAGE015
Figure 237235DEST_PATH_IMAGE005
Figure 65831DEST_PATH_IMAGE005
Figure 487716DEST_PATH_IMAGE017
Figure 723525DEST_PATH_IMAGE005
, it is M that binary operator, which controls decryption computing during variable k=4,i=
Figure 577529DEST_PATH_IMAGE010
Figure 486710DEST_PATH_IMAGE006
Figure 995052DEST_PATH_IMAGE011
Figure 938868DEST_PATH_IMAGE006
Figure 140042DEST_PATH_IMAGE012
Figure 536520DEST_PATH_IMAGE006
Figure 848552DEST_PATH_IMAGE013
Figure 709192DEST_PATH_IMAGE018
Figure 832000DEST_PATH_IMAGE014
Figure 965041DEST_PATH_IMAGE018
Figure 831497DEST_PATH_IMAGE015
Figure 733594DEST_PATH_IMAGE006
Figure 27303DEST_PATH_IMAGE016
Figure 382061DEST_PATH_IMAGE006
Figure 52208DEST_PATH_IMAGE017
Figure 808811DEST_PATH_IMAGE006
, it is M that binary operator, which controls decryption computing during variable k=5,i=
Figure 285141DEST_PATH_IMAGE007
Figure 392774DEST_PATH_IMAGE010
Figure 601032DEST_PATH_IMAGE007
Figure 212142DEST_PATH_IMAGE011
Figure 113233DEST_PATH_IMAGE007
Figure 442584DEST_PATH_IMAGE012
Figure 188954DEST_PATH_IMAGE007
Figure 920150DEST_PATH_IMAGE013
Figure 992142DEST_PATH_IMAGE007
Figure 543209DEST_PATH_IMAGE014
Figure 757601DEST_PATH_IMAGE015
Figure 984183DEST_PATH_IMAGE018
Figure 641877DEST_PATH_IMAGE007
Figure 832818DEST_PATH_IMAGE017
Figure 495881DEST_PATH_IMAGE007
, it is M that binary operator, which controls decryption computing during variable k=6,i=
Figure 992032DEST_PATH_IMAGE010
Figure 552327DEST_PATH_IMAGE008
Figure 871444DEST_PATH_IMAGE011
Figure 149978DEST_PATH_IMAGE008
Figure 845533DEST_PATH_IMAGE012
Figure 260334DEST_PATH_IMAGE008
Figure 750352DEST_PATH_IMAGE013
Figure 749849DEST_PATH_IMAGE014
Figure 956840DEST_PATH_IMAGE008
Figure 132606DEST_PATH_IMAGE015
Figure 870886DEST_PATH_IMAGE018
Figure 157511DEST_PATH_IMAGE016
Figure 285917DEST_PATH_IMAGE018
Figure 632585DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=7,i=
Figure 682898DEST_PATH_IMAGE009
Figure 195099DEST_PATH_IMAGE009
Figure 907971DEST_PATH_IMAGE011
Figure 349448DEST_PATH_IMAGE009
Figure 260903DEST_PATH_IMAGE012
Figure 316081DEST_PATH_IMAGE009
Figure 285305DEST_PATH_IMAGE014
Figure 144677DEST_PATH_IMAGE009
Figure 566562DEST_PATH_IMAGE015
Figure 360522DEST_PATH_IMAGE016
Figure 390795DEST_PATH_IMAGE018
Figure 362294DEST_PATH_IMAGE017
Figure 886947DEST_PATH_IMAGE018
, first M from binary system decryption anti-counterfeiting information table1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiCorresponding decryption computing is carried out, binary system anti-counterfeiting information is solved, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 is the overall structure figure of the present invention.
Fig. 2 is A-A sectional views of the present invention.
Fig. 3 loads anti-counterfeiting information flow chart.
Fig. 4 extracts anti-counterfeiting information flow chart.
Embodiment
As in Fig. 1 and Fig. 2, anti-fake information storage trademark, it is made up of trade mark page paper 7-1, amplitude 6-1 to the 6-150 being printed on trade mark page paper 7-1, horizontal scanning line 1-1 to the 1-15 being printed on trade mark page paper 7-1, column scan line 2-1 to the 2-10 being printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 are made up of amplitude 6-1 to 6-150
According to storage binary system encryption anti-fake information, a part of amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, another part amplitude on trade mark page paper 7-1 is formed by dielectric ink printing, horizontal scanning line 1-1 to 1-15 and column scan line 2-1 to 2-10 on trade mark page paper 7-1 are formed by the printing of electrically conducting transparent ink
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, and the light amplitude on trade mark page paper 7-1 is formed by dielectric ink printing,
The amplitude being printed on trade mark page paper 7-1 is divided into 15 rows 10 on trade mark paper and arranged, amplitude 6-1 to 6-150 is neat arranged in arrays on trade mark page paper 7-1, i is allowed to take 1 to 15, j is allowed to take 1 to 10, j-th strip column scan line on trade mark page paper 7-1 is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper 7-1, i-th horizontal scanning line on trade mark page paper 7-1 is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper 7-1
When the binary system encryption anti-fake information for needing to store the trade mark page is read, the 1st article of horizontal scanning line on trade mark page paper 7-1 is set to high level successively to the 15th article of horizontal scanning line,
When the 1st article of horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary system encryption anti-fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is exported from the 1st bar of column scan line to the 10th bar of column scan line, the 1st row on trade mark page paper 7-1 exports binary message 1 by electrically conductive ink printing into amplitude, the 1st row on trade mark page paper 7-1 exports binary message 0 by dielectric ink printing into amplitude, therefore the binary system encryption anti-fake information 1100001000 that the 1st row is read, above-mentioned readout is repeated to other rows on trade mark page paper 7-1.
In loading anti-counterfeiting information flow chart 3, original anti-counterfeiting information(Image, word)It is digitized into processing, the binary system anti-counterfeiting information table of 8 one group of generation, 8 one group of binary messages in binary system anti-counterfeiting information table are expanded into 32 one group of binary messages, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary message in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 31937DEST_PATH_IMAGE001
, i is the positive integer more than 0, from first 32 binary system encryption anti-fake information in 32 one group of binary system anti-counterfeiting information tables
Figure 412103DEST_PATH_IMAGE019
Start, to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 927398DEST_PATH_IMAGE001
Carry out binary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize that trademark anti-counterfeit prints, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, realize trademark anti-counterfeit.
In anti-counterfeiting information flow chart 4 is extracted, when extracting anti-counterfeiting information, the electric conductivity signal of trade mark page halftone dot image is gathered first, by the electric conductivity identification to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding.
The binary system generated after decoding is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting the initial value of encryption parameter as encryption, initial value when setting the initial value of encryption variables as encryption, it is k=0 that binary operator, which controls variable k initial value design, first M from the binary system decryption anti-counterfeiting information table of generation1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiComputing is decrypted, binary system anti-counterfeiting information is solved
Figure 788038DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.

Claims (1)

1. a kind of generate binary modulated signal by anti-counterfeiting information by cryptographic calculation and channel coding, and by circulating the parameter transmutation binary encryption anti-fake information storage trademark that anti-counterfeiting information is embedded in full page by tabling look-up modulation mode,It is characterized in that:Anti-counterfeiting information stores trade mark, it is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, according to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 2013100223310100001DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as respectively
Figure 2013100223310100001DEST_PATH_IMAGE002
Figure 2013100223310100001DEST_PATH_IMAGE003
Figure 2013100223310100001DEST_PATH_IMAGE004
Figure 2013100223310100001DEST_PATH_IMAGE005
Figure 2013100223310100001DEST_PATH_IMAGE006
Figure 2013100223310100001DEST_PATH_IMAGE008
With, encryption parameter
Figure 921642DEST_PATH_IMAGE002
Figure 901100DEST_PATH_IMAGE003
Figure 493886DEST_PATH_IMAGE004
Figure 764462DEST_PATH_IMAGE005
Figure 641151DEST_PATH_IMAGE006
Figure 276663DEST_PATH_IMAGE007
With
Figure 617962DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, eight-digit binary number encryption variables are denoted as q, and encryption variables q is the binary system positive integer of 0≤q≤256, and binary operator control variable is denoted as k, and binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 2013100223310100001DEST_PATH_IMAGE010
Figure 2013100223310100001DEST_PATH_IMAGE011
Figure 2013100223310100001DEST_PATH_IMAGE012
Figure 2013100223310100001DEST_PATH_IMAGE014
Figure 2013100223310100001DEST_PATH_IMAGE015
Figure 2013100223310100001DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 838904DEST_PATH_IMAGE010
Figure 832268DEST_PATH_IMAGE011
Figure 399647DEST_PATH_IMAGE012
Figure 535410DEST_PATH_IMAGE014
Figure 27571DEST_PATH_IMAGE015
Figure 82246DEST_PATH_IMAGE016
Figure 232736DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 938523DEST_PATH_IMAGE010
Figure 86739DEST_PATH_IMAGE011
Figure 877978DEST_PATH_IMAGE012
Figure 769841DEST_PATH_IMAGE013
Figure 330136DEST_PATH_IMAGE014
Figure 790198DEST_PATH_IMAGE015
Figure 803154DEST_PATH_IMAGE016
Figure 498708DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 913509DEST_PATH_IMAGE010
Figure 669107DEST_PATH_IMAGE011
Figure 169358DEST_PATH_IMAGE012
Figure 403024DEST_PATH_IMAGE013
Figure 937911DEST_PATH_IMAGE014
Figure 864410DEST_PATH_IMAGE015
Figure 851957DEST_PATH_IMAGE016
Figure 889315DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 110529DEST_PATH_IMAGE011
Figure 523055DEST_PATH_IMAGE012
Figure 613371DEST_PATH_IMAGE013
Figure 608003DEST_PATH_IMAGE014
Figure 584584DEST_PATH_IMAGE016
Figure 26061DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 390046DEST_PATH_IMAGE010
Figure 625986DEST_PATH_IMAGE011
Figure 826155DEST_PATH_IMAGE012
Figure 258273DEST_PATH_IMAGE013
Figure 961918DEST_PATH_IMAGE014
Figure 821289DEST_PATH_IMAGE015
Figure 243175DEST_PATH_IMAGE016
Figure 478984DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 302715DEST_PATH_IMAGE010
Figure 332987DEST_PATH_IMAGE011
Figure 242169DEST_PATH_IMAGE012
Figure 694327DEST_PATH_IMAGE014
Figure 895501DEST_PATH_IMAGE015
Figure 291978DEST_PATH_IMAGE016
Figure 604011DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 402334DEST_PATH_IMAGE010
Figure 774409DEST_PATH_IMAGE011
Figure 658183DEST_PATH_IMAGE012
Figure 773906DEST_PATH_IMAGE013
Figure 426736DEST_PATH_IMAGE014
Figure 907396DEST_PATH_IMAGE015
Figure 75203DEST_PATH_IMAGE016
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 501953DEST_PATH_IMAGE010
Figure 215831DEST_PATH_IMAGE011
Figure 74197DEST_PATH_IMAGE012
Figure 531723DEST_PATH_IMAGE013
Figure 881847DEST_PATH_IMAGE014
Figure 32205DEST_PATH_IMAGE015
Figure 112288DEST_PATH_IMAGE016
Figure 373505DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, binary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 2013100223310100001DEST_PATH_IMAGE018
Figure 786480DEST_PATH_IMAGE018
Figure 540809DEST_PATH_IMAGE011
Figure 90871DEST_PATH_IMAGE002
Figure 676573DEST_PATH_IMAGE012
Figure 919466DEST_PATH_IMAGE002
Figure 957830DEST_PATH_IMAGE013
Figure 165585DEST_PATH_IMAGE002
Figure 22070DEST_PATH_IMAGE015
Figure 474228DEST_PATH_IMAGE016
Figure 42613DEST_PATH_IMAGE002
Figure 83599DEST_PATH_IMAGE017
Figure 28421DEST_PATH_IMAGE002
, binary cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 193954DEST_PATH_IMAGE003
Figure 198819DEST_PATH_IMAGE010
Figure 449803DEST_PATH_IMAGE018
Figure 932737DEST_PATH_IMAGE011
Figure 218356DEST_PATH_IMAGE018
Figure 128543DEST_PATH_IMAGE012
Figure 153448DEST_PATH_IMAGE013
Figure 480524DEST_PATH_IMAGE003
Figure 52768DEST_PATH_IMAGE003
Figure 628237DEST_PATH_IMAGE015
Figure 872137DEST_PATH_IMAGE003
Figure 915627DEST_PATH_IMAGE003
Figure 393193DEST_PATH_IMAGE003
, binary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 894713DEST_PATH_IMAGE004
Figure 344148DEST_PATH_IMAGE010
Figure 261420DEST_PATH_IMAGE004
Figure 479912DEST_PATH_IMAGE011
Figure 761169DEST_PATH_IMAGE012
Figure 747710DEST_PATH_IMAGE018
Figure 820708DEST_PATH_IMAGE013
Figure 601714DEST_PATH_IMAGE004
Figure 760163DEST_PATH_IMAGE014
Figure 19237DEST_PATH_IMAGE004
Figure 212321DEST_PATH_IMAGE015
Figure 152509DEST_PATH_IMAGE004
Figure 798254DEST_PATH_IMAGE016
Figure 861019DEST_PATH_IMAGE004
Figure 908609DEST_PATH_IMAGE017
Figure 218368DEST_PATH_IMAGE004
, binary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 102141DEST_PATH_IMAGE005
Figure 870694DEST_PATH_IMAGE005
Figure 413671DEST_PATH_IMAGE011
Figure 519161DEST_PATH_IMAGE005
Figure 438576DEST_PATH_IMAGE012
Figure 659790DEST_PATH_IMAGE013
Figure 518155DEST_PATH_IMAGE018
Figure 788731DEST_PATH_IMAGE014
Figure 275207DEST_PATH_IMAGE005
Figure 176298DEST_PATH_IMAGE015
Figure 505648DEST_PATH_IMAGE005
Figure 252018DEST_PATH_IMAGE016
Figure 920897DEST_PATH_IMAGE005
Figure 543957DEST_PATH_IMAGE005
, binary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 608865DEST_PATH_IMAGE006
Figure 945299DEST_PATH_IMAGE010
Figure 171881DEST_PATH_IMAGE006
Figure 226556DEST_PATH_IMAGE011
Figure 829576DEST_PATH_IMAGE006
Figure 20517DEST_PATH_IMAGE012
Figure 683579DEST_PATH_IMAGE006
Figure 22288DEST_PATH_IMAGE013
Figure 191449DEST_PATH_IMAGE018
Figure 751744DEST_PATH_IMAGE014
Figure 70861DEST_PATH_IMAGE018
Figure 349395DEST_PATH_IMAGE015
Figure 44950DEST_PATH_IMAGE006
Figure 459751DEST_PATH_IMAGE016
Figure 949769DEST_PATH_IMAGE006
Figure 450021DEST_PATH_IMAGE017
Figure 949266DEST_PATH_IMAGE006
, binary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 218574DEST_PATH_IMAGE007
Figure 332023DEST_PATH_IMAGE010
Figure 70303DEST_PATH_IMAGE007
Figure 497053DEST_PATH_IMAGE007
Figure 679084DEST_PATH_IMAGE007
Figure 769400DEST_PATH_IMAGE013
Figure 281601DEST_PATH_IMAGE014
Figure 622900DEST_PATH_IMAGE015
Figure 472039DEST_PATH_IMAGE018
Figure 973559DEST_PATH_IMAGE016
Figure 157415DEST_PATH_IMAGE007
Figure 340266DEST_PATH_IMAGE017
Figure 496441DEST_PATH_IMAGE007
, binary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 355812DEST_PATH_IMAGE008
Figure 777698DEST_PATH_IMAGE010
Figure 560977DEST_PATH_IMAGE008
Figure 633975DEST_PATH_IMAGE011
Figure 403262DEST_PATH_IMAGE008
Figure 148681DEST_PATH_IMAGE008
Figure 92497DEST_PATH_IMAGE013
Figure 424570DEST_PATH_IMAGE014
Figure 939865DEST_PATH_IMAGE008
Figure 987455DEST_PATH_IMAGE015
Figure 110263DEST_PATH_IMAGE018
Figure 977725DEST_PATH_IMAGE016
Figure 844181DEST_PATH_IMAGE018
Figure 746278DEST_PATH_IMAGE017
Figure 39987DEST_PATH_IMAGE008
, binary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 660324DEST_PATH_IMAGE009
Figure 87074DEST_PATH_IMAGE009
Figure 551685DEST_PATH_IMAGE011
Figure 19838DEST_PATH_IMAGE009
Figure 104785DEST_PATH_IMAGE009
Figure 740297DEST_PATH_IMAGE013
Figure 143914DEST_PATH_IMAGE014
Figure 625842DEST_PATH_IMAGE009
Figure 681522DEST_PATH_IMAGE015
Figure 260620DEST_PATH_IMAGE009
Figure 661962DEST_PATH_IMAGE018
Figure 888544DEST_PATH_IMAGE017
Figure 943219DEST_PATH_IMAGE018
, set encryption parameter
Figure 546239DEST_PATH_IMAGE002
Figure 737180DEST_PATH_IMAGE003
Figure 400242DEST_PATH_IMAGE004
Figure 738951DEST_PATH_IMAGE005
Figure 896394DEST_PATH_IMAGE006
WithInitial value, setting encryption variables q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesPosition control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 2013100223310100001DEST_PATH_IMAGE019
Carry out H1=
Figure 2013100223310100001DEST_PATH_IMAGE020
Figure 525215DEST_PATH_IMAGE010
Figure 718747DEST_PATH_IMAGE011
Figure 467260DEST_PATH_IMAGE002
Figure 549617DEST_PATH_IMAGE012
Figure 476116DEST_PATH_IMAGE002
Figure 463663DEST_PATH_IMAGE013
Figure 501020DEST_PATH_IMAGE002
Figure 567110DEST_PATH_IMAGE014
Figure 648199DEST_PATH_IMAGE002
Figure 873775DEST_PATH_IMAGE015
Figure 901774DEST_PATH_IMAGE002
Figure 476292DEST_PATH_IMAGE002
Figure 923585DEST_PATH_IMAGE017
Binary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 729047DEST_PATH_IMAGE019
Carry out H1=
Figure 168249DEST_PATH_IMAGE020
Figure 352106DEST_PATH_IMAGE010
Figure 534957DEST_PATH_IMAGE020
Figure 628815DEST_PATH_IMAGE011
Figure 238919DEST_PATH_IMAGE002
Figure 910071DEST_PATH_IMAGE012
Figure 18546DEST_PATH_IMAGE013
Figure 48819DEST_PATH_IMAGE002
Figure 958000DEST_PATH_IMAGE014
Figure 731921DEST_PATH_IMAGE002
Figure 421877DEST_PATH_IMAGE015
Figure 623052DEST_PATH_IMAGE002
Figure 19529DEST_PATH_IMAGE016
Figure 597141DEST_PATH_IMAGE002
Figure 377326DEST_PATH_IMAGE002
I+1, q+1 and k+1 computing are carried out while binary cryptographic calculation, next binary cryptographic calculation is pointed to H2= 
Figure 376823DEST_PATH_IMAGE010
Figure 2013100223310100001DEST_PATH_IMAGE021
Figure 91969DEST_PATH_IMAGE011
Figure 385679DEST_PATH_IMAGE021
Figure 410583DEST_PATH_IMAGE003
Figure 167187DEST_PATH_IMAGE013
Figure 897377DEST_PATH_IMAGE003
Figure 739431DEST_PATH_IMAGE014
Figure 947689DEST_PATH_IMAGE003
Figure 824378DEST_PATH_IMAGE015
Figure 459890DEST_PATH_IMAGE003
Figure 789240DEST_PATH_IMAGE016
Figure 801190DEST_PATH_IMAGE003
Figure 470069DEST_PATH_IMAGE017
Figure 525749DEST_PATH_IMAGE003
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 2013100223310100001DEST_PATH_IMAGE022
Carry out H2= 
Figure 155445DEST_PATH_IMAGE003
Figure 291208DEST_PATH_IMAGE021
Figure 534102DEST_PATH_IMAGE011
Figure 651094DEST_PATH_IMAGE021
Figure 632005DEST_PATH_IMAGE003
Figure 768502DEST_PATH_IMAGE013
Figure 559740DEST_PATH_IMAGE003
Figure 451604DEST_PATH_IMAGE014
Figure 11898DEST_PATH_IMAGE003
Figure 596595DEST_PATH_IMAGE015
Figure 609550DEST_PATH_IMAGE003
Figure 305105DEST_PATH_IMAGE016
Figure 719906DEST_PATH_IMAGE003
Figure 975755DEST_PATH_IMAGE003
I+1, q+1 and k+1 computing are carried out while binary cryptographic calculation, next binary cryptographic calculation is pointed to H3=
Figure 209421DEST_PATH_IMAGE004
Figure 744307DEST_PATH_IMAGE010
Figure 670806DEST_PATH_IMAGE004
Figure 658354DEST_PATH_IMAGE011
Figure 2013100223310100001DEST_PATH_IMAGE023
Figure 758028DEST_PATH_IMAGE012
Figure 632574DEST_PATH_IMAGE023
Figure 605341DEST_PATH_IMAGE013
Figure 830917DEST_PATH_IMAGE004
Figure 921232DEST_PATH_IMAGE014
Figure 915864DEST_PATH_IMAGE004
Figure 167854DEST_PATH_IMAGE015
Figure 880726DEST_PATH_IMAGE004
Figure 509154DEST_PATH_IMAGE016
Figure 810822DEST_PATH_IMAGE004
Figure 984446DEST_PATH_IMAGE017
Figure 433882DEST_PATH_IMAGE004
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this binary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesCarry out binary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN201310022331.0A 2013-01-22 2013-01-22 Parameter transmutation binary encryption anti-fake information storage trademark Expired - Fee Related CN103116790B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310022331.0A CN103116790B (en) 2013-01-22 2013-01-22 Parameter transmutation binary encryption anti-fake information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310022331.0A CN103116790B (en) 2013-01-22 2013-01-22 Parameter transmutation binary encryption anti-fake information storage trademark

Publications (2)

Publication Number Publication Date
CN103116790A true CN103116790A (en) 2013-05-22
CN103116790B CN103116790B (en) 2016-06-01

Family

ID=48415160

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310022331.0A Expired - Fee Related CN103116790B (en) 2013-01-22 2013-01-22 Parameter transmutation binary encryption anti-fake information storage trademark

Country Status (1)

Country Link
CN (1) CN103116790B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘连浩: "基于身份的十进制加密技术研究", 《计算机工程与应用》, vol. 41, no. 24, 3 November 2005 (2005-11-03), pages 154 - 156 *
姚旭罡等: "一种多重加密的算法及其实现方案", 《通信技术》, no. 138, 8 October 2007 (2007-10-08), pages 95 - 96 *

Also Published As

Publication number Publication date
CN103116790B (en) 2016-06-01

Similar Documents

Publication Publication Date Title
CN103106442A (en) Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106460A (en) Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark
CN103106513A (en) Multi-parameter univariate poly encryption anti-fake information storage trademark
CN103116790A (en) Parameter transmutation binary encryption anti-fake information storage trademark
CN103106517A (en) Parameter transmutation ternary encryption anti-fake information storage trademark
CN103106518A (en) Parameter transmutation one-element encryption anti-fake information storage trademark
CN103106448A (en) Single variable parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103116796A (en) One-parameter variation transmutation unary encryption anti-fake information storage trademark
CN103106429A (en) Single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark
CN103116774B (en) Parameter transmutation unary circulation encryption anti-fake information storage trademark
CN103106447A (en) Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark
CN103116788A (en) Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark
CN103106439A (en) Multiparameter multivariable binary encryption anti-fake information storage trademark
CN103106438A (en) Parameter-gradient multivariable multi-encryption anti-fake information storage trademark
CN103106512A (en) Multiparameter multivariable ternary encryption anti-fake information storage trademark
CN103106457A (en) Single parameter ternary circulation encryption anti-counterfeiting information storage trademark
CN103106479B (en) Parameter transmutation binary circulation encryption anti-fake information storage trademark
CN103106516A (en) Multivariate multi-parameter gradient binary encryption anti-fake information storage trademark
CN103106450A (en) Single parameter multivariable unitary circulation encryption anti-counterfeiting information storage trademark
CN103106440A (en) Multi-parameter unitary encryption anti-fake information storage brand
CN103116797A (en) Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark
CN103106503A (en) Multivariate multi-parameter gradient polynary encryption anti-fake information storage trademark
CN103106459A (en) Multiparameter transmutation multivariable cycle multielement encryption anti-fake information storage trademark
CN103106452A (en) Multivariate parameter gradation unitary circulating encryption anti-fake information storage trademark
CN103106449A (en) Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160601

Termination date: 20170122