CN103136565B - Multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand - Google Patents

Multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand Download PDF

Info

Publication number
CN103136565B
CN103136565B CN201310022310.9A CN201310022310A CN103136565B CN 103136565 B CN103136565 B CN 103136565B CN 201310022310 A CN201310022310 A CN 201310022310A CN 103136565 B CN103136565 B CN 103136565B
Authority
CN
China
Prior art keywords
scale
group
control variable
trade mark
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310022310.9A
Other languages
Chinese (zh)
Other versions
CN103136565A (en
Inventor
张立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN201310022310.9A priority Critical patent/CN103136565B/en
Publication of CN103136565A publication Critical patent/CN103136565A/en
Application granted granted Critical
Publication of CN103136565B publication Critical patent/CN103136565B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Printing Methods (AREA)
  • Storage Device Security (AREA)

Abstract

Provided is a multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand. According to the brand, binary system anti-fake information can be changed into binary system modulating signals through ternary circulating encryption and channel coding. The anti-fake information can be embedded into an entire brand page through orderly changes of conductivity of amplitude-modulated dots through a circulation look-up table modulation type. The anti-fake information can be identified from any arbitrary fragment in the brand identification process, and also can be applied to various anti-fake brands.

Description

Multivariate multi-parameter gradient ternary circulation anti-fake information storage trademark
Technical field:
The present invention relates to a kind of anti-false trademark, particularly a kind of multivariate multi-parameter gradient ternary circulation anti-fake information storage trademark, scale-of-two encryption anti-fake information can be kept on the trade mark page and realize the false proof of trade mark by this trade mark, this trade mark may be used for extensive stock false proof in.
Background technology:
Anti-false trademark, also known as antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, is a kind ofly to discern the false from the genuine, prevent the proof label palmed off, be in commodity circulation process people for distinguishing true and false, the mark of distinguishing commercial quality quality of merchandise resources.Trademark anti-counterfeit is related to businessman, client and market safety, is related to the interests of protection businessman and client.The trade mark of China has carried out innovating audaciously; have employed laser anti-counterfeit, core micropore is false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof; but the false proof struggle with faking is high-tech trial of strength; anti-counterfeiting technology advanced again has certain ageing; so; constantly must promote trade mark anti-fake technique; could false proof with fraud in forever maintain the leading position, this is also the basic assurance that protection businessman and the interests of client maintain commodity circulation safety.
Summary of the invention:
In order to improve reliability and the security of trademark anti-counterfeit, the deficiency that the present invention is directed to the existence of existing trademark anti-counterfeit is improved existing trade mark anti-fake technique, propose a kind of anti-counterfeiting information and store trade mark, this trade mark is by the change to amplitude electric conductivity in brand printing, encryption anti-fake information is embedded on the whole trade mark page with scale-of-two coded signal form, encryption anti-fake information can be identified when brand recognition from any one fragment, therefore there is very strong disguised and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information stores trade mark, and be made up of trade mark page paper, the amplitude be printed on trade mark page paper, the horizontal scanning line be printed on trade mark page paper, the column scan line be printed on trade mark page paper, the image on trade mark page paper and word are made up of amplitude,
According to the scale-of-two encryption anti-fake information stored, a part of amplitude on trade mark page paper is printed by electrically conductive ink and is formed, another part amplitude on trade mark page paper is printed by dielectric ink and is formed, and the horizontal scanning line on trade mark page paper and column scan line are printed by electrically conducting transparent ink and formed
The horizontal scanning line be printed on trade mark page paper has N bar, the column scan line be printed on trade mark page paper has M bar, the amplitude be printed on trade mark page paper is divided into the capable M row of N on trade mark paper, amplitude is the neat arrangement in matrix on trade mark page paper paper, i is allowed to get 1 to N, j is allowed to get 1 to M, the basal surface of each amplitude that the jth bar column scan line on trade mark page paper arranges with the jth on trade mark page paper is electrically connected, i-th horizontal scanning line on trade mark page paper is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper
When the binary message needing the trade mark page to store reads, the 1st on trade mark page paper article is set to high level successively to N article of horizontal scanning line,
When article horizontal scanning line of the 1st on trade mark page paper is set to high level, the binary message that the 1st row on trade mark page paper stores exports to M bar of column scan line from the 1st bar of column scan line with 0,1 code form, the amplitude that the 1st row on trade mark page paper is printed by electrically conductive ink exports binary message 1, the amplitude that the 1st row on trade mark page paper is printed by dielectric ink exports binary message 0, above-mentioned readout can be repeated to other row on trade mark page paper
In order to realize the cryptographic storage of trademark anti-counterfeit information, first digitized processing is carried out to image false-proof information and character anti-counterfeiting information, image false-proof information and character anti-counterfeiting information is utilized to generate the scale-of-two anti-counterfeiting information table of 8 group, for preventing producing information spillover in ciphering process, each in scale-of-two anti-counterfeiting information table 8 one group of scale-of-two anti-counterfeiting information are expanded to 32 one group of scale-of-two anti-counterfeiting information, generate high 24 be entirely 0 32 one group scale-of-two anti-counterfeiting information table, i-th group of 32 scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table are denoted as N i, i-th group of 32 scale-of-two encryption anti-fake information in 32 one group scale-of-two encryption anti-fake information table are denoted as H i, i be greater than 0 positive integer, scale-of-two encryption parameter is denoted as c respectively 1, c 2, c 3, c 4, c 5, c 6, c 7and c 8, encryption parameter c 1, c 2, c 3, c 4, c 5, c 6, c 7and c 8it is the scale-of-two positive integer of 1 to 256, scale-of-two encryption variables is denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are the scale-of-two positive integer of 1 to 256, binary operator control variable is denoted as k, binary operator control variable k is the bigit of 0≤k≤7, operator adopt+,-, ×, three kinds of operators, during binary operator control variable k=0 be defined as respectively-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1 be defined as respectively+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2 be defined as respectively-, × ,+,+, × ,-,+,-, during binary operator control variable k=3 be defined as respectively-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4 be defined as respectively+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5 be defined as respectively × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6 be defined as respectively × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7 be defined as respectively+, ×, × ,-,+,-,-, ×, during binary operator control variable k=0, ternary circulation cryptographic calculation is defined as H i = ( N i + q ) @ k 1 ( c 1 + j ) @ k 2 ( N i + q ) @ k 3 ( c 1 + j ) @ k 4 ( N i + q ) @ k 5 ( c 1 + j ) @ k 6 ( c 1 + j ) @ k 7 ( c 1 + j ) @ k 8 ( c 1 + j ) , During binary operator control variable k=1, ternary circulation cryptographic calculation is defined as H i = ( c 2 + d ) @ k 1 ( N i + j ) @ k 2 ( c 2 + d ) @ k 3 ( N i + j ) @ k 4 ( c 2 + d ) @ k 5 ( N i + j ) @ k 6 ( c 2 + d ) @ k 7 ( c 2 + d ) @ k 8 ( c 2 + d ) , During binary operator control variable k=2, ternary circulation cryptographic calculation is defined as H i = ( c 3 + e ) @ k 1 ( c 3 + e ) @ k 2 ( N i + d ) @ k 3 ( c 3 + e ) @ k 4 ( N i + d ) @ k 5 ( c 3 + e ) @ k 6 ( N i + d ) @ k 7 ( c 3 + e ) @ k 8 ( c 3 + e ) , During binary operator control variable k=3, ternary circulation cryptographic calculation is defined as H i = ( c 4 + f ) @ k 1 ( c 4 + f ) @ k 2 ( c 4 + f ) @ k 3 ( N i + e ) @ k 4 ( c 4 + f ) @ k 5 ( N i + e ) @ k 6 ( c 4 + f ) @ k 7 ( N i + e ) @ k 8 ( c 4 + f ) , During binary operator control variable k=4, ternary circulation cryptographic calculation is defined as H i = ( c 5 + g ) @ k 1 ( c 5 + g ) @ k 2 ( c 5 + g ) @ k 3 ( c 5 + g ) @ k 4 ( N i + f ) @ k 5 ( c 5 + g ) @ k 6 ( N i + f ) @ k 7 ( c 5 + g ) @ k 8 ( N i + f ) , During binary operator control variable k=5, ternary circulation cryptographic calculation is defined as H i = ( N i + g ) @ k 1 ( c 6 + h ) @ k 2 ( c 6 + h ) @ k 3 ( c 6 + h ) @ k 4 ( c 6 + h ) @ k 5 ( N i + g ) @ k 6 ( c 6 + h ) @ k 7 ( N i + g ) @ k 8 ( c 6 + h ) , During binary operator control variable k=6, ternary circulation cryptographic calculation is defined as H i = ( c 7 + r ) @ k 1 ( N i + h ) @ k 2 ( c 7 + r ) @ k 3 ( c 7 + r ) @ k 4 ( c 7 + r ) @ k 5 ( c 7 + r ) @ k 6 ( N i + h ) @ k 7 ( c 7 + r ) @ k 8 ( N i + h ) , During binary operator control variable k=7, ternary circulation cryptographic calculation is defined as H i = ( N i + r ) @ k 1 ( c 8 + p ) @ k 2 ( N i + r ) @ k 3 ( c 8 + p ) @ k 4 ( c 8 + p ) @ k 5 ( c 8 + p ) @ k 6 ( c 8 + p ) @ k 7 ( N i + r ) @ k 8 ( c 8 + p ) , Setting encryption parameter c 1, c 2, c 3, c 4, c 5, c 6, c 7and c 8initial value, the initial value of setting encryption variables j, d, e, f, g, h, r, p and q, the initial value of setting binary operator control variable k is k=0, sets 32 scale-of-two anti-counterfeiting information N in 32 one group scale-of-two anti-counterfeiting information table iposition control variable i=1, set 32 scale-of-two encryption anti-fake information H in 32 one group scale-of-two encryption anti-fake information table iposition control variable i=1, to N 1carry out H 1 = ( N 1 + q ) @ k 1 ( c 1 + j ) @ k 2 ( N 1 + q ) @ k 3 ( c 1 + j ) @ k 4 ( N 1 + q ) @ k 5 ( c 1 + j ) @ k 6 ( c 1 + j ) @ k 7 ( c 1 + j ) @ k 8 ( c 1 + j ) Ternary circulation cryptographic calculation, wherein k=0, generate first group of scale-of-two encryption anti-fake information H in the scale-of-two encryption anti-fake information table of 32 group 1, to N 1carry out carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing while ternary circulation cryptographic calculation, next ternary circulation cryptographic calculation is pointed to wherein k=1, generates second group of scale-of-two encryption anti-fake information H in the scale-of-two encryption anti-fake information table of 32 group 2, to N 2carry out H 2 = ( c 2 + d ) @ k 1 ( N 2 + j ) @ k 2 ( c 2 + d ) @ k 3 ( N 2 + j ) @ k 4 ( c 2 + d ) @ k 5 ( N 2 + j ) @ k 6 ( c 2 + d ) @ k 7 ( c 2 + d ) @ k 8 ( c 2 + d ) Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing while ternary circulation cryptographic calculation, next ternary circulation cryptographic calculation is pointed to H 3 = ( c 3 + e ) @ k 1 ( c 3 + e ) @ k 2 ( N 3 + d ) @ k 3 ( c 3 + e ) @ k 4 ( N 3 + d ) @ k 5 ( c 3 + e ) @ k 6 ( N 3 + d ) @ k 7 ( c 3 + e ) @ k 8 ( c 3 + e ) , Wherein k=2, generates the 3rd group of scale-of-two encryption anti-fake information H in the scale-of-two encryption anti-fake information table of 32 group 3, this ternary circulation cryptographic calculation goes on always until last in scale-of-two anti-counterfeiting information table organizes 32 scale-of-two anti-counterfeiting information, by organizing 32 scale-of-two anti-counterfeiting information N to each in 32 one group scale-of-two anti-counterfeiting information table icarry out ternary circulation cryptographic calculation, generate 32 the one group scale-of-two encryption anti-fake information table corresponding with 32 one group scale-of-two anti-counterfeiting information table, digitized processing is carried out to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, in label printing process, utilize the scale-of-two encryption anti-fake information of 32 group of generation by the printing process of the amplitude on the circulation look-up table modulation trade mark page, printing amplitude by selecting dielectric ink and electrically conductive ink makes the regular electric conductivity according to above-mentioned two kinds of amplitudes of the amplitude on the trade mark page change, after modulation, on the trade mark page, adjacent 32 amplitudes form one group of 32 binary message, make the trade mark page carries anti-counterfeiting information by the change of amplitude electric conductivity, and make this anti-counterfeiting information be embedded in whole trade mark page site, realize trademark anti-counterfeit, obvious extractible anti-counterfeiting information is embedded by non-in the trade mark page, valid certificates can be provided for true trade mark, there is stronger anti-forgery ability simultaneously.
For solving above-mentioned technical matters, first digitized processing is carried out to image false-proof information and character anti-counterfeiting information, generate the scale-of-two anti-counterfeiting information table of 8 group, each in scale-of-two anti-counterfeiting information table 8 one group of scale-of-two anti-counterfeiting information are expanded to 32 one group of scale-of-two anti-counterfeiting information, generate high 24 be entirely 0 32 one group scale-of-two anti-counterfeiting information table, ternary circulation cryptographic calculation is carried out to each 32 the scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table, generate the scale-of-two encryption anti-fake information table of 32 group, utilize 32 scale-of-two encryption anti-fake information in scale-of-two encryption anti-fake information table through chnnel coding, generate the binary modulated signal with 32 group of error detecting and error correcting function, chnnel coding can adopt loop coding, convolutional encoding or Turbo coding various ways, image signal of trade mark page original continuous being changed the line map exports shadow tone hybrid screening picture signal through rasterizing process (RIP) and hybrid screening, comprising amplitude and FM screened image signal, 32 the one group of binary modulated signals generated are utilized to adopt the electric conductivity of amplitude in circulation look-up table modulation system modulation hybrid screening picture signal, make the electric conductivity of amplitude according to dielectric ink amplitude and electrically conductive ink amplitude is regular changes, adjacent 32 amplitudes in hybrid screening picture signal are made to carry 32 scale-of-two anti-counterfeiting information by the change of electric conductivity, thus be created on the hybrid screening picture signal embedding anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, first trade mark page site electric conductivity signal is gathered, through the identification to the electric conductivity of amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, channel-decoding is carried out to the binary modulated signal of 32 group that demodulation exports, generate scale-of-two deciphering anti-counterfeiting information table after channel-decoding, i-th group of 32 binary message of being deciphered by scale-of-two in anti-counterfeiting information table are denoted as M i.
Scale-of-two is deciphered 32 binary message M in anti-counterfeiting information table ithe initial value design of position control variable i be i=1, setting encryption parameter c 1, c 2, c 3, c 4, c 5, c 6, c 7and c 8initial value be encryption time initial value, the initial value when initial value of setting encryption variables j, d, e, f, g, h, r, p and q is encryption, the initial value design of binary operator control variable k is k=0, and known by ternary circulation ciphering process, during binary operator control variable k=0, decrypt operation is M i = ( N i + q ) @ k 1 ( c 1 + j ) @ k 2 ( N i + q ) @ k 3 ( c 1 + j ) @ k 4 ( N i + q ) @ k 5 ( c 1 + j ) @ k 6 ( c 1 + j ) @ k 7 ( c 1 + j ) @ k 8 ( c 1 + j ) , During binary operator control variable k=1, decrypt operation is M i = ( c 2 + d ) @ k 1 ( N i + j ) @ k 2 ( c 2 + d ) @ k 3 ( N i + j ) @ k 4 ( c 2 + d ) @ k 5 ( N i + j ) @ k 6 ( c 2 + d ) @ k 7 ( c 2 + d ) @ k 8 ( c 2 + d ) , During binary operator control variable k=2, decrypt operation is M i = ( c 3 + e ) @ k 1 ( c 3 + e ) @ k 2 ( N i + d ) @ k 3 ( c 3 + e ) @ k 4 ( N i + d ) @ k 5 ( c 3 + e ) @ k 6 ( N i + d ) @ k 7 ( c 3 + e ) @ k 8 ( c 3 + e ) , During binary operator control variable k=3, decrypt operation is M i = ( c 4 + f ) @ k 1 ( c 4 + f ) @ k 2 ( c 4 + f ) @ k 3 ( N i + e ) @ k 4 ( c 4 + f ) @ k 5 ( N i + e ) @ k 6 ( c 4 + f ) @ k 7 ( N i + e ) @ k 8 ( c 4 + f ) , During binary operator control variable k=4, decrypt operation is M i = ( c 5 + g ) @ k 1 ( c 5 + g ) @ k 2 ( c 5 + g ) @ k 3 ( c 5 + g ) @ k 4 ( N i + f ) @ k 5 ( c 5 + g ) @ k 6 ( N i + f ) @ k 7 ( c 5 + g ) @ k 8 ( N i + f ) , During binary operator control variable k=5, decrypt operation is M i = ( N i + g ) @ k 1 ( c 6 + h ) @ k 2 ( c 6 + h ) @ k 3 ( c 6 + h ) @ k 4 ( c 6 + h ) @ k 5 ( N i + g ) @ k 6 ( c 6 + h ) @ k 7 ( N i + g ) @ k 8 ( c 6 + h ) , During binary operator control variable k=6, decrypt operation is M i = ( c 7 + r ) @ k 1 ( N i + h ) @ k 2 ( c 7 + r ) @ k 3 ( c 7 + r ) @ k 4 ( c 7 + r ) @ k 5 ( c 7 + r ) @ k 6 ( N i + h ) @ k 7 ( c 7 + r ) @ k 8 ( N i + h ) , During binary operator control variable k=7, decrypt operation is M i = ( N i + r ) @ k 1 ( c 8 + p ) @ k 2 ( N i + r ) @ k 3 ( c 8 + p ) @ k 4 ( c 8 + p ) @ k 5 ( c 8 + p ) @ k 6 ( c 8 + p ) @ k 7 ( N i + r ) @ k 8 ( c 8 + p ) , First M from scale-of-two deciphering anti-counterfeiting information table 1start, to each 32 the binary message M in scale-of-two deciphering anti-counterfeiting information table icarry out corresponding decrypt operation, solve scale-of-two anti-counterfeiting information N i, generate high 24 be entirely 0 32 one group scale-of-two anti-counterfeiting information table, remove high 24, recover the scale-of-two anti-counterfeiting information table of generation 8 group, recover anti-counterfeiting signal and also export anti-counterfeiting information.
Accompanying drawing explanation
Below in conjunction with accompanying drawing, the present invention is further described.
Fig. 1 is one-piece construction figure of the present invention.
Fig. 2 is A-A cut-open view of the present invention.
Fig. 3 loads anti-counterfeiting information process flow diagram.
Fig. 4 extracts anti-counterfeiting information process flow diagram.
Embodiment
As in Fig. 1 and Fig. 2, anti-fake information storage trademark, by trade mark page paper 7-1, be printed on amplitude 6-1 to the 6-150 on trade mark page paper 7-1, be printed on horizontal scanning line 1-1 to the 1-15 on trade mark page paper 7-1, column scan line 2-1 to the 2-10 be printed on trade mark page paper 7-1 is formed, image on trade mark page paper 7-1 and word are made up of amplitude 6-1 to 6-150, according to storage scale-of-two encryption anti-fake information, a part of amplitude on trade mark page paper 7-1 is printed by electrically conductive ink and is formed, another part amplitude on trade mark page paper 7-1 is printed by dielectric ink and is formed, horizontal scanning line 1-1 to 1-15 on trade mark page paper 7-1 and column scan line 2-1 to 2-10 is printed by electrically conducting transparent ink and forms,
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is printed by electrically conductive ink and is formed, and the light amplitude on trade mark page paper 7-1 is printed by dielectric ink and formed,
The amplitude be printed on trade mark page paper 7-1 is divided into 15 row 10 and arranges on trade mark paper, amplitude 6-1 to 6-150 is the neat arrangement in matrix on trade mark page paper 7-1, i is allowed to get 1 to 15, j is allowed to get 1 to 10, the basal surface of each amplitude that the jth bar column scan line on trade mark page paper 7-1 arranges with the jth on trade mark page paper 7-1 is electrically connected, i-th horizontal scanning line on trade mark page paper 7-1 is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper 7-1
When the scale-of-two encryption anti-fake information needing the trade mark page to store reads, the 1st article of horizontal scanning line on trade mark page paper 7-1 is set to high level successively to the 15th article of horizontal scanning line,
When the 1st article of horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the scale-of-two encryption anti-fake information that the 1st row on trade mark page paper 7-1 stores is with 0, 1 code form exports from the 1st bar of column scan line to the 10th bar of column scan line, the 1st row on trade mark page paper 7-1 is printed by electrically conductive ink and is formed amplitude output binary message 1, the 1st row on trade mark page paper 7-1 is printed by dielectric ink and is formed amplitude output binary message 0, therefore the scale-of-two encryption anti-fake information 1100001000 of the 1st row reading, above-mentioned readout can be repeated to other row on trade mark page paper 7-1.
In loading anti-counterfeiting information process flow diagram 3, original anti-counterfeiting information (image, word) is through digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, in scale-of-two anti-counterfeiting information table 8 one group of binary message is expanded to 32 one group of binary messages, generate high 24 be entirely 0 32 one group scale-of-two anti-counterfeiting information table, i-th group of 32 binary message in 32 one group scale-of-two anti-counterfeiting information table are denoted as N i, i be greater than 0 positive integer, from first 32 scale-of-two encryption anti-fake information N 32 one group scale-of-two anti-counterfeiting information table 1start, to 32 the scale-of-two anti-counterfeiting information N of each in 32 one group scale-of-two anti-counterfeiting information table icarry out ternary circulation cryptographic calculation, generate 32 the one group scale-of-two encryption anti-fake information table corresponding with 32 one group scale-of-two anti-counterfeiting information table, digitized processing is carried out to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, in label printing process, utilize the scale-of-two encryption anti-fake information of 32 group of generation by the printing process of the amplitude on the circulation look-up table modulation trade mark page, printing amplitude by selecting dielectric ink and electrically conductive ink makes the regular electric conductivity according to above-mentioned two kinds of amplitudes of the amplitude on the trade mark page change, after modulation, on the trade mark page, adjacent 32 amplitudes form one group of 32 binary message, make the trade mark page carries anti-counterfeiting information by the change of amplitude electric conductivity, and make this anti-counterfeiting information be embedded in whole trade mark page site, realize trademark anti-counterfeit printing, obvious extractible anti-counterfeiting information is embedded by non-in the trade mark page, realize trademark anti-counterfeit.
In extraction anti-counterfeiting information process flow diagram 4, when extracting anti-counterfeiting information, first the electric conductivity signal of trade mark page halftone dot image is gathered, through the electric conductivity identification to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, channel-decoding is carried out to the binary modulated signal of 32 group that demodulation exports, after channel-decoding, generates scale-of-two deciphering anti-counterfeiting information table.
The scale-of-two generated after decoding is deciphered 32 binary message M in anti-counterfeiting information table ithe initial value design of position control variable i be i=1, the initial value when initial value of setting encryption parameter is encryption, the initial value when initial value of setting encryption variables is encryption, the initial value design of binary operator control variable k is k=0, first M from the scale-of-two deciphering anti-counterfeiting information table generated 1start, to each 32 the binary message M in scale-of-two deciphering anti-counterfeiting information table ibe decrypted computing, solve scale-of-two anti-counterfeiting information N i, generate high 24 be entirely 0 32 one group scale-of-two anti-counterfeiting information table, remove high 24, recover the scale-of-two anti-counterfeiting information table of generation 8 group, recover anti-counterfeiting signal and also export anti-counterfeiting information.

Claims (1)

1. anti-counterfeiting information is generated binary modulated signal by cryptographic calculation and chnnel coding by one kind, and anti-counterfeiting information is embedded in the multivariate multi-parameter gradient ternary circulation anti-fake information storage trademark in full page by modulation system of tabling look-up by circulating, it is characterized in that: anti-counterfeiting information stores trade mark, by trade mark page paper, be printed on the amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper is formed, according to the scale-of-two encryption anti-fake information stored, a part of amplitude on trade mark page paper is printed by electrically conductive ink and is formed, another part amplitude on trade mark page paper is printed by dielectric ink and is formed, horizontal scanning line on trade mark page paper and column scan line are printed by electrically conducting transparent ink and are formed,
In order to realize the cryptographic storage of trademark anti-counterfeit information, first digitized processing is carried out to image false-proof information and character anti-counterfeiting information, image false-proof information and character anti-counterfeiting information is utilized to generate the scale-of-two anti-counterfeiting information table of 8 group, for preventing producing information spillover in ciphering process, each in scale-of-two anti-counterfeiting information table 8 one group of scale-of-two anti-counterfeiting information are expanded to 32 one group of scale-of-two anti-counterfeiting information, generate high 24 be entirely 0 32 one group scale-of-two anti-counterfeiting information table, i-th group of 32 scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table are denoted as N i, i-th group of 32 scale-of-two encryption anti-fake information in 32 one group scale-of-two encryption anti-fake information table are denoted as H i, i be greater than 0 positive integer, scale-of-two encryption parameter is denoted as c respectively 1, c 2, c 3, c 4, c 5, c 6, c 7and c 8, encryption parameter c 1, c 2, c 3, c 4, c 5, c 6, c 7and c 8it is the scale-of-two positive integer of 1 to 256, scale-of-two encryption variables is denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are the scale-of-two positive integer of 1 to 256, binary operator control variable is denoted as k, binary operator control variable k is the bigit of 0≤k≤7, operator adopt+,-, ×, three kinds of operators, during binary operator control variable k=0 be defined as respectively-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1 be defined as respectively+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2 be defined as respectively-, × ,+,+, × ,-,+,-, during binary operator control variable k=3 be defined as respectively-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4 be defined as respectively+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5 be defined as respectively × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6 be defined as respectively × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7 be defined as respectively+, ×, × ,-,+,-,-, ×, during binary operator control variable k=0, ternary circulation cryptographic calculation is defined as H i = ( N i + q ) @ k 1 ( c 1 + j ) @ k 2 ( N i + q ) @ k 3 ( c 1 + j ) @ k 4 ( N i + q ) @ k 5 ( c 1 + j ) @ k 6 ( c 1 + j ) @ k 7 ( c 1 + j ) During binary operator control variable k=1, ternary circulation cryptographic calculation is defined as H i = ( c 2 + d ) @ k 1 ( N i + j ) @ k 2 ( c 2 + d ) @ k 3 ( N i + j ) @ k 4 ( c 2 + d ) @ k 5 ( N i + j ) @ k 6 ( c 2 + d ) @ k 7 ( c 2 + d ) @ k 8 ( c 2 + d ) , During binary operator control variable k=2, ternary circulation cryptographic calculation is defined as H i = ( c 3 + e ) @ k 1 ( c 3 + e ) @ k 2 ( N i + d ) @ k 3 ( c 3 + e ) @ k 4 ( N i + d ) @ k 5 ( c 3 + e ) @ k 6 ( N i + d ) @ k 7 ( c 3 + e ) @ k 8 ( c 3 + e ) , During binary operator control variable k=3, ternary circulation cryptographic calculation is defined as H i = ( c 4 + f ) @ k 1 ( c 4 + f ) @ k 2 ( c 4 + f ) @ k 3 ( N i + e ) @ k 4 ( c 4 + f ) @ k 2 ( N i + e ) @ k 6 ( c 4 + f ) @ k 7 ( N i + e ) @ k 8 ( c 4 + f ) , During binary operator control variable k=4, ternary circulation cryptographic calculation is defined as H i = ( c 5 + g ) @ k 1 ( c 5 + g ) @ k 2 ( c 5 + g ) @ k 3 ( c 5 + g ) @ k 4 ( N i + f ) @ k 5 ( c 5 + g ) @ k 6 ( N i + f ) @ k 7 ( c 5 + g ) @ k 8 ( N i + f ) , During binary operator control variable k=5, ternary circulation cryptographic calculation is defined as H i = ( N i + g ) @ k 1 ( c 6 + h ) @ k 2 ( c 6 + h ) @ k 3 ( c 6 + h ) @ k 4 ( c 6 + h ) @ k 5 ( N i + g ) @ k 6 ( c 6 + h ) @ k 7 ( N i + g ) @ k 8 ( c 6 + h ) , During binary operator control variable k=6, ternary circulation cryptographic calculation is defined as H i = ( c 7 + r ) @ k 1 ( N i + h ) @ k 2 ( c 7 + r ) @ k 3 ( c 7 + r ) @ k 4 ( c 7 + r ) @ k 5 ( c 7 + r ) @ k 6 ( N i + h ) @ k 7 ( c 7 + r ) @ k 8 ( N i + h ) , During binary operator control variable k=7, ternary circulation cryptographic calculation is defined as H i = ( N i + r ) @ k 1 ( c 8 + p ) @ k 2 ( N i + r ) @ k 3 ( c 8 + p ) @ k 4 ( c 8 + p ) @ k 5 ( c 8 + p ) @ k 6 ( c 8 + p ) @ k 7 ( N i + r ) @ k 8 ( c 8 + p ) , Setting encryption parameter c 1, c 2, c 3, c 4, c 5, c 6, c 7and c 8initial value, the initial value of setting encryption variables j, d, e, f, g, h, r, p and q, the initial value of setting binary operator control variable k is k=0, sets 32 scale-of-two anti-counterfeiting information N in 32 one group scale-of-two anti-counterfeiting information table iposition control variable i=1, set 32 scale-of-two encryption anti-fake information H in 32 one group scale-of-two encryption anti-fake information table iposition control variable i=1, to N 1carry out H 1 = ( H 1 + q ) @ k 1 ( c 1 + j ) @ k 2 ( N 1 + q ) @ k 3 ( c 1 + j ) @ k 4 ( N 1 + q ) @ k 5 ( c 1 + j ) @ k 6 ( c 1 + j ) @ k 7 ( c 1 + j ) @ k 8 ( c 1 + j ) Ternary circulation cryptographic calculation, wherein k=0, generate first group of scale-of-two encryption anti-fake information H in the scale-of-two encryption anti-fake information table of 32 group 1, to N 1carry out H 1 = ( H 1 + q ) @ k 1 ( c 1 + j ) @ k 2 ( N 1 + q ) @ k 3 ( c 1 + j ) @ k 3 ( c 1 + j ) @ k 4 ( N 1 + q ) @ k 5 ( c 1 + j ) @ k 6 ( c 1 + j ) @ k 7 ( c 1 + j ) @ k 8 ( c 1 + j ) Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing while ternary circulation cryptographic calculation, next ternary circulation cryptographic calculation is pointed to H 2 = ( c 2 + d ) @ k 1 ( N 2 + j ) @ k 2 ( c 2 + d ) @ k 3 ( N 2 + j ) @ k 4 ( c 2 + d ) @ k 5 ( N 2 + j ) @ k 6 ( c 2 + d ) @ k 7 ( c 2 + d ) @ k 8 ( c 2 + d ) , Wherein k=1, generates second group of scale-of-two encryption anti-fake information H in the scale-of-two encryption anti-fake information table of 32 group 2, to N 2carry out H 2 = ( c 2 + d ) @ k 1 ( N 2 + j ) @ k 2 ( c 2 + d ) @ k 3 ( N 2 + j ) @ k 4 ( c 2 + d ) @ k 5 ( N 2 + j ) @ k 6 ( c 2 + d ) @ k 7 ( c 2 + d ) @ k 8 ( c 2 + d ) Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing while ternary circulation cryptographic calculation, next ternary circulation cryptographic calculation is pointed to H 3 = ( c 3 + e ) @ k 1 ( N 3 + e ) @ k 2 ( N 3 + d ) @ k 3 ( c 3 + e ) @ k 4 ( N 3 + d ) @ k 5 ( c 3 + e ) @ k 6 ( N 3 + d ) @ k 7 ( c 3 + e ) @ k 8 ( c 3 + e ) , Wherein k=2, generates the 3rd group of scale-of-two encryption anti-fake information H in the scale-of-two encryption anti-fake information table of 32 group 3, this ternary circulation cryptographic calculation goes on always until last in scale-of-two anti-counterfeiting information table organizes 32 scale-of-two anti-counterfeiting information, by organizing 32 scale-of-two anti-counterfeiting information N to each in 32 one group scale-of-two anti-counterfeiting information table 1carry out ternary circulation cryptographic calculation, generate 32 the one group scale-of-two encryption anti-fake information table corresponding with 32 one group scale-of-two anti-counterfeiting information table, digitized processing is carried out to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, in label printing process, utilize the scale-of-two encryption anti-fake information of 32 group of generation by the printing process of the amplitude on the circulation look-up table modulation trade mark page, printing amplitude by selecting dielectric ink and electrically conductive ink makes the regular electric conductivity according to above-mentioned two kinds of amplitudes of the amplitude on the trade mark page change, after modulation, on the trade mark page, adjacent 32 amplitudes form one group of 32 binary message, make the trade mark page carries anti-counterfeiting information by the change of amplitude electric conductivity, and make this anti-counterfeiting information be embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN201310022310.9A 2013-01-22 2013-01-22 Multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand Expired - Fee Related CN103136565B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310022310.9A CN103136565B (en) 2013-01-22 2013-01-22 Multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310022310.9A CN103136565B (en) 2013-01-22 2013-01-22 Multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand

Publications (2)

Publication Number Publication Date
CN103136565A CN103136565A (en) 2013-06-05
CN103136565B true CN103136565B (en) 2015-06-17

Family

ID=48496373

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310022310.9A Expired - Fee Related CN103136565B (en) 2013-01-22 2013-01-22 Multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand

Country Status (1)

Country Link
CN (1) CN103136565B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101320433A (en) * 2008-06-20 2008-12-10 王立国 Anti-counterfeit method by graded encryption
CN102270312A (en) * 2011-07-19 2011-12-07 北京中科联众科技股份有限公司 Method for making point bitmap, and goods-fleeing prevention verification method
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100364326C (en) * 2005-12-01 2008-01-23 北京北大方正电子有限公司 Method and apparatus for embedding and detecting digital watermark in text file
US8023160B2 (en) * 2008-09-10 2011-09-20 Xerox Corporation Encoding message data in a cover contone image via halftone dot orientation

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101320433A (en) * 2008-06-20 2008-12-10 王立国 Anti-counterfeit method by graded encryption
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages
CN102270312A (en) * 2011-07-19 2011-12-07 北京中科联众科技股份有限公司 Method for making point bitmap, and goods-fleeing prevention verification method

Also Published As

Publication number Publication date
CN103136565A (en) 2013-06-05

Similar Documents

Publication Publication Date Title
CN103106442B (en) Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106430B (en) One-parameter double-variant multi-variant encryption anti-fake information storage brand
CN103136565B (en) Multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand
CN103106522B (en) Multi-variable-parameter gradient binary-variant circulating encryption anti-fake information storage brand
CN103106502B (en) Multi-variable-parameter gradient ternary-variant encryption anti-fake information storage brand
CN103106481B (en) One-parameter double-variant binary circulating encryption anti-fake information storage brand
CN103116788B (en) Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark
CN103106449B (en) Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103106474B (en) Multivariate multi-parameter gradient unitary encryption anti-fake information storage trademark
CN103106450B (en) Single parameter multivariable unitary circulation anti-fake information storage trademark
CN103116775B (en) One-parameter double variant binary variable circulation encryption anti-fake information storage trademark
CN103106457B (en) One-parameter ternary circulation encryption anti-fake information storage trademark
CN103116792B (en) One-parameter double variant ternary variable circulation anti-fake information storage trademark
CN103136564B (en) Multi-parametric-vargradient gradient polynary circulation anti-fake information storage trademark
CN103136562B (en) Multivariable parameter gradient multivariate variable circulation encryption anti-fake information storage trademark
CN103106499B (en) Parametric variation multi-layer gradient multi-encryption anti-fake information storage trademark
CN103116784B (en) Multi-parameter univariable ternary circulation encryption anti-fake information storage trademark
CN103106485B (en) One-parameter double-variant unary circulation anti-fake information storage trademark
CN103106464B (en) Single parameter variable transmutation ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103116778B (en) One-parameter multivariate binary variable circulation encryption anti-fake information storage trademark
CN103116793B (en) Multivariable multi-parameter gradient binary circulation encryption anti-fake information storage trademark
CN103106463B (en) Single parameter variable transmutation polytomized variable circulation encryption anti-counterfeiting information storage trademark
CN103106466B (en) Single parameter variable transmutation binary variable circulation encryption anti-counterfeiting information storage trademark
CN103116776B (en) One-parameter double variant multivariable circulation encryption anti-fake information storage trademark
CN103116779B (en) One-parameter variation transmutation multivariable circulation encryption anti-fake information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150617

Termination date: 20190122

CF01 Termination of patent right due to non-payment of annual fee