CN103136567A - One-parameter variable gradient binary encryption anti-fake information storage brand - Google Patents

One-parameter variable gradient binary encryption anti-fake information storage brand Download PDF

Info

Publication number
CN103136567A
CN103136567A CN2013100223325A CN201310022332A CN103136567A CN 103136567 A CN103136567 A CN 103136567A CN 2013100223325 A CN2013100223325 A CN 2013100223325A CN 201310022332 A CN201310022332 A CN 201310022332A CN 103136567 A CN103136567 A CN 103136567A
Authority
CN
China
Prior art keywords
binary
binary system
group
trade mark
counterfeiting information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100223325A
Other languages
Chinese (zh)
Inventor
张明鸣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN2013100223325A priority Critical patent/CN103136567A/en
Publication of CN103136567A publication Critical patent/CN103136567A/en
Pending legal-status Critical Current

Links

Images

Abstract

Provided is a one-parameter variable gradient binary encryption anti-fake information storage brand. According to the brand, binary system anti-fake information can be changed into binary system modulating signals through binary encryption and channel coding. The anti-fake information can be embedded into an entire brand page through orderly changes of conductivity of amplitude-modulated dots through a circulation look-up table modulation type. The anti-fake information can be identified from any arbitrary fragment in the brand identification process, and also can be applied to various anti-fake brands.

Description

One-parameter variable gradient binary encryption anti-fake information storage brand
Art:
The present invention relates to a kind of anti-false trademark, particularly a kind of One-parameter variable gradient binary encryption anti-fake information storage brand, binary system encryption anti-fake information can be stored on the trade mark page and realize the false proof of trade mark by the trade mark, the trade mark can be used for extensive stock it is false proof in.
Background technology:
Anti-false trademark, also known as antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, are a kind of proof labels discerned the false from the genuine, prevent personation, are mark true and false, that distinguish marketing quality quality of the people for distinguishing merchandise resources during commodity circulation.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and the interests of client.The trade mark of China is audaciously innovated; employ laser anti-counterfeit, core micropore are false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but false proof is high-tech trial of strength with struggle that is faking; advanced anti-counterfeiting technology has certain ageing again; so; trade mark anti-fake technique must constantly be lifted; could be false proof with being maintained the leading position forever in faking, this is also the basic assurance for protecting the interests of businessman and client to maintain commodity circulation safety.
The content of the invention:
In order to improve the reliability and security of trademark anti-counterfeit, the present invention is improved existing trade mark anti-fake technique for the deficiency that existing trademark anti-counterfeit is present, propose a kind of anti-counterfeiting information storage trade mark, the trade mark passes through the change to amplitude electric conductivity in brand printing, encryption anti-fake information is embedded on the whole trade mark page in binary system coded signal form, encryption anti-fake information can be recognized in any one fragment in brand recognition, therefore with very strong disguised and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information stores trade mark, is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, the image and word on trade mark page paper are made up of amplitude,
According to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, and the horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
The horizontal scanning line being printed on trade mark page paper has N bars, the column scan line being printed on trade mark page paper has M bars, the amplitude being printed on trade mark page paper is divided into N rows M row on trade mark paper, amplitude is neat arranged in arrays on trade mark page paper paper, i is allowed to take 1 to arrive N, j is allowed to take 1 to arrive M, j-th strip column scan line on trade mark page paper is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper, i-th horizontal scanning line on trade mark page paper is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper
When the binary message for needing to store the trade mark page is read, the 1st article on trade mark page paper is set to high level successively to the N articles horizontal scanning line,
When the 1st article of horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported with 0,1 code form from the 1st bar of column scan line to the M bars column scan line, the amplitude that the 1st row on trade mark page paper is printed by electrically conductive ink exports binary message 1, the amplitude that the 1st row on trade mark page paper is printed by dielectric ink exports binary message 0, above-mentioned readout is repeated to other rows on trade mark page paper
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 141140DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as HiI is the positive integer more than 0, eight-digit binary number encryption parameter is denoted as C, encryption parameter C is the binary system positive integer of 0≤C≤256, eight-digit binary number encryption variables are denoted as q, j, d, e, f, g, h, r and p respectively, and encryption variables q, j, d, e, f, g, h, r and p are 0 to 256 binary system positive integer, and binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 995964DEST_PATH_IMAGE002
Figure 713384DEST_PATH_IMAGE003
Figure 46276DEST_PATH_IMAGE004
Figure 860649DEST_PATH_IMAGE005
Figure 59942DEST_PATH_IMAGE006
Figure 326975DEST_PATH_IMAGE007
Figure 463559DEST_PATH_IMAGE008
Figure 70121DEST_PATH_IMAGE009
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 499703DEST_PATH_IMAGE002
Figure 191715DEST_PATH_IMAGE003
Figure 866410DEST_PATH_IMAGE004
Figure 327478DEST_PATH_IMAGE005
Figure 196471DEST_PATH_IMAGE006
Figure 375779DEST_PATH_IMAGE007
Figure 588586DEST_PATH_IMAGE008
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 941125DEST_PATH_IMAGE002
Figure 607729DEST_PATH_IMAGE003
Figure 561910DEST_PATH_IMAGE004
Figure 499035DEST_PATH_IMAGE005
Figure 208365DEST_PATH_IMAGE006
Figure 96687DEST_PATH_IMAGE007
Figure 916875DEST_PATH_IMAGE008
Figure 705578DEST_PATH_IMAGE009
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 585809DEST_PATH_IMAGE002
Figure 961427DEST_PATH_IMAGE003
Figure 319727DEST_PATH_IMAGE004
Figure 219726DEST_PATH_IMAGE005
Figure 270858DEST_PATH_IMAGE006
Figure 133772DEST_PATH_IMAGE007
Figure 295763DEST_PATH_IMAGE008
Figure 793478DEST_PATH_IMAGE009
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 365722DEST_PATH_IMAGE003
Figure 512987DEST_PATH_IMAGE005
Figure 141807DEST_PATH_IMAGE006
Figure 979313DEST_PATH_IMAGE007
Figure 420790DEST_PATH_IMAGE008
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 456934DEST_PATH_IMAGE002
Figure 89221DEST_PATH_IMAGE004
Figure 418964DEST_PATH_IMAGE005
Figure 700221DEST_PATH_IMAGE007
Figure 195979DEST_PATH_IMAGE009
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 135433DEST_PATH_IMAGE003
Figure 286186DEST_PATH_IMAGE004
Figure 165597DEST_PATH_IMAGE006
Figure 936424DEST_PATH_IMAGE008
Figure 357916DEST_PATH_IMAGE009
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 605357DEST_PATH_IMAGE002
Figure 613765DEST_PATH_IMAGE003
Figure 604854DEST_PATH_IMAGE004
Figure 895501DEST_PATH_IMAGE005
Figure 313844DEST_PATH_IMAGE006
Figure 338749DEST_PATH_IMAGE008
Figure 469254DEST_PATH_IMAGE009
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 58498DEST_PATH_IMAGE002
Figure 374390DEST_PATH_IMAGE004
Figure 362331DEST_PATH_IMAGE005
Figure 592772DEST_PATH_IMAGE007
Figure 729355DEST_PATH_IMAGE008
Figure 568873DEST_PATH_IMAGE009
Be respectively defined as+, ×, × ,-,+,-,-, ×, binary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 640865DEST_PATH_IMAGE010
Figure 834343DEST_PATH_IMAGE002
Figure 695988DEST_PATH_IMAGE011
Figure 26049DEST_PATH_IMAGE011
Figure 554158DEST_PATH_IMAGE004
Figure 534009DEST_PATH_IMAGE011
Figure 115163DEST_PATH_IMAGE005
Figure 428519DEST_PATH_IMAGE006
Figure 386744DEST_PATH_IMAGE011
Figure 42110DEST_PATH_IMAGE008
Figure 90149DEST_PATH_IMAGE009
Figure 468915DEST_PATH_IMAGE010
, binary cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 844533DEST_PATH_IMAGE012
Figure 202833DEST_PATH_IMAGE002
Figure 613086DEST_PATH_IMAGE010
Figure 900104DEST_PATH_IMAGE003
Figure 862692DEST_PATH_IMAGE004
Figure 625986DEST_PATH_IMAGE012
Figure 198230DEST_PATH_IMAGE012
Figure 898333DEST_PATH_IMAGE006
Figure 923717DEST_PATH_IMAGE007
Figure 761223DEST_PATH_IMAGE012
Figure 301161DEST_PATH_IMAGE009
Figure 625963DEST_PATH_IMAGE010
, binary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 263191DEST_PATH_IMAGE002
Figure 997929DEST_PATH_IMAGE013
Figure 544448DEST_PATH_IMAGE003
Figure 102523DEST_PATH_IMAGE004
Figure 8162DEST_PATH_IMAGE013
Figure 425685DEST_PATH_IMAGE013
Figure 995600DEST_PATH_IMAGE006
Figure 72141DEST_PATH_IMAGE013
Figure 655569DEST_PATH_IMAGE007
Figure 842968DEST_PATH_IMAGE013
Figure 765924DEST_PATH_IMAGE008
Figure 511901DEST_PATH_IMAGE013
, binary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 288861DEST_PATH_IMAGE014
Figure 208669DEST_PATH_IMAGE002
Figure 438793DEST_PATH_IMAGE014
Figure 301762DEST_PATH_IMAGE014
Figure 891006DEST_PATH_IMAGE004
Figure 874006DEST_PATH_IMAGE010
Figure 206898DEST_PATH_IMAGE005
Figure 183120DEST_PATH_IMAGE014
Figure 208845DEST_PATH_IMAGE006
Figure 413561DEST_PATH_IMAGE014
Figure 222249DEST_PATH_IMAGE007
Figure 828810DEST_PATH_IMAGE014
Figure 25437DEST_PATH_IMAGE008
Figure 451870DEST_PATH_IMAGE014
Figure 893609DEST_PATH_IMAGE009
Figure 354677DEST_PATH_IMAGE010
, binary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 456625DEST_PATH_IMAGE015
Figure 550538DEST_PATH_IMAGE015
Figure 866113DEST_PATH_IMAGE003
Figure 404542DEST_PATH_IMAGE015
Figure 307032DEST_PATH_IMAGE004
Figure 589109DEST_PATH_IMAGE015
Figure 962452DEST_PATH_IMAGE005
Figure 904738DEST_PATH_IMAGE010
Figure 878828DEST_PATH_IMAGE015
Figure 168995DEST_PATH_IMAGE007
Figure 296830DEST_PATH_IMAGE015
Figure 672448DEST_PATH_IMAGE008
Figure 296327DEST_PATH_IMAGE015
Figure 441001DEST_PATH_IMAGE009
Figure 990669DEST_PATH_IMAGE010
, binary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 15574DEST_PATH_IMAGE002
Figure 280333DEST_PATH_IMAGE016
Figure 3832DEST_PATH_IMAGE003
Figure 88462DEST_PATH_IMAGE016
Figure 54144DEST_PATH_IMAGE004
Figure 173410DEST_PATH_IMAGE016
Figure 64880DEST_PATH_IMAGE005
Figure 902386DEST_PATH_IMAGE016
Figure 819100DEST_PATH_IMAGE010
Figure 382937DEST_PATH_IMAGE007
Figure 442159DEST_PATH_IMAGE016
Figure 749644DEST_PATH_IMAGE008
Figure 76775DEST_PATH_IMAGE009
Figure 623294DEST_PATH_IMAGE010
, binary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 468890DEST_PATH_IMAGE017
Figure 858174DEST_PATH_IMAGE003
Figure 507461DEST_PATH_IMAGE017
Figure 74446DEST_PATH_IMAGE004
Figure 150987DEST_PATH_IMAGE017
Figure 406519DEST_PATH_IMAGE005
Figure 859497DEST_PATH_IMAGE017
Figure 272199DEST_PATH_IMAGE006
Figure 581958DEST_PATH_IMAGE017
Figure 324786DEST_PATH_IMAGE007
Figure 315876DEST_PATH_IMAGE010
Figure 93339DEST_PATH_IMAGE008
Figure 443604DEST_PATH_IMAGE009
Figure 411953DEST_PATH_IMAGE010
, binary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 309502DEST_PATH_IMAGE018
Figure 898746DEST_PATH_IMAGE002
Figure 616166DEST_PATH_IMAGE018
Figure 199649DEST_PATH_IMAGE018
Figure 959795DEST_PATH_IMAGE004
Figure 164511DEST_PATH_IMAGE018
Figure 802559DEST_PATH_IMAGE005
Figure 409121DEST_PATH_IMAGE018
Figure 340168DEST_PATH_IMAGE006
Figure 32181DEST_PATH_IMAGE018
Figure 470990DEST_PATH_IMAGE007
Figure 932058DEST_PATH_IMAGE018
Figure 275632DEST_PATH_IMAGE010
Figure 193166DEST_PATH_IMAGE009
, setting encryption parameter C initial value, setting encryption variables q, j, d, e, f, g, h, r and p initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 47169DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 884413DEST_PATH_IMAGE019
Carry out H1=
Figure 166490DEST_PATH_IMAGE020
Figure 336571DEST_PATH_IMAGE002
Figure 45901DEST_PATH_IMAGE011
Figure 447406DEST_PATH_IMAGE003
Figure 267595DEST_PATH_IMAGE011
Figure 557762DEST_PATH_IMAGE004
Figure 437993DEST_PATH_IMAGE011
Figure 312146DEST_PATH_IMAGE005
Figure 936025DEST_PATH_IMAGE011
Figure 80699DEST_PATH_IMAGE006
Figure 496210DEST_PATH_IMAGE007
Figure 595884DEST_PATH_IMAGE011
Figure 922960DEST_PATH_IMAGE008
Figure 879415DEST_PATH_IMAGE011
Figure 447504DEST_PATH_IMAGE020
Binary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 566770DEST_PATH_IMAGE019
Carry out H1=
Figure 30167DEST_PATH_IMAGE002
Figure 773312DEST_PATH_IMAGE003
Figure 337149DEST_PATH_IMAGE011
Figure 886118DEST_PATH_IMAGE004
Figure 193602DEST_PATH_IMAGE011
Figure 287460DEST_PATH_IMAGE005
Figure 22198DEST_PATH_IMAGE011
Figure 861213DEST_PATH_IMAGE007
Figure 766852DEST_PATH_IMAGE011
Figure 302132DEST_PATH_IMAGE008
Figure 889102DEST_PATH_IMAGE011
Figure 754290DEST_PATH_IMAGE009
Figure 830830DEST_PATH_IMAGE020
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while binary cryptographic calculation, next binary cryptographic calculation is pointed to H2=
Figure 850477DEST_PATH_IMAGE012
Figure 303455DEST_PATH_IMAGE002
Figure 960832DEST_PATH_IMAGE021
Figure 208274DEST_PATH_IMAGE003
Figure 718146DEST_PATH_IMAGE012
Figure 709236DEST_PATH_IMAGE004
Figure 486699DEST_PATH_IMAGE012
Figure 905042DEST_PATH_IMAGE005
Figure 899281DEST_PATH_IMAGE012
Figure 428482DEST_PATH_IMAGE006
Figure 60452DEST_PATH_IMAGE012
Figure 915275DEST_PATH_IMAGE007
Figure 134160DEST_PATH_IMAGE012
Figure 219108DEST_PATH_IMAGE012
Figure 682505DEST_PATH_IMAGE021
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 819088DEST_PATH_IMAGE022
Carry out H2=
Figure 356697DEST_PATH_IMAGE002
Figure 236588DEST_PATH_IMAGE003
Figure 697657DEST_PATH_IMAGE012
Figure 127501DEST_PATH_IMAGE004
Figure 306809DEST_PATH_IMAGE012
Figure 955834DEST_PATH_IMAGE005
Figure 809838DEST_PATH_IMAGE006
Figure 994405DEST_PATH_IMAGE007
Figure 430066DEST_PATH_IMAGE012
Figure 139396DEST_PATH_IMAGE008
Figure 395759DEST_PATH_IMAGE012
Figure 215948DEST_PATH_IMAGE009
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while binary cryptographic calculation, next binary cryptographic calculation is pointed to H3=
Figure 825494DEST_PATH_IMAGE013
Figure 57947DEST_PATH_IMAGE013
Figure 519332DEST_PATH_IMAGE023
Figure 759077DEST_PATH_IMAGE004
Figure 921068DEST_PATH_IMAGE013
Figure 920248DEST_PATH_IMAGE005
Figure 640817DEST_PATH_IMAGE013
Figure 991027DEST_PATH_IMAGE006
Figure 956709DEST_PATH_IMAGE013
Figure 75975DEST_PATH_IMAGE007
Figure 716514DEST_PATH_IMAGE013
Figure 297166DEST_PATH_IMAGE009
Figure 93958DEST_PATH_IMAGE023
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this binary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 418760DEST_PATH_IMAGE001
Carry out binary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, valid certificates can be provided for true trade mark, there is stronger anti-forgery ability simultaneously.
To solve above-mentioned technical problem, processing is digitized to image false-proof information and character anti-counterfeiting information first, the binary system anti-counterfeiting information table of 8 one group of generation, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, binary cryptographic calculation is carried out to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables, the binary system encryption anti-fake information table of 32 one group of generation, pass through channel coding using 32 binary system encryption anti-fake informations in binary system encryption anti-fake information table, 32 one group of binary modulated signal of the generation with error detecting and error correcting function, channel coding can use loop coding, convolutional encoding or Turbo coding diversified forms, picture signal is adjusted to be handled by rasterizing trade mark page original continuous(RIP)Halftoning hybrid screening picture signal is exported with hybrid screening, including amplitude and FM screened image signal, the electric conductivity of amplitude in hybrid screening picture signal is modulated using circulation look-up table modulation system using 32 one group of binary modulated signals of generation, make the electric conductivity of amplitude according to dielectric ink amplitude and electrically conductive ink amplitude is regular changes, adjacent 32 amplitudes in hybrid screening picture signal are made to carry 32 binary system anti-counterfeiting information by the change of electric conductivity, so as to generate the hybrid screening picture signal of the embedded anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, trade mark page site electric conductivity signal is gathered first, by the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding, decrypts i-th group of 32 binary message in anti-counterfeiting information table by binary system and is denoted as Mi
Binary system is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting encryption parameter C initial value as encryption, initial value when setting encryption variables q, j, d, e, f, g, h, r and p initial value as encryption, it is k=0 that binary operator, which controls variable k initial value design, by binary ciphering process, it is M that binary operator, which controls decryption computing during variable k=0,i=
Figure 726245DEST_PATH_IMAGE010
Figure 554523DEST_PATH_IMAGE002
Figure 790726DEST_PATH_IMAGE011
Figure 337245DEST_PATH_IMAGE003
Figure 738642DEST_PATH_IMAGE011
Figure 834774DEST_PATH_IMAGE005
Figure 421745DEST_PATH_IMAGE011
Figure 726080DEST_PATH_IMAGE006
Figure 323732DEST_PATH_IMAGE007
Figure 511131DEST_PATH_IMAGE011
Figure 932623DEST_PATH_IMAGE008
Figure 180064DEST_PATH_IMAGE011
Figure 188472DEST_PATH_IMAGE009
Figure 179561DEST_PATH_IMAGE010
, it is M that binary operator, which controls decryption computing during variable k=1,i=
Figure 458489DEST_PATH_IMAGE012
Figure 44640DEST_PATH_IMAGE010
Figure 337955DEST_PATH_IMAGE003
Figure 969925DEST_PATH_IMAGE012
Figure 559169DEST_PATH_IMAGE004
Figure 542169DEST_PATH_IMAGE012
Figure 913600DEST_PATH_IMAGE012
Figure 939325DEST_PATH_IMAGE006
Figure 144042DEST_PATH_IMAGE012
Figure 716843DEST_PATH_IMAGE007
Figure 57826DEST_PATH_IMAGE012
Figure 254452DEST_PATH_IMAGE008
Figure 8781DEST_PATH_IMAGE012
Figure 683476DEST_PATH_IMAGE009
Figure 646009DEST_PATH_IMAGE010
, it is M that binary operator, which controls decryption computing during variable k=2,i=
Figure 13537DEST_PATH_IMAGE013
Figure 927266DEST_PATH_IMAGE002
Figure 405652DEST_PATH_IMAGE013
Figure 758191DEST_PATH_IMAGE010
Figure 424795DEST_PATH_IMAGE004
Figure 441293DEST_PATH_IMAGE013
Figure 822169DEST_PATH_IMAGE013
Figure 976070DEST_PATH_IMAGE006
Figure 522644DEST_PATH_IMAGE007
Figure 402875DEST_PATH_IMAGE013
Figure 638258DEST_PATH_IMAGE013
Figure 48510DEST_PATH_IMAGE009
Figure 834064DEST_PATH_IMAGE010
, it is M that binary operator, which controls decryption computing during variable k=3,i=
Figure 696978DEST_PATH_IMAGE014
Figure 357504DEST_PATH_IMAGE002
Figure 622263DEST_PATH_IMAGE014
Figure 844297DEST_PATH_IMAGE003
Figure 194507DEST_PATH_IMAGE014
Figure 220293DEST_PATH_IMAGE004
Figure 732494DEST_PATH_IMAGE005
Figure 632317DEST_PATH_IMAGE014
Figure 136111DEST_PATH_IMAGE006
Figure 608418DEST_PATH_IMAGE014
Figure 172255DEST_PATH_IMAGE007
Figure 538962DEST_PATH_IMAGE008
Figure 134285DEST_PATH_IMAGE014
Figure 869023DEST_PATH_IMAGE009
Figure 415542DEST_PATH_IMAGE010
, it is M that binary operator, which controls decryption computing during variable k=4,i=
Figure 526717DEST_PATH_IMAGE015
Figure 973617DEST_PATH_IMAGE002
Figure 879256DEST_PATH_IMAGE015
Figure 913071DEST_PATH_IMAGE003
Figure 112758DEST_PATH_IMAGE015
Figure 320065DEST_PATH_IMAGE015
Figure 339712DEST_PATH_IMAGE005
Figure 527111DEST_PATH_IMAGE010
Figure 450067DEST_PATH_IMAGE006
Figure 697509DEST_PATH_IMAGE015
Figure 195662DEST_PATH_IMAGE007
Figure 320241DEST_PATH_IMAGE015
Figure 550366DEST_PATH_IMAGE009
Figure 535027DEST_PATH_IMAGE010
, it is M that binary operator, which controls decryption computing during variable k=5,i=
Figure 603214DEST_PATH_IMAGE016
Figure 192459DEST_PATH_IMAGE002
Figure 9815DEST_PATH_IMAGE003
Figure 426867DEST_PATH_IMAGE016
Figure 235554DEST_PATH_IMAGE005
Figure 904433DEST_PATH_IMAGE016
Figure 101059DEST_PATH_IMAGE006
Figure 26028DEST_PATH_IMAGE010
Figure 280816DEST_PATH_IMAGE007
Figure 741884DEST_PATH_IMAGE016
Figure 843832DEST_PATH_IMAGE008
Figure 23141DEST_PATH_IMAGE016
Figure 189942DEST_PATH_IMAGE009
Figure 505517DEST_PATH_IMAGE010
, it is M that binary operator, which controls decryption computing during variable k=6,i=
Figure 43946DEST_PATH_IMAGE017
Figure 943507DEST_PATH_IMAGE002
Figure 29844DEST_PATH_IMAGE017
Figure 465504DEST_PATH_IMAGE003
Figure 909255DEST_PATH_IMAGE017
Figure 319562DEST_PATH_IMAGE017
Figure 609729DEST_PATH_IMAGE005
Figure 101464DEST_PATH_IMAGE006
Figure 663027DEST_PATH_IMAGE017
Figure 807700DEST_PATH_IMAGE007
Figure 357368DEST_PATH_IMAGE010
Figure 220282DEST_PATH_IMAGE008
Figure 335447DEST_PATH_IMAGE009
, it is M that binary operator, which controls decryption computing during variable k=7,i=
Figure 642112DEST_PATH_IMAGE018
Figure 607794DEST_PATH_IMAGE002
Figure 228525DEST_PATH_IMAGE018
Figure 621460DEST_PATH_IMAGE003
Figure 458966DEST_PATH_IMAGE018
Figure 962759DEST_PATH_IMAGE004
Figure 998849DEST_PATH_IMAGE018
Figure 61220DEST_PATH_IMAGE005
Figure 120443DEST_PATH_IMAGE018
Figure 427928DEST_PATH_IMAGE006
Figure 521786DEST_PATH_IMAGE018
Figure 769707DEST_PATH_IMAGE007
Figure 316226DEST_PATH_IMAGE018
Figure 546405DEST_PATH_IMAGE010
Figure 452044DEST_PATH_IMAGE009
Figure 485859DEST_PATH_IMAGE010
, first M from binary system decryption anti-counterfeiting information table1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiCorresponding decryption computing is carried out, binary system anti-counterfeiting information is solved
Figure 135146DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 is the overall structure figure of the present invention.
Fig. 2 is A-A sectional views of the present invention.
Fig. 3 loads anti-counterfeiting information flow chart.
Fig. 4 extracts anti-counterfeiting information flow chart.
Embodiment
As in Fig. 1 and Fig. 2, anti-fake information storage trademark, it is made up of trade mark page paper 7-1, amplitude 6-1 to the 6-150 being printed on trade mark page paper 7-1, horizontal scanning line 1-1 to the 1-15 being printed on trade mark page paper 7-1, column scan line 2-1 to the 2-10 being printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 are made up of amplitude 6-1 to 6-150
According to storage binary system encryption anti-fake information, a part of amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, another part amplitude on trade mark page paper 7-1 is formed by dielectric ink printing, horizontal scanning line 1-1 to 1-15 and column scan line 2-1 to 2-10 on trade mark page paper 7-1 are formed by the printing of electrically conducting transparent ink
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, and the light amplitude on trade mark page paper 7-1 is formed by dielectric ink printing,
The amplitude being printed on trade mark page paper 7-1 is divided into 15 rows 10 on trade mark paper and arranged, amplitude 6-1 to 6-150 is neat arranged in arrays on trade mark page paper 7-1, i is allowed to take 1 to 15, j is allowed to take 1 to 10, j-th strip column scan line on trade mark page paper 7-1 is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper 7-1, i-th horizontal scanning line on trade mark page paper 7-1 is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper 7-1
When the binary system encryption anti-fake information for needing to store the trade mark page is read, the 1st article of horizontal scanning line on trade mark page paper 7-1 is set to high level successively to the 15th article of horizontal scanning line,
When the 1st article of horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary system encryption anti-fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is exported from the 1st bar of column scan line to the 10th bar of column scan line, the 1st row on trade mark page paper 7-1 exports binary message 1 by electrically conductive ink printing into amplitude, the 1st row on trade mark page paper 7-1 exports binary message 0 by dielectric ink printing into amplitude, therefore the binary system encryption anti-fake information 1100001000 that the 1st row is read, above-mentioned readout is repeated to other rows on trade mark page paper 7-1.
In loading anti-counterfeiting information flow chart 3, original anti-counterfeiting information(Image, word)It is digitized into processing, the binary system anti-counterfeiting information table of 8 one group of generation, 8 one group of binary messages in binary system anti-counterfeiting information table are expanded into 32 one group of binary messages, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary message in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 705061DEST_PATH_IMAGE001
, i is the positive integer more than 0, from first 32 binary system encryption anti-fake information in 32 one group of binary system anti-counterfeiting information tables
Figure 781602DEST_PATH_IMAGE019
Start, to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 99451DEST_PATH_IMAGE001
Carry out binary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize that trademark anti-counterfeit prints, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, realize trademark anti-counterfeit.
In anti-counterfeiting information flow chart 4 is extracted, when extracting anti-counterfeiting information, the electric conductivity signal of trade mark page halftone dot image is gathered first, by the electric conductivity identification to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding.
The binary system generated after decoding is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting the initial value of encryption parameter as encryption, initial value when setting the initial value of encryption variables as encryption, it is k=0 that binary operator, which controls variable k initial value design, first M from the binary system decryption anti-counterfeiting information table of generation1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiComputing is decrypted, binary system anti-counterfeiting information is solved
Figure 552429DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.

Claims (1)

1. a kind of generate binary modulated signal by anti-counterfeiting information by cryptographic calculation and channel coding, and by circulating the One-parameter variable gradient binary encryption anti-fake information storage brand that anti-counterfeiting information is embedded in full page by tabling look-up modulation mode,It is characterized in that:Anti-counterfeiting information stores trade mark, it is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, according to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 2013100223325100001DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as HiI is the positive integer more than 0, eight-digit binary number encryption parameter is denoted as C, encryption parameter C is the binary system positive integer of 0≤C≤256, eight-digit binary number encryption variables are denoted as q, j, d, e, f, g, h, r and p respectively, and encryption variables q, j, d, e, f, g, h, r and p are 0 to 256 binary system positive integer, and binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 2013100223325100001DEST_PATH_IMAGE002
Figure 2013100223325100001DEST_PATH_IMAGE004
Figure DEST_PATH_IMAGE005
Figure 2013100223325100001DEST_PATH_IMAGE006
Figure DEST_PATH_IMAGE007
Figure 2013100223325100001DEST_PATH_IMAGE008
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 78801DEST_PATH_IMAGE004
Figure 913159DEST_PATH_IMAGE005
Figure 665214DEST_PATH_IMAGE006
Figure 425360DEST_PATH_IMAGE007
Figure 630076DEST_PATH_IMAGE008
Figure 828976DEST_PATH_IMAGE009
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 934073DEST_PATH_IMAGE002
Figure 865120DEST_PATH_IMAGE003
Figure 557133DEST_PATH_IMAGE004
Figure 231827DEST_PATH_IMAGE005
Figure 561888DEST_PATH_IMAGE007
Figure 741197DEST_PATH_IMAGE008
Figure 954003DEST_PATH_IMAGE009
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 33693DEST_PATH_IMAGE002
Figure 428792DEST_PATH_IMAGE005
Figure 864453DEST_PATH_IMAGE006
Figure 573783DEST_PATH_IMAGE007
Figure 462104DEST_PATH_IMAGE008
Figure 718511DEST_PATH_IMAGE009
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 136011DEST_PATH_IMAGE005
Figure 546264DEST_PATH_IMAGE006
Figure 597396DEST_PATH_IMAGE007
Figure 958845DEST_PATH_IMAGE008
Figure 58519DEST_PATH_IMAGE009
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 57699DEST_PATH_IMAGE002
Figure 342050DEST_PATH_IMAGE003
Figure 193725DEST_PATH_IMAGE004
Figure 97090DEST_PATH_IMAGE005
Figure 216356DEST_PATH_IMAGE006
Figure 679753DEST_PATH_IMAGE008
Figure 183547DEST_PATH_IMAGE009
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 422898DEST_PATH_IMAGE002
Figure 222620DEST_PATH_IMAGE003
Figure 547422DEST_PATH_IMAGE004
Figure 854907DEST_PATH_IMAGE005
Figure 916458DEST_PATH_IMAGE007
Figure 462977DEST_PATH_IMAGE008
Figure 574153DEST_PATH_IMAGE009
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 522517DEST_PATH_IMAGE002
Figure 929621DEST_PATH_IMAGE003
Figure 963436DEST_PATH_IMAGE004
Figure 550407DEST_PATH_IMAGE005
Figure 415595DEST_PATH_IMAGE006
Figure 990670DEST_PATH_IMAGE007
Figure 511781DEST_PATH_IMAGE008
Figure 699180DEST_PATH_IMAGE009
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 622137DEST_PATH_IMAGE002
Figure 359325DEST_PATH_IMAGE003
Figure 136285DEST_PATH_IMAGE006
Figure 283287DEST_PATH_IMAGE008
Figure 78068DEST_PATH_IMAGE009
Be respectively defined as+, ×, × ,-,+,-,-, ×, binary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 149185DEST_PATH_IMAGE002
Figure DEST_PATH_IMAGE011
Figure 676113DEST_PATH_IMAGE003
Figure 659112DEST_PATH_IMAGE011
Figure 428223DEST_PATH_IMAGE004
Figure 977016DEST_PATH_IMAGE011
Figure 2741DEST_PATH_IMAGE005
Figure 207457DEST_PATH_IMAGE011
Figure 845505DEST_PATH_IMAGE006
Figure 186488DEST_PATH_IMAGE011
Figure 383114DEST_PATH_IMAGE007
Figure 248357DEST_PATH_IMAGE008
Figure 709425DEST_PATH_IMAGE011
Figure 391466DEST_PATH_IMAGE009
Figure 305196DEST_PATH_IMAGE010
, binary cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 2013100223325100001DEST_PATH_IMAGE012
Figure 783582DEST_PATH_IMAGE002
Figure 136120DEST_PATH_IMAGE003
Figure 802725DEST_PATH_IMAGE012
Figure 819223DEST_PATH_IMAGE004
Figure 524318DEST_PATH_IMAGE005
Figure 678218DEST_PATH_IMAGE012
Figure 287109DEST_PATH_IMAGE012
Figure 167340DEST_PATH_IMAGE007
Figure 542958DEST_PATH_IMAGE012
Figure 901258DEST_PATH_IMAGE008
Figure 812976DEST_PATH_IMAGE012
Figure 598529DEST_PATH_IMAGE009
, binary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure DEST_PATH_IMAGE013
Figure 199778DEST_PATH_IMAGE013
Figure 923277DEST_PATH_IMAGE003
Figure 273486DEST_PATH_IMAGE010
Figure 973589DEST_PATH_IMAGE004
Figure 92855DEST_PATH_IMAGE013
Figure 984325DEST_PATH_IMAGE005
Figure 821831DEST_PATH_IMAGE013
Figure 325625DEST_PATH_IMAGE006
Figure 361714DEST_PATH_IMAGE013
Figure 925551DEST_PATH_IMAGE007
Figure 751818DEST_PATH_IMAGE013
Figure 793723DEST_PATH_IMAGE008
Figure 887581DEST_PATH_IMAGE013
Figure 622319DEST_PATH_IMAGE009
Figure 667373DEST_PATH_IMAGE010
, binary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 653914DEST_PATH_IMAGE002
Figure 997664DEST_PATH_IMAGE003
Figure 93796DEST_PATH_IMAGE014
Figure 415187DEST_PATH_IMAGE004
Figure 982172DEST_PATH_IMAGE010
Figure 58713DEST_PATH_IMAGE005
Figure 579824DEST_PATH_IMAGE014
Figure 767223DEST_PATH_IMAGE006
Figure 501403DEST_PATH_IMAGE007
Figure 509810DEST_PATH_IMAGE014
Figure 278363DEST_PATH_IMAGE014
Figure 195241DEST_PATH_IMAGE009
, binary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure DEST_PATH_IMAGE015
Figure 157829DEST_PATH_IMAGE002
Figure 291264DEST_PATH_IMAGE015
Figure 863508DEST_PATH_IMAGE015
Figure 196400DEST_PATH_IMAGE004
Figure 745193DEST_PATH_IMAGE015
Figure 269453DEST_PATH_IMAGE005
Figure 474169DEST_PATH_IMAGE010
Figure 163010DEST_PATH_IMAGE007
Figure 589443DEST_PATH_IMAGE015
Figure 529717DEST_PATH_IMAGE008
Figure 990786DEST_PATH_IMAGE015
Figure 591269DEST_PATH_IMAGE009
, binary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 2013100223325100001DEST_PATH_IMAGE016
Figure 186646DEST_PATH_IMAGE002
Figure 3686DEST_PATH_IMAGE016
Figure 542115DEST_PATH_IMAGE003
Figure 943140DEST_PATH_IMAGE016
Figure 225217DEST_PATH_IMAGE004
Figure 159413DEST_PATH_IMAGE016
Figure 603164DEST_PATH_IMAGE005
Figure 577253DEST_PATH_IMAGE006
Figure 368885DEST_PATH_IMAGE010
Figure 983537DEST_PATH_IMAGE007
Figure 421471DEST_PATH_IMAGE016
Figure 739692DEST_PATH_IMAGE009
Figure 602606DEST_PATH_IMAGE010
, binary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 702280DEST_PATH_IMAGE002
Figure 468504DEST_PATH_IMAGE017
Figure 690538DEST_PATH_IMAGE003
Figure 775169DEST_PATH_IMAGE017
Figure 740851DEST_PATH_IMAGE004
Figure 358652DEST_PATH_IMAGE017
Figure 751587DEST_PATH_IMAGE005
Figure 155203DEST_PATH_IMAGE006
Figure 182558DEST_PATH_IMAGE007
Figure 241781DEST_PATH_IMAGE010
Figure 549266DEST_PATH_IMAGE008
Figure 643124DEST_PATH_IMAGE017
Figure 876397DEST_PATH_IMAGE009
, binary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 268512DEST_PATH_IMAGE002
Figure 216876DEST_PATH_IMAGE018
Figure 623980DEST_PATH_IMAGE003
Figure 657795DEST_PATH_IMAGE018
Figure 307082DEST_PATH_IMAGE004
Figure 375533DEST_PATH_IMAGE018
Figure 950608DEST_PATH_IMAGE005
Figure 206140DEST_PATH_IMAGE018
Figure 659118DEST_PATH_IMAGE006
Figure 582075DEST_PATH_IMAGE018
Figure 891833DEST_PATH_IMAGE007
Figure 136126DEST_PATH_IMAGE018
Figure 323022DEST_PATH_IMAGE009
Figure 317261DEST_PATH_IMAGE010
, setting encryption parameter C initial value, setting encryption variables q, j, d, e, f, g, h, r and p initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 846462DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure DEST_PATH_IMAGE019
Carry out H1=
Figure 787052DEST_PATH_IMAGE011
Figure 504472DEST_PATH_IMAGE003
Figure 837364DEST_PATH_IMAGE011
Figure 589420DEST_PATH_IMAGE004
Figure 115134DEST_PATH_IMAGE005
Figure 858279DEST_PATH_IMAGE006
Figure 789326DEST_PATH_IMAGE011
Figure 982803DEST_PATH_IMAGE007
Figure 923077DEST_PATH_IMAGE011
Figure 384146DEST_PATH_IMAGE008
Figure 486094DEST_PATH_IMAGE011
Figure 163938DEST_PATH_IMAGE009
Figure 642323DEST_PATH_IMAGE020
Binary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 957898DEST_PATH_IMAGE019
Carry out H1=
Figure 496327DEST_PATH_IMAGE020
Figure 850975DEST_PATH_IMAGE003
Figure 560305DEST_PATH_IMAGE011
Figure 947162DEST_PATH_IMAGE004
Figure 57518DEST_PATH_IMAGE005
Figure 937749DEST_PATH_IMAGE011
Figure 803113DEST_PATH_IMAGE006
Figure 489309DEST_PATH_IMAGE011
Figure 633983DEST_PATH_IMAGE007
Figure 685115DEST_PATH_IMAGE011
Figure 548029DEST_PATH_IMAGE008
Figure 208555DEST_PATH_IMAGE011
Figure 473314DEST_PATH_IMAGE009
Figure 429769DEST_PATH_IMAGE020
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while binary cryptographic calculation, next binary cryptographic calculation is pointed to H2=
Figure 779979DEST_PATH_IMAGE012
Figure 247126DEST_PATH_IMAGE002
Figure 366392DEST_PATH_IMAGE003
Figure 759327DEST_PATH_IMAGE012
Figure 271266DEST_PATH_IMAGE012
Figure 510617DEST_PATH_IMAGE005
Figure 136770DEST_PATH_IMAGE012
Figure 195993DEST_PATH_IMAGE006
Figure 4943DEST_PATH_IMAGE012
Figure 98801DEST_PATH_IMAGE007
Figure 833538DEST_PATH_IMAGE012
Figure 380057DEST_PATH_IMAGE008
Figure 724189DEST_PATH_IMAGE012
Figure 672553DEST_PATH_IMAGE009
Figure 578192DEST_PATH_IMAGE021
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 2013100223325100001DEST_PATH_IMAGE022
Carry out H2=
Figure 51155DEST_PATH_IMAGE012
Figure 700443DEST_PATH_IMAGE002
Figure 503313DEST_PATH_IMAGE021
Figure 579854DEST_PATH_IMAGE003
Figure 599500DEST_PATH_IMAGE012
Figure 52478DEST_PATH_IMAGE004
Figure 709856DEST_PATH_IMAGE012
Figure 957297DEST_PATH_IMAGE005
Figure 469978DEST_PATH_IMAGE006
Figure 309758DEST_PATH_IMAGE012
Figure 728101DEST_PATH_IMAGE007
Figure 223805DEST_PATH_IMAGE012
Figure 251541DEST_PATH_IMAGE008
Figure 883511DEST_PATH_IMAGE012
Figure 455755DEST_PATH_IMAGE021
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while binary cryptographic calculation, next binary cryptographic calculation is pointed to H3=
Figure 290112DEST_PATH_IMAGE013
Figure 42167DEST_PATH_IMAGE002
Figure 802313DEST_PATH_IMAGE013
Figure 7029DEST_PATH_IMAGE003
Figure 642148DEST_PATH_IMAGE004
Figure 248709DEST_PATH_IMAGE013
Figure 179756DEST_PATH_IMAGE005
Figure 871769DEST_PATH_IMAGE013
Figure 47929DEST_PATH_IMAGE006
Figure 508997DEST_PATH_IMAGE013
Figure 876524DEST_PATH_IMAGE007
Figure 55833DEST_PATH_IMAGE013
Figure 767175DEST_PATH_IMAGE008
Figure 348329DEST_PATH_IMAGE013
Figure 683495DEST_PATH_IMAGE009
Figure 350100DEST_PATH_IMAGE023
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this binary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 366597DEST_PATH_IMAGE001
Carry out binary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN2013100223325A 2013-01-22 2013-01-22 One-parameter variable gradient binary encryption anti-fake information storage brand Pending CN103136567A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100223325A CN103136567A (en) 2013-01-22 2013-01-22 One-parameter variable gradient binary encryption anti-fake information storage brand

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100223325A CN103136567A (en) 2013-01-22 2013-01-22 One-parameter variable gradient binary encryption anti-fake information storage brand

Publications (1)

Publication Number Publication Date
CN103136567A true CN103136567A (en) 2013-06-05

Family

ID=48496375

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100223325A Pending CN103136567A (en) 2013-01-22 2013-01-22 One-parameter variable gradient binary encryption anti-fake information storage brand

Country Status (1)

Country Link
CN (1) CN103136567A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201392621Y (en) * 2009-03-24 2010-01-27 温姜培 Anti-counterfeiting label of logistics
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201392621Y (en) * 2009-03-24 2010-01-27 温姜培 Anti-counterfeiting label of logistics
CN101777134A (en) * 2010-03-01 2010-07-14 北京印刷学院 Presswork encryption security printing technology based on multi-system quadrature amplitude modulation
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯登国等: "《密码学导引》", 30 April 1999, article "《密码学导引》", pages: 271-273 *

Similar Documents

Publication Publication Date Title
CN103106442A (en) Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106460A (en) Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark
CN103106513A (en) Multi-parameter univariate poly encryption anti-fake information storage trademark
CN103136567A (en) One-parameter variable gradient binary encryption anti-fake information storage brand
CN103106441A (en) Multi-variable-parameter gradient multi-variant encryption anti-fake information storage brand
CN103106443A (en) One-parameter double-variant unary encryption anti-fake information storage brand
CN103106451A (en) Multi-variable-parameter gradient ternary-variant circulating encryption anti-fake information storage brand
CN103106440A (en) Multi-parameter unitary encryption anti-fake information storage brand
CN103106453A (en) Multi-parameter ternary variant circulating encryption anti-fake information storage brand
CN103136565A (en) Multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand
CN103116788A (en) Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark
CN103116796A (en) One-parameter variation transmutation unary encryption anti-fake information storage trademark
CN103106439A (en) Multiparameter multivariable binary encryption anti-fake information storage trademark
CN103106447A (en) Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark
CN103106438A (en) Parameter-gradient multivariable multi-encryption anti-fake information storage trademark
CN103106512A (en) Multiparameter multivariable ternary encryption anti-fake information storage trademark
CN103106449B (en) Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103106457A (en) Single parameter ternary circulation encryption anti-counterfeiting information storage trademark
CN103106448A (en) Single variable parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103106450A (en) Single parameter multivariable unitary circulation encryption anti-counterfeiting information storage trademark
CN103116797A (en) Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark
CN103106502B (en) Multi-variable-parameter gradient ternary-variant encryption anti-fake information storage brand
CN103106518A (en) Parameter transmutation one-element encryption anti-fake information storage trademark
CN103106429A (en) Single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark
CN103116774B (en) Parameter transmutation unary circulation encryption anti-fake information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130605