CN103324894B - A kind of composite anti-fake document structure tree method and system - Google Patents
A kind of composite anti-fake document structure tree method and system Download PDFInfo
- Publication number
- CN103324894B CN103324894B CN201310292562.3A CN201310292562A CN103324894B CN 103324894 B CN103324894 B CN 103324894B CN 201310292562 A CN201310292562 A CN 201310292562A CN 103324894 B CN103324894 B CN 103324894B
- Authority
- CN
- China
- Prior art keywords
- page
- security documents
- specifying
- false proof
- documentation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Abstract
The present invention relates to field of anti-counterfeit technology, particularly a kind of composite anti-fake document structure tree method and system.The method, comprising: the false proof figure adding true-to-shape by preset rules in the documentation page of specifying, and generates security documents page; Wherein, false proof figure comprises: one or more in false proof shading figure, anti-duplicating figure, micro text figure and two-dimension code pattern; Receive the request instruction that user triggers, after the security documents page of being specified by request instruction encryption, be issued to client; Client is combined into security documents to after the security documents page deciphering received.This system comprises: server end, and the security documents page for generating security documents page and specified by request instruction is issued to client after encrypting; Client, for being combined into security documents to after the security documents page deciphering received.The security documents that these composite anti-fake document structure tree method and system generate, reduces the difficulty that consumer identifies true and false document, improves the antifalse effect of security documents.
Description
Technical field
The present invention relates to field of anti-counterfeit technology, in particular to a kind of composite anti-fake document structure tree method and system.
Background technology
In correlation technique, the generation method of security documents mainly contains: by adding laser anti-counterfeit label in a document, or, by adding query formulation numerical code anti-fake label in a document, or, generate security documents by adding the various ways such as texture anti-fake label in a document.
But because laser anti-counterfeit label and query formulation digital code anti-false are easy to be forged, when lacking comparison, the antifalsification label of forgery is difficult to be identified.And texture anti-fake label also can scan by high precision the mode copied forges, thereby increase the difficulty that consumer identifies true and false document, reduce the antifalse effect of security documents.
Summary of the invention
The object of the present invention is to provide a kind of composite anti-fake document structure tree method and system, to solve the above problems.
Provide a kind of composite anti-fake document structure tree method in an embodiment of the present invention, comprising:
In the documentation page of specifying, add the false proof figure of true-to-shape by preset rules, generate security documents page;
Wherein said false proof figure comprises: one or more in false proof shading figure, anti-duplicating figure, micro text figure and two-dimension code pattern;
In the documentation page of specifying, add two-dimension code pattern, comprising:
Extract the key message of documentation page of specifying, according to the described key message extracted generate be used for the character information that carries by Quick Response Code;
According to described character information generator matrix two-dimension code pattern;
Described matrix two-dimensional code figure is added in the assigned address of the documentation page of specifying.
Except generate according to the described key message extracted to be used for by Quick Response Code except the character information that carries, also comprise: according to Antiforge inquiry website information generate be used for the character information that carries by Quick Response Code.
Receive the request instruction that user triggers, after the security documents page of described request instruction being specified encryption, be issued to client;
Client is combined into security documents to after the security documents page deciphering received.
A kind of composite anti-fake document creating system, comprising:
Server end, for adding the false proof figure of true-to-shape in the documentation page of specifying by preset rules, generates security documents page; Wherein said false proof figure comprises: one or more in false proof shading figure, anti-duplicating figure, micro text figure and two-dimension code pattern; Receive the request instruction that user triggers, and be issued to client after the security documents page of described request instruction being specified encryption;
Client, for being combined into security documents to after the security documents page deciphering received.
In the security documents that composite anti-fake document structure tree method and system according to the above embodiment of the present invention generate, according to false proof demand, one or more the false proof figures in false proof shading figure, anti-duplicating figure, micro text figure and two-dimension code pattern can be added in documentation page.Can make to demonstrate the figure different from original paper in the documentation page copied according to the anti-duplicating figure added, consumer can the true and false of identification document intuitively.When adding micro text figure in security documents, key message micro in document can be generated micro text figure, realize key message to a certain degree hide, two-dimension code pattern can also be added in addition in security documents, realize the inquiry being carried out anti-counterfeiting information by Quick Response Code, be convenient to the Antiforge inquiry of consumer to document.Therefore the security documents of composite anti-fake document structure tree method and system generation according to the above embodiment of the present invention, reduces the difficulty that consumer identifies true and false document, improves the antifalse effect of security documents.
Accompanying drawing explanation
Fig. 1 shows the process flow diagram of embodiment of the present invention composite anti-fake document structure tree method;
Fig. 2 shows the structural representation of embodiment of the present invention composite anti-fake document creating system.
Embodiment
Also by reference to the accompanying drawings the present invention is described in further detail below by specific embodiment.
The embodiment of the present invention provides a kind of composite anti-fake document structure tree method, and as shown in Figure 1, main processing steps comprises:
Step S11: the false proof figure adding true-to-shape by preset rules in the documentation page of specifying, generates security documents page;
Wherein said false proof figure comprises: one or more in false proof shading figure, anti-duplicating figure, micro text figure and two-dimension code pattern;
Step S12: receive the request instruction that user triggers, is issued to client after the security documents page of described request instruction being specified encryption;
Step S13: client is combined into security documents to after the security documents page deciphering received.
According in the security documents that the composite anti-fake document structure tree method of the embodiment of the present invention generates, according to false proof demand, one or more the false proof figures in false proof shading figure, anti-duplicating figure, micro text figure and two-dimension code pattern can be added in documentation page.Can make to demonstrate the figure different from original paper in the documentation page copied according to the anti-duplicating figure added, consumer can the true and false of identification document intuitively.When adding micro text figure in security documents, key message micro in document can be generated micro text figure, realize key message to a certain degree hide, two-dimension code pattern can also be added in addition in security documents, realize the inquiry being carried out anti-counterfeiting information by Quick Response Code, be convenient to the Antiforge inquiry of consumer to document.Therefore the security documents of security documents generation method generation according to the above embodiment of the present invention, reduces the difficulty that consumer identifies true and false document, improves the antifalse effect of security documents.
In the embodiment of the present invention, in the documentation page of specifying, the false proof figure of true-to-shape is added by preset rules, generate security documents page, the false proof figure wherein added can be one or more in false proof shading figure, anti-duplicating figure, micro text figure and two-dimension code pattern.
When adding false proof shading figure in the documentation page of specifying, comprising: in the documentation page of specifying, determine multiple reference mark; Generate the SPL by multiple described reference mark; False proof shading figure is formed by multiple described SPL; Described false proof shading figure is joined the assigned address in the documentation page of specifying, generate security documents page.
In the embodiment of the present invention, structure batten is exactly by given one group of reference mark (one group of XY value) in the O-XY coordinate system of specifying, such as given following four reference mark (X is value between 1 to 100);
A(10,15)、B(28,78)、C(68,32)、D(76,12)
According to four reference mark provided, calculate a function Y=F (X);
Then X is substituted into this function entirely from 1 to 100, just obtain 100 points, by 100 the some structure SPL drawn.
When the number ratio at reference mark is more, by reference mark segmentation computing function, such as front 4 dot generation Y=F1 (X), lower four another functions of dot generation Y=F2 (X) ... SPL is combined into by multiple sectional curve.
Keep level and smooth for making the junction of the curve of segmentation, certain condition of continuity (continuitycondition) need be determined, by the parametric derivative connected at the public semi-match of segment of curve, thus set up parametric continuity (parametriccontinuity).
Particularly, generate the SPL by multiple described reference mark in the embodiment of the present invention, comprising: determine the SPL by multiple reference mark by cubic spline interpolation.
The piecewise function that cubic spline generates is cubic polynomial, cubic spline differential technique is provide a rational half-way house between the dirigibility of SPL and computing velocity, compared with higher level polynomial expression, cubic spline function only needs less calculating and storage space, and it is more stable, compared with polynomial of lower degree, cubic spline seems more flexible when simulating Arbitrary groove profile.
Mathematically, the quantitative description of smooth degree is: the k order derivative of function (curve) exists and continuously, then claims this curve to have k rank slickness.Wherein the smooth degree of the higher curve of exponent number is better.
Can the curve obtained be made to have higher-order slickness in the situation compared with polynomial of lower degree by cubic spline difference.
Particularly, determine that the method for cubic spline function is in the documentation page of specifying, set up O-XY coordinate system, in the O-XY coordinate system set up, note cubic spline function is designated as s (x), and its interval of definition is [a, b];
This cubic spline function s (x) meets at each minizone [Xi-1, Xi] on be a cubic polynomial function, and on whole interval [a, b], its second derivative exists and continuously, so can ensure that cubic spline function is continuous in the second derivative of each Nodes.
Cubic spline functions defining method is: given function f (x) at n+1 node x0, x1 ..., the functional value at xn place is y0, y1, ..., yn, asks cubic spline function s (x), make its meet
s(xi)=yi,i=0,1,…,n;
Piecewise linear interpolation, in two parameters of the linear function of each section, is uniquely determined by two equations (functional value of two end points is set-point); For cubic spline interpolation, the cubic function on each interval has four parameters, and is that set-point is merely able to generation two equations by the functional value of two end points on this interval, and only this is not enough to uniquely determine four parameters.Notice the requirement of cubic spline function to whole smooth, its second derivative exists and continuously, considers that the relation of number of parameters and equation number is as follows from the angle of the overall situation:
Parameter: each segment is determined 4 parameters, n segment determines 4n parameter altogether;
Equation: each segment obtains 2 by given function value, equation, n segment amounts to 2n equation;
Slickness requires that the single order at each internal node place, second derivative are continuous, and show that its Derivative on the left or on the right is equal, therefore, each node produces 2 equations, amounts to 2 (n-1) individual, can obtain 4n-2 equation thus, now also need to determine two equations.
For this reason, conventional method is to boundary node subsidiary boundary condition except functional value, by respectively determining that a boundary condition obtains two required equations for two, left and right end points, wherein determines that the mode of end points boundary condition has three kinds:
(1) m boundary condition: s'(X0)=m0, s'(Xn)=mn, namely the first derivative values of two boundary nodes is set-point: m0, mn.
(2) M boundary condition: s " (x0)=m0, s " (xn)=mn, namely the second derivative values of two boundary nodes is set-point: m0, mn.
Especially, when m0 and mn is zero, natural boundary conditions is called.
(3) periodic boundary condition: s'(x0)=s'(xn); S " (x0)=s " (xn).
Further, when adding anti-duplicating figure in the documentation page of specifying, comprising:
Determine background image and the foreground image of described anti-duplicating figure;
The described background image determined and described foreground image are joined the assigned address in the documentation page of specifying by preset rules, generate security documents page.
When adding micro text figure in the documentation page of specifying, comprising: extract the key message in the documentation page of specifying; By the described key message micro extracted, generate micro text figure; The described micro text figure generated is added to the assigned address in the documentation page of specifying.Particularly, the micro text figure generated can join in the frame line being arranged on whole document, realize hiding of key message, wherein, the information content in the micro text figure generated can be inquired about by Quick Response Code, carries out inquiry be convenient to consumer and inquire about false proof content by Quick Response Code.
When adding two-dimension code pattern in the documentation page of specifying, comprising: extract the key message of documentation page of specifying, according to the described key message extracted generate be used for the character information that carries by Quick Response Code; According to described character information generator matrix two-dimension code pattern; Described matrix two-dimensional code figure is added in the assigned address of the documentation page of specifying.
Described except generate according to the described key message extracted to be used for by Quick Response Code except the character information that carries, also comprise: according to Antiforge inquiry website information generate be used for the character information that carries by Quick Response Code.
Described client is combined into security documents to after the security documents page deciphering received, and comprising:
Client according to the filename of the security documents page received, check that password, document Modify password, the page number and Layer Order number are by security documents page synthesis security documents.
The embodiment of the present invention also provides a kind of composite anti-fake document creating system, as shown in Figure 2, comprising:
Server end 21, for adding the false proof figure of true-to-shape in the documentation page of specifying by preset rules, generates security documents page; Wherein said false proof figure comprises: one or more in false proof shading figure, anti-duplicating figure, micro text figure and two-dimension code pattern; Receive the request instruction that user triggers, and be issued to client after the security documents page of described request instruction being specified encryption;
Client 22, for being combined into security documents to after the security documents page deciphering received.
Described server end, comprising: one or more in false proof shading generation server, anti-duplicating processing server, micro processing server and Quick Response Code processing server.
According to the security documents that the composite anti-fake document structure tree method and system of the embodiment of the present invention generate, the mode of Quick Response Code can be scanned by mobile phone terminal, show the summary info of false proof content, and Antiforge inquiry network address is provided, by Antiforge inquiry network address, can represent the false proof shading of every a anti-fake material, anti-duplicating label, micro text content and particular location.
Obviously, those skilled in the art should be understood that, above-mentioned of the present invention each module or each step can realize with general calculation element, they can concentrate on single calculation element, or be distributed on network that multiple calculation element forms, alternatively, they can realize with the executable program code of calculation element, thus, they can be stored and be performed by calculation element in the storage device, or they are made into each integrated circuit modules respectively, or the multiple module in them or step are made into single integrated circuit module to realize.Like this, the present invention is not restricted to any specific hardware and software combination.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (8)
1. a composite anti-fake document structure tree method, is characterized in that, comprising:
In the documentation page of specifying, add the false proof figure of true-to-shape by preset rules, generate security documents page;
Wherein said false proof figure comprises: one or more in false proof shading figure, anti-duplicating figure, micro text figure and two-dimension code pattern;
In the documentation page of specifying, add two-dimension code pattern, comprising:
Extract the key message of documentation page of specifying, according to the described key message extracted generate be used for the character information that carries by Quick Response Code;
According to described character information generator matrix two-dimension code pattern;
Described matrix two-dimensional code figure is added in the assigned address of the documentation page of specifying;
Except generate according to the described key message extracted to be used for by Quick Response Code except the character information that carries, also comprise: according to Antiforge inquiry website information generate be used for the character information that carries by Quick Response Code;
Receive the request instruction that user triggers, after the security documents page of described request instruction being specified encryption, be issued to client;
Client is combined into security documents to after the security documents page deciphering received.
2. method according to claim 1, is characterized in that, the described false proof figure adding true-to-shape by preset rules in the documentation page of specifying, and generates security documents page, comprising:
In the documentation page of specifying, add false proof shading figure, comprising:
Multiple reference mark is determined in the documentation page of specifying;
Generate the SPL by multiple described reference mark;
False proof shading figure is formed by multiple described SPL;
Described false proof shading figure is joined the assigned address in the documentation page of specifying, generate security documents page.
3. method according to claim 2, is characterized in that, generates the SPL by multiple described reference mark, comprising:
The SPL by multiple reference mark is determined by cubic spline interpolation.
4. method according to claim 1, is characterized in that, the described false proof figure adding true-to-shape by preset rules in the documentation page of specifying, and generates security documents page, comprising:
In the documentation page of specifying, add anti-duplicating figure, comprising:
Determine background image and the foreground image of described anti-duplicating figure;
The described background image determined and described foreground image are joined the assigned address in the documentation page of specifying by preset rules, generate security documents page.
5. method according to claim 1, is characterized in that, the described false proof figure adding true-to-shape by preset rules in the documentation page of specifying, and generates security documents page, comprising:
In the documentation page of specifying, add micro text figure, comprising:
Extract the key message in the documentation page of specifying;
By the described key message micro extracted, generate micro text figure;
The described micro text figure generated is added to the assigned address in the documentation page of specifying.
6. the method according to any one of claim 1 to 5, is characterized in that, described client is combined into security documents to after the security documents page deciphering received, and comprising:
Client according to the filename of the security documents page received, check that password, document Modify password, the page number and Layer Order number are by security documents page synthesis security documents.
7. a composite anti-fake document creating system, is characterized in that, comprising:
Server end, for adding the false proof figure of true-to-shape in the documentation page of specifying by preset rules, generates security documents page; Wherein said false proof figure comprises: one or more in false proof shading figure, anti-duplicating figure, micro text figure and two-dimension code pattern; In the documentation page of specifying, add two-dimension code pattern, comprising:
Extract the key message of documentation page of specifying, according to the described key message extracted generate be used for the character information that carries by Quick Response Code;
According to described character information generator matrix two-dimension code pattern;
Described matrix two-dimensional code figure is added in the assigned address of the documentation page of specifying;
Except generate according to the described key message extracted to be used for by Quick Response Code except the character information that carries, also comprise: according to Antiforge inquiry website information generate be used for the character information that carries by Quick Response Code;
Receive the request instruction that user triggers, and be issued to client after the security documents page of described request instruction being specified encryption;
Client, for being combined into security documents to after the security documents page deciphering received.
8. system according to claim 7, is characterized in that, described server end, comprising:
One or more in false proof shading generation server, anti-duplicating processing server, micro processing server and Quick Response Code processing server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310292562.3A CN103324894B (en) | 2013-07-11 | 2013-07-11 | A kind of composite anti-fake document structure tree method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310292562.3A CN103324894B (en) | 2013-07-11 | 2013-07-11 | A kind of composite anti-fake document structure tree method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103324894A CN103324894A (en) | 2013-09-25 |
CN103324894B true CN103324894B (en) | 2016-01-06 |
Family
ID=49193628
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310292562.3A Expired - Fee Related CN103324894B (en) | 2013-07-11 | 2013-07-11 | A kind of composite anti-fake document structure tree method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103324894B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104463412A (en) * | 2014-10-29 | 2015-03-25 | 中冶天工集团有限公司 | Method for carrying out kiln project technical disclosure by utilization of two-dimension codes |
CN107302645B (en) * | 2017-04-27 | 2019-08-16 | 珠海赛纳打印科技股份有限公司 | A kind of image processing apparatus and its image processing method |
CN108805787B (en) * | 2018-04-17 | 2022-08-23 | 北京数科网维技术有限责任公司 | Paper document tampering and authenticating method and device |
CN109299763B (en) * | 2018-10-17 | 2021-11-02 | 国网江苏省电力有限公司无锡供电分公司 | Paper secret-involved carrier tamper-proof counterfeiting method based on RFID key chain |
CN113313782A (en) * | 2021-06-15 | 2021-08-27 | 福建正孚软件有限公司 | File anti-counterfeiting method and system based on three-dimensional grains |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101841411A (en) * | 2005-10-28 | 2010-09-22 | 北京书生数字技术有限公司 | Data resource anti-copying encrypted transmission method and device system |
CN103065101A (en) * | 2012-12-14 | 2013-04-24 | 北京思特奇信息技术股份有限公司 | Anti-counterfeiting method for documents |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009508240A (en) * | 2005-09-12 | 2009-02-26 | サンド ボックス テクノロジーズ インク. | System and method for controlling the distribution of electronic information |
-
2013
- 2013-07-11 CN CN201310292562.3A patent/CN103324894B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101841411A (en) * | 2005-10-28 | 2010-09-22 | 北京书生数字技术有限公司 | Data resource anti-copying encrypted transmission method and device system |
CN103065101A (en) * | 2012-12-14 | 2013-04-24 | 北京思特奇信息技术股份有限公司 | Anti-counterfeiting method for documents |
Non-Patent Citations (1)
Title |
---|
防伪版纹设计系统研究;王丰军等;《天津科技大学学报》;20081231;第23卷(第4期);第66-68页 * |
Also Published As
Publication number | Publication date |
---|---|
CN103324894A (en) | 2013-09-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11475176B2 (en) | Method and system for automatically ordering and fulfilling architecture, design and construction product sample requests | |
CN103324894B (en) | A kind of composite anti-fake document structure tree method and system | |
CN112148932B (en) | Visualization method, system, computer device and storage medium | |
CN103400415B (en) | Plane space structure three-dimensional digital model generates and the implementation method of online interaction automatically | |
Nishida et al. | Example‐driven procedural urban roads | |
US8754884B2 (en) | 3D virtual environment for generating variable data images | |
EP2774110A1 (en) | Systems and methods for dynamic digital product synthesis, commerce, and distribution | |
US20140267268A1 (en) | Apparatus and methods for detailing subdivision surfaces | |
CN104050699B (en) | The application example of general three-dimensional contextual data | |
Ellul et al. | Investigating approaches to improving rendering performance of 3D city models on mobile devices | |
Zhang et al. | Machine learning aided 2D-3D architectural form finding at high resolution | |
Barnsley et al. | Fractal homeomorphism for bi-affine iterated function systems | |
Prechtel | On strategies and automation in upgrading 2D to 3D landscape representations | |
Tanaka et al. | Feature extraction from sketches of objects | |
CN106021228A (en) | Method and system for performing text analysis by utilizing knowledge topographic map | |
CN105881910A (en) | Object faxing method based on 3D scanning, 3D printing and cloud services | |
Rhyne | Scientific visualization in the next millennium | |
CN114595673A (en) | Collaborative creation method of digital works, task release method and device | |
US20170092012A1 (en) | Specification-based method for generating views in 3d reports | |
Zhu et al. | Mid-surface abstraction for complex thin-wall models based on virtual decomposition | |
CN107291725B (en) | Method and device for generating multi-directional tree | |
Yoo | Rapid three-dimensional urban model production using bilayered displacement mapping | |
Wu | Application of Virtual Reality Technology in the Digital Inheritance of Intangible Cultural Heritage | |
Huang et al. | Interactive 3D character modeling from 2D orthogonal drawings with annotations | |
Zhao et al. | A Face Changing Animation Framework Based on Landmark Mapping |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160106 |
|
CF01 | Termination of patent right due to non-payment of annual fee |