CN106427285A - Single-variable-parameter layered gradating and ternary encrypting type binary anti-counterfeit printing method for Ren Min Bi - Google Patents
Single-variable-parameter layered gradating and ternary encrypting type binary anti-counterfeit printing method for Ren Min Bi Download PDFInfo
- Publication number
- CN106427285A CN106427285A CN201610851054.8A CN201610851054A CN106427285A CN 106427285 A CN106427285 A CN 106427285A CN 201610851054 A CN201610851054 A CN 201610851054A CN 106427285 A CN106427285 A CN 106427285A
- Authority
- CN
- China
- Prior art keywords
- binary
- group
- control variable
- counterfeiting information
- operator control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/30—Identification or security features, e.g. for preventing forgery
- B42D25/305—Associated digital information
Abstract
The invention discloses a single-variable-parameter layered gradating and ternary encrypting type binary anti-counterfeit printing method for the Ren Min Bi. According to the method, binary anti-counterfeit information can generate binary modulating signals through ternary layered encrypting and channel coding and are orderly changed and implanted into the whole surface of the Ren Min Bi in the shape of amplitude modulation dots and through the modulation mode of the cyclic table lookup method, and anti-counterfeit information can be recognized from any fragment in the recognition process of the Ren Min Bi. The method can be used in anti-counterfeit printing of the Ren Min Bi.
Description
Technical field:
The present invention relates to a kind of RMB anti-counterfeiting printing technology, particularly a kind of univariate parameter layering gradient ternary encryption two is entered
RMB anti-counterfeiting printing process processed, this RMB anti-counterfeiting printing technology can be used for the anti-counterfeit printing of the RMB of various face amounts
In.
Background technology:
Currency security is related to a national financial security, starts struggle that is false proof and faking from currency generation and does not just stop
Breath, the RMB of China is audaciously innovated, and employs watermark anti-counterfeiting technology, safety line anti-counterfeiting technology, carved intaglio print
Brush and gravure wiring anti-counterfeiting technology, red blue color fiber and colorless fluorescent fiber anti-counterfeiting technology, stealthy denomination digital anti-counterfeiting technology,
Photochromatic printing ink printing denomination digital anti-counterfeiting technology, yin yang complementarity are to being patterned anti-counterfeiting technology, number convex print anti-counterfeiting technology, miniature literary composition
Word anti-counterfeiting technology, colorless fluorescent pattern anti-counterfeiting technology, colored fluorescent pattern anti-fake technology and docking coincide etc. multinomial anti-counterfeiting technology,
But struggle that is false proof and faking is high-tech trial of strength, more advanced anti-counterfeiting technology have certain ageing, therefore it is necessary to not
So as to forever be in the leading position of anti-counterfeiting technology, this is also to maintain financial security of the country to disconnected lifting RMB anti-counterfeiting technology
Basic assurance.
Content of the invention:
In order to improve reliability and the safety of RMB anti-counterfeiting, the present invention is directed to the deficiency of existing RMB anti-counterfeiting presence to existing
RMB anti-counterfeiting technology is had to carry out improving it is proposed that the RMB that a kind of binary system coded signal modulates amplitude shape is prevented
Pseudo- technology, this RMB anti-counterfeiting technology, by the change of amplitude shape during RMB is printed, anti-counterfeiting information is entered with two
Coded signal form processed is embedded in the whole RMB page, can identify false proof from any one fragment when RMB identifies
Information, therefore has very disguised by force and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:First line number is entered to image and character anti-counterfeiting information
Wordization is processed, and generates 8 one group of binary system anti-counterfeiting information table using image and character anti-counterfeiting information, for preventing in ciphering process
Produce information spillover, 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 16 one group of binary systems
Anti-counterfeiting information, generates the 16 one group binary system anti-counterfeiting information table that most-significant byte is all 0, by 16 one group binary system anti-counterfeiting information table
In i-th group of 16 binary system anti-counterfeiting information be denoted as Ni, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as, encryption parameterFor 0 C
255 bigit, eight-digit binary number encryption variables are denoted as j, and encryption parameter j is the bigit of 0 j 255, and two
System operator control variable is denoted as k, and binary operator control variable k is the bigit of 0 k 7, operatorUsing+,-, ×, tetra- kinds of operators of ÷, during binary operator control variable k=0Be defined as+, during binary operator control variable k=1Be respectively defined as+, ÷, binary operator control variable k=2
WhenBe respectively defined as-, ÷ ,+, during binary operator control variable k=3Define respectively
For+, × ,+, ÷, during binary operator control variable k=4Be respectively defined as+, × ,+,
÷ ,-, during binary operator control variable k=5Be respectively defined as+, × ,+, ÷ ,-,
÷, during binary operator control variable k=6Be respectively defined as+, × ,+, ÷ ,-,
÷ ,+, during binary operator control variable k=7Be respectively defined as+, × ,+,
÷ ,-, ÷ ,+, ×, by i-th group of 16 binary system encryption anti-fake information in 16 one group binary system encryption anti-fake information table
It is denoted as Ni, during binary operator control variable k=0, ternary layered encryption operational formula is defined as, binary system calculation
During symbol control variable k=1, ternary layered encryption operational formula is defined as, binary operator control change
During amount k=2, ternary layered encryption operational formula is defined as, binary operator control variable k
When=3, ternary layered encryption operational formula is defined as, binary operator control change
During amount k=4, ternary layered encryption operational formula is defined as,
During binary operator control variable k=5, ternary layered encryption operational formula is defined as , ternary layered encryption operational formula definition during binary operator control variable k=6
For, binary operator control
During variable k=7 processed, ternary layered encryption operational formula is defined as , set encryption parameterJust
Value, sets the initial value that eight-digit binary number encryption variables are denoted as j, sets 16 binary systems in 16 one group binary system anti-counterfeiting information table
Anti-counterfeiting information NiPosition control variable i=1, from 16 one group binary system anti-counterfeiting information table, first group of 16 binary system is false proof
Information N1Start, circulation is using above-mentioned eight kinds different cryptographic calculation formula to 16 in 16 one group binary system anti-counterfeiting information table
Binary system anti-counterfeiting information is encrypted computing, and carries out i+1, j+1 and k+1 computing while cryptographic calculation each time, with
The value change of i, j and k, by the false proof letter of each group of 16 binary systems in 16 one group binary system anti-counterfeiting information table
Breath is encrypted computing, generates 16 one group binary system encryption anti-fake information corresponding with 16 one group binary system anti-counterfeiting information table
Table, is digitized processing to the shape of amplitude in RMB printing, amplitude is shaped toWith
Two kinds, whereinBe defined as numeral 0,It is defined as numeral 1, using 16 group generating in RMB printing process
Binary system encryption anti-fake information is passed through to circulate the amplitude that look-up table is modulated on the RMB page, makes the tune on the RMB page
The regular shape according to above two amplitude in width site is changed, adjacent 16 tune on the RMB page after modulation
Width site constitutes one group of 16 binary system anti-counterfeiting information so that carry anti-on the RMB page by the change of amplitude shape
Fake information, and so that this anti-counterfeiting information is embedded in whole RMB page site, realize RMB anti-counterfeiting.By in RMB page
Non- in face embed extractible anti-counterfeiting information obviously, can be that real Renminbi provides valid certificates, have stronger anti-simultaneously
Forgery ability, and do not increase extra anti-counterfeiting cost.
For solving above-mentioned technical problem, anti-counterfeiting information is digitized processing first, generates 8 one group of binary system
Anti-counterfeiting information table, anti-counterfeiting information can be image information and Word message information, by 8 one group in binary system anti-counterfeiting information table
Binary system anti-counterfeiting information expands to 16 one group of binary system anti-counterfeiting information, and 16 one group of binary systems that generation most-significant byte is all 0 are false proof
16 binary system anti-counterfeiting information of each of 16 one group binary system anti-counterfeiting information table are carried out layered encryption fortune by information table
Calculate, generate 16 one group of binary system encryption anti-fake information table, using 16 binary systems in binary system encryption anti-fake information table
Encryption anti-fake information, through chnnel coding, generates the binary modulated signal of 16 group with error detecting and error correcting function, letter
RMB page original continuous can be changed the line map picture by road coding using loop coding, convolutional encoding or Turbo coding various ways
Signal is processed through rasterizing(RIP)Export halftoning hybrid screening picture signal with hybrid screening, including amplitude
With FM screened image signal, modulated using circulation look-up table modulation system using the 16 one group of binary modulated signals generating
The shape of amplitude in halftoning hybrid screening picture signal, make the shape of amplitude according toWithRegular
Raw change, makes adjacent 16 amplitudes in halftoning hybrid screening picture signal carry 16 binary systems by the change of shape
Encryption anti-fake information, thus generate the halftoning hybrid screening image letter of embedded anti-counterfeiting information in whole RMB page site
Number, realize the anti-counterfeit printing of RMB.
When extracting anti-counterfeiting information, gather RMB page halftone dot image signal first, through the shape to amplitude
Fuzzy diagnosis, differentiate the shape of amplitude, extract the edge signal of amplitude and shape information, demodulate the RMB page
The shape information of amplitude, the binary modulated signal of 16 one group of output, the binary system to 16 group of demodulation output
Modulated signal carries out channel decoding, recovers to generate binary system deciphering anti-counterfeiting information table after channel decoding.
Binary system is deciphered 16 binary informations in anti-counterfeiting information table and is denoted as Hi, by ciphering process, extensive
In the binary system deciphering anti-counterfeiting information table of repetitive generation, ternary layering deciphering computing during binary operator control variable k=0 is, during binary operator control variable k=1 ternary layering deciphering computing be, during binary operator control variable k=2 ternary layering deciphering computing be, during binary operator control variable k=3 ternary layering deciphering computing be, ternary layering deciphering computing during binary operator control variable k=4
For, ternary during binary operator control variable k=5
Computing is deciphered in layering, binary system
During operator control variable k=6 ternary layering deciphering computing be , during binary operator control variable k=7 ternary layering deciphering computing be, will
Recover 16 binary informations H in the binary system deciphering anti-counterfeiting information table generating after decodingiPosition control initial guess set
For i=1, binary operator control variable initial value design is K=0, first from the binary system deciphering anti-counterfeiting information table recovering to generate
Group H1Start, each group of 16 binary informations in anti-counterfeiting information table are deciphered to the binary system recovering to generate and carries out corresponding three
Unit's layering deciphering computing, solves binary system anti-counterfeiting information Ni, generate the 16 one group binary system anti-counterfeiting information table that most-significant byte is all 0,
Remove most-significant byte, recover to generate 8 one group of binary system anti-counterfeiting information table, recover anti-counterfeiting signal and export anti-counterfeiting information.
Brief description
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 loads anti-counterfeiting information flow chart.
Fig. 2 extracts anti-counterfeiting information flow chart.
Specific embodiment
In loading anti-counterfeiting information flow process Fig. 1, original anti-counterfeiting information(Image, word)Encrypted, generate the two of 8 one group
System anti-counterfeiting information table, 8 one group of binary informations in binary system anti-counterfeiting information table are expanded to 16 one group of binary system letters
Breath, generates the 16 one group binary system anti-counterfeiting information table that most-significant byte is all 0, i-th group in 16 one group binary system anti-counterfeiting information table
16 binary informations are denoted as Ni, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as, encryption parameterFor 0 C
255 bigit, eight-digit binary number encryption variables are denoted as j, and encryption parameter j is the bigit of 0 j 255, and two
System operator control variable is denoted as k, and binary operator control variable k is the bigit of 0 k 7, operatorUsing+,-, ×, tetra- kinds of operators of ÷, binary operator control variable k=0
WhenBe defined as+, during binary operator control variable k=1Be respectively defined as+, ÷, binary operator control variable
During k=2Be respectively defined as-, ÷ ,+, during binary operator control variable k=3Fixed respectively
Justice for+, × ,+, ÷, during binary operator control variable k=4Be respectively defined as+, × ,+,
÷ ,-, during binary operator control variable k=5Be respectively defined as+, × ,+, ÷ ,-, ÷,
During binary operator control variable k=6Be respectively defined as+, × ,+, ÷ ,-, ÷ ,+,
During binary operator control variable k=7Be respectively defined as+, × ,+,
÷ ,-, ÷ ,+, ×, by i-th group of 16 binary system encryption anti-fake information in 16 one group binary system encryption anti-fake information table
It is denoted as Ni, during binary operator control variable k=0, ternary layered encryption operational formula is defined as, binary system calculation
During symbol control variable k=1, ternary layered encryption operational formula is defined as, binary operator control change
During amount k=2, ternary layered encryption operational formula is defined as, binary operator control variable k
When=3, ternary layered encryption operational formula is defined as, binary operator control change
During amount k=4, ternary layered encryption operational formula is defined as, two enter
During operator control variable k=5 processed, ternary layered encryption operational formula is defined as , during binary operator control variable k=6, ternary layered encryption operational formula is defined as, binary operator control
During variable k=7, ternary layered encryption operational formula is defined as , set encryption parameterInitial value,
Set the initial value that eight-digit binary number encryption variables are denoted as j, set 16 binary systems in 16 one group binary system anti-counterfeiting information table and prevent
Fake information NiPosition control variable i=1, the false proof letter of first group of 16 binary system from 16 one group binary system anti-counterfeiting information table
Breath N1Start, circulation is using above-mentioned eight kinds different cryptographic calculation formula to 16 two in 16 one group binary system anti-counterfeiting information table
System anti-counterfeiting information is encrypted computing, and carries out i+1, j+1 and k+1 computing while cryptographic calculation each time, with
The value change of i, j and k, by each group of 16 binary system anti-counterfeiting information in 16 one group binary system anti-counterfeiting information table
It is encrypted computing, generate 16 one group binary system encryption anti-fake information corresponding with 16 one group binary system anti-counterfeiting information table
Table, is digitized processing to the shape of amplitude in RMB printing, amplitude is shaped toWith
Two kinds, whereinBe defined as numeral 0,It is defined as numeral 1, using 16 group generating in RMB printing process
Binary system encryption anti-fake information is passed through to circulate the amplitude that look-up table is modulated on the RMB page, makes the tune on the RMB page
The regular shape according to above two amplitude in width site is changed, adjacent 16 tune on the RMB page after modulation
Width site constitutes one group of 16 binary system anti-counterfeiting information so that carry anti-on the RMB page by the change of amplitude shape
Fake information, and so that this anti-counterfeiting information is embedded in whole RMB page site, realize RMB anti-counterfeiting printing.
In extracting anti-counterfeiting information flow process Fig. 2, when extracting anti-counterfeiting information, collection RMB page halftone dot image letter first
Number, through the fuzzy diagnosis to the shape of amplitude, differentiate the shape of amplitude, extract amplitude edge signal and
Shape information, the shape information of demodulation RMB page amplitude, the binary modulated signal of 16 one group of output, to demodulation
The binary modulated signal of 16 group of output carries out channel decoding, recovers generation binary system deciphering false proof after channel decoding
Information table.
Binary system is deciphered 16 binary informations in anti-counterfeiting information table and is denoted as Hi, by ciphering process, extensive
In the binary system deciphering anti-counterfeiting information table of repetitive generation, ternary layering deciphering computing during binary operator control variable k=0 is, during binary operator control variable k=1 ternary layering deciphering computing be, during binary operator control variable k=2 ternary layering deciphering computing be, during binary operator control variable k=3 ternary layering deciphering computing be, ternary layering deciphering computing during binary operator control variable k=4
For, ternary during binary operator control variable k=5
Computing is deciphered in layering, binary system
During operator control variable k=6 ternary layering deciphering computing be , during binary operator control variable k=7 ternary layering deciphering computing be, will solve
Recover 16 binary informations H in the binary system deciphering anti-counterfeiting information table generating after codeiPosition control initial guess be set as i
=1, binary operator control variable initial value design is k=0, first group of H from the binary system deciphering anti-counterfeiting information table recovering to generate1
Start, corresponding ternary layering is carried out to each group of 16 binary informations in the binary system group anti-counterfeiting information table recovering generation
Deciphering computing, solves binary system anti-counterfeiting information Ni, generate the 16 one group binary system anti-counterfeiting information table that most-significant byte is all 0, remove height
8, recover to generate 8 one group of binary system anti-counterfeiting information table, recover anti-counterfeiting signal and export anti-counterfeiting information.
Claims (1)
1. anti-counterfeiting information is passed through cryptographic calculation and chnnel coding and generates binary modulated signal by one kind, and is tabled look-up tune by circulation
Anti-counterfeiting information is embedded in the univariate parameter layering gradient ternary encrypted binary RMB anti-counterfeiting in full page by mode processed
Printing process, is characterized in that:Anti-counterfeiting information is digitized, generates 8 one group of binary system anti-counterfeiting information table, anti-counterfeiting information
It is image information and Word message, for preventing from producing information spillover in ciphering process, by 8 one in binary system anti-counterfeiting information table
Group binary system anti-counterfeiting information expands to 16 one group of binary system anti-counterfeiting information, and 16 one group of binary systems that generation most-significant byte is all 0 are prevented
Fake information table, i-th group of 16 binary system anti-counterfeiting information in 16 one group binary system anti-counterfeiting information table are denoted as Ni, i is more than 0
Positive integer, eight-digit binary number encryption parameter is denoted as, encryption parameterFor the bigit of 0 C 255, eight-digit binary number encryption variables are denoted as
J, encryption parameter j are the bigit of 0 j 255, and binary operator control variable is denoted as k, binary operator control variable
K is the bigit of 0 k 7, operatorUsing+,-, ×, tetra- kinds of ÷
Operator, during binary operator control variable k=0Be defined as+, during binary operator control variable k=1Define respectively
For+, ÷, during binary operator control variable k=2Be respectively defined as-, ÷ ,+, binary operator control variable
During k=3Be respectively defined as+, × ,+, ÷, during binary operator control variable k=4Be respectively defined as+, × ,+, ÷ ,-, during binary operator control variable k=5Be respectively defined as+, × ,+, ÷ ,-, ÷, during binary operator control variable k=6Be respectively defined as+, × ,+, ÷ ,-, ÷ ,+, during binary operator control variable k=7Be respectively defined as+, × ,+, ÷ ,-, ÷ ,+, ×, 16 one group two is entered
I-th group of 16 binary system encryption anti-fake information in encryption anti-fake information table processed are denoted as Ni, during binary operator control variable k=0
Ternary layered encryption operational formula is defined as, ternary layered encryption fortune during binary operator control variable k=1
Calculate formula to be defined as, during binary operator control variable k=2, ternary layered encryption operational formula is fixed
Justice is, during binary operator control variable k=3, ternary layered encryption operational formula is defined as, during binary operator control variable k=4, ternary layered encryption operational formula is fixed
Justice is, during binary operator control variable k=5, ternary is layered and adds
Close operational formula is defined as, binary operator
During control variable k=6, ternary layered encryption operational formula is defined as , during binary operator control variable k=7, ternary layered encryption operational formula is defined as, set encryption
ParameterInitial value, set eight-digit binary number encryption variables and be denoted as the initial value of j,
Set 16 binary system anti-counterfeiting information N in 16 one group binary system anti-counterfeiting information tableiPosition control variable i=1, from 16 one
First group 16 binary system anti-counterfeiting information N in group binary system anti-counterfeiting information table1Start, circulation adopts above-mentioned eight kinds of different encryptions
Operational formula is encrypted computing to 16 binary system anti-counterfeiting information in 16 one group binary system anti-counterfeiting information table, and each
Carry out i+1, j+1 and k+1 computing, with the value change of i, j and k, by 16 one group two while secondary cryptographic calculation
16 binary system anti-counterfeiting information of in system anti-counterfeiting information table each group are encrypted computing, generate and prevent with 16 one group of binary systems
The corresponding 16 one group binary system encryption anti-fake information table of fake information table, enters line number to the shape of amplitude in RMB printing
Wordization is processed, and amplitude is shaped toWithTwo kinds, whereinBe defined as numeral 0,It is defined as numeral
1, pass through to circulate look-up table modulation using the binary system encryption anti-fake information of 16 group generating in RMB printing process
Amplitude on the RMB page, makes the amplitude on the RMB page regular according to above two amplitude
Shape is changed, and on the RMB page after modulation, adjacent 16 amplitudes constitute one group of 16 binary system anti-counterfeiting information, make
Obtain, on the RMB page, anti-counterfeiting information is carried by the change of amplitude shape, and make this anti-counterfeiting information be embedded in the whole people
In coin page site, realize RMB anti-counterfeiting.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610851054.8A CN106427285A (en) | 2016-09-25 | 2016-09-25 | Single-variable-parameter layered gradating and ternary encrypting type binary anti-counterfeit printing method for Ren Min Bi |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610851054.8A CN106427285A (en) | 2016-09-25 | 2016-09-25 | Single-variable-parameter layered gradating and ternary encrypting type binary anti-counterfeit printing method for Ren Min Bi |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106427285A true CN106427285A (en) | 2017-02-22 |
Family
ID=58171200
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610851054.8A Pending CN106427285A (en) | 2016-09-25 | 2016-09-25 | Single-variable-parameter layered gradating and ternary encrypting type binary anti-counterfeit printing method for Ren Min Bi |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106427285A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1424690A (en) * | 2003-01-20 | 2003-06-18 | 天津市阿波罗信息技术有限公司 | Network screen encoded anti-fakery method |
CA2554674A1 (en) * | 2004-02-06 | 2005-08-25 | Signoptic Technologies | Use of a digital signature obtained from at least one structural characteristic of a hardware element in order to protect direct reading of sensitive information and method for reading protected sensitive information |
CN101219614A (en) * | 2007-01-08 | 2008-07-16 | 郑阿奇 | Method for setting false proof making in printed matter |
CN101699845A (en) * | 2009-10-20 | 2010-04-28 | 北京印刷学院 | Encryption counterfeit printing technology of frequency modulated halftone dot space position for pseudo random signal modulation printed matter |
CN101777134A (en) * | 2010-03-01 | 2010-07-14 | 北京印刷学院 | Presswork encryption security printing technology based on multi-system quadrature amplitude modulation |
CN102225671A (en) * | 2011-04-14 | 2011-10-26 | 北京印刷学院 | Encrypted anti-counterfeit printing technology for modulating shape of printed matter amplitude-modulation screen dot by dual-encrypted signal |
CN102402696A (en) * | 2011-04-25 | 2012-04-04 | 北京印刷学院 | Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals |
-
2016
- 2016-09-25 CN CN201610851054.8A patent/CN106427285A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1424690A (en) * | 2003-01-20 | 2003-06-18 | 天津市阿波罗信息技术有限公司 | Network screen encoded anti-fakery method |
CA2554674A1 (en) * | 2004-02-06 | 2005-08-25 | Signoptic Technologies | Use of a digital signature obtained from at least one structural characteristic of a hardware element in order to protect direct reading of sensitive information and method for reading protected sensitive information |
CN101219614A (en) * | 2007-01-08 | 2008-07-16 | 郑阿奇 | Method for setting false proof making in printed matter |
CN101699845A (en) * | 2009-10-20 | 2010-04-28 | 北京印刷学院 | Encryption counterfeit printing technology of frequency modulated halftone dot space position for pseudo random signal modulation printed matter |
CN101777134A (en) * | 2010-03-01 | 2010-07-14 | 北京印刷学院 | Presswork encryption security printing technology based on multi-system quadrature amplitude modulation |
CN102225671A (en) * | 2011-04-14 | 2011-10-26 | 北京印刷学院 | Encrypted anti-counterfeit printing technology for modulating shape of printed matter amplitude-modulation screen dot by dual-encrypted signal |
CN102402696A (en) * | 2011-04-25 | 2012-04-04 | 北京印刷学院 | Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals |
Non-Patent Citations (1)
Title |
---|
冯登国: "《密码学导引》", 30 April 1999 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106427285A (en) | Single-variable-parameter layered gradating and ternary encrypting type binary anti-counterfeit printing method for Ren Min Bi | |
CN106427284A (en) | Parametric layered gradating and ternary encrypting type binary anti-counterfeit printing method for Ren Min Bi | |
CN106427286A (en) | Single-parameter single-variable unitary layered encryption type binary anti-counterfeit printing method for Ren Min Bi | |
CN106355623A (en) | Single-parameter multi-variable binary layering encrypting binary RMB anti-counterfeiting printing method | |
CN106427282A (en) | Single parameter variable progressive-changing ternary layering encryption binary Ren Min Bi anti-counterfeit printing method | |
CN106355622A (en) | Single parameter variable gradient unary layering encrypting binary RMB anti-counterfeiting printing method | |
CN106427281A (en) | Single-parameter single-variable multivariate layering encryption binary Ren Min Bi anti-counterfeit printing method | |
CN106626875A (en) | Single-parameter multi-variable unary layered encryption binary Renminbi anti-counterfeit printing method | |
CN106626876A (en) | One-parameter variable transmutation binary layered encryption binary system Ren Min Bi anti-counterfeit printing method | |
CN106183533A (en) | Univariate parameter layering gradient multivariate encrypted binary RMB anti-counterfeiting printing process | |
CN106427283A (en) | Single-parameter multi-variable multivariate layering encryption binary Ren Min Bi anti-counterfeit printing method | |
CN106183534A (en) | Parameter layering gradient multivariate encrypted binary RMB anti-counterfeiting printing process | |
CN106427280A (en) | Binary information encryption certificate anti-counterfeit printing method | |
CN106183535A (en) | One-parameter multivariate ternary layered encryption binary system RMB anti-counterfeiting printing process | |
CN106218263A (en) | Univariate parameter layering transmutation unary encrypted binary RMB anti-counterfeiting printing process | |
CN106183530A (en) | One-parameter variation transmutation multivariable layered encryption binary system RMB anti-counterfeiting printing process | |
CN106183532A (en) | One-parameter univariate binary layered encryption binary system RMB anti-counterfeiting printing process | |
CN106218262A (en) | One-parameter univariable ternary layered encryption binary system RMB anti-counterfeiting printing process | |
CN106274136A (en) | Parameter layering transmutation unary encrypted binary RMB anti-counterfeiting printing process | |
CN106183531A (en) | Parameter layering gradient binary encrypted binary RMB anti-counterfeiting printing process | |
CN106427279A (en) | Multi-information encryption certificate anti-counterfeit printing method | |
CN102945421B (en) | Binary anti-fake printing method by reverse synchronous-progressing encryption | |
CN102945445B (en) | Multiparameter single order encrypted binary antiforging printing method | |
CN102945418A (en) | Double-variant multi-parameter same-directional synchronous gradually-increased encryption binary anti-counterfeiting printing method | |
CN103116773A (en) | Parameter transmutation ternary variable circulation encryption anti-fake information storage trademark |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170222 |