CN106779740A - A kind of digital invisible two-dimensional codes checking Antiforge system and invisible two-dimensional codes modulator approach - Google Patents
A kind of digital invisible two-dimensional codes checking Antiforge system and invisible two-dimensional codes modulator approach Download PDFInfo
- Publication number
- CN106779740A CN106779740A CN201611096474.6A CN201611096474A CN106779740A CN 106779740 A CN106779740 A CN 106779740A CN 201611096474 A CN201611096474 A CN 201611096474A CN 106779740 A CN106779740 A CN 106779740A
- Authority
- CN
- China
- Prior art keywords
- invisible
- dimensional codes
- information
- digital
- quick response
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
- G06K19/06103—Constructional details the marking being embedded in a human recognizable image, e.g. a company logo with an embedded two-dimensional code
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The invention discloses a kind of digital invisible two-dimensional codes checking Antiforge system and invisible two-dimensional codes modulator approach, including original image, plain code Quick Response Code, cloud server and the modulation software being connected with cloud server, modulation software modulates to original image plain code Quick Response Code, combined together with original image, plain code Quick Response Code forms invisible two-dimensional codes in original image, naked eyes cannot differentiate invisible two-dimensional codes, invisible two-dimensional codes are preset with product information and store it on cloud server by cloud server, user obtains feedback information and carries out fake certification with the product information on cloud server by hand-hold scanning equipment or mobile scanning terminal invisible two-dimensional codes.The Quick Response Code of plain code is carried out stealth by the present invention on the basis of existing digital anti-counterfeiting technology, i.e., naked eyes cannot be checked, identification relevant information is scanned by handheld terminal or mobile device.
Description
Technical field
The present invention relates to verify Antiforge system application field, more particularly to a kind of numeral stealthy two based on mobile Internet
The checking Antiforge system of dimension code and the modulator approach of invisible two-dimensional codes.
Background technology
At present, anti-counterfeiting technology refers to the measure taken to reach false proof purpose, and anti-counterfeiting technology within the specific limits can
Accurately discern the false from the genuine, and be difficult by anti-system and duplication, that is, prevent copy, the technology of counterfeit grade, for protection brand, market with
And terminal user's legitimate rights and interests and the technical measure of a kind of precaution taken.Anti-counterfeiting technology species has a lot, such as:Antiforge
Technology, chemical material anti-counterfeiting technology, physical security technology, digital information false proof technology, structure and package anti-counterfeiting technology, human body and
Biological characteristic anti-counterfeiting technology etc..
The high speed development of modern science and technology art and being becoming increasingly rampant for personation activity, promote the development of various anti-counterfeiting technologies, prevent
The development of pseudo- technology be it is closely coupled with the development of other related disciplines and technology, it is closely related, incorporated at it advanced
While technological achievement, the crystallization of numerous subject scientific and technological achievements and integrated application is also become.Traditional anti-counterfeiting technology is such as:Laser
False proof, fluorescence falsification preventing, magnetic anti-counterfeit, temperature becomes false proof etc., all once playing certain effect using the initial stage, but because itself is easy
It is counterfeit, thus produce little effect, it is primarily due to traditional anti-counterfeiting technology and exists with low content of technology, textural association is easily decrypted, with
The progress and popularization of Market and Technology, these methods are easy to the person of being counterfeited and decode and utilize, once adulterator has grasped these
Technology and equipment, it is possible to barbaric a large amount of forgeries.Furthermore in face of various anti-counterfeiting marks, consumer can not possibly slap one by one
Hold, and consumer can not differentiate the true and false of anti-counterfeiting mark, and the anti-counterfeiting technology for allowing performs practically no function.Using digital anti-counterfeiting technology
The shortcoming that traditional anti-counterfeiting technology is counterfeited effectively is overcome, compared with common anti-counterfeiting technology, digital anti-counterfeiting technology is not only provided
Anti-fake identification mark, is more to provide the all-around service after marker, including inquiry differentiates, consulting is answerred questions, monitoring management, is followed the trail of
Fake products, statistical analysis etc., also have easily identification, the characteristics of prevent large-scale imitation behavior and low implementation cost in addition.
And network technology should be made full use of as digital anti-counterfeiting technology, and the communication technology, digital coding techniques and printing technology constantly will
New technology is melted into anti-fake network system, while being absorbed in special technology, the security performance of Strengthens network, it is ensured that whole system
Reliability.
Digital anti-counterfeiting technology is realized with reference to printing technology using computer, network service, information coding etc., passed through
It is that each product or commodity add unique information, just like in everyone identity ID, while this information is stored in
High in the clouds core database, when consumer buys the commodity with Quick Response Code, only need to scan Quick Response Code and lead to the information of identification
Cross connection high in the clouds core database server and can verify that authenticity of products, overcoming traditional anti-counterfeiting technology can be possible by batch duplicating
Property and consumer's limitation not easy to identify.But the Quick Response Code added on commodity, being belonging to plain code, i.e. consumer can
To be directly viewable and scan, it is very easy to use simple and direct, to consumer also without any technical threshold.But this mark
Knowledge is easily damaged and loses, and there is potential safety hazard;For staple commodities these information can only be pasted on packing material outside or
The more hidden position of commodity, this brings inconvenience to consumer in checking;Product after having used or installed for part
Product will all do over again when such as verifying the true and false, waste time and energy;For some decorative products, common visible Quick Response Code can also influence
Its aesthetics;Common two safeguard that code is visible due to naked eyes, and adulterator makes extremely similar identifier and is added on commodity, and
Unofficial authentication server is provided, so as to reach deception consumer's purpose;And this visible Quick Response Code is being manufactured
And also need to put into large number quipments and manpower in addition;Such as external processing, a series of problems, such as also involving secret and leak.
The content of the invention
To overcome disadvantages mentioned above, it is an object of the invention to provide a kind of digital invisible two-dimensional codes checking Antiforge system and hidden
Shape Quick Response Code modulator approach, to reach on the basis of existing digital anti-counterfeiting technology, stealth, i.e. meat is carried out by the Quick Response Code of plain code
Eye cannot check, by handheld terminal or mobile device be scanned identification relevant information purpose.
In order to reach object above, the technical solution adopted by the present invention is:A kind of digital invisible two-dimensional codes verify false proof system
System, including original image, plain code Quick Response Code, cloud server and the modulation software that is connected with the cloud server, the tune
Software processed modulates to original image the plain code Quick Response Code, is combined together with the original image, the plain code Quick Response Code
Invisible two-dimensional codes are formed in original image, the invisible two-dimensional codes cannot be visually differentiated, the invisible two-dimensional codes are by described
Cloud server is preset with product information and stores it on cloud server, and user is by hand-hold scanning equipment or mobile whole
End scanning invisible two-dimensional codes obtain feedback information and carry out fake certification with the product information on cloud server, eliminate the false and retain the true.
The Quick Response Code of plain code is carried out stealth by the system on the basis of existing digital anti-counterfeiting technology, i.e., naked eyes cannot be checked, by hand
Hold terminal or mobile device is scanned identification relevant information, the outward appearance of original image is not changed, Quick Response Code is possessed stealth and exist
The characteristics of in original image, imitator is judged the type and the information content of identifier at all, also cannot just be replicated
Or anti-system, improve security.
Further, invisible two-dimensional codes position on the original image is random distribution and/or specific distribution, can be with
Any one place of product is appeared in, unless commodity all destroyed, otherwise only needs a relic to read stealthy two
The full detail of code is tieed up, therefore, to following the trail of goods, preventing commodity falsifying to be very helpful.
Further, the invisible two-dimensional codes add encryption information or digital signature in modulated process, can widen significantly
Invisible two-dimensional codes false proof and encryption technology application surface and application field, it is ensured that the integrality of information transfer, it is ensured that sender's
Authentication, prevents deception.
Further, original image with the invisible two-dimensional codes printed by multiple color digital, it is color ink jet printed or
Be printed directly on image in product packaging or on product surface by laser printing, can be generated at random due to invisible two-dimensional codes and
More information content can be accommodated, each product packaging and product surface is respectively provided with unique customizing messages.
Further, the checking Antiforge system is divided into passive type application, inter-act application by application mode
And active application.
Further, the passive type application sets the robustness of hide information, possesses anti-copy, anti-copying effect, institute
Stating original image internal modulation has the invisible two-dimensional codes of several different product information, scans by several times, multiple authentication.
Further, the product information of the invisible two-dimensional codes of the inter-act application include link, text, video,
Electronic pictures, picture album, Show Me animation and 3D Web museums.
Further, the product information of the invisible two-dimensional codes of the active application includes paying, authorizes encryption, information to obtain
Take, the invisible two-dimensional codes use specific identifier.
A kind of digital invisible two-dimensional codes modulator approach, comprises the following steps:
1):Original image is carried out into block DCT transform by modulating software, all pieces (4,4) quadrant coefficient is taken out, led to
One-dimensional vector X is crossed with the orthogonal sequence S for producing N number of length to be N1, S2..., SNCalculate Ci=XSi;
2):The 2 D code information length for setting insertion is L, and bit series are W, and this sequence is converted into decimal value,
It is designated as Q, i.e. Q=(W)10, M orthogonal sequence q is found, it is designated as q1, q2... qM, then with formula Cmax=maxCiWith reference to obtaining two dimension
Code vector Y,Wherein, A is systematic parameter;
3):By the reverse scrambles of vectorial Y, each piece (4,4) quadrant coefficient is changed with the component of vectorial Y, then it is soft by modulating
Part carries out piecemeal inverse dct transform, obtains the image containing invisible two-dimensional codes.
Further, the step 1) in press K when taking out all pieces (4,4) quadrant coefficient1Scramble, produces N number of length
For N orthogonal sequence when press K2Scramble, the K1、K2Scramble is determined by key.
Brief description of the drawings
Fig. 1 is the system block diagram of the present embodiment;
Fig. 2 is the block diagram of the passive type application of the present embodiment;
Fig. 3 is the block diagram of the inter-act application of the present embodiment;
Fig. 4 is the block diagram of the active application of the present embodiment;
Fig. 5 is the block diagram of the invisible two-dimensional codes modulator approach of the present embodiment;
Fig. 6 is the schematic block diagram of the invisible two-dimensional codes modulator approach of the present embodiment.
Specific embodiment
Presently preferred embodiments of the present invention is described in detail below in conjunction with the accompanying drawings, so that advantages and features of the invention energy
It is easier to be readily appreciated by one skilled in the art, apparent is clearly defined so as to be made to protection scope of the present invention.
Referring to shown in accompanying drawing 1-6, a kind of digital invisible two-dimensional codes of the present embodiment verify Antiforge system, including original graph
Picture, plain code Quick Response Code, cloud server and the modulation software being connected with the cloud server, the modulation software will be stated clearly
Code Quick Response Code is modulated to original image, is combined together with the original image, plain code Quick Response Code shape in original image
Into invisible two-dimensional codes, the invisible two-dimensional codes cannot be visually differentiated, the invisible two-dimensional codes are default by the cloud server
There is product information and store it on cloud server, user is by hand-hold scanning equipment or the stealthy two dimension of mobile scanning terminal
Code obtains feedback information and carries out fake certification with the product information on cloud server, eliminates the false and retains the true.
Quick Response Code used in the present invention in the real life in be seen everywhere, for preserving and recognizing that commodity are believed
Breath is very convenient and quick.With network communication and the popularization of intelligent terminal, ordinary consumer is easy to participate, to common
Need not be to the basic understanding of anti-counterfeiting technology for consumer.Without by seeing, touch, shine, the traditional approach such as wiping is identified,
More eliminate and make a phone call, the checking means such as photos and sending messages, it is commodity institute that need to only be scanned by intelligent hand-held terminal and can obtain producer
The various information for adding.The present invention, can also be by specific information, self-defined information in addition to can be using common Quick Response Code
In addition image therefore higher for safe class, demand application scenarios higher using to special scanning recognition, it is necessary to set
Standby and device, to obtain the more information content hidden in product appearance image.
The technology is combined with digital printing technology, can in real time be added Quick Response Code while production commodity,
The producer need to only set Quick Response Code needs the content of addition, while production addition Quick Response Code, the information meeting of the commodity
Synchronized upload decides whether to enable the part item identifier that (i.e. whether is the commodity to high in the clouds core database after quality restriction
Can dispatch from the factory), consumer can verify at any time after selecting the part commodity, solve the possibility that product is replicated and forges.Stealth is anti-
Pseudo- technology greatly reduces artificial input during production application, strict protection information and secret in the middle of production process,
Prevent from leaking, while also shorten the distance between consumer and producer, more identifier contents can also allow consumer with
Producer is interactive.
The present invention can be applied in various business models, be not only limited as false proof.For example:Internet of Things, checking, chase after
Trace back, the payment of identity information, copyright protection, currency, product introduction, military affairs etc. there are the application scenarios of interactive information demand and high-grade
The application of encryption requirements.The invisibility of the invisible two-dimensional codes in the system, after modulating in image, meat is passed through with original image
Eye respectively, therefore when different industries and field are applied, cannot mainly solve current plain code formula Quick Response Code and be easily replicated, and break
It is bad, and the drawback such as security;Quick Response Code self-information capacity preferably solves greatly product and is imitated, and falsifying etc. is a series of
Problem, has further widened the range of application of the system.
Stealthy reason is consistent with surrounding enviroment from the color colour of skin by changing just like in chameleon, and the present invention is as a same reason
Quick Response Code melts Quick Response Code and relevant information and original image and be an entirety, i.e., do not change by soft-modulation in pattern
Become the outward appearance of original image, naked eyes cannot also be checked, so that the characteristics of Quick Response Code possesses stealth;And invisible two-dimensional codes are in figure
As in position be random and specific distribution, can appear in product any one place, therefore unless by commodity all destroy,
Otherwise only needing a relic can also read full detail, therefore to following the trail of goods, prevent commodity falsifying to be very helpful;
The application higher for safety requirements, when in the middle of by Quick Response Code modulation to original image process, to Quick Response Code addition encryption letter
Breath and/or digital signature, can significantly widen the application surface and application field of concealed anti-false and encryption technology, it is ensured that information transfer
Integrality, it is ensured that the authentication of sender, prevents deception;The image of invisible two-dimensional codes will be with the addition of by current many chromatic numbers
Be printed directly on for image by various existing high-tech digital printing technological means such as code printing, color ink jet printed or laser printing
Packaging external appearance, product surface etc. so that each product surface and packaging external appearance are respectively provided with unique customizing messages, due to two dimension
Code can at random be generated and can accommodate more information content, therefore can cause that each product surface and packaging external appearance are equal
With different information.When product reaches consumer on hand using hand-hold scanning equipment or intelligent hand-held terminal equipment to product table
Face image is scanned, so as to obtain additional information extra in image, and carries out comparison by network and server, goes
Puppet is deposited very, and because Quick Response Code stealth is in image, imitator cannot judge the type and the information content of identifier at all, also with regard to nothing
Method is replicated or anti-system.
The system can be divided into following three class, passive type application, inter-act application and master by application mode classification
Dynamic formula application.
Such as passive type application, refers to simple data message inquiring and authenticating, common ticket, and admission ticket etc. simply should
With this kind of Quick Response Code comprising personal information is shown with the general plain without encryption, it is easy to allow adulterator to replicate simultaneously
Relevant information is decoded, many troubles are brought to consumer.Such as relevant information is encrypted stealthy and many using private database classification
Secondary checking, can prevent the possibility copied.Anti-counterfeiting mark in the present invention is accorded with addition to possessing hidden function, and stealth also can be set
The robustness of information makes it possess anti-copy, anti-copying and other effects, even if the image complete copy that imitator will encrypt, is added
Plus information make occur the loss of information and damage during being replicated due to the difference of robustness, so as to cannot be tested
Card.Even if imitator obtains partial information, counterfeit goods is manufactured using same technological means, the present invention can be in an image
The Quick Response Code of the middle multiple difference information of modulation, is capable of achieving scanning and multiple authentication by several times, and authorize using different Qualify Phases
The authority of different information is obtained, so as to realize being classified Multiple-Scan, the effect of multiple authentication is rigid in checking up to inquiring and authenticating, many
The information true and false is progressively filtered in secondary scanning.
Inter-act application, refers to profound application, in addition to having simple passive type scanning validation, can be with root
According to the different demands of manufacturer, link, text, video, the content such as Show Me animation is preset to database.Such as common advertisement a surname
Pass, product promotion, product introduction, product is traced to the source.The application that case describes two-way mutual assistance is now described as with product introduction.Enterprise
In order to constantly exploit market, more new products are persistently released, the synchronous publicity for making new product causes a large amount of old propaganda materials
Overstock, the finishing again of spacial flex is costly, causes the popularization time long, high cost, slowly effect;User is in purchase product
When, it is impossible to directly docked with manufacturer, Asymmetry information etc., thousand commodity for choosing ten thousand choosings of taking time, found after point of purchase improper or again
There is more preferable new product to release, target is indefinite to be caused time and efforts and pecuniary waste significantly.For enterprise, enterprise
Industry need to only make electronic pictures and picture album containing hiding information, the sales company to each department be delivered, while in database
Upload the displaying video or design sketch made, or even 3D Web museums in type selecting of freely arranging in pairs or groups etc., it is most comprehensive with offer
Most timely product information, user only need to can be directly acquainted with newest most comprehensive in database to picture album and picture scanning
Product information, most suitable product is selected according to bandwagon effect, is accurately submitted order to and is paid;User buys product
Afterwards, incidental hiding information in scanning product, verifies true and false;Product can be scanned at any time in the middle of using process,
Solution product is used, and is maintained, and is safeguarded, accessory, the information such as after-sale service, user when recommending other people to buy with money like product when,
Dependent merchandise can also be quick and precisely found by scanning the hiding information on product in pattern to obtain newest Products Information
And purchase location.Present internet hunt mode from word turn to the picture epoch when, this patent also provides good solution party
Case, after computer obtains the hiding information in picture, can accurately navigate to the source of identical picture very much, change present searching
Figure mode, solves the problems, such as that to search figure mode inaccurate now.
Active application, refers to more intelligent, safer application.For example:Pay, encryption, military affairs etc..Its application characteristic exists
It is different from common anti-counterfeiting mark symbol in identifier, it is specific identifier, will be read in scanning after special identifier stealth
Particular device is needed to use in the middle of information process, correlation function is directly performed according to the requirement of unique identifier information command beyond the clouds
And by data feedback to user.
The stealthy process in digital picture of Quick Response Code in the present invention is modulated by by Quick Response Code dimension frequency domain,
So that it fully incorporates in the middle of figure and image and naked eyes cannot be visible.The process of modulation is the figure that will need to be embedded in Quick Response Code
As carrying out wavelet transform, low frequency part is extracted, and piecemeal is carried out to low frequency part image, then carry out discrete cosine change
Change, extract DC coefficient structural matrix, DC coefficient matrix is decomposed, obtain singular matrix, then will need modulation
2 D code information is converted into dimension pulse signal, and dimension pulse signal is modulated to singular matrix, so as to obtain new square
Battle array is simultaneously updated in former coefficient matrix, and by inverse discrete cosine transform, discrete wavelet inverse transformation has obtained the figure of 2 D code information
Picture.
During the basic thought of the Quick Response Code modulation algorithm based on dimension frequency domain is selected at DC coefficient, low frequency component two
Dimension code information, this is, because the vision system of centering, low frequency component people is very sensitive, to be carried out when to carrier image containing Quick Response Code
During malicious sabotage, inevitably image is caused to make the effect of its quality degradation;Secondly, in common digital picture
This partial data will not be changed in processing procedure;Additionally, it is MPEG and JPEG isobaric that quantization is carried out on dct transform domain
The core of compression method.Therefore, Quick Response Code telescopiny and quantizing process are dexterously merged, Quick Response Code can be made to have one
The fixed performance for resisting lossy compression method.In addition, the statistical distribution of DCT domain coefficient is represented with preferable Mathematical Modeling, therefore two
The information content for tieing up code can be estimated according to the result of theory analysis.Due to the 2 D code information being embedded into during dct transform
Its signal can be distributed in the whole space of carrier image after inverse dct transform, therefore Quick Response Code can resist cutting, LPF etc.
Attack, but also with preferable disguise.
A kind of digital invisible two-dimensional codes modulator approach, comprises the following steps:
1):Original image is carried out into block DCT transform by modulating software, all pieces (4,4) quadrant coefficient is taken out, pressed
K1Mode scramble, by the one-dimensional vector X and orthogonal sequence S for producing N number of length to be N1, S2..., SNCalculate Ci=XSi, produce
Life N number of length presses K when being the orthogonal sequence of N2Mode scramble, K1、K2Scramble is determined by key;
2):The 2 D code information length for setting insertion is L, and bit series are W, and this sequence is converted into decimal value,
It is designated as Q, i.e. Q=(W)10, M orthogonal sequence q is found, it is designated as q1, q2... qM, then with formula Cmax=maxCiWith reference to obtaining two dimension
Code vector Y,Wherein, A is systematic parameter;
3):By the reverse scrambles of vectorial Y, each piece (4,4) quadrant coefficient is changed with the component of vectorial Y, then it is soft by modulating
Part carries out piecemeal inverse dct transform, obtains the image containing invisible two-dimensional codes.
Carrier gray level image is done 8 × 8 block DCT transform, the different coefficients after conversion in each piece represent carrier not
Same frequency component, it is assumed here that the line number and columns of carrier image are all 8 multiples.Disguised and robustness is taken into account, we will
2 D code information is embedded in the intermediate frequency coefficient that position is (4,4), and the coefficient of other positions does not make any changes.By each fritter
In (4,4) frequency location DCT coefficient propose constitute a data block, then by this data block, scramble is in some way
One one-dimensional vector, disorder method is determined by key.The length of so this one-dimensional vector is the 1/64 of original image number of picture elements,
N is set to, and remembers that this one-dimensional vector is X={ X1, X2 ..., XN }.
The orthogonal sequence that N number of length is N can be constructed, such as { 1,0 ..., 0 }, { 0,1 ..., 0 }, { 0,0 ..., 1 } are
Security is improved, this programme uses pseudorandom orthogonal sequence set.Quick Response Code can be according to key pseudorandom real estate when being embedded in
The N number of length of life is the orthogonal sequence of N, then by their orthogonalizations, the sequence after note orthogonalization be S1, S2 ..., SN.I
M sequence therein will be selected to be superimposed to some strength on one-dimensional vector X in this N number of orthogonal sequence, the method for selection
Determined by embedded 2 D code information.Obviously, the species of system of selection has:
Each system of selection can correspond to a kind of 2 D code information, then the binary system two that this method can be loaded
Tieing up code message length is:
If it is the bit sequence W of L to be intended to embedded 2 D code information for length, this sequence is converted into decimal value, remembered
It is Q, we select M orthogonal sequence successively according to Q values with the following method:
If still there is m sequence not select (initial value of m i.e. M), find q and meet:
2.Sq is the sequence selected;
3. following variable is updated
M=m-1
4., if m is 0, M sequence has been selected;Otherwise go to the first step.In above-mentioned steps, due to
So after the 3rd step variable update, the q that a new round finds necessarily is less than the last round of q for finding, that is to say, that M
Orthogonal sequence is selected one by one according to descending.Such as N=8, M=4, Q=36, the q for sequentially finding are 8,4,2,1.
Calculate
Ci=XSi, i=1,2 ..., N
" " represents inner product, note in above formula
If the M orthogonal sequence selected according to 2 D code information is 1Sq, 2Sq ..., MqS, by this M orthogonal sequence with one
Determine intensity to be superimposed on X,
So that the inner product containing two-dimentional code vector Y and this M sequence is Cmax+A, i.e., more than Y and the inner product of other sequences.This
In, A is systematic parameter, and bigger robustness is better, and smaller disguise is better.It is by the reverse scrambles of Y and not altered with other
DCT coefficient does inverse dct transform together, and what is obtained is the image containing Quick Response Code.
Demodulation of the system to invisible two-dimensional codes is to being first with original containing invisible two-dimensional codes image scanning RM
The priori of image is demodulated to the image for implying Quick Response Code, the image information containing Quick Response Code is drawn, using voluntarily only
The Quick Response Code recognizer identification Quick Response Code of vertical exploitation, so as to obtain Quick Response Code relevant information, and does further data interaction
Treatment.Specific demodulating process is to extract the image containing 2 D code information by image capture device, by wavelet transform,
Low frequency part image is extracted, discrete cosine transform is carried out to low-frequency image, extract DC coefficient, structural matrix is obtained, to matrix
SVD decomposition is carried out, singular matrix is obtained, according to the index of modulation, in middle extraction dimension pulse signal, dimension pulse signal is carried out
Identification decoding, obtains 2 D code information.
Carrier image does 8 × 8 block DCT transform first, and according to key by (4,4) frequency location in each fritter
DCT coefficient propose constitute a data block, then by this data block press be embedded in Quick Response Code when same mode scramble
It is an one-dimensional vector Y'.Further according to key obtain N number of orthogonal sequence S1, S2 ..., SN, and calculate
C′i=Y ' Si, i=1,2 ..., N
Find out maximum in C'i M, by their sequence number it is ascending be designated as q1, q2 ..., qM, and calculate
Such as when N=8, M=4 q1, q2 ..., qM be followed successively by 1,2,4,8, just can calculate Q'=36.Finally Q' is converted
For binary sequence is the 2 D code information W. for extracting
Quick Response Code is the M pseudo-random sequence of superposition in initial data in the middle of modulated process, but actually embedded in L
Bit (L>M), particularly when n is large, L is even more much larger than M.2 D code information is embedded in intermediate frequency component by this algorithm, is taken into account
Robustness and disguise.Robustness is mainly relevant with parameter A, embedded quantity then depend on parameter M, and disguise then with the two
Parameter has substantial connection.In practical application, the two systematic parameters can be adjusted according to different situations.
Embodiment of above technology design and feature only to illustrate the invention, technique is familiar with its object is to allow
People understands present disclosure and is carried out, and it is not intended to limit the scope of the present invention, all according to spirit of the invention
The equivalent change or modification that essence is done, should all cover within the scope of the present invention.
Claims (10)
1. a kind of digital invisible two-dimensional codes verify Antiforge system, it is characterised in that including original image, plain code Quick Response Code, high in the clouds
Server and the modulation software being connected with the cloud server, the modulation software modulate to original the plain code Quick Response Code
In image, combined together with the original image, the plain code Quick Response Code forms invisible two-dimensional codes in original image, visually without
Method differentiates the invisible two-dimensional codes, and the invisible two-dimensional codes are preset with product information and are stored by the cloud server
Beyond the clouds on server, user obtains feedback information and and cloud by hand-hold scanning equipment or mobile scanning terminal invisible two-dimensional codes
Product information on the server of end carries out fake certification.
2. a kind of digital invisible two-dimensional codes according to claim 1 verify Antiforge system, it is characterised in that described stealthy two
Dimension code position on the original image is random distribution and/or specific distribution.
3. a kind of digital invisible two-dimensional codes according to claim 1 verify Antiforge system, it is characterised in that described stealthy two
Dimension code adds encryption information or digital signature in modulated process.
4. a kind of digital invisible two-dimensional codes according to claim 1 verify Antiforge system, it is characterised in that with described hidden
The original image of shape Quick Response Code is printed by multiple color digital, image is printed directly on product by color ink jet printed or laser printing
In packaging or on product surface, each product packaging and product surface is set to be respectively provided with unique customizing messages.
5. a kind of digital invisible two-dimensional codes according to claim 1 verify Antiforge system, it is characterised in that the checking is prevented
Antiforge system is divided into passive type application, inter-act application and active application.
6. a kind of digital invisible two-dimensional codes according to claim 5 verify Antiforge system, it is characterised in that the passive type
Using the robustness for setting hide information, possess anti-copy, anti-copying effect, the original image internal modulation there are several different
The invisible two-dimensional codes of product information, scan, multiple authentication by several times.
7. a kind of digital invisible two-dimensional codes according to claim 5 verify Antiforge system, it is characterised in that described two-way mutual
The product information of the invisible two-dimensional codes of dynamic formula application includes link, text, video, electronic pictures, picture album, Show Me animation and 3D nets
Network exhibition room.
8. a kind of digital invisible two-dimensional codes according to claim 5 verify Antiforge system, it is characterised in that described active
The product information of the invisible two-dimensional codes of application includes paying, authorizes encryption, information to obtain, and the invisible two-dimensional codes are using specific
Identifier.
9. a kind of digital invisible two-dimensional codes modulator approach, it is characterised in that comprise the following steps:
1):Original image is carried out into block DCT transform by modulating software, all pieces (4,4) quadrant coefficient is taken out, by one
The dimensional vector X and orthogonal sequence S for producing N number of length to be N1, S2..., SNCalculate Ci=XSi;
2):The 2 D code information length for setting insertion is L, and bit series are W, and this sequence is converted into decimal value, are designated as
Q, i.e. Q=(W)10, M orthogonal sequence q is found, it is designated as q1, q2... qM, then with formula Cmax=maxCiWith reference to obtain Quick Response Code to
Amount Y,Wherein, A is systematic parameter;
3):By the reverse scrambles of vectorial Y, each piece (4,4) quadrant coefficient is changed with the component of vectorial Y, then entered by modulating software
Row piecemeal inverse dct transform, obtains the image containing invisible two-dimensional codes.
10. a kind of digital invisible two-dimensional codes modulator approach according to claim 9, it is characterised in that the step 1) in
K is pressed during (4,4) the quadrant coefficient for taking out all pieces1Scramble, K is pressed when producing the orthogonal sequence that N number of length is N2Scramble, the K1、
K2Scramble is determined by key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611096474.6A CN106779740A (en) | 2016-12-02 | 2016-12-02 | A kind of digital invisible two-dimensional codes checking Antiforge system and invisible two-dimensional codes modulator approach |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611096474.6A CN106779740A (en) | 2016-12-02 | 2016-12-02 | A kind of digital invisible two-dimensional codes checking Antiforge system and invisible two-dimensional codes modulator approach |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106779740A true CN106779740A (en) | 2017-05-31 |
Family
ID=58882834
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611096474.6A Pending CN106779740A (en) | 2016-12-02 | 2016-12-02 | A kind of digital invisible two-dimensional codes checking Antiforge system and invisible two-dimensional codes modulator approach |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106779740A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107563479A (en) * | 2017-08-28 | 2018-01-09 | 宁夏软件工程院有限公司 | The preparation and recognition methods of a kind of invisible two-dimensional codes |
CN108549920A (en) * | 2018-03-13 | 2018-09-18 | 福建新大陆电脑股份有限公司 | A kind of two-dimensional code data hidden method, data extraction method and equipment |
CN109255824A (en) * | 2018-08-21 | 2019-01-22 | 同济大学 | Anti-channel conflict decoding method based on DCT |
CN109376833A (en) * | 2018-12-21 | 2019-02-22 | 北京印刷学院 | Triple anti-fake two-dimension codes of pseudo-random information double exposure digital fluorescence images |
CN109711513A (en) * | 2018-12-21 | 2019-05-03 | 北京印刷学院 | Triple anti-fake two-dimension codes of digital fluorescence images double exposure light and shade dicode |
CN110119967A (en) * | 2018-02-07 | 2019-08-13 | 阿里巴巴集团控股有限公司 | Processing method, system, mobile terminal and the product sharing method of image |
CN110288836A (en) * | 2019-07-09 | 2019-09-27 | 西安工业大学 | A kind of wisdom traffic system based on invisible two-dimensional codes license plate |
CN111679800A (en) * | 2020-06-10 | 2020-09-18 | 天津光电久远科技有限公司 | Official document anti-counterfeiting printing system based on domestic operating system |
CN112308574A (en) * | 2020-10-29 | 2021-02-02 | 深圳市运恒通科技有限公司 | Invisible LOGO anti-counterfeiting identification method |
CN115099836A (en) * | 2022-08-26 | 2022-09-23 | 南通领跑信息技术有限公司 | Whole-network intelligent marketing anti-counterfeiting data monitoring system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101923701A (en) * | 2010-07-19 | 2010-12-22 | 西安建筑科技大学 | Anti-counterfeiting authentication method of anti-counterfeiting image of printed matter based on digital watermarking technology |
US8249350B2 (en) * | 2006-06-30 | 2012-08-21 | University Of Geneva | Brand protection and product autentication using portable devices |
CN104951827A (en) * | 2015-06-08 | 2015-09-30 | 上海理工大学 | Compound two-dimensional code and identifying system thereof |
CN105117760A (en) * | 2015-09-15 | 2015-12-02 | 牛建伟 | Method for generating color image two-dimensional code through fusion of two-dimensional code with color image |
CN105931174A (en) * | 2016-04-12 | 2016-09-07 | 上海理工大学 | High-robustness digital watermarking method making color QR code embedded in color image |
-
2016
- 2016-12-02 CN CN201611096474.6A patent/CN106779740A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8249350B2 (en) * | 2006-06-30 | 2012-08-21 | University Of Geneva | Brand protection and product autentication using portable devices |
CN101923701A (en) * | 2010-07-19 | 2010-12-22 | 西安建筑科技大学 | Anti-counterfeiting authentication method of anti-counterfeiting image of printed matter based on digital watermarking technology |
CN104951827A (en) * | 2015-06-08 | 2015-09-30 | 上海理工大学 | Compound two-dimensional code and identifying system thereof |
CN105117760A (en) * | 2015-09-15 | 2015-12-02 | 牛建伟 | Method for generating color image two-dimensional code through fusion of two-dimensional code with color image |
CN105931174A (en) * | 2016-04-12 | 2016-09-07 | 上海理工大学 | High-robustness digital watermarking method making color QR code embedded in color image |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107563479A (en) * | 2017-08-28 | 2018-01-09 | 宁夏软件工程院有限公司 | The preparation and recognition methods of a kind of invisible two-dimensional codes |
CN110119967A (en) * | 2018-02-07 | 2019-08-13 | 阿里巴巴集团控股有限公司 | Processing method, system, mobile terminal and the product sharing method of image |
CN108549920A (en) * | 2018-03-13 | 2018-09-18 | 福建新大陆电脑股份有限公司 | A kind of two-dimensional code data hidden method, data extraction method and equipment |
CN109255824A (en) * | 2018-08-21 | 2019-01-22 | 同济大学 | Anti-channel conflict decoding method based on DCT |
CN109376833B (en) * | 2018-12-21 | 2023-06-27 | 北京印刷学院 | Triple anti-counterfeiting two-dimensional code for pseudo-random information overprinting digital fluorescent image |
CN109376833A (en) * | 2018-12-21 | 2019-02-22 | 北京印刷学院 | Triple anti-fake two-dimension codes of pseudo-random information double exposure digital fluorescence images |
CN109711513A (en) * | 2018-12-21 | 2019-05-03 | 北京印刷学院 | Triple anti-fake two-dimension codes of digital fluorescence images double exposure light and shade dicode |
CN109711513B (en) * | 2018-12-21 | 2023-06-27 | 北京印刷学院 | Triple anti-counterfeiting two-dimensional code with double-code of digital fluorescent image overprinting bright and dark |
CN110288836A (en) * | 2019-07-09 | 2019-09-27 | 西安工业大学 | A kind of wisdom traffic system based on invisible two-dimensional codes license plate |
CN111679800A (en) * | 2020-06-10 | 2020-09-18 | 天津光电久远科技有限公司 | Official document anti-counterfeiting printing system based on domestic operating system |
CN112308574A (en) * | 2020-10-29 | 2021-02-02 | 深圳市运恒通科技有限公司 | Invisible LOGO anti-counterfeiting identification method |
CN115099836A (en) * | 2022-08-26 | 2022-09-23 | 南通领跑信息技术有限公司 | Whole-network intelligent marketing anti-counterfeiting data monitoring system |
CN115099836B (en) * | 2022-08-26 | 2022-11-11 | 南通领跑信息技术有限公司 | Whole-network intelligent marketing anti-counterfeiting data monitoring system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106779740A (en) | A kind of digital invisible two-dimensional codes checking Antiforge system and invisible two-dimensional codes modulator approach | |
EP2257909B1 (en) | Secure item identification and authentication system and method based on unclonable features | |
Begum et al. | Analysis of digital image watermarking techniques through hybrid methods | |
DE69631806T2 (en) | Used in the transformation domain of steganographic embedded calibration data for the detection of image distortions | |
US9800408B2 (en) | Method of generating secure tokens and transmission based on (TRNG) generated tokens and split into shares and the system thereof | |
CN104766113B (en) | A kind of light and shade code anti-fake label and its method for anti-counterfeit | |
Thulasidharan et al. | QR code based blind digital image watermarking with attack detection code | |
CN112313716B (en) | Method for producing a security element in an image that is invisible to the human eye and that is not reproducible, and printed image | |
CN103208067B (en) | Antiforge system and the formation of label thereof, embed, understand, differentiate and ownership change method | |
CN109146024A (en) | Art work Anti-fake electronic label System and method for based on block chain | |
US20020146146A1 (en) | Using digital watermarks to facilitate counterfeit inspection and inventory management | |
CN104766111B (en) | Combined anti-fake mark and generation method based on the same ID and device | |
CN107705139A (en) | A kind of novel article anti-counterfeiting authentication method | |
CN108764930A (en) | The implementation method of commodity counterfeit prevention verification platform based on block chain structure | |
JP2020521260A (en) | Product counterfeit prevention verification system based on natural biological information | |
JP6549692B2 (en) | Transmission of certification mark | |
CN105389708A (en) | Anti-counterfeiting method based on combination of digital watermark and two-dimensional code and verification method thereof | |
CN102708391A (en) | Anti-counterfeiting label on basis of fractal image and anti-counterfeiting verification method | |
CN109816077A (en) | A kind of hidden method of two-dimensional barcode information, device, electronic equipment and storage medium | |
CN108154207B (en) | Anti-counterfeiting unique code generation and anti-counterfeiting verification method | |
Katariya | Digital watermarking | |
CN103761657A (en) | Random characteristic information anti-counterfeiting method | |
CN108960387A (en) | A kind of anti-counterfeiting two dimensional code and its generation and recognition methods | |
CN103649976A (en) | Anti-counterfeiting marking with asymmetrical concealment | |
CN103971246B (en) | One-way function bidirectional encryption based electronic commodity security system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170531 |