CN106779740A - A kind of digital invisible two-dimensional codes checking Antiforge system and invisible two-dimensional codes modulator approach - Google Patents

A kind of digital invisible two-dimensional codes checking Antiforge system and invisible two-dimensional codes modulator approach Download PDF

Info

Publication number
CN106779740A
CN106779740A CN201611096474.6A CN201611096474A CN106779740A CN 106779740 A CN106779740 A CN 106779740A CN 201611096474 A CN201611096474 A CN 201611096474A CN 106779740 A CN106779740 A CN 106779740A
Authority
CN
China
Prior art keywords
invisible
dimensional codes
information
digital
quick response
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611096474.6A
Other languages
Chinese (zh)
Inventor
覃勇
吴小林
张军
潘宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201611096474.6A priority Critical patent/CN106779740A/en
Publication of CN106779740A publication Critical patent/CN106779740A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • G06K19/06103Constructional details the marking being embedded in a human recognizable image, e.g. a company logo with an embedded two-dimensional code

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention discloses a kind of digital invisible two-dimensional codes checking Antiforge system and invisible two-dimensional codes modulator approach, including original image, plain code Quick Response Code, cloud server and the modulation software being connected with cloud server, modulation software modulates to original image plain code Quick Response Code, combined together with original image, plain code Quick Response Code forms invisible two-dimensional codes in original image, naked eyes cannot differentiate invisible two-dimensional codes, invisible two-dimensional codes are preset with product information and store it on cloud server by cloud server, user obtains feedback information and carries out fake certification with the product information on cloud server by hand-hold scanning equipment or mobile scanning terminal invisible two-dimensional codes.The Quick Response Code of plain code is carried out stealth by the present invention on the basis of existing digital anti-counterfeiting technology, i.e., naked eyes cannot be checked, identification relevant information is scanned by handheld terminal or mobile device.

Description

A kind of digital invisible two-dimensional codes checking Antiforge system and invisible two-dimensional codes modulator approach
Technical field
The present invention relates to verify Antiforge system application field, more particularly to a kind of numeral stealthy two based on mobile Internet The checking Antiforge system of dimension code and the modulator approach of invisible two-dimensional codes.
Background technology
At present, anti-counterfeiting technology refers to the measure taken to reach false proof purpose, and anti-counterfeiting technology within the specific limits can Accurately discern the false from the genuine, and be difficult by anti-system and duplication, that is, prevent copy, the technology of counterfeit grade, for protection brand, market with And terminal user's legitimate rights and interests and the technical measure of a kind of precaution taken.Anti-counterfeiting technology species has a lot, such as:Antiforge Technology, chemical material anti-counterfeiting technology, physical security technology, digital information false proof technology, structure and package anti-counterfeiting technology, human body and Biological characteristic anti-counterfeiting technology etc..
The high speed development of modern science and technology art and being becoming increasingly rampant for personation activity, promote the development of various anti-counterfeiting technologies, prevent The development of pseudo- technology be it is closely coupled with the development of other related disciplines and technology, it is closely related, incorporated at it advanced While technological achievement, the crystallization of numerous subject scientific and technological achievements and integrated application is also become.Traditional anti-counterfeiting technology is such as:Laser False proof, fluorescence falsification preventing, magnetic anti-counterfeit, temperature becomes false proof etc., all once playing certain effect using the initial stage, but because itself is easy It is counterfeit, thus produce little effect, it is primarily due to traditional anti-counterfeiting technology and exists with low content of technology, textural association is easily decrypted, with The progress and popularization of Market and Technology, these methods are easy to the person of being counterfeited and decode and utilize, once adulterator has grasped these Technology and equipment, it is possible to barbaric a large amount of forgeries.Furthermore in face of various anti-counterfeiting marks, consumer can not possibly slap one by one Hold, and consumer can not differentiate the true and false of anti-counterfeiting mark, and the anti-counterfeiting technology for allowing performs practically no function.Using digital anti-counterfeiting technology The shortcoming that traditional anti-counterfeiting technology is counterfeited effectively is overcome, compared with common anti-counterfeiting technology, digital anti-counterfeiting technology is not only provided Anti-fake identification mark, is more to provide the all-around service after marker, including inquiry differentiates, consulting is answerred questions, monitoring management, is followed the trail of Fake products, statistical analysis etc., also have easily identification, the characteristics of prevent large-scale imitation behavior and low implementation cost in addition. And network technology should be made full use of as digital anti-counterfeiting technology, and the communication technology, digital coding techniques and printing technology constantly will New technology is melted into anti-fake network system, while being absorbed in special technology, the security performance of Strengthens network, it is ensured that whole system Reliability.
Digital anti-counterfeiting technology is realized with reference to printing technology using computer, network service, information coding etc., passed through It is that each product or commodity add unique information, just like in everyone identity ID, while this information is stored in High in the clouds core database, when consumer buys the commodity with Quick Response Code, only need to scan Quick Response Code and lead to the information of identification Cross connection high in the clouds core database server and can verify that authenticity of products, overcoming traditional anti-counterfeiting technology can be possible by batch duplicating Property and consumer's limitation not easy to identify.But the Quick Response Code added on commodity, being belonging to plain code, i.e. consumer can To be directly viewable and scan, it is very easy to use simple and direct, to consumer also without any technical threshold.But this mark Knowledge is easily damaged and loses, and there is potential safety hazard;For staple commodities these information can only be pasted on packing material outside or The more hidden position of commodity, this brings inconvenience to consumer in checking;Product after having used or installed for part Product will all do over again when such as verifying the true and false, waste time and energy;For some decorative products, common visible Quick Response Code can also influence Its aesthetics;Common two safeguard that code is visible due to naked eyes, and adulterator makes extremely similar identifier and is added on commodity, and Unofficial authentication server is provided, so as to reach deception consumer's purpose;And this visible Quick Response Code is being manufactured And also need to put into large number quipments and manpower in addition;Such as external processing, a series of problems, such as also involving secret and leak.
The content of the invention
To overcome disadvantages mentioned above, it is an object of the invention to provide a kind of digital invisible two-dimensional codes checking Antiforge system and hidden Shape Quick Response Code modulator approach, to reach on the basis of existing digital anti-counterfeiting technology, stealth, i.e. meat is carried out by the Quick Response Code of plain code Eye cannot check, by handheld terminal or mobile device be scanned identification relevant information purpose.
In order to reach object above, the technical solution adopted by the present invention is:A kind of digital invisible two-dimensional codes verify false proof system System, including original image, plain code Quick Response Code, cloud server and the modulation software that is connected with the cloud server, the tune Software processed modulates to original image the plain code Quick Response Code, is combined together with the original image, the plain code Quick Response Code Invisible two-dimensional codes are formed in original image, the invisible two-dimensional codes cannot be visually differentiated, the invisible two-dimensional codes are by described Cloud server is preset with product information and stores it on cloud server, and user is by hand-hold scanning equipment or mobile whole End scanning invisible two-dimensional codes obtain feedback information and carry out fake certification with the product information on cloud server, eliminate the false and retain the true. The Quick Response Code of plain code is carried out stealth by the system on the basis of existing digital anti-counterfeiting technology, i.e., naked eyes cannot be checked, by hand Hold terminal or mobile device is scanned identification relevant information, the outward appearance of original image is not changed, Quick Response Code is possessed stealth and exist The characteristics of in original image, imitator is judged the type and the information content of identifier at all, also cannot just be replicated Or anti-system, improve security.
Further, invisible two-dimensional codes position on the original image is random distribution and/or specific distribution, can be with Any one place of product is appeared in, unless commodity all destroyed, otherwise only needs a relic to read stealthy two The full detail of code is tieed up, therefore, to following the trail of goods, preventing commodity falsifying to be very helpful.
Further, the invisible two-dimensional codes add encryption information or digital signature in modulated process, can widen significantly Invisible two-dimensional codes false proof and encryption technology application surface and application field, it is ensured that the integrality of information transfer, it is ensured that sender's Authentication, prevents deception.
Further, original image with the invisible two-dimensional codes printed by multiple color digital, it is color ink jet printed or Be printed directly on image in product packaging or on product surface by laser printing, can be generated at random due to invisible two-dimensional codes and More information content can be accommodated, each product packaging and product surface is respectively provided with unique customizing messages.
Further, the checking Antiforge system is divided into passive type application, inter-act application by application mode And active application.
Further, the passive type application sets the robustness of hide information, possesses anti-copy, anti-copying effect, institute Stating original image internal modulation has the invisible two-dimensional codes of several different product information, scans by several times, multiple authentication.
Further, the product information of the invisible two-dimensional codes of the inter-act application include link, text, video, Electronic pictures, picture album, Show Me animation and 3D Web museums.
Further, the product information of the invisible two-dimensional codes of the active application includes paying, authorizes encryption, information to obtain Take, the invisible two-dimensional codes use specific identifier.
A kind of digital invisible two-dimensional codes modulator approach, comprises the following steps:
1):Original image is carried out into block DCT transform by modulating software, all pieces (4,4) quadrant coefficient is taken out, led to One-dimensional vector X is crossed with the orthogonal sequence S for producing N number of length to be N1, S2..., SNCalculate Ci=XSi
2):The 2 D code information length for setting insertion is L, and bit series are W, and this sequence is converted into decimal value, It is designated as Q, i.e. Q=(W)10, M orthogonal sequence q is found, it is designated as q1, q2... qM, then with formula Cmax=maxCiWith reference to obtaining two dimension Code vector Y,Wherein, A is systematic parameter;
3):By the reverse scrambles of vectorial Y, each piece (4,4) quadrant coefficient is changed with the component of vectorial Y, then it is soft by modulating Part carries out piecemeal inverse dct transform, obtains the image containing invisible two-dimensional codes.
Further, the step 1) in press K when taking out all pieces (4,4) quadrant coefficient1Scramble, produces N number of length For N orthogonal sequence when press K2Scramble, the K1、K2Scramble is determined by key.
Brief description of the drawings
Fig. 1 is the system block diagram of the present embodiment;
Fig. 2 is the block diagram of the passive type application of the present embodiment;
Fig. 3 is the block diagram of the inter-act application of the present embodiment;
Fig. 4 is the block diagram of the active application of the present embodiment;
Fig. 5 is the block diagram of the invisible two-dimensional codes modulator approach of the present embodiment;
Fig. 6 is the schematic block diagram of the invisible two-dimensional codes modulator approach of the present embodiment.
Specific embodiment
Presently preferred embodiments of the present invention is described in detail below in conjunction with the accompanying drawings, so that advantages and features of the invention energy It is easier to be readily appreciated by one skilled in the art, apparent is clearly defined so as to be made to protection scope of the present invention.
Referring to shown in accompanying drawing 1-6, a kind of digital invisible two-dimensional codes of the present embodiment verify Antiforge system, including original graph Picture, plain code Quick Response Code, cloud server and the modulation software being connected with the cloud server, the modulation software will be stated clearly Code Quick Response Code is modulated to original image, is combined together with the original image, plain code Quick Response Code shape in original image Into invisible two-dimensional codes, the invisible two-dimensional codes cannot be visually differentiated, the invisible two-dimensional codes are default by the cloud server There is product information and store it on cloud server, user is by hand-hold scanning equipment or the stealthy two dimension of mobile scanning terminal Code obtains feedback information and carries out fake certification with the product information on cloud server, eliminates the false and retains the true.
Quick Response Code used in the present invention in the real life in be seen everywhere, for preserving and recognizing that commodity are believed Breath is very convenient and quick.With network communication and the popularization of intelligent terminal, ordinary consumer is easy to participate, to common Need not be to the basic understanding of anti-counterfeiting technology for consumer.Without by seeing, touch, shine, the traditional approach such as wiping is identified, More eliminate and make a phone call, the checking means such as photos and sending messages, it is commodity institute that need to only be scanned by intelligent hand-held terminal and can obtain producer The various information for adding.The present invention, can also be by specific information, self-defined information in addition to can be using common Quick Response Code In addition image therefore higher for safe class, demand application scenarios higher using to special scanning recognition, it is necessary to set Standby and device, to obtain the more information content hidden in product appearance image.
The technology is combined with digital printing technology, can in real time be added Quick Response Code while production commodity, The producer need to only set Quick Response Code needs the content of addition, while production addition Quick Response Code, the information meeting of the commodity Synchronized upload decides whether to enable the part item identifier that (i.e. whether is the commodity to high in the clouds core database after quality restriction Can dispatch from the factory), consumer can verify at any time after selecting the part commodity, solve the possibility that product is replicated and forges.Stealth is anti- Pseudo- technology greatly reduces artificial input during production application, strict protection information and secret in the middle of production process, Prevent from leaking, while also shorten the distance between consumer and producer, more identifier contents can also allow consumer with Producer is interactive.
The present invention can be applied in various business models, be not only limited as false proof.For example:Internet of Things, checking, chase after Trace back, the payment of identity information, copyright protection, currency, product introduction, military affairs etc. there are the application scenarios of interactive information demand and high-grade The application of encryption requirements.The invisibility of the invisible two-dimensional codes in the system, after modulating in image, meat is passed through with original image Eye respectively, therefore when different industries and field are applied, cannot mainly solve current plain code formula Quick Response Code and be easily replicated, and break It is bad, and the drawback such as security;Quick Response Code self-information capacity preferably solves greatly product and is imitated, and falsifying etc. is a series of Problem, has further widened the range of application of the system.
Stealthy reason is consistent with surrounding enviroment from the color colour of skin by changing just like in chameleon, and the present invention is as a same reason Quick Response Code melts Quick Response Code and relevant information and original image and be an entirety, i.e., do not change by soft-modulation in pattern Become the outward appearance of original image, naked eyes cannot also be checked, so that the characteristics of Quick Response Code possesses stealth;And invisible two-dimensional codes are in figure As in position be random and specific distribution, can appear in product any one place, therefore unless by commodity all destroy, Otherwise only needing a relic can also read full detail, therefore to following the trail of goods, prevent commodity falsifying to be very helpful; The application higher for safety requirements, when in the middle of by Quick Response Code modulation to original image process, to Quick Response Code addition encryption letter Breath and/or digital signature, can significantly widen the application surface and application field of concealed anti-false and encryption technology, it is ensured that information transfer Integrality, it is ensured that the authentication of sender, prevents deception;The image of invisible two-dimensional codes will be with the addition of by current many chromatic numbers Be printed directly on for image by various existing high-tech digital printing technological means such as code printing, color ink jet printed or laser printing Packaging external appearance, product surface etc. so that each product surface and packaging external appearance are respectively provided with unique customizing messages, due to two dimension Code can at random be generated and can accommodate more information content, therefore can cause that each product surface and packaging external appearance are equal With different information.When product reaches consumer on hand using hand-hold scanning equipment or intelligent hand-held terminal equipment to product table Face image is scanned, so as to obtain additional information extra in image, and carries out comparison by network and server, goes Puppet is deposited very, and because Quick Response Code stealth is in image, imitator cannot judge the type and the information content of identifier at all, also with regard to nothing Method is replicated or anti-system.
The system can be divided into following three class, passive type application, inter-act application and master by application mode classification Dynamic formula application.
Such as passive type application, refers to simple data message inquiring and authenticating, common ticket, and admission ticket etc. simply should With this kind of Quick Response Code comprising personal information is shown with the general plain without encryption, it is easy to allow adulterator to replicate simultaneously Relevant information is decoded, many troubles are brought to consumer.Such as relevant information is encrypted stealthy and many using private database classification Secondary checking, can prevent the possibility copied.Anti-counterfeiting mark in the present invention is accorded with addition to possessing hidden function, and stealth also can be set The robustness of information makes it possess anti-copy, anti-copying and other effects, even if the image complete copy that imitator will encrypt, is added Plus information make occur the loss of information and damage during being replicated due to the difference of robustness, so as to cannot be tested Card.Even if imitator obtains partial information, counterfeit goods is manufactured using same technological means, the present invention can be in an image The Quick Response Code of the middle multiple difference information of modulation, is capable of achieving scanning and multiple authentication by several times, and authorize using different Qualify Phases The authority of different information is obtained, so as to realize being classified Multiple-Scan, the effect of multiple authentication is rigid in checking up to inquiring and authenticating, many The information true and false is progressively filtered in secondary scanning.
Inter-act application, refers to profound application, in addition to having simple passive type scanning validation, can be with root According to the different demands of manufacturer, link, text, video, the content such as Show Me animation is preset to database.Such as common advertisement a surname Pass, product promotion, product introduction, product is traced to the source.The application that case describes two-way mutual assistance is now described as with product introduction.Enterprise In order to constantly exploit market, more new products are persistently released, the synchronous publicity for making new product causes a large amount of old propaganda materials Overstock, the finishing again of spacial flex is costly, causes the popularization time long, high cost, slowly effect;User is in purchase product When, it is impossible to directly docked with manufacturer, Asymmetry information etc., thousand commodity for choosing ten thousand choosings of taking time, found after point of purchase improper or again There is more preferable new product to release, target is indefinite to be caused time and efforts and pecuniary waste significantly.For enterprise, enterprise Industry need to only make electronic pictures and picture album containing hiding information, the sales company to each department be delivered, while in database Upload the displaying video or design sketch made, or even 3D Web museums in type selecting of freely arranging in pairs or groups etc., it is most comprehensive with offer Most timely product information, user only need to can be directly acquainted with newest most comprehensive in database to picture album and picture scanning Product information, most suitable product is selected according to bandwagon effect, is accurately submitted order to and is paid;User buys product Afterwards, incidental hiding information in scanning product, verifies true and false;Product can be scanned at any time in the middle of using process, Solution product is used, and is maintained, and is safeguarded, accessory, the information such as after-sale service, user when recommending other people to buy with money like product when, Dependent merchandise can also be quick and precisely found by scanning the hiding information on product in pattern to obtain newest Products Information And purchase location.Present internet hunt mode from word turn to the picture epoch when, this patent also provides good solution party Case, after computer obtains the hiding information in picture, can accurately navigate to the source of identical picture very much, change present searching Figure mode, solves the problems, such as that to search figure mode inaccurate now.
Active application, refers to more intelligent, safer application.For example:Pay, encryption, military affairs etc..Its application characteristic exists It is different from common anti-counterfeiting mark symbol in identifier, it is specific identifier, will be read in scanning after special identifier stealth Particular device is needed to use in the middle of information process, correlation function is directly performed according to the requirement of unique identifier information command beyond the clouds And by data feedback to user.
The stealthy process in digital picture of Quick Response Code in the present invention is modulated by by Quick Response Code dimension frequency domain, So that it fully incorporates in the middle of figure and image and naked eyes cannot be visible.The process of modulation is the figure that will need to be embedded in Quick Response Code As carrying out wavelet transform, low frequency part is extracted, and piecemeal is carried out to low frequency part image, then carry out discrete cosine change Change, extract DC coefficient structural matrix, DC coefficient matrix is decomposed, obtain singular matrix, then will need modulation 2 D code information is converted into dimension pulse signal, and dimension pulse signal is modulated to singular matrix, so as to obtain new square Battle array is simultaneously updated in former coefficient matrix, and by inverse discrete cosine transform, discrete wavelet inverse transformation has obtained the figure of 2 D code information Picture.
During the basic thought of the Quick Response Code modulation algorithm based on dimension frequency domain is selected at DC coefficient, low frequency component two Dimension code information, this is, because the vision system of centering, low frequency component people is very sensitive, to be carried out when to carrier image containing Quick Response Code During malicious sabotage, inevitably image is caused to make the effect of its quality degradation;Secondly, in common digital picture This partial data will not be changed in processing procedure;Additionally, it is MPEG and JPEG isobaric that quantization is carried out on dct transform domain The core of compression method.Therefore, Quick Response Code telescopiny and quantizing process are dexterously merged, Quick Response Code can be made to have one The fixed performance for resisting lossy compression method.In addition, the statistical distribution of DCT domain coefficient is represented with preferable Mathematical Modeling, therefore two The information content for tieing up code can be estimated according to the result of theory analysis.Due to the 2 D code information being embedded into during dct transform Its signal can be distributed in the whole space of carrier image after inverse dct transform, therefore Quick Response Code can resist cutting, LPF etc. Attack, but also with preferable disguise.
A kind of digital invisible two-dimensional codes modulator approach, comprises the following steps:
1):Original image is carried out into block DCT transform by modulating software, all pieces (4,4) quadrant coefficient is taken out, pressed K1Mode scramble, by the one-dimensional vector X and orthogonal sequence S for producing N number of length to be N1, S2..., SNCalculate Ci=XSi, produce Life N number of length presses K when being the orthogonal sequence of N2Mode scramble, K1、K2Scramble is determined by key;
2):The 2 D code information length for setting insertion is L, and bit series are W, and this sequence is converted into decimal value, It is designated as Q, i.e. Q=(W)10, M orthogonal sequence q is found, it is designated as q1, q2... qM, then with formula Cmax=maxCiWith reference to obtaining two dimension Code vector Y,Wherein, A is systematic parameter;
3):By the reverse scrambles of vectorial Y, each piece (4,4) quadrant coefficient is changed with the component of vectorial Y, then it is soft by modulating Part carries out piecemeal inverse dct transform, obtains the image containing invisible two-dimensional codes.
Carrier gray level image is done 8 × 8 block DCT transform, the different coefficients after conversion in each piece represent carrier not Same frequency component, it is assumed here that the line number and columns of carrier image are all 8 multiples.Disguised and robustness is taken into account, we will 2 D code information is embedded in the intermediate frequency coefficient that position is (4,4), and the coefficient of other positions does not make any changes.By each fritter In (4,4) frequency location DCT coefficient propose constitute a data block, then by this data block, scramble is in some way One one-dimensional vector, disorder method is determined by key.The length of so this one-dimensional vector is the 1/64 of original image number of picture elements, N is set to, and remembers that this one-dimensional vector is X={ X1, X2 ..., XN }.
The orthogonal sequence that N number of length is N can be constructed, such as { 1,0 ..., 0 }, { 0,1 ..., 0 }, { 0,0 ..., 1 } are Security is improved, this programme uses pseudorandom orthogonal sequence set.Quick Response Code can be according to key pseudorandom real estate when being embedded in The N number of length of life is the orthogonal sequence of N, then by their orthogonalizations, the sequence after note orthogonalization be S1, S2 ..., SN.I M sequence therein will be selected to be superimposed to some strength on one-dimensional vector X in this N number of orthogonal sequence, the method for selection Determined by embedded 2 D code information.Obviously, the species of system of selection has:
Each system of selection can correspond to a kind of 2 D code information, then the binary system two that this method can be loaded Tieing up code message length is:
If it is the bit sequence W of L to be intended to embedded 2 D code information for length, this sequence is converted into decimal value, remembered It is Q, we select M orthogonal sequence successively according to Q values with the following method:
If still there is m sequence not select (initial value of m i.e. M), find q and meet:
2.Sq is the sequence selected;
3. following variable is updated
M=m-1
4., if m is 0, M sequence has been selected;Otherwise go to the first step.In above-mentioned steps, due to
So after the 3rd step variable update, the q that a new round finds necessarily is less than the last round of q for finding, that is to say, that M Orthogonal sequence is selected one by one according to descending.Such as N=8, M=4, Q=36, the q for sequentially finding are 8,4,2,1.
Calculate
Ci=XSi, i=1,2 ..., N
" " represents inner product, note in above formula
If the M orthogonal sequence selected according to 2 D code information is 1Sq, 2Sq ..., MqS, by this M orthogonal sequence with one Determine intensity to be superimposed on X,
So that the inner product containing two-dimentional code vector Y and this M sequence is Cmax+A, i.e., more than Y and the inner product of other sequences.This In, A is systematic parameter, and bigger robustness is better, and smaller disguise is better.It is by the reverse scrambles of Y and not altered with other DCT coefficient does inverse dct transform together, and what is obtained is the image containing Quick Response Code.
Demodulation of the system to invisible two-dimensional codes is to being first with original containing invisible two-dimensional codes image scanning RM The priori of image is demodulated to the image for implying Quick Response Code, the image information containing Quick Response Code is drawn, using voluntarily only The Quick Response Code recognizer identification Quick Response Code of vertical exploitation, so as to obtain Quick Response Code relevant information, and does further data interaction Treatment.Specific demodulating process is to extract the image containing 2 D code information by image capture device, by wavelet transform, Low frequency part image is extracted, discrete cosine transform is carried out to low-frequency image, extract DC coefficient, structural matrix is obtained, to matrix SVD decomposition is carried out, singular matrix is obtained, according to the index of modulation, in middle extraction dimension pulse signal, dimension pulse signal is carried out Identification decoding, obtains 2 D code information.
Carrier image does 8 × 8 block DCT transform first, and according to key by (4,4) frequency location in each fritter DCT coefficient propose constitute a data block, then by this data block press be embedded in Quick Response Code when same mode scramble It is an one-dimensional vector Y'.Further according to key obtain N number of orthogonal sequence S1, S2 ..., SN, and calculate
C′i=Y ' Si, i=1,2 ..., N
Find out maximum in C'i M, by their sequence number it is ascending be designated as q1, q2 ..., qM, and calculate
Such as when N=8, M=4 q1, q2 ..., qM be followed successively by 1,2,4,8, just can calculate Q'=36.Finally Q' is converted For binary sequence is the 2 D code information W. for extracting
Quick Response Code is the M pseudo-random sequence of superposition in initial data in the middle of modulated process, but actually embedded in L Bit (L>M), particularly when n is large, L is even more much larger than M.2 D code information is embedded in intermediate frequency component by this algorithm, is taken into account Robustness and disguise.Robustness is mainly relevant with parameter A, embedded quantity then depend on parameter M, and disguise then with the two Parameter has substantial connection.In practical application, the two systematic parameters can be adjusted according to different situations.
Embodiment of above technology design and feature only to illustrate the invention, technique is familiar with its object is to allow People understands present disclosure and is carried out, and it is not intended to limit the scope of the present invention, all according to spirit of the invention The equivalent change or modification that essence is done, should all cover within the scope of the present invention.

Claims (10)

1. a kind of digital invisible two-dimensional codes verify Antiforge system, it is characterised in that including original image, plain code Quick Response Code, high in the clouds Server and the modulation software being connected with the cloud server, the modulation software modulate to original the plain code Quick Response Code In image, combined together with the original image, the plain code Quick Response Code forms invisible two-dimensional codes in original image, visually without Method differentiates the invisible two-dimensional codes, and the invisible two-dimensional codes are preset with product information and are stored by the cloud server Beyond the clouds on server, user obtains feedback information and and cloud by hand-hold scanning equipment or mobile scanning terminal invisible two-dimensional codes Product information on the server of end carries out fake certification.
2. a kind of digital invisible two-dimensional codes according to claim 1 verify Antiforge system, it is characterised in that described stealthy two Dimension code position on the original image is random distribution and/or specific distribution.
3. a kind of digital invisible two-dimensional codes according to claim 1 verify Antiforge system, it is characterised in that described stealthy two Dimension code adds encryption information or digital signature in modulated process.
4. a kind of digital invisible two-dimensional codes according to claim 1 verify Antiforge system, it is characterised in that with described hidden The original image of shape Quick Response Code is printed by multiple color digital, image is printed directly on product by color ink jet printed or laser printing In packaging or on product surface, each product packaging and product surface is set to be respectively provided with unique customizing messages.
5. a kind of digital invisible two-dimensional codes according to claim 1 verify Antiforge system, it is characterised in that the checking is prevented Antiforge system is divided into passive type application, inter-act application and active application.
6. a kind of digital invisible two-dimensional codes according to claim 5 verify Antiforge system, it is characterised in that the passive type Using the robustness for setting hide information, possess anti-copy, anti-copying effect, the original image internal modulation there are several different The invisible two-dimensional codes of product information, scan, multiple authentication by several times.
7. a kind of digital invisible two-dimensional codes according to claim 5 verify Antiforge system, it is characterised in that described two-way mutual The product information of the invisible two-dimensional codes of dynamic formula application includes link, text, video, electronic pictures, picture album, Show Me animation and 3D nets Network exhibition room.
8. a kind of digital invisible two-dimensional codes according to claim 5 verify Antiforge system, it is characterised in that described active The product information of the invisible two-dimensional codes of application includes paying, authorizes encryption, information to obtain, and the invisible two-dimensional codes are using specific Identifier.
9. a kind of digital invisible two-dimensional codes modulator approach, it is characterised in that comprise the following steps:
1):Original image is carried out into block DCT transform by modulating software, all pieces (4,4) quadrant coefficient is taken out, by one The dimensional vector X and orthogonal sequence S for producing N number of length to be N1, S2..., SNCalculate Ci=XSi
2):The 2 D code information length for setting insertion is L, and bit series are W, and this sequence is converted into decimal value, are designated as Q, i.e. Q=(W)10, M orthogonal sequence q is found, it is designated as q1, q2... qM, then with formula Cmax=maxCiWith reference to obtain Quick Response Code to Amount Y,Wherein, A is systematic parameter;
3):By the reverse scrambles of vectorial Y, each piece (4,4) quadrant coefficient is changed with the component of vectorial Y, then entered by modulating software Row piecemeal inverse dct transform, obtains the image containing invisible two-dimensional codes.
10. a kind of digital invisible two-dimensional codes modulator approach according to claim 9, it is characterised in that the step 1) in K is pressed during (4,4) the quadrant coefficient for taking out all pieces1Scramble, K is pressed when producing the orthogonal sequence that N number of length is N2Scramble, the K1、 K2Scramble is determined by key.
CN201611096474.6A 2016-12-02 2016-12-02 A kind of digital invisible two-dimensional codes checking Antiforge system and invisible two-dimensional codes modulator approach Pending CN106779740A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611096474.6A CN106779740A (en) 2016-12-02 2016-12-02 A kind of digital invisible two-dimensional codes checking Antiforge system and invisible two-dimensional codes modulator approach

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611096474.6A CN106779740A (en) 2016-12-02 2016-12-02 A kind of digital invisible two-dimensional codes checking Antiforge system and invisible two-dimensional codes modulator approach

Publications (1)

Publication Number Publication Date
CN106779740A true CN106779740A (en) 2017-05-31

Family

ID=58882834

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611096474.6A Pending CN106779740A (en) 2016-12-02 2016-12-02 A kind of digital invisible two-dimensional codes checking Antiforge system and invisible two-dimensional codes modulator approach

Country Status (1)

Country Link
CN (1) CN106779740A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107563479A (en) * 2017-08-28 2018-01-09 宁夏软件工程院有限公司 The preparation and recognition methods of a kind of invisible two-dimensional codes
CN108549920A (en) * 2018-03-13 2018-09-18 福建新大陆电脑股份有限公司 A kind of two-dimensional code data hidden method, data extraction method and equipment
CN109255824A (en) * 2018-08-21 2019-01-22 同济大学 Anti-channel conflict decoding method based on DCT
CN109376833A (en) * 2018-12-21 2019-02-22 北京印刷学院 Triple anti-fake two-dimension codes of pseudo-random information double exposure digital fluorescence images
CN109711513A (en) * 2018-12-21 2019-05-03 北京印刷学院 Triple anti-fake two-dimension codes of digital fluorescence images double exposure light and shade dicode
CN110119967A (en) * 2018-02-07 2019-08-13 阿里巴巴集团控股有限公司 Processing method, system, mobile terminal and the product sharing method of image
CN110288836A (en) * 2019-07-09 2019-09-27 西安工业大学 A kind of wisdom traffic system based on invisible two-dimensional codes license plate
CN111679800A (en) * 2020-06-10 2020-09-18 天津光电久远科技有限公司 Official document anti-counterfeiting printing system based on domestic operating system
CN112308574A (en) * 2020-10-29 2021-02-02 深圳市运恒通科技有限公司 Invisible LOGO anti-counterfeiting identification method
CN115099836A (en) * 2022-08-26 2022-09-23 南通领跑信息技术有限公司 Whole-network intelligent marketing anti-counterfeiting data monitoring system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101923701A (en) * 2010-07-19 2010-12-22 西安建筑科技大学 Anti-counterfeiting authentication method of anti-counterfeiting image of printed matter based on digital watermarking technology
US8249350B2 (en) * 2006-06-30 2012-08-21 University Of Geneva Brand protection and product autentication using portable devices
CN104951827A (en) * 2015-06-08 2015-09-30 上海理工大学 Compound two-dimensional code and identifying system thereof
CN105117760A (en) * 2015-09-15 2015-12-02 牛建伟 Method for generating color image two-dimensional code through fusion of two-dimensional code with color image
CN105931174A (en) * 2016-04-12 2016-09-07 上海理工大学 High-robustness digital watermarking method making color QR code embedded in color image

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8249350B2 (en) * 2006-06-30 2012-08-21 University Of Geneva Brand protection and product autentication using portable devices
CN101923701A (en) * 2010-07-19 2010-12-22 西安建筑科技大学 Anti-counterfeiting authentication method of anti-counterfeiting image of printed matter based on digital watermarking technology
CN104951827A (en) * 2015-06-08 2015-09-30 上海理工大学 Compound two-dimensional code and identifying system thereof
CN105117760A (en) * 2015-09-15 2015-12-02 牛建伟 Method for generating color image two-dimensional code through fusion of two-dimensional code with color image
CN105931174A (en) * 2016-04-12 2016-09-07 上海理工大学 High-robustness digital watermarking method making color QR code embedded in color image

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107563479A (en) * 2017-08-28 2018-01-09 宁夏软件工程院有限公司 The preparation and recognition methods of a kind of invisible two-dimensional codes
CN110119967A (en) * 2018-02-07 2019-08-13 阿里巴巴集团控股有限公司 Processing method, system, mobile terminal and the product sharing method of image
CN108549920A (en) * 2018-03-13 2018-09-18 福建新大陆电脑股份有限公司 A kind of two-dimensional code data hidden method, data extraction method and equipment
CN109255824A (en) * 2018-08-21 2019-01-22 同济大学 Anti-channel conflict decoding method based on DCT
CN109376833B (en) * 2018-12-21 2023-06-27 北京印刷学院 Triple anti-counterfeiting two-dimensional code for pseudo-random information overprinting digital fluorescent image
CN109376833A (en) * 2018-12-21 2019-02-22 北京印刷学院 Triple anti-fake two-dimension codes of pseudo-random information double exposure digital fluorescence images
CN109711513A (en) * 2018-12-21 2019-05-03 北京印刷学院 Triple anti-fake two-dimension codes of digital fluorescence images double exposure light and shade dicode
CN109711513B (en) * 2018-12-21 2023-06-27 北京印刷学院 Triple anti-counterfeiting two-dimensional code with double-code of digital fluorescent image overprinting bright and dark
CN110288836A (en) * 2019-07-09 2019-09-27 西安工业大学 A kind of wisdom traffic system based on invisible two-dimensional codes license plate
CN111679800A (en) * 2020-06-10 2020-09-18 天津光电久远科技有限公司 Official document anti-counterfeiting printing system based on domestic operating system
CN112308574A (en) * 2020-10-29 2021-02-02 深圳市运恒通科技有限公司 Invisible LOGO anti-counterfeiting identification method
CN115099836A (en) * 2022-08-26 2022-09-23 南通领跑信息技术有限公司 Whole-network intelligent marketing anti-counterfeiting data monitoring system
CN115099836B (en) * 2022-08-26 2022-11-11 南通领跑信息技术有限公司 Whole-network intelligent marketing anti-counterfeiting data monitoring system

Similar Documents

Publication Publication Date Title
CN106779740A (en) A kind of digital invisible two-dimensional codes checking Antiforge system and invisible two-dimensional codes modulator approach
US8705873B2 (en) Secure item identification and authentication system and method based on unclonable features
DE69631806T2 (en) Used in the transformation domain of steganographic embedded calibration data for the detection of image distortions
US9800408B2 (en) Method of generating secure tokens and transmission based on (TRNG) generated tokens and split into shares and the system thereof
Thulasidharan et al. QR code based blind digital image watermarking with attack detection code
CN103208067B (en) Antiforge system and the formation of label thereof, embed, understand, differentiate and ownership change method
CN104766113B (en) A kind of light and shade code anti-fake label and its method for anti-counterfeit
US20020146146A1 (en) Using digital watermarks to facilitate counterfeit inspection and inventory management
CN109146024A (en) Art work Anti-fake electronic label System and method for based on block chain
CN104766111B (en) Combined anti-fake mark and generation method based on the same ID and device
CN107705139A (en) A kind of novel article anti-counterfeiting authentication method
JP6549692B2 (en) Transmission of certification mark
CN108764930A (en) The implementation method of commodity counterfeit prevention verification platform based on block chain structure
CN105389708A (en) Anti-counterfeiting method based on combination of digital watermark and two-dimensional code and verification method thereof
JP2020521260A (en) Product counterfeit prevention verification system based on natural biological information
Nie et al. The use of least significant bit (LSB) and knight tour algorithm for image steganography of cover image
CN102708391A (en) Anti-counterfeiting label on basis of fractal image and anti-counterfeiting verification method
Katariya Digital watermarking
CN103761657A (en) Random characteristic information anti-counterfeiting method
CN108960387A (en) A kind of anti-counterfeiting two dimensional code and its generation and recognition methods
Saraswat et al. A review of digital image steganography
CN108154207B (en) Anti-counterfeiting unique code generation and anti-counterfeiting verification method
Bachrach et al. Image steganography and steganalysis
CN109816077A (en) A kind of hidden method of two-dimensional barcode information, device, electronic equipment and storage medium
CN103971246B (en) One-way function bidirectional encryption based electronic commodity security system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170531