CN110009081A - Multi-code divides the complementary stealthy identification anti-counterfeit method of credentials of fragment - Google Patents
Multi-code divides the complementary stealthy identification anti-counterfeit method of credentials of fragment Download PDFInfo
- Publication number
- CN110009081A CN110009081A CN201910192273.3A CN201910192273A CN110009081A CN 110009081 A CN110009081 A CN 110009081A CN 201910192273 A CN201910192273 A CN 201910192273A CN 110009081 A CN110009081 A CN 110009081A
- Authority
- CN
- China
- Prior art keywords
- image
- code
- size
- pseudo
- width
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
- G06K19/0614—Constructional details the marking being selective to wavelength, e.g. color barcode or barcodes only visible under UV or IR
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
Abstract
A kind of white tone stealth invalid code complementation identification dimension code anti-counterfeit method, the antiforging printing method, a width image in 2 D code is made of anti-counterfeiting information first, and the image in 2 D code is divided into two parts, a part is known as short in size image, another part is known as complement code image, then using metamerism with color ink by short in size printing image on the white space of printed matter by complement code printing image on a piece of thin plate key piece, generate a kind of stealthy complementary image in 2 D code, stealth complementation image in 2 D code shows blank image under visible light, complement code image and short in size image are merged only under infrared light when constituting the complete image in 2 D code of a width, correct two-dimensional barcode information can be just obtained by scanning, label can be identified in this way, bill, the printed matters such as marketable securities are with the presence or absence of personation infringement problem.
Description
Technical field:
The present invention relates to a kind of anti-counterfeit method of credentials, especially a kind of complementary stealthy identification certificate false proof side of multi-code segmentation fragment
Method, the anti-counterfeit method of credentials can be used for the anti-fake of various certificates.
Background technique:
Certificate serves to demonstrate how the certificate and file of identity, experience etc., such as resident identification card, passport, employee's card, student's identity card, finishes
Industry card etc., the fraud of various forms of certificates has given society and the people to bring serious threat, and certificate false proof technology is main
There are digital encryption, digital watermarking, laser anti-false sign, cipher counterfeit-proof labeling, texture anti-fake, biological identification technology etc., with
The development of science and technology, certificate forge means also in the continuous improvement, and simple certificate false proof technology is no longer satisfied certificate
Anti-fake needs, it is necessary to constantly promote certificate false proof technology, society and the legitimate interests of the people could be protected, maintain the steady of society
Fixed and safety.
Summary of the invention:
In order to improve the reliability and safety of certificate false proof, the present invention is for deficiency existing for existing certificate false proof to existing card
Part anti-counterfeiting technology is improved, and a kind of complementary stealthy identification anti-counterfeit method of credentials of multi-code segmentation fragment, the anti-fake side are proposed
Method generates size, the identical three width two dimensional code figure of size and shape by personal information, licence issuing authority information and manufacturer's information
The all complementations of every width image in 2 D code are divided into two pieces or more graphical image planes by picture, and a portion image is known as short in size
Image, another part image are known as complement code image, the composition original image in 2 D code that short in size image and complement code image can be complementary, three width
The short in size image of image in 2 D code can be complementary one width of composition pseudo- two dimension identical with the size of image in 2 D code, size and shape
Code image, using metamerism with color ink by pseudo- image in 2 D code be printed on one on certificate and image in 2 D code size and
On the identical white space of shape, generate it is a kind of stealth in the pseudo- image in 2 D code on certificate white space, under visible light should
White space shows blank image, and the pseudo- image in 2 D code being printed on the white space is shown under infrared light, utilizes three width
The complement code image of image in 2 D code can generate three width image in 2 D code respectively, and the letter of every width image in 2 D code can be obtained by scanning
Breath, can be by pseudo- image in 2 D code stealth in any one white space on certificate using this method, and this method can reflect
Other certificate is with the presence or absence of personation infringement problem.
The technical solution adopted by the present invention to solve the technical problems is: the first width two dimensional code figure is made of personal information
Picture, by the first width image in 2 D code it is complementary be divided into the first short in size image and the first complement code image, the first short in size image and the
One complement code image can be complementary the complete first width image in 2 D code of composition,
The second width image in 2 D code is made of licence issuing authority information, and the second width image in 2 D code complementation is divided into the second short in size
Image and the second complement code image, the second short in size image and the second complement code image can be complementary the complete second width two dimensional code figure of composition
Picture,
Third width image in 2 D code is made of manufacturer's information, and the image in 2 D code complementation of third width is divided into third short in size
Image and third complement code image, third short in size image and third complement code image can be complementary the complete third width two dimensional code figure of composition
Picture,
The size of one width of composition of first short in size image, the second short in size image and third short in size image complementation and image in 2 D code,
The identical pseudo- image in 2 D code of size and shape,
The color matching ratio for adjusting yellow black four color ink of green product generates one kind with color ink, should show under visible light with color ink white
Color shows black under infrared light,
The site of pseudo- image in 2 D code is divided into two kinds, and one is black site, another kind is white site,
For pseudo- image in 2 D code is hidden on certificate, one and pseudo- two dimensional code figure pseudo- image in 2 D code being printed on certificate
As on the identical white space of size and shape, for the white site in pseudo- image in 2 D code, it is desirable that under visible light with it is red
All show white under outer light, therefore printed using ordinary white ink, for the black site in pseudo- image in 2 D code, it is desirable that
Show white under visible light, black is shown under infrared light, therefore print using with color ink, be printed on certificate blank area in this way
Pseudo- image in 2 D code in domain, it is homochromy with the white space on certificate under visible light, show under infrared light and is printed on the area
Pseudo- image in 2 D code on domain can generate three width image in 2 D code using the complement code image of three width image in 2 D code respectively, pass through
Scanning can obtain the information of every width image in 2 D code, can be by pseudo- image in 2 D code stealth in any on certificate using this method
One region, this method can identify certificate with the presence or absence of personation infringement problem.
Detailed description of the invention
The following further describes the present invention with reference to the drawings.
Fig. 1 the first width image in 2 D code.
Fig. 2 the first short in size image.
Fig. 3 the first complement code image.
Fig. 4 the second width image in 2 D code.
Fig. 5 the second short in size image.
Fig. 6 the second complement code image.
Fig. 7 third width image in 2 D code.
Fig. 8 third short in size image.
Fig. 9 third complement code image.
Figure 10 puppet image in 2 D code.
Figure 11 puppet image in 2 D code part color lump figure.
Specific embodiment
In fig. 1, fig. 2 and fig. 3, the first width image in 2 D code 1 is made of personal information, by the first width image in 2 D code 1
Complementary is divided into the first short in size image 1-1 and the first complement code image 1-2, the first short in size image 1-1 and the first complement code image 1-2
The complete first width image in 2 D code 1 of composition that can be complementary,
In Fig. 4, Fig. 5 and Fig. 6, the second width image in 2 D code 2 is made of licence issuing authority information, by the second width image in 2 D code 2
Complementary is divided into the second short in size image 2-1 and the second complement code image 2-2, the second short in size image 2-1 and the second complement code image 2-2
The complete second width image in 2 D code 2 of composition that can be complementary,
In Fig. 7, Fig. 8 and Fig. 9, third width image in 2 D code 3 is made of manufacturer's information, by third width image in 2 D code 3
Complementary is divided into third short in size image 3-1 and third complement code image 3-2, third short in size image 3-1 and third complement code image 3-2
The complete third width image in 2 D code 3 of composition that can be complementary,
The size of three width image in 2 D code, size and shape are identical,
In Figure 10, one width of composition of the first short in size image 1-1, the second short in size image 2-1 and third short in size image 3-1 complementation with
The identical pseudo- image in 2 D code 3-3 of the size of image in 2 D code, size and shape,
The color matching ratio for adjusting yellow black four color ink of green product generates one kind with color ink, should show under visible light with color ink white
Color shows black under infrared light,
In Figure 10 and Figure 11, the site of pseudo- image in 2 D code is divided into two kinds, and one is black site 7, another kind is white net
Point 6, for pseudo- image in 2 D code 3-3 is hidden on certificate, one and puppet two pseudo- image in 2 D code 3-3 being printed on certificate
It ties up on the identical white space of code image 3-3 size and shape, for the white site 6 in the site pseudo- image in 2 D code 3-3,
Ask under visible light with all show white under infrared light, using ordinary white ink print, for the site pseudo- image in 2 D code 3-3
In black site 7, it is desirable that show white under visible light, show black under infrared light, therefore printed using with color ink,
The pseudo- image in 2 D code 3-3 being printed in certificate white space in this way, it is homochromy with the white space of certificate under visible light, red
Show the pseudo- image in 2 D code 3-3 of printing on the area under outer light, the complement code image using three width image in 2 D code can be distinguished
Three width image in 2 D code are generated, the information of every width image in 2 D code can be obtained by scanning, it can be by pseudo- two dimension using this method
For code Invisible Image in any one region on certificate, this method can identify certificate with the presence or absence of personation infringement problem.
Claims (5)
1. a kind of complementary stealthy identification anti-counterfeit method of credentials of multi-code segmentation fragment, it is characterized in that: the method for anti-counterfeit by personal information,
Licence issuing authority information and manufacturer's information generate size, the identical three width image in 2 D code of size and shape, by every width two dimension
The all complementations of code image are divided into two pieces or more graphical image planes, and a portion image is known as short in size image, another part
Image is known as complement code image, and the composition original image in 2 D code that short in size image and complement code image can be complementary utilizes three width two dimensional code figures
One width of composition of the short in size image complementation of picture pseudo- image in 2 D code identical with the size of image in 2 D code, size and shape, it is pseudo-
The site of image in 2 D code is divided into two kinds, and one is black site, another kind is white site, matches color ink using metamerism
One pseudo- image in 2 D code is printed on certificate white space white space identical with image in 2 D code size and shape
On, it generates a kind of stealth and is shown under visible light on the certificate white space in the pseudo- image in 2 D code on certificate white space
Existing blank image shows the pseudo- image in 2 D code of printing on the area under infrared light, utilizes the benefit of three width image in 2 D code
Code image can generate three width image in 2 D code respectively, and the information of every width image in 2 D code can be obtained by scanning, utilizes this method
Can be by pseudo- image in 2 D code stealth in any one white space on certificate, this method can identify certificate and whether there is
Palm off infringement problem.
2. the complementary stealthy identification anti-counterfeit method of credentials of multi-code segmentation fragment according to claim 1, it is characterized in that: homochromy different
Spectrum with color ink is formulated by the color matching ratio for adjusting yellow black four color ink of green product, should be shown under visible light with color ink
White shows black under infrared light.
3. the complementary stealthy identification anti-counterfeit method of credentials of multi-code segmentation fragment according to claim 1, it is characterized in that: by every width
Image in 2 D code all complementations are divided into two pieces or more graphical image planes, and a portion image is known as short in size image, another
Parts of images is known as complement code image, the composition original two dimensional code figure that the short in size image and complement code image of every width image in 2 D code can be complementary
Picture.
4. the complementary stealthy identification anti-counterfeit method of credentials of multi-code segmentation fragment according to claim 1, it is characterized in that: pseudo- two dimension
Code image printing is on a white space identical with pseudo- image in 2 D code size and shape on certificate, pseudo- image in 2 D code
In white site printed using ordinary white ink, the black site in pseudo- image in 2 D code is utilized prints with color ink.
5. the complementary stealthy identification anti-counterfeit method of credentials of multi-code segmentation fragment according to claim 1, it is characterized in that: being printed on
Pseudo- image in 2 D code in the white space of certificate is homochromy with the white space of certificate under visible light, shows this under infrared light
Pseudo- image in 2 D code on region can generate three width image in 2 D code using the complement code image of three width image in 2 D code respectively, lead to
Overscanning can obtain the information of every width image in 2 D code, can be by pseudo- image in 2 D code stealth in appointing on certificate using this method
On what white space.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910192273.3A CN110009081A (en) | 2019-03-14 | 2019-03-14 | Multi-code divides the complementary stealthy identification anti-counterfeit method of credentials of fragment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910192273.3A CN110009081A (en) | 2019-03-14 | 2019-03-14 | Multi-code divides the complementary stealthy identification anti-counterfeit method of credentials of fragment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110009081A true CN110009081A (en) | 2019-07-12 |
Family
ID=67167037
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910192273.3A Pending CN110009081A (en) | 2019-03-14 | 2019-03-14 | Multi-code divides the complementary stealthy identification anti-counterfeit method of credentials of fragment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110009081A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116362773A (en) * | 2023-05-31 | 2023-06-30 | 酒仙网络科技股份有限公司 | Red wine intelligent anti-counterfeiting system based on data analysis |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060022059A1 (en) * | 2004-08-02 | 2006-02-02 | Scott Juds | Coaligned bar codes and validation means |
CN1898682A (en) * | 2003-10-24 | 2007-01-17 | 皮特尼鲍斯股份有限公司 | Fluorescent hidden indicium |
JP2009183390A (en) * | 2008-02-05 | 2009-08-20 | Tenyo Co Ltd | Jigsaw puzzle |
CN204440410U (en) * | 2014-12-23 | 2015-07-01 | 江苏工程职业技术学院 | A kind of splitting type two-dimension code anti-counterfeit structure |
CN107206829A (en) * | 2015-02-19 | 2017-09-26 | 特洛伊集团公司 | The method for protecting invisible 2D bar codes and print image |
-
2019
- 2019-03-14 CN CN201910192273.3A patent/CN110009081A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1898682A (en) * | 2003-10-24 | 2007-01-17 | 皮特尼鲍斯股份有限公司 | Fluorescent hidden indicium |
US20060022059A1 (en) * | 2004-08-02 | 2006-02-02 | Scott Juds | Coaligned bar codes and validation means |
JP2009183390A (en) * | 2008-02-05 | 2009-08-20 | Tenyo Co Ltd | Jigsaw puzzle |
CN204440410U (en) * | 2014-12-23 | 2015-07-01 | 江苏工程职业技术学院 | A kind of splitting type two-dimension code anti-counterfeit structure |
CN107206829A (en) * | 2015-02-19 | 2017-09-26 | 特洛伊集团公司 | The method for protecting invisible 2D bar codes and print image |
Non-Patent Citations (1)
Title |
---|
张逸新: "《现代印刷防伪技术》", 31 January 2007, 中国轻工业出版社 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116362773A (en) * | 2023-05-31 | 2023-06-30 | 酒仙网络科技股份有限公司 | Red wine intelligent anti-counterfeiting system based on data analysis |
CN116362773B (en) * | 2023-05-31 | 2023-07-28 | 酒仙网络科技股份有限公司 | Red wine intelligent anti-counterfeiting system based on data analysis |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JPWO2006106677A1 (en) | Printed matter, detection method and detection device for the printed matter, and authentication method and authentication device | |
KR20050042001A (en) | Network point printed matter and printing method | |
CN109376832B (en) | Triple anti-counterfeiting two-dimensional code embedded with anti-counterfeiting mark image and digital fluorescent image | |
CN109726788B (en) | Light and shade double-code two-dimensional code with hidden metamerism | |
CN109376833B (en) | Triple anti-counterfeiting two-dimensional code for pseudo-random information overprinting digital fluorescent image | |
CN109919274A (en) | Stealthy complementary identification anti-counterfeit method of credentials | |
CN110009081A (en) | Multi-code divides the complementary stealthy identification anti-counterfeit method of credentials of fragment | |
JP5768236B2 (en) | Anti-counterfeit printed matter, anti-counterfeit printed material preparation apparatus, and anti-counterfeit printed matter preparation method | |
CN109766974A (en) | The stealthy multiple complementary identification dimension code anti-counterfeit method of overlapping | |
CN109572258A (en) | The stealthy infrared complementary identification dimension code anti-counterfeit method of pseudo-code | |
CN109711514B (en) | Anti-fake two-dimensional code with hidden pseudo-random information | |
CN109711513A (en) | Triple anti-fake two-dimension codes of digital fluorescence images double exposure light and shade dicode | |
CN109766976A (en) | Invisible two-dimensional codes anti-counterfeit method of credentials | |
JP5990791B2 (en) | Anti-counterfeit printed matter | |
JP4082448B2 (en) | Printed material capable of authenticating authenticity and method for producing the same | |
CN109697493A (en) | Stealthy badge anti-forge method | |
CN109784453A (en) | Logo and the stealthy complementary identification dimension code anti-counterfeit method of trademark image overlapping | |
CN109686228A (en) | Invisible trademark method for anti-counterfeit | |
CN109766975A (en) | The infrared complementary identification and false proof method of two dimensional code covering | |
CN109685184A (en) | Complementary segmental stealth identifies dimension code anti-counterfeit method | |
CN109766977A (en) | Multi-C complementary identifies dimension code anti-counterfeit method | |
CN109754042A (en) | Trademark image stealth identification and false proof method | |
CN109740713B (en) | Triple anti-counterfeiting two-dimensional code with hidden digital signature and digital fluorescent image | |
JP5678364B2 (en) | Printed material capable of authenticating authenticity, manufacturing apparatus and manufacturing method thereof, authentication apparatus for printed matter capable of authenticating authenticity and authentication method thereof | |
CN109740712B (en) | Two-dimensional code for hiding anti-counterfeiting mark image |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190712 |