CN110009081A - Multi-code divides the complementary stealthy identification anti-counterfeit method of credentials of fragment - Google Patents

Multi-code divides the complementary stealthy identification anti-counterfeit method of credentials of fragment Download PDF

Info

Publication number
CN110009081A
CN110009081A CN201910192273.3A CN201910192273A CN110009081A CN 110009081 A CN110009081 A CN 110009081A CN 201910192273 A CN201910192273 A CN 201910192273A CN 110009081 A CN110009081 A CN 110009081A
Authority
CN
China
Prior art keywords
image
code
size
pseudo
width
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910192273.3A
Other languages
Chinese (zh)
Inventor
陆利坤
李业丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN201910192273.3A priority Critical patent/CN110009081A/en
Publication of CN110009081A publication Critical patent/CN110009081A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • G06K19/0614Constructional details the marking being selective to wavelength, e.g. color barcode or barcodes only visible under UV or IR
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Abstract

A kind of white tone stealth invalid code complementation identification dimension code anti-counterfeit method, the antiforging printing method, a width image in 2 D code is made of anti-counterfeiting information first, and the image in 2 D code is divided into two parts, a part is known as short in size image, another part is known as complement code image, then using metamerism with color ink by short in size printing image on the white space of printed matter by complement code printing image on a piece of thin plate key piece, generate a kind of stealthy complementary image in 2 D code, stealth complementation image in 2 D code shows blank image under visible light, complement code image and short in size image are merged only under infrared light when constituting the complete image in 2 D code of a width, correct two-dimensional barcode information can be just obtained by scanning, label can be identified in this way, bill, the printed matters such as marketable securities are with the presence or absence of personation infringement problem.

Description

Multi-code divides the complementary stealthy identification anti-counterfeit method of credentials of fragment
Technical field:
The present invention relates to a kind of anti-counterfeit method of credentials, especially a kind of complementary stealthy identification certificate false proof side of multi-code segmentation fragment Method, the anti-counterfeit method of credentials can be used for the anti-fake of various certificates.
Background technique:
Certificate serves to demonstrate how the certificate and file of identity, experience etc., such as resident identification card, passport, employee's card, student's identity card, finishes Industry card etc., the fraud of various forms of certificates has given society and the people to bring serious threat, and certificate false proof technology is main There are digital encryption, digital watermarking, laser anti-false sign, cipher counterfeit-proof labeling, texture anti-fake, biological identification technology etc., with The development of science and technology, certificate forge means also in the continuous improvement, and simple certificate false proof technology is no longer satisfied certificate Anti-fake needs, it is necessary to constantly promote certificate false proof technology, society and the legitimate interests of the people could be protected, maintain the steady of society Fixed and safety.
Summary of the invention:
In order to improve the reliability and safety of certificate false proof, the present invention is for deficiency existing for existing certificate false proof to existing card Part anti-counterfeiting technology is improved, and a kind of complementary stealthy identification anti-counterfeit method of credentials of multi-code segmentation fragment, the anti-fake side are proposed Method generates size, the identical three width two dimensional code figure of size and shape by personal information, licence issuing authority information and manufacturer's information The all complementations of every width image in 2 D code are divided into two pieces or more graphical image planes by picture, and a portion image is known as short in size Image, another part image are known as complement code image, the composition original image in 2 D code that short in size image and complement code image can be complementary, three width The short in size image of image in 2 D code can be complementary one width of composition pseudo- two dimension identical with the size of image in 2 D code, size and shape Code image, using metamerism with color ink by pseudo- image in 2 D code be printed on one on certificate and image in 2 D code size and On the identical white space of shape, generate it is a kind of stealth in the pseudo- image in 2 D code on certificate white space, under visible light should White space shows blank image, and the pseudo- image in 2 D code being printed on the white space is shown under infrared light, utilizes three width The complement code image of image in 2 D code can generate three width image in 2 D code respectively, and the letter of every width image in 2 D code can be obtained by scanning Breath, can be by pseudo- image in 2 D code stealth in any one white space on certificate using this method, and this method can reflect Other certificate is with the presence or absence of personation infringement problem.
The technical solution adopted by the present invention to solve the technical problems is: the first width two dimensional code figure is made of personal information Picture, by the first width image in 2 D code it is complementary be divided into the first short in size image and the first complement code image, the first short in size image and the One complement code image can be complementary the complete first width image in 2 D code of composition,
The second width image in 2 D code is made of licence issuing authority information, and the second width image in 2 D code complementation is divided into the second short in size Image and the second complement code image, the second short in size image and the second complement code image can be complementary the complete second width two dimensional code figure of composition Picture,
Third width image in 2 D code is made of manufacturer's information, and the image in 2 D code complementation of third width is divided into third short in size Image and third complement code image, third short in size image and third complement code image can be complementary the complete third width two dimensional code figure of composition Picture,
The size of one width of composition of first short in size image, the second short in size image and third short in size image complementation and image in 2 D code, The identical pseudo- image in 2 D code of size and shape,
The color matching ratio for adjusting yellow black four color ink of green product generates one kind with color ink, should show under visible light with color ink white Color shows black under infrared light,
The site of pseudo- image in 2 D code is divided into two kinds, and one is black site, another kind is white site,
For pseudo- image in 2 D code is hidden on certificate, one and pseudo- two dimensional code figure pseudo- image in 2 D code being printed on certificate As on the identical white space of size and shape, for the white site in pseudo- image in 2 D code, it is desirable that under visible light with it is red All show white under outer light, therefore printed using ordinary white ink, for the black site in pseudo- image in 2 D code, it is desirable that Show white under visible light, black is shown under infrared light, therefore print using with color ink, be printed on certificate blank area in this way Pseudo- image in 2 D code in domain, it is homochromy with the white space on certificate under visible light, show under infrared light and is printed on the area Pseudo- image in 2 D code on domain can generate three width image in 2 D code using the complement code image of three width image in 2 D code respectively, pass through Scanning can obtain the information of every width image in 2 D code, can be by pseudo- image in 2 D code stealth in any on certificate using this method One region, this method can identify certificate with the presence or absence of personation infringement problem.
Detailed description of the invention
The following further describes the present invention with reference to the drawings.
Fig. 1 the first width image in 2 D code.
Fig. 2 the first short in size image.
Fig. 3 the first complement code image.
Fig. 4 the second width image in 2 D code.
Fig. 5 the second short in size image.
Fig. 6 the second complement code image.
Fig. 7 third width image in 2 D code.
Fig. 8 third short in size image.
Fig. 9 third complement code image.
Figure 10 puppet image in 2 D code.
Figure 11 puppet image in 2 D code part color lump figure.
Specific embodiment
In fig. 1, fig. 2 and fig. 3, the first width image in 2 D code 1 is made of personal information, by the first width image in 2 D code 1 Complementary is divided into the first short in size image 1-1 and the first complement code image 1-2, the first short in size image 1-1 and the first complement code image 1-2 The complete first width image in 2 D code 1 of composition that can be complementary,
In Fig. 4, Fig. 5 and Fig. 6, the second width image in 2 D code 2 is made of licence issuing authority information, by the second width image in 2 D code 2 Complementary is divided into the second short in size image 2-1 and the second complement code image 2-2, the second short in size image 2-1 and the second complement code image 2-2 The complete second width image in 2 D code 2 of composition that can be complementary,
In Fig. 7, Fig. 8 and Fig. 9, third width image in 2 D code 3 is made of manufacturer's information, by third width image in 2 D code 3 Complementary is divided into third short in size image 3-1 and third complement code image 3-2, third short in size image 3-1 and third complement code image 3-2 The complete third width image in 2 D code 3 of composition that can be complementary,
The size of three width image in 2 D code, size and shape are identical,
In Figure 10, one width of composition of the first short in size image 1-1, the second short in size image 2-1 and third short in size image 3-1 complementation with The identical pseudo- image in 2 D code 3-3 of the size of image in 2 D code, size and shape,
The color matching ratio for adjusting yellow black four color ink of green product generates one kind with color ink, should show under visible light with color ink white Color shows black under infrared light,
In Figure 10 and Figure 11, the site of pseudo- image in 2 D code is divided into two kinds, and one is black site 7, another kind is white net Point 6, for pseudo- image in 2 D code 3-3 is hidden on certificate, one and puppet two pseudo- image in 2 D code 3-3 being printed on certificate It ties up on the identical white space of code image 3-3 size and shape, for the white site 6 in the site pseudo- image in 2 D code 3-3, Ask under visible light with all show white under infrared light, using ordinary white ink print, for the site pseudo- image in 2 D code 3-3 In black site 7, it is desirable that show white under visible light, show black under infrared light, therefore printed using with color ink, The pseudo- image in 2 D code 3-3 being printed in certificate white space in this way, it is homochromy with the white space of certificate under visible light, red Show the pseudo- image in 2 D code 3-3 of printing on the area under outer light, the complement code image using three width image in 2 D code can be distinguished Three width image in 2 D code are generated, the information of every width image in 2 D code can be obtained by scanning, it can be by pseudo- two dimension using this method For code Invisible Image in any one region on certificate, this method can identify certificate with the presence or absence of personation infringement problem.

Claims (5)

1. a kind of complementary stealthy identification anti-counterfeit method of credentials of multi-code segmentation fragment, it is characterized in that: the method for anti-counterfeit by personal information, Licence issuing authority information and manufacturer's information generate size, the identical three width image in 2 D code of size and shape, by every width two dimension The all complementations of code image are divided into two pieces or more graphical image planes, and a portion image is known as short in size image, another part Image is known as complement code image, and the composition original image in 2 D code that short in size image and complement code image can be complementary utilizes three width two dimensional code figures One width of composition of the short in size image complementation of picture pseudo- image in 2 D code identical with the size of image in 2 D code, size and shape, it is pseudo- The site of image in 2 D code is divided into two kinds, and one is black site, another kind is white site, matches color ink using metamerism One pseudo- image in 2 D code is printed on certificate white space white space identical with image in 2 D code size and shape On, it generates a kind of stealth and is shown under visible light on the certificate white space in the pseudo- image in 2 D code on certificate white space Existing blank image shows the pseudo- image in 2 D code of printing on the area under infrared light, utilizes the benefit of three width image in 2 D code Code image can generate three width image in 2 D code respectively, and the information of every width image in 2 D code can be obtained by scanning, utilizes this method Can be by pseudo- image in 2 D code stealth in any one white space on certificate, this method can identify certificate and whether there is Palm off infringement problem.
2. the complementary stealthy identification anti-counterfeit method of credentials of multi-code segmentation fragment according to claim 1, it is characterized in that: homochromy different Spectrum with color ink is formulated by the color matching ratio for adjusting yellow black four color ink of green product, should be shown under visible light with color ink White shows black under infrared light.
3. the complementary stealthy identification anti-counterfeit method of credentials of multi-code segmentation fragment according to claim 1, it is characterized in that: by every width Image in 2 D code all complementations are divided into two pieces or more graphical image planes, and a portion image is known as short in size image, another Parts of images is known as complement code image, the composition original two dimensional code figure that the short in size image and complement code image of every width image in 2 D code can be complementary Picture.
4. the complementary stealthy identification anti-counterfeit method of credentials of multi-code segmentation fragment according to claim 1, it is characterized in that: pseudo- two dimension Code image printing is on a white space identical with pseudo- image in 2 D code size and shape on certificate, pseudo- image in 2 D code In white site printed using ordinary white ink, the black site in pseudo- image in 2 D code is utilized prints with color ink.
5. the complementary stealthy identification anti-counterfeit method of credentials of multi-code segmentation fragment according to claim 1, it is characterized in that: being printed on Pseudo- image in 2 D code in the white space of certificate is homochromy with the white space of certificate under visible light, shows this under infrared light Pseudo- image in 2 D code on region can generate three width image in 2 D code using the complement code image of three width image in 2 D code respectively, lead to Overscanning can obtain the information of every width image in 2 D code, can be by pseudo- image in 2 D code stealth in appointing on certificate using this method On what white space.
CN201910192273.3A 2019-03-14 2019-03-14 Multi-code divides the complementary stealthy identification anti-counterfeit method of credentials of fragment Pending CN110009081A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910192273.3A CN110009081A (en) 2019-03-14 2019-03-14 Multi-code divides the complementary stealthy identification anti-counterfeit method of credentials of fragment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910192273.3A CN110009081A (en) 2019-03-14 2019-03-14 Multi-code divides the complementary stealthy identification anti-counterfeit method of credentials of fragment

Publications (1)

Publication Number Publication Date
CN110009081A true CN110009081A (en) 2019-07-12

Family

ID=67167037

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910192273.3A Pending CN110009081A (en) 2019-03-14 2019-03-14 Multi-code divides the complementary stealthy identification anti-counterfeit method of credentials of fragment

Country Status (1)

Country Link
CN (1) CN110009081A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116362773A (en) * 2023-05-31 2023-06-30 酒仙网络科技股份有限公司 Red wine intelligent anti-counterfeiting system based on data analysis

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060022059A1 (en) * 2004-08-02 2006-02-02 Scott Juds Coaligned bar codes and validation means
CN1898682A (en) * 2003-10-24 2007-01-17 皮特尼鲍斯股份有限公司 Fluorescent hidden indicium
JP2009183390A (en) * 2008-02-05 2009-08-20 Tenyo Co Ltd Jigsaw puzzle
CN204440410U (en) * 2014-12-23 2015-07-01 江苏工程职业技术学院 A kind of splitting type two-dimension code anti-counterfeit structure
CN107206829A (en) * 2015-02-19 2017-09-26 特洛伊集团公司 The method for protecting invisible 2D bar codes and print image

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1898682A (en) * 2003-10-24 2007-01-17 皮特尼鲍斯股份有限公司 Fluorescent hidden indicium
US20060022059A1 (en) * 2004-08-02 2006-02-02 Scott Juds Coaligned bar codes and validation means
JP2009183390A (en) * 2008-02-05 2009-08-20 Tenyo Co Ltd Jigsaw puzzle
CN204440410U (en) * 2014-12-23 2015-07-01 江苏工程职业技术学院 A kind of splitting type two-dimension code anti-counterfeit structure
CN107206829A (en) * 2015-02-19 2017-09-26 特洛伊集团公司 The method for protecting invisible 2D bar codes and print image

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张逸新: "《现代印刷防伪技术》", 31 January 2007, 中国轻工业出版社 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116362773A (en) * 2023-05-31 2023-06-30 酒仙网络科技股份有限公司 Red wine intelligent anti-counterfeiting system based on data analysis
CN116362773B (en) * 2023-05-31 2023-07-28 酒仙网络科技股份有限公司 Red wine intelligent anti-counterfeiting system based on data analysis

Similar Documents

Publication Publication Date Title
JPWO2006106677A1 (en) Printed matter, detection method and detection device for the printed matter, and authentication method and authentication device
KR20050042001A (en) Network point printed matter and printing method
CN109376832B (en) Triple anti-counterfeiting two-dimensional code embedded with anti-counterfeiting mark image and digital fluorescent image
CN109726788B (en) Light and shade double-code two-dimensional code with hidden metamerism
CN109376833B (en) Triple anti-counterfeiting two-dimensional code for pseudo-random information overprinting digital fluorescent image
CN109919274A (en) Stealthy complementary identification anti-counterfeit method of credentials
CN110009081A (en) Multi-code divides the complementary stealthy identification anti-counterfeit method of credentials of fragment
JP5768236B2 (en) Anti-counterfeit printed matter, anti-counterfeit printed material preparation apparatus, and anti-counterfeit printed matter preparation method
CN109766974A (en) The stealthy multiple complementary identification dimension code anti-counterfeit method of overlapping
CN109572258A (en) The stealthy infrared complementary identification dimension code anti-counterfeit method of pseudo-code
CN109711514B (en) Anti-fake two-dimensional code with hidden pseudo-random information
CN109711513A (en) Triple anti-fake two-dimension codes of digital fluorescence images double exposure light and shade dicode
CN109766976A (en) Invisible two-dimensional codes anti-counterfeit method of credentials
JP5990791B2 (en) Anti-counterfeit printed matter
JP4082448B2 (en) Printed material capable of authenticating authenticity and method for producing the same
CN109697493A (en) Stealthy badge anti-forge method
CN109784453A (en) Logo and the stealthy complementary identification dimension code anti-counterfeit method of trademark image overlapping
CN109686228A (en) Invisible trademark method for anti-counterfeit
CN109766975A (en) The infrared complementary identification and false proof method of two dimensional code covering
CN109685184A (en) Complementary segmental stealth identifies dimension code anti-counterfeit method
CN109766977A (en) Multi-C complementary identifies dimension code anti-counterfeit method
CN109754042A (en) Trademark image stealth identification and false proof method
CN109740713B (en) Triple anti-counterfeiting two-dimensional code with hidden digital signature and digital fluorescent image
JP5678364B2 (en) Printed material capable of authenticating authenticity, manufacturing apparatus and manufacturing method thereof, authentication apparatus for printed matter capable of authenticating authenticity and authentication method thereof
CN109740712B (en) Two-dimensional code for hiding anti-counterfeiting mark image

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190712