CN113076528A - Anti-counterfeiting information embedding method, anti-counterfeiting information extracting method, anti-counterfeiting information embedding device, anti-counterfeiting information extracting device and storage medium - Google Patents

Anti-counterfeiting information embedding method, anti-counterfeiting information extracting method, anti-counterfeiting information embedding device, anti-counterfeiting information extracting device and storage medium Download PDF

Info

Publication number
CN113076528A
CN113076528A CN202110311711.0A CN202110311711A CN113076528A CN 113076528 A CN113076528 A CN 113076528A CN 202110311711 A CN202110311711 A CN 202110311711A CN 113076528 A CN113076528 A CN 113076528A
Authority
CN
China
Prior art keywords
counterfeiting
code
information
counterfeiting information
point block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110311711.0A
Other languages
Chinese (zh)
Inventor
彭继兵
李海雄
马杨晓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Pantum Electronics Co Ltd
Original Assignee
Zhuhai Pantum Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Pantum Electronics Co Ltd filed Critical Zhuhai Pantum Electronics Co Ltd
Priority to CN202110311711.0A priority Critical patent/CN113076528A/en
Publication of CN113076528A publication Critical patent/CN113076528A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0065Extraction of an embedded watermark; Reliable detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The embodiment of the application provides an anti-counterfeiting information embedding method, an anti-counterfeiting information extracting method, an anti-counterfeiting information embedding device and a storage medium, wherein the anti-counterfeiting information embedding method comprises the steps of determining N embedded areas in a page of a file to be printed according to a preset embedding rule; according to a preset coding rule, coding the anti-counterfeiting information to obtain an anti-counterfeiting information code; adding a positioning code and a fault-tolerant code in the anti-counterfeiting information code to obtain an anti-counterfeiting code, wherein the positioning code and the fault-tolerant code are respectively used for positioning and fault-tolerant checking the anti-counterfeiting code when the anti-counterfeiting information is extracted; and converting the anti-counterfeiting codes into anti-counterfeiting point block sets according to a preset point block generation rule, and respectively embedding the anti-counterfeiting codes into the N embedded areas. By adopting the technical scheme provided by the embodiment of the application, the plurality of anti-counterfeiting information embedding areas are arranged in the confidential file, so that the anti-counterfeiting information can be accurately and efficiently extracted based on the spliced file fragments under the condition that the confidential file is shredded.

Description

Anti-counterfeiting information embedding method, anti-counterfeiting information extracting method, anti-counterfeiting information embedding device, anti-counterfeiting information extracting device and storage medium
Technical Field
The present application relates to the field of anti-counterfeiting technologies, and in particular, to an anti-counterfeiting information embedding method, an anti-counterfeiting information extracting method, an anti-counterfeiting information embedding device, an anti-counterfeiting information extracting device, and a storage medium.
Background
In order to improve the security of the security document, a common method is to embed anti-counterfeiting information on the security document in a watermark manner. When the confidential file needs to be verified, the anti-counterfeiting information is extracted according to the preset rule when the anti-counterfeiting information is embedded, so that the source tracing is carried out.
It can be understood that the anti-counterfeiting information can be easily extracted from the security document when the security document is complete. However, after the user uses up the confidential document, the confidential document is usually torn down, so that the security of the document information is ensured; or the paper is maliciously torn down after being illegally printed by the illegal copy. If the secure document has been torn, it is difficult to extract the anti-counterfeiting information from the torn secure document to trace to the source.
Disclosure of Invention
The application provides an anti-counterfeiting information embedding method, an anti-counterfeiting information extracting method, an anti-counterfeiting information embedding device, an anti-counterfeiting information extracting device and a storage medium, which are beneficial to solving the problem that anti-counterfeiting information is difficult to extract from a shredded confidential document in the prior art so as to trace to the source.
In a first aspect, an embodiment of the present application provides an anti-counterfeit information embedding method, including:
determining N embedded areas in a page of a file to be printed according to a preset embedding rule, wherein the embedded areas are used for embedding anti-counterfeiting codes, and N is more than or equal to 2;
according to a preset coding rule, coding the anti-counterfeiting information to obtain an anti-counterfeiting information code;
adding a positioning code and a fault-tolerant code in the anti-counterfeiting information code to obtain an anti-counterfeiting code, wherein the positioning code and the fault-tolerant code are respectively used for positioning and fault-tolerant checking the anti-counterfeiting code when the anti-counterfeiting information is extracted;
and converting the anti-counterfeiting code into an anti-counterfeiting point block set according to a preset point block generation rule, and respectively embedding the anti-counterfeiting code into the N embedded regions, wherein each embedded region corresponds to one anti-counterfeiting point block set.
Preferably, the determining N embedded regions in the page of the document to be printed according to the preset embedding rule includes:
and determining N embedded areas in a print data sparse area and/or at the corner of the file to be printed according to the page information of the file to be printed.
Preferably, the anti-counterfeiting code further comprises a direction code, an angle code, a key code and/or a code form code;
the direction code and/or the angle code are/is used for carrying out graphic correction when the anti-counterfeiting information is extracted;
and the secret key code and/or the code form code are used for carrying out security verification when the anti-counterfeiting information is extracted.
Preferably, the anti-counterfeiting information is at least one of the brand, model, individual information of an image forming apparatus that is to print the file to be printed, and the time of receiving the file to be printed;
the individual information of the image forming apparatus is at least one of a serial number, an IP address and a MAC address of the image forming apparatus, and the individual information of the image forming apparatus is unique information which is distinguished from other image forming apparatuses;
the time of receiving the file to be printed comprises at least one of year, month, day, time, minute and second.
In a second aspect, an embodiment of the present application provides an anti-counterfeiting information extraction method, including:
scanning a confidential file of which anti-counterfeiting information is to be extracted to obtain image data corresponding to the confidential file, wherein the image data comprises a plurality of anti-counterfeiting point block sets which are repeatedly embedded;
determining the position of the anti-counterfeiting point block set in the image data according to a positioning code and a preset embedding rule in the anti-counterfeiting point block set;
according to the positions of the anti-counterfeiting point block sets, the image data are segmented to obtain M anti-counterfeiting point block slices, wherein each anti-counterfeiting point block slice corresponds to one anti-counterfeiting point block set, and M is more than or equal to 2;
analyzing the M anti-counterfeiting point block slices according to a preset point block generation rule to obtain M anti-counterfeiting code slices;
according to a preset fault-tolerant rule, performing combination and fault-tolerant detection on the M anti-counterfeiting coding slices, and judging whether any two or more anti-counterfeiting coding slices contain repeated codes meeting the fault-tolerant rule;
if two or more anti-counterfeiting code slices contain repeated codes meeting fault-tolerant rules, splicing the two or more anti-counterfeiting code slices after removing the duplication to obtain an anti-counterfeiting code splicing set;
and converting the anti-counterfeiting codes in the anti-counterfeiting code splicing set into anti-counterfeiting information according to a preset coding rule.
Preferably, the confidential document from which the anti-counterfeiting information is to be extracted is two or more confidential document fragments.
Preferably, the converting the anti-counterfeit codes in the anti-counterfeit code splicing set into the anti-counterfeit information according to a preset coding rule includes:
judging whether the anti-counterfeiting code splicing set contains a complete anti-counterfeiting code;
and if the anti-counterfeiting code splicing set contains a complete anti-counterfeiting code, converting the anti-counterfeiting code in the anti-counterfeiting code splicing set into anti-counterfeiting information according to a preset code rule.
Preferably, the method further comprises the following steps:
if any two or more anti-counterfeiting code slices do not contain repeated codes meeting the fault-tolerant rule, judging whether any one anti-counterfeiting code slice contains complete anti-counterfeiting codes;
if the ith anti-counterfeiting code slice contains a complete anti-counterfeiting code, the anti-counterfeiting code in the ith anti-counterfeiting code slice is converted into character information to obtain anti-counterfeiting information, and i is more than or equal to 1 and less than or equal to M.
Preferably, after scanning the security document of which the anti-counterfeiting information is to be extracted and obtaining the image data corresponding to the security document, the method further comprises the following steps:
and correcting the inclination angle of the image data according to the direction point block and/or the angle point block in the anti-counterfeiting point block set.
Preferably, according to a preset encoding rule, the method for converting the anti-counterfeiting codes in the anti-counterfeiting code splicing set into the anti-counterfeiting information comprises the following steps:
according to a preset coding rule, converting a secret key code and/or a code form code in the anti-counterfeiting code splicing set into secret key information and/or code form information;
carrying out security verification on the anti-counterfeiting code according to the secret key information and/or the coding form information;
and if the security check is passed, converting the anti-counterfeiting information codes in the anti-counterfeiting code splicing set into anti-counterfeiting information according to a preset coding rule.
In a third aspect, an embodiment of the present application provides an anti-counterfeit information embedding apparatus, including: a processor, a memory, and a computer program, wherein the computer program is stored in the memory, the computer program comprising instructions that, when executed, cause the apparatus to perform the method of any of the first aspects.
In a fourth aspect, an embodiment of the present application provides an anti-counterfeit information extraction apparatus, including: a processor, a memory, and a computer program, wherein the computer program is stored in the memory, the computer program comprising instructions that, when executed, cause the apparatus to perform the method of any of the second aspects.
In a fifth aspect, the present application provides a computer-readable storage medium, where the computer-readable storage medium includes a stored program, where the program, when executed, controls an apparatus in which the computer-readable storage medium is located to perform the method of any one of the first aspects.
In a sixth aspect, the present application provides a computer-readable storage medium, where the computer-readable storage medium includes a stored program, where the program, when executed, controls an apparatus in which the computer-readable storage medium is located to perform the method of any one of the second aspects.
By adopting the technical scheme provided by the embodiment of the application, the plurality of anti-counterfeiting information embedding areas are arranged in the confidential file, so that the anti-counterfeiting information can be accurately and efficiently extracted based on the spliced file fragments under the condition that the confidential file is shredded.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive labor.
Fig. 1 is a schematic diagram of a file fragment provided in an embodiment of the present application;
fig. 2 is a schematic flow chart of an anti-counterfeiting information embedding method according to an embodiment of the present disclosure;
FIG. 3 is a schematic diagram of a print document provided in an embodiment of the present application;
fig. 4 is a schematic flow chart of an anti-counterfeiting information extraction method provided in the embodiment of the present application;
fig. 5 is a schematic diagram of image data provided in an embodiment of the present application;
FIG. 6 is a schematic diagram of error extraction provided in an embodiment of the present application;
fig. 7 is a schematic view of a slice of an anti-counterfeit dot block according to an embodiment of the present application.
Detailed Description
For better understanding of the technical solutions of the present application, the following detailed descriptions of the embodiments of the present application are provided with reference to the accompanying drawings.
It should be understood that the embodiments described are only a few embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terminology used in the embodiments of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the examples of this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be understood that the term "and/or" as used herein is merely one type of associative relationship that describes an associated object, meaning that three types of relationships may exist, e.g., A and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
In order to improve the security of the security document, a common method is to embed anti-counterfeiting information on the security document in a watermark manner. When the confidential document needs to be traced back to the divulgence source, the anti-counterfeiting information is extracted according to the preset rule when the anti-counterfeiting information is embedded, and thus the tracing is performed.
It can be understood that the anti-counterfeiting information can be easily extracted from the security document when the security document is complete. However, after the user uses up the confidential document, the confidential document is usually torn down, so that the security of the document information is ensured; or the paper is maliciously torn down after being illegally printed by the illegal copy.
Referring to fig. 1, a schematic diagram of a file fragment provided in an embodiment of the present application is shown. As shown in fig. 1, the completed document is torn into 5 fragments, respectively A, B, C, D, E. At this time, the watermark in the file may be decomposed A, B, C, D, E into different fragments, and it is difficult to extract the anti-counterfeiting information corresponding to the watermark from the different fragments so as to perform tracing.
Based on this, the application provides an anti-counterfeiting information embedding method, an anti-counterfeiting information extracting method, an anti-counterfeiting information embedding device and an anti-counterfeiting information extracting device and a storage medium, so that the problem that the anti-counterfeiting information is difficult to extract from a shredded confidential document in the prior art and the source tracing is performed is solved.
It can be understood that before tracing the source of the anti-counterfeiting information, the anti-counterfeiting information needs to be embedded in the security file.
Referring to fig. 2, a schematic flow chart of an anti-counterfeiting information embedding method provided in the embodiment of the present application is shown. As shown in fig. 2, it mainly includes the following steps.
Step S201: and determining N embedded areas in the page of the file to be printed according to a preset embedding rule, wherein the embedded areas are used for embedding the anti-counterfeiting code, and N is more than or equal to 2.
First, a file to be printed is obtained, specifically, the obtained file to be printed is an electronic part, and may be in a picture format, a PDF format, or a text format, which is not specifically limited in this embodiment of the application.
And determining N embedded areas in the page of the file to be printed according to a preset embedding rule. It can be understood that when the file is torn, it is likely to cause the loss of the partial file fragments, that is, the anti-counterfeiting information can be extracted only based on the partial file fragments. Based on this, the embodiment of the application sets a plurality of embedded areas in the file to be printed, namely N is larger than or equal to 2, and each embedded area is used for embedding a set of complete anti-counterfeiting codes.
In the embodiment of the present application, the embedding rule may include the following two.
The first method comprises the following steps:
the printing data distribution area of the file to be printed is analyzed, and a small amount of or no embedded area can be set in the printing data dense area, so that the influence of subsequently embedded anti-counterfeiting information on the content or the picture of the printed file is reduced. In the print data sparse area, the embedded area can be increased appropriately, so that the reliability of subsequent tracing can be increased. Specifically, the print data amount of a certain area may be compared with a preset threshold value, and when the print data amount is greater than the threshold value, the area is determined to be a print data dense area; when the amount of print data is less than the threshold value, it is determined as a print data thinning-out region.
And the second method comprises the following steps:
according to the size information of the document to be printed, a mark is set at a specific position of the document to be printed. Referring to fig. 3, a schematic diagram of a print file provided in an embodiment of the present application is shown. As shown in fig. 3, since the printed document is a4 size, the distance between the print data and the top and bottom margins is 25.4mm in general, and the distance between the print data and the left and right margins is 31.8mm in general, marks (i.e., four dots in fig. 3) can be set at the four corners of the a 4-sized printed document, and the marks can be used as references to determine the embedded regions of the forgery-preventing code, which can be the four corners of the printed document (fragments of the four corners can be easily determined). Of course, the skilled person can also set marks on four sides of the printed document, and the application is not limited to this.
Step S202: and according to a preset coding rule, coding the anti-counterfeiting information to obtain the anti-counterfeiting information code.
Before the anti-counterfeiting information is coded, the anti-counterfeiting information needs to be acquired. The anti-counterfeit information may be at least one of a brand, a model, individual information, and a time of receiving the document to be printed of an image forming apparatus that is to print the document to be printed. The individual information of the image forming apparatus may be a serial number, an IP address, a MAC address, etc. of the image forming apparatus unique information distinguished from other image forming apparatuses, and the time when the file to be printed is received includes year, month, day, hour, minute, second, etc. In a specific implementation, after receiving a file to be printed sent by a user by using a terminal device, the image forming apparatus records and stores the time when the file to be printed is received and unique identification information such as a serial number of the image forming apparatus. The image forming apparatus may be an image forming apparatus such as a printer, a copier, a facsimile machine, a scanner, or the like.
And encoding the anti-counterfeiting information, namely converting the anti-counterfeiting information into binary digital information. The encoding rule can adopt common information encoding modes such as ASCII code, GB2312, GBK, GB18030 and the like. Of course, other encoding manners may also be adopted by those skilled in the art, and the embodiment of the present application is not particularly limited thereto.
Step S203: and adding a positioning code and a fault-tolerant code in the anti-counterfeiting information code to obtain the anti-counterfeiting code, wherein the positioning code and the fault-tolerant code are respectively used for positioning and fault-tolerant checking the anti-counterfeiting code when the anti-counterfeiting information is extracted.
Specifically, after the anti-counterfeiting information is converted into binary digital information according to the encoding rule, the binary digital information is subjected to discrete combination to form an anti-counterfeiting information encoding matrix with fixed length and width, the anti-counterfeiting information encoding matrix is subjected to row-column expansion, and binary codes such as positioning codes, direction codes, angle codes, fault-tolerant codes, key codes, encoding form codes and the like are added to corresponding positions in the expanded matrix, so that a complete anti-counterfeiting code is formed. It can be understood that the expansion mode of the coding matrix and the insertion mode of the related special codes (positioning code, direction code, angle code, fault-tolerant code, key code, coding form code) are various, and the embodiment of the present application does not limit this.
Specifically, the method comprises the following steps:
and the positioning code is used for positioning the anti-counterfeiting code when the anti-counterfeiting information is extracted, so that a camera or a scanner can accurately and quickly read the anti-counterfeiting code.
The direction code and the angle code are used for carrying out graphic correction when the anti-counterfeiting information is extracted, namely certain angle and direction deviation of image data containing the codes can be allowed, the function of automatic correction is achieved by automatically identifying internal correction information, and the accuracy of decoding is improved.
And the fault-tolerant code is used for carrying out fault-tolerant verification on the spliced anti-counterfeiting code slice when the anti-counterfeiting information is extracted, so that the camera or the scanner can still correctly read even if the anti-counterfeiting code is locally damaged due to perforation, dirt and the like.
And the key code and the code form code are used for carrying out security verification when the anti-counterfeiting information is extracted. Specifically, when decoding, the corresponding key information such as the key code, the code form code and the like can be decoded first, the security check is performed on the anti-counterfeiting code through the key information and the code form information, and if the security check is passed, the anti-counterfeiting information code is decoded, so that the information confidentiality is improved.
Step S204: and converting the anti-counterfeiting code into an anti-counterfeiting point block set according to a preset point block generation rule, and respectively embedding the anti-counterfeiting code into the N embedded regions, wherein each embedded region corresponds to one anti-counterfeiting point block set.
It can be understood that the anti-counterfeit code generated in step S203 is a digital matrix, and the digital matrix needs to be converted into a corresponding pattern if the anti-counterfeit code is embedded in a printed document. Therefore, according to the preset point block generation rule, the anti-counterfeiting code is converted into the anti-counterfeiting point block set.
In a specific implementation, whether the file to be printed is a black-and-white printing job or a color printing job, the anti-counterfeiting point block set is embedded into the N embedded areas. Preferably, a specific channel of the N embedding regions may be embedded, the specific channel including a yellow channel or an invisible color channel, so as to avoid an influence on the print data as much as possible.
And respectively embedding the anti-counterfeiting point block set into the N embedding areas, and then printing to form an encrypted document, namely a confidential document.
As described above, after the user uses up the confidential document, the confidential document is usually torn down, so as to ensure the security of the document information; or the paper is maliciously torn down after being illegally printed by the illegal copy. At this time, if the anti-counterfeiting information is to be traced, any two fragments with the largest area as possible can be selected for splicing (it can be understood that the larger the area is, the more the anti-counterfeiting information is carried, the higher the probability of obtaining the complete anti-counterfeiting information is), a camera or a scanner is used for extracting the anti-counterfeiting information, the information of the spliced repeated part is subjected to deduplication processing, and then the complete anti-counterfeiting information is obtained. The following is a detailed description.
Referring to fig. 4, a schematic flow chart of an anti-counterfeiting information extraction method provided in the embodiment of the present application is shown. As shown in fig. 4, it mainly includes the following steps.
Step S401: scanning a confidential document of which the anti-counterfeiting information is to be extracted to obtain image data corresponding to the confidential document, wherein the image data comprises an anti-counterfeiting point block set.
It will be appreciated that when the security document is torn, the security document scanned here is a spliced fragment of the security document. Specifically, the splicing of two fragments with a large area and less print data can be realized. For example, the fragment a and the fragment C shown in fig. 1 are selected for stitching. And then, scanning the spliced confidential document fragments by using a camera or a scanner to obtain image data corresponding to the confidential document fragments.
Referring to fig. 5, a schematic diagram of image data provided in an embodiment of the present application is shown. As shown in fig. 5, the anti-counterfeiting information in the image data is in a dot matrix form, i.e., an anti-counterfeiting dot block set. In an alternative embodiment, the anti-counterfeiting point block set is invisible to naked eyes and can only be extracted by a camera or a scanner. Each point block in the set of anti-counterfeiting point blocks contains specific information. For example, a black dot block with a square frame is an anchor dot block, and a dot block with a circle is a fault-tolerant dot block, and the dot block is drawn as a black dot for convenience of viewing, and may be a yellow dot or a fluorescent dot invisible to the naked eye in practical application. The dotted line in fig. 5 is a dividing line, and the anti-counterfeiting information on both sides of the dotted line is the same, that is, the anti-counterfeiting information is embedded repeatedly on both sides of the dotted line.
In order to facilitate subsequent data processing, the PC may be used to perform color enhancement and morphological processing on the image data to obtain enhanced image data.
Step S402: and determining the position of the anti-counterfeiting point block set in the image data according to the positioning codes in the anti-counterfeiting point block set and a preset embedding rule.
It should be noted that, in the above image data, in addition to the embedded anti-counterfeit dot block set, dot blocks without any information themselves may be stored, and these dot blocks may generate interference, so that the embedded anchor point block and the preset embedding rule need to be used to accurately determine the position of the embedded anti-counterfeit dot block set for extraction.
In addition, because the anti-counterfeiting point block set is repeatedly embedded, the anti-counterfeiting point block set needs to be accurately determined by using the positioning point block and a preset embedding rule so as to prevent a hand-picking error.
Referring to fig. 6, a schematic diagram of error extraction provided in the embodiment of the present application is shown. In fig. 6, a group of anti-counterfeit point block sets should be above the dotted line, and a group of anti-counterfeit point block sets should be below the dotted line, and if the positions of the anti-counterfeit point block sets are not confirmed by using the anchor point blocks and the predetermined embedding rules, it is likely that the anti-counterfeit point block sets will be incorrectly identified and extracted as the point block sets within the dotted line frame, resulting in false extraction of the anti-counterfeit point block sets.
It should be noted that fig. 6 is only an exemplary illustration. The false identification in the embodiment of the application means that the range where one anti-counterfeiting point block set is located cannot be identified. For example, the identification range of the dashed box in fig. 6 spans a plurality of anti-counterfeit dot block sets.
In an optional embodiment, the anti-counterfeit point block set further includes a direction point block and/or an angle point block, and the tilt angle of the image data may be corrected according to the direction point block and/or the angle point block in the anti-counterfeit point block set.
Step S403: and segmenting the image data according to the positions of the anti-counterfeiting point block sets to obtain M anti-counterfeiting point block slices, wherein each anti-counterfeiting point block slice corresponds to one anti-counterfeiting point block set, and M is more than or equal to 2.
After the position of the anti-counterfeiting point block set is determined in step S402, the image data is segmented according to the position of the anti-counterfeiting point block set, and M anti-counterfeiting point block slices are obtained. It can be understood that the number of the anti-counterfeiting point block slices is matched with the number of the anti-counterfeiting point block sets, and one anti-counterfeiting point block slice corresponds to one anti-counterfeiting point block set.
Referring to fig. 7, a schematic diagram of a slice of an anti-counterfeit dot block according to an embodiment of the present application is provided. In the implementation of the application, the image data is cut into 4 anti-counterfeiting point block slices.
Step S404: and analyzing the M anti-counterfeiting point block slices according to a preset point block generation rule to obtain M anti-counterfeiting code slices.
It can be understood that each point block in the anti-counterfeiting point block slice corresponds to specific information, so that the anti-counterfeiting point block slice can be analyzed according to the point block generation rule to obtain a corresponding anti-counterfeiting code slice.
Referring to tables 1 to 4, the anti-counterfeiting code slices corresponding to the 4 anti-counterfeiting point block slices shown in fig. 7 are binary anti-counterfeiting codes.
Figure BDA0002990027030000071
Figure BDA0002990027030000072
Step S405: and according to a preset fault-tolerant rule, performing combination and fault-tolerant detection on the M anti-counterfeiting coding slices, and judging whether any two or more anti-counterfeiting coding slices contain repeated codes meeting the fault-tolerant rule.
As indicated above, to perform the fault-tolerant check, an error-tolerant code is inserted into the security code when the security code is generated. In the concrete implementation, the M anti-counterfeiting code slices can be combined pairwise, and whether repeated codes meeting the fault-tolerant rule exist in the combined anti-counterfeiting code slices or not is judged. For example, the shaded portion in the above tables 1 and 2 is a repetition code that conforms to the fault tolerance rule; shaded portions in tables 3 and 4 are repetition codes that comply with the fault tolerance rule.
Step S406: and if two or more anti-counterfeiting code slices contain repeated codes meeting the fault-tolerant rule, splicing the two or more anti-counterfeiting code slices after removing the duplication to obtain an anti-counterfeiting code splicing set.
Because the repeated codes are inserted repeated parts, the two anti-counterfeiting code slices need to be subjected to de-duplication treatment after being spliced.
For example, after splicing tables 1 and 2, the shaded portion is subjected to deduplication processing, and table 5 is obtained.
Figure BDA0002990027030000073
TABLE 5
Step S407: and converting the anti-counterfeiting codes in the anti-counterfeiting code splicing set into anti-counterfeiting information according to a preset coding rule.
It can be understood that the codes shown in table 5 are binary codes, and in order to facilitate the user to read the information carried in the binary codes, the binary codes need to be decoded to obtain the relevant anti-counterfeiting information. For example, after decoding the binary code shown in table 5, the obtained anti-counterfeiting information is "XX division printing by using XX printer in XX month XX and XX day XX.
It should be noted that the anti-counterfeiting information is embedded in the anti-counterfeiting information embedding step. Other anti-counterfeiting information can be embedded by a person skilled in the art according to actual needs, and the specific content of the anti-counterfeiting information is not limited in the embodiment of the application.
In an optional embodiment, the splicing set of the anti-counterfeit codes further includes a key code and/or a code format code, where step S407 specifically includes: according to a preset coding rule, converting a secret key code and/or a code form code in the anti-counterfeiting code splicing set into secret key information and/or code form information; carrying out security verification on the anti-counterfeiting code according to the secret key information and/or the coding form information; and if the security check is passed, converting the anti-counterfeiting information codes in the anti-counterfeiting code splicing set into anti-counterfeiting information according to a preset coding rule. That is, when the key code and/or the code form code exists, the key code and/or the code form code is firstly decoded, and if the key code and/or the code form code meets the relevant verification condition, the anti-counterfeiting information code is decoded.
In an optional embodiment, after the anti-counterfeiting code slices are spliced, whether the anti-counterfeiting code splicing set contains a complete anti-counterfeiting code is judged; if the anti-counterfeiting code splicing set contains a complete anti-counterfeiting code, converting the anti-counterfeiting code in the anti-counterfeiting code splicing set into anti-counterfeiting information according to a preset code rule; and if the anti-counterfeiting code splicing set does not contain the complete anti-counterfeiting code, the anti-counterfeiting information extraction is failed.
In an optional embodiment, any two or more anti-counterfeiting code slices may not contain repeated codes meeting the fault-tolerant rule, and whether any anti-counterfeiting code slice contains complete anti-counterfeiting codes or not is judged at the moment; if any anti-counterfeiting code slice contains a complete anti-counterfeiting code, the anti-counterfeiting code in the anti-counterfeiting code slice is converted into character information to obtain anti-counterfeiting information.
By adopting the technical scheme provided by the embodiment of the application, the plurality of anti-counterfeiting information embedding areas are arranged in the confidential file, so that the anti-counterfeiting information can be accurately and efficiently extracted based on the spliced file fragments under the condition that the confidential file is shredded.
Corresponding to the above embodiment, the present application also provides an anti-counterfeit information embedding apparatus, including: a processor, a memory, and a computer program stored in the memory, the computer program comprising instructions that, when executed, cause the image forming apparatus to perform some or all of the steps in the above-described method embodiments.
Corresponding to the above embodiment, the present application also provides an anti-counterfeit information extraction device, including: a processor, a memory, and a computer program stored in the memory, the computer program comprising instructions that, when executed, cause the image forming apparatus to perform some or all of the steps in the above-described method embodiments.
In specific implementation, the present application further provides a computer storage medium, where the computer storage medium may store a program, and the program may include some or all of the steps in the embodiments provided in the present application when executed. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), a Random Access Memory (RAM), or the like.
In a specific implementation, an embodiment of the present application further provides a computer program product, where the computer program product includes executable instructions, and when the executable instructions are executed on a computer, the computer is caused to perform some or all of the steps in the foregoing method embodiment.
In the embodiments of the present application, "at least one" means one or more, "a plurality" means two or more. "and/or" describes the association relationship of the associated objects, and means that there may be three relationships, for example, a and/or B, and may mean that a exists alone, a and B exist simultaneously, and B exists alone. Wherein A and B can be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" and similar expressions refer to any combination of these items, including any combination of singular or plural items. For example, at least one of a, b, and c may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or multiple.
Those of ordinary skill in the art will appreciate that the various elements and algorithm steps described in connection with the embodiments disclosed herein can be implemented as electronic hardware, computer software, or combinations of electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The above description is only for the specific embodiments of the present application, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present disclosure, and all the changes or substitutions should be covered by the protection scope of the present application. The protection scope of the present application shall be subject to the protection scope of the claims.

Claims (14)

1. A method for embedding anti-counterfeiting information is characterized by comprising the following steps:
determining N embedded areas in a page of a file to be printed according to a preset embedding rule, wherein the embedded areas are used for embedding anti-counterfeiting codes, and N is more than or equal to 2;
according to a preset coding rule, coding the anti-counterfeiting information to obtain an anti-counterfeiting information code;
adding a positioning code and a fault-tolerant code in the anti-counterfeiting information code to obtain an anti-counterfeiting code, wherein the positioning code and the fault-tolerant code are respectively used for positioning and fault-tolerant checking the anti-counterfeiting code when the anti-counterfeiting information is extracted;
and converting the anti-counterfeiting code into an anti-counterfeiting point block set according to a preset point block generation rule, and respectively embedding the anti-counterfeiting code into the N embedded regions, wherein each embedded region corresponds to one anti-counterfeiting point block set.
2. The method according to claim 1, wherein the determining N embedded regions in the page of the document to be printed according to the preset embedding rule comprises:
and determining N embedded areas in a print data sparse area and/or at the corner of the file to be printed according to the page information of the file to be printed.
3. The method according to claim 1, wherein the anti-counterfeiting code further comprises a direction code, an angle code, a key code and/or a code form code;
the direction code and/or the angle code are/is used for carrying out graphic correction when the anti-counterfeiting information is extracted;
and the secret key code and/or the code form code are used for carrying out security verification when the anti-counterfeiting information is extracted.
4. The method according to claim 1, wherein the anti-counterfeit information is at least one of a brand, a model, individual information, and a time at which the document to be printed is received of an image forming apparatus that is to print the document to be printed;
the individual information of the image forming apparatus is at least one of a serial number, an IP address and a MAC address of the image forming apparatus, and the individual information of the image forming apparatus is unique information which is distinguished from other image forming apparatuses;
the time of receiving the file to be printed comprises at least one of year, month, day, time, minute and second.
5. A method for extracting anti-counterfeiting information is characterized by comprising the following steps:
scanning a confidential file of which anti-counterfeiting information is to be extracted to obtain image data corresponding to the confidential file, wherein the image data comprises a plurality of anti-counterfeiting point block sets which are repeatedly embedded;
determining the position of the anti-counterfeiting point block set in the image data according to a positioning code and a preset embedding rule in the anti-counterfeiting point block set;
according to the positions of the anti-counterfeiting point block sets, the image data are segmented to obtain M anti-counterfeiting point block slices, wherein each anti-counterfeiting point block slice corresponds to one anti-counterfeiting point block set, and M is more than or equal to 2;
analyzing the M anti-counterfeiting point block slices according to a preset point block generation rule to obtain M anti-counterfeiting code slices;
according to a preset fault-tolerant rule, performing combination and fault-tolerant detection on the M anti-counterfeiting coding slices, and judging whether any two or more anti-counterfeiting coding slices contain repeated codes meeting the fault-tolerant rule;
if two or more anti-counterfeiting code slices contain repeated codes meeting fault-tolerant rules, splicing the two or more anti-counterfeiting code slices after removing the duplication to obtain an anti-counterfeiting code splicing set;
and converting the anti-counterfeiting codes in the anti-counterfeiting code splicing set into anti-counterfeiting information according to a preset coding rule.
6. The method according to claim 5, wherein the secure document from which the anti-counterfeiting information is to be extracted is two or more secure document fragments.
7. The method according to claim 5, wherein the converting the anti-counterfeit codes in the spliced set of anti-counterfeit codes into anti-counterfeit information according to a preset coding rule comprises:
judging whether the anti-counterfeiting code splicing set contains a complete anti-counterfeiting code;
and if the anti-counterfeiting code splicing set contains a complete anti-counterfeiting code, converting the anti-counterfeiting code in the anti-counterfeiting code splicing set into anti-counterfeiting information according to a preset code rule.
8. The method of claim 5, further comprising:
if any two or more anti-counterfeiting code slices do not contain repeated codes meeting the fault-tolerant rule, judging whether any one anti-counterfeiting code slice contains complete anti-counterfeiting codes;
if the ith anti-counterfeiting code slice contains a complete anti-counterfeiting code, the anti-counterfeiting code in the ith anti-counterfeiting code slice is converted into character information to obtain anti-counterfeiting information, and i is more than or equal to 1 and less than or equal to M.
9. The method according to claim 5, after scanning the security document from which the anti-counterfeiting information is to be extracted and obtaining the image data corresponding to the security document, further comprising:
and correcting the inclination angle of the image data according to the direction point block and/or the angle point block in the anti-counterfeiting point block set.
10. The method according to claim 5, wherein converting the anti-counterfeit codes in the splicing set of anti-counterfeit codes into anti-counterfeit information according to a preset coding rule comprises:
according to a preset coding rule, converting a secret key code and/or a code form code in the anti-counterfeiting code splicing set into secret key information and/or code form information;
carrying out security verification on the anti-counterfeiting code according to the secret key information and/or the coding form information;
and if the security check is passed, converting the anti-counterfeiting information codes in the anti-counterfeiting code splicing set into anti-counterfeiting information according to a preset coding rule.
11. An embedded anti-counterfeiting information device, comprising: a processor, a memory, and a computer program, wherein the computer program is stored in the memory, the computer program comprising instructions that, when executed, cause the apparatus to perform the method of any of claims 1-4.
12. An anti-counterfeiting information extraction device, comprising: a processor, a memory, and a computer program, wherein the computer program is stored in the memory, the computer program comprising instructions that, when executed, cause the apparatus to perform the method of any of claims 5-10.
13. A computer-readable storage medium, comprising a stored program, wherein the program, when executed, controls an apparatus on which the computer-readable storage medium resides to perform the method of any one of claims 1-4.
14. A computer-readable storage medium, comprising a stored program, wherein the program, when executed, controls an apparatus on which the computer-readable storage medium resides to perform the method of any one of claims 5-10.
CN202110311711.0A 2021-03-24 2021-03-24 Anti-counterfeiting information embedding method, anti-counterfeiting information extracting method, anti-counterfeiting information embedding device, anti-counterfeiting information extracting device and storage medium Pending CN113076528A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110311711.0A CN113076528A (en) 2021-03-24 2021-03-24 Anti-counterfeiting information embedding method, anti-counterfeiting information extracting method, anti-counterfeiting information embedding device, anti-counterfeiting information extracting device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110311711.0A CN113076528A (en) 2021-03-24 2021-03-24 Anti-counterfeiting information embedding method, anti-counterfeiting information extracting method, anti-counterfeiting information embedding device, anti-counterfeiting information extracting device and storage medium

Publications (1)

Publication Number Publication Date
CN113076528A true CN113076528A (en) 2021-07-06

Family

ID=76613881

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110311711.0A Pending CN113076528A (en) 2021-03-24 2021-03-24 Anti-counterfeiting information embedding method, anti-counterfeiting information extracting method, anti-counterfeiting information embedding device, anti-counterfeiting information extracting device and storage medium

Country Status (1)

Country Link
CN (1) CN113076528A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114564705A (en) * 2022-04-29 2022-05-31 杭州安司源科技有限公司 Traceable anti-shooting method and device and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090021765A1 (en) * 2007-07-05 2009-01-22 Canon Kabushiki Kaisha Image forming apparatus and print controlling method for the same
CN106874819A (en) * 2016-11-22 2017-06-20 复旦大学 Can be by sparse horizontal and vertical parity check code control method of handset identity
CN110335189A (en) * 2019-05-31 2019-10-15 平安科技(深圳)有限公司 Fill method, apparatus, computer equipment and the storage medium of anti-counterfeiting information
KR102023101B1 (en) * 2018-12-20 2019-11-04 주식회사 엔퍼 Apparatus for preventing forgery of original data and method thereof
US20200111190A1 (en) * 2018-10-08 2020-04-09 Alibaba Group Holding Limited Method and apparatus for watermark embedding and extracting
CN111292219A (en) * 2018-11-21 2020-06-16 慧盾信息安全科技(苏州)股份有限公司 Method for realizing hidden watermark of picture image data
CN112395565A (en) * 2019-08-15 2021-02-23 中国移动通信集团广东有限公司 Watermark information embedding and extracting method and device and electronic equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090021765A1 (en) * 2007-07-05 2009-01-22 Canon Kabushiki Kaisha Image forming apparatus and print controlling method for the same
CN106874819A (en) * 2016-11-22 2017-06-20 复旦大学 Can be by sparse horizontal and vertical parity check code control method of handset identity
US20200111190A1 (en) * 2018-10-08 2020-04-09 Alibaba Group Holding Limited Method and apparatus for watermark embedding and extracting
CN111292219A (en) * 2018-11-21 2020-06-16 慧盾信息安全科技(苏州)股份有限公司 Method for realizing hidden watermark of picture image data
KR102023101B1 (en) * 2018-12-20 2019-11-04 주식회사 엔퍼 Apparatus for preventing forgery of original data and method thereof
CN110335189A (en) * 2019-05-31 2019-10-15 平安科技(深圳)有限公司 Fill method, apparatus, computer equipment and the storage medium of anti-counterfeiting information
CN112395565A (en) * 2019-08-15 2021-02-23 中国移动通信集团广东有限公司 Watermark information embedding and extracting method and device and electronic equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114564705A (en) * 2022-04-29 2022-05-31 杭州安司源科技有限公司 Traceable anti-shooting method and device and storage medium

Similar Documents

Publication Publication Date Title
US10373033B2 (en) Two dimensional barcode and method of authentication of such barcode
EP0660275B1 (en) Document copying deterrent method
US6115508A (en) Clock free two-dimensional barcode and method for printing and reading the same
JP3373811B2 (en) Method and apparatus for embedding and detecting watermark information in black and white binary document image
CN108805787B (en) Paper document tampering and authenticating method and device
EP1667422A1 (en) Printed matter processing system, watermark-containing document printing device, watermark-containing document read device, printed matter processing method, information read device, and information read method
US20040001606A1 (en) Watermark fonts
WO2005109311A2 (en) System and method for decoding digital encoded images
Tan et al. Print-Scan Resilient Text Image Watermarking Based on Stroke Direction Modulation for Chinese Document Authentication.
EP3477578A1 (en) Watermark embedding and extracting method for protecting documents
MXPA06001533A (en) Machine readable data.
US20070030521A1 (en) Printed matter processing system, watermark-containing document printing device, watermark-containing document read device, printed matter processing method, information read device, and information read method
US9064138B2 (en) Method for detecting reorgination of barcodes
US7911653B2 (en) Device using low visibility encoded image to manage copy history
US7894102B2 (en) Image processing apparatus for extracting code data from scanned image and control method thereof
WO2020237881A1 (en) Method and apparatus for injecting anti-counterfeit information, computer device, and storage medium
CN113076528A (en) Anti-counterfeiting information embedding method, anti-counterfeiting information extracting method, anti-counterfeiting information embedding device, anti-counterfeiting information extracting device and storage medium
US8038073B2 (en) Tamper detection of documents using encoded dots
CN112650992A (en) Document tracking encryption method based on digital watermark
WO2015140562A1 (en) Steganographic document alteration
RU2446464C2 (en) Method and system for embedding and extracting hidden data in printed documents
US20080292136A1 (en) Data Processing System And Method
JP4838778B2 (en) Additional information expression device and additional information expression method
Varna et al. Data hiding in hard-copy text documents robust to print, scan and photocopy operations
JP4285300B2 (en) Program for realizing information embedding device and program for realizing information reading device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination