CN1140875C - 2D chaotic graphics method for security and antiforge purpose - Google Patents

2D chaotic graphics method for security and antiforge purpose Download PDF

Info

Publication number
CN1140875C
CN1140875C CNB001332724A CN00133272A CN1140875C CN 1140875 C CN1140875 C CN 1140875C CN B001332724 A CNB001332724 A CN B001332724A CN 00133272 A CN00133272 A CN 00133272A CN 1140875 C CN1140875 C CN 1140875C
Authority
CN
China
Prior art keywords
information
chaotic
security
visual information
chaos graph
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB001332724A
Other languages
Chinese (zh)
Other versions
CN1355500A (en
Inventor
廖振强
廖琰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNB001332724A priority Critical patent/CN1140875C/en
Publication of CN1355500A publication Critical patent/CN1355500A/en
Application granted granted Critical
Publication of CN1140875C publication Critical patent/CN1140875C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

The present invention relates to a two-dimensional chaotic figure method for security and anti-counterfeit purposes, which has the steps: information visible figures with characters and figures are designed according to an application object; the information visible figures are automatically switched into chaotic figures by software for hiding all the visual information of the information visible figures; the chaotic figures are printed or carved on information carriers; the chaotic figures on the information carriers are extracted; corresponding inverse transformation is carried out by special software for obtaining the visible figure information hidden by the chaotic figures for verifying the information. The present invention has the advantages of large carrying information quantity, strong security, simple information processing and difficult counterfeiting by other people, and can be applied to the anti-counterfeit management of various credentials such as passports, identification cards, driving cards, etc.

Description

2 D chaotic graphics method for security and antiforge purpose
The present invention relates to a kind of literal, graphics method for security and antiforge purpose, particularly a kind of 2 D chaotic graphics method for security and antiforge purpose.
Prior art is generally 2D bar code technology, and bar code is one group of bar, null symbol of arranging by certain coding rule, in order to the information of representing that certain character, numeral and symbol are formed.The quantity of information that two-dimensional bar code carries is more than bar code, and the information that can be stored in the background data base when using bar code in the past is included in the bar code, can directly obtain corresponding information by reading bar code.Two-dimensional bar code has maintains secrecy and antiforge function, also can work out fingerprint in wherein, can be used for the false proof of certificate, just adopted the PDF417 technology several years ago at the driver's license in more than ten state of the U.S., Americans in uniform's card, soldier's medical certificate etc., the personal information of certificate is organized in the two-dimensional bar code, can realize the automatically identifying and reading of I.D., can prevent that puppet from emitting the generation of certificate incident, also adopt 2D bar code technology on the passport of China the Hong Kong Special Administrative Region.In China some areas certified public accountant card and sale of automobile, 2D bar code technology has also obtained Preliminary Applications.
But the quantity of information that two-dimensional bar code carries is still more limited, and especially when containing black and white or photochrome in the information, the resolution of its identification photo is lower, so the photographic quality that forms is not high.And barcode technology is as a kind of standard code technology, and confidentiality is not very high, easily forges and personation.
The object of the present invention is to provide a kind of carry contain much information, strong security, information processing simple two-dimensional chaotic graphics method for security and antiforge purpose.
The technical solution that realizes purpose of the present invention is: a kind of 2 D chaotic graphics method for security and antiforge purpose, and step is:
1), according to concrete application, design is loaded with the visual information figure of colours such as comprising various literal, numeral, symbol, lines, pattern, fingerprint or photo or black and white;
2), the visual information figure be automatically converted to by software a kind ofly seem at random chaotic, actual chaos graph with a kind of inherent rule of conversion stashes all visual informations of visual information figure;
3), generate chaos graph after, with its printing, printing or engraving on information carrier;
4), the chaos graph on the information extraction carrier, and utilize special software to carry out corresponding inverse transformation, obtain the eye diagram information that chaos graph is hidden, do Information Authentication.
The mode of Information hiding can adopt a kind of rule random noise as can be known that superposes of each gray values of pixel points on the visual information figure, make all visual informations on the figure become invisible, obtain chaos graph, utilize mathematical function that noise figure is remembered, so that the noise with each point in the chaos graph removes when needed, recover original visual information figure.
The mode of Information hiding can adopt: the visual information figure is done security and antiforge purpose handle, arbitrary gray values of pixel points in the visual information figure is stored on another any pixel, utilize mathematical function that it is remembered, read so that will be stored in the gray-scale value of each point when needed, recover the original gray-scale value of each point.
The mode of Information hiding can adopt: with a kind of rule random noise as can be known that superposes of each gray values of pixel points on the visual information figure, arbitrary gray values of pixel points is stored on another any pixel again, obtain chaos graph, utilize the mathematical function memory, so that recover the original gray-scale value of each point when needed.
The mode of Information hiding can adopt: arbitrary gray values of pixel points is stored on another any pixel, a kind of rule random noise as can be known again superposes each gray values of pixel points on the visual information figure, obtain chaos graph, utilize the mathematical function memory, so that recover the original gray-scale value of each point when needed.
The present invention compared with prior art, its remarkable advantage is: 1, principle is simple, has higher confidentiality, its probability that is decrypted is zero, therefore extremely difficult the forgery, be particularly useful for needing highly confidential and false proof occasion, as the fax of classified document, online transmission, the anti-false sign of valuables, important certificate, security etc. prevent palm off etc.; That 2, carries contains much information, photochrome etc. also can be discerned in very high explanation, be more suitable for handling the occasion that photochrome etc. has chromatic information, be suitable for the picture fingerprint recognition, identity is determined, anti-personation of important certificate and valuable property article and antitheft occasion; Though 3, the generating principle of each width of cloth chaos graph of the present invention is identical, concrete structure respectively has difference, even understand coding rule, has discerned a width of cloth chaos figure, also is difficult to discern other chaos graph; 4, two-dimensional bar code is when coding, to different information (as literal, symbol, numeral, fingerprint, photo etc.) coding rule is different, increased the complicacy of handling, and the present invention is with unified processing mode to various information, even it is to the processing of photochrome too, therefore simple relatively to information processing; 5, with low cost, study does not need the user to understand complicated coding principle easily, just can control oneself and design the visual information figure and generate chaos graph.
Fig. 1 is a real information figure of the present invention.
Fig. 2 is the corresponding chaos graph of information graphic shown in Figure 1 of the present invention.
Below in conjunction with accompanying drawing embodiments of the invention are described.
In conjunction with Fig. 1, Fig. 2, one, according to concrete application, designing a width of cloth is loaded with the visible figure of various information (information can comprise various literal, numeral, symbol, line image, fingerprint pattern or photo etc.), for example if I.D. antifalsification label of design, then this width of cloth figure can be loaded with bearer's name, age, sex, the birthplace, the address, identification card number, information such as fingerprint and photo, if the taxi antifalsification label then can be loaded with the taxi number, the car model, manufacturer, the date of production, driver's fingerprint, information such as ID (identity number) card No. and photo.These information synthesize an original visible labels figure by computing machine, and for example fingerprint and photo can go on " stickup " appropriate location in the designed tag figure by instruments such as scanner inputs computing machine again.Call special software of the present invention then, it is automatically converted to a kind of confusion at random that seems, actual chaos graph with a kind of inherent Changing Pattern, so just all visual informations with original figure stash.
The ultimate principle that the visual information figure that designs is converted to chaos graph is: by certain special mathematical function and operation steps, with in addition conversion of each gray values of pixel points on the visual information figure, just can make it become a kind of Information hiding and seem the chaotic at random chaos graph that has the interior change rule actually.When needs restore it for the visual information figure, as long as again it is implemented and the opposite inverse transformation of conversion in the past.Its method and step are:
1, each gray values of pixel points on the visual information figure is superposeed a kind of rule pseudo noise as can be known makes all visual informations on the figure become invisible.This visual information figure that is superimposed with random noise is called " information noise figure ".
2, " information noise figure " further being done security and antiforge purpose handles.Soon arbitrary gray values of pixel points is stored on another any pixel among this figure, for example, gray-scale value on the A point is stored in the B point, the gray-scale value that B is ordered is stored in the C point, the gray-scale value that C is ordered is stored in the D point, obtains chaos graph, utilizes a kind of special mathematical function that it is remembered, so that the gray-scale value that is stored in each point can be read when needed, in order to recover the original gray-scale value of each point;
3, behind the generation chaos graph, print with dot matrix, laser, ink-jet, the hot transfer printing of temperature-sensitive, clip making machine etc., can directly print (or printing) on paper, card, PVC, metal surface or non-metal material surfaces such as glass, plastics, or with engraving technology engraving on the information carrier material, when needs are read information in the chaos graph, the laser read device of available grating belt, optical scanner or digital camera or video camera etc. extract figure, and utilize special software to carry out corresponding inverse transformation operation, can obtain required information;
4, when the needs chaos graph has error correction, then when the above-mentioned first step designs the visual information figure, key message in reproducible whole figure or the figure, it is suitably dwindled certain appropriate location that is placed in the figure, like this, when forming chaos graph, the information of duplicating also is evenly distributed in each position in the figure, when certain part of chaos graph is destroyed, can compare according to two width of cloth visual information figures and differentiate, recover the information of damage.Because in general, for even distribution, the probability that is damaged during identical information of same in two width of cloth figures will reduce by 50%.
The confidentiality of " information-noise figure " has greatly been strengthened in the operation of above-mentioned second portion.Because the figure of a name cards size, pixel has 8 * 10 approximately on it 6(individual), so if reach by the method for composing again to another pixel from certain pixel taking-up gray-scale value randomly, the purpose of recovering " information-noise figure " almost can not, the probability of its realization can be considered as zero, and (annotate: its probability is less than 1/[(8 * 10 6)! ], this "! " be factorial sign, for example 5!=5 * 4 * 3 * 2 * 1, and 10!=3.6288 * 10 6So, 1/[(8 * 10 6)! ] can be considered as zero.
When needs were read the information of hiding in the chaos graph, the inverse transformation that only need carry out above-mentioned second step and first step conversion successively got final product.Promptly at first will there be the pixel value of storing in each point to read, and compose give original pixel, obtain " information-noise figure " before the conversion, and then " information-noise figure " is carried out the denoising operation get final product.
A, for the occasion that general security and antiforge purpose requires, the operation that only needs " visual information figure " to be implemented the above-mentioned first step gets final product;
B, for the exigent occasion of security and antiforge purpose, the operation that only needs " visual information figure " to be implemented above-mentioned second step gets final product.Equal zero because decode the probability of this kind conversion, can be considered as impossible event;
C, for requiring top-secret occasion, for example be used for the transmission of military secrecy, can implement the operation in the above-mentioned first step and second step simultaneously to " visual information figure ";
D, function of the present invention can also be widened, can carry out encryption anti-counterfeiting to any figure and handle, for example, available it the two-dimensional bar code figure is carried out encryption, its privacy degrees is significantly increased, be used for military purposes;
Pseudo noise among e, the present invention in the aforementioned first step and the position that arbitrary gray values of pixel points is stored in arbitrary other pixel in second step all need to manage memory to be lived, so that utilize when implementing inverse transformation.Be that the random number series that adopts randomizer to produce is realized in the example of the present invention.Since the random number series that randomizer produces will be according to the difference of " random number seed " difference, and any function of functions of random number generation function is random number generation function, and can begin to intercept random number series from the arbitrary position the random number series that generates, so this random number series is that non-availability is known to other people;
Chaos graph generation method is not a kind of fixing method among f, the present invention, can change, the random number series difference of in the last step (e), using, just can obtain different chaos graphs, the benefit of doing like this is, even because certain unpredictable accidental cause has been decoded a kind of chaos graph, the also figure only that relates to, and other chaos graph still can not be decoded, because their pairing random number serieses have nothing in common with each other, but so, need a kind of password symbol and represent the random number series that has nothing in common with each other.For example when needing to produce 10 10During individual chaos graph, need be by 10 10Individual numeral is formed password, with 10 10Individual different chaos graph is corresponding.For the high occasion of security and antiforge purpose requirement, preferably construct a special random number generation function separately, rather than will utilize the randomizer in the existing various higher level lanquage by the deviser, like this, confidentiality is higher.
Specifically can be applicable to following field:
1., utilize the transmission of computer network or facsimile recorder to need highly confidential information; 2., be applied to certificate false proof management: for example passport, I.D., driver's license, driver's trip ticket, army's testimony of a witness, health certificate, insurance card, announcement card, residence booklet etc.On these certificates, print the chaos graph that relevant information is arranged, make other people be difficult to forge personation, because relevant Word message is not only arranged in the chaos graph but also can have photo, fingerprint etc. to discern the information of identity; 3., the false proof management of various qualification certificates such as academic certificate, diploma, accounting qualification certificate, teacher's qualification certificate; 4., the false proof management of securities such as stock, bond, ticket, lottery ticket, check; 5., customs declaration list, tax form, insurance registration form etc. are forbidden the list forging, revise; 6., the antifalsification label of valuables, as antifalsification label, as the anti-false sign (can have antitheft effect concurrently) of the vehicles such as motor vehicles and bicycle as valuable household electrical appliance such as colour TV, refrigerator, air-conditioning, DVD.

Claims (8)

1, a kind of 2 D chaotic graphics method for security and antiforge purpose is characterized in that step is:
1), according to concrete application, design is loaded with the visual information figure of colours such as comprising various literal, numeral, symbol, lines, pattern, fingerprint or photo or black and white;
2), the visual information figure be automatically converted to by software a kind ofly seem at random chaotic, actual chaos graph with a kind of inherent rule of conversion stashes all visual informations of visual information figure;
3), generate chaos graph after, with its printing, printing or engraving on information carrier;
4), the chaos graph on the information extraction carrier, and utilize special software to carry out corresponding inverse transformation, obtain the eye diagram information that chaos graph is hidden, do Information Authentication.
2,2 D chaotic graphics method for security and antiforge purpose according to claim 1, it is characterized in that: with a kind of rule random noise as can be known that superposes of each gray values of pixel points on the visual information figure, make all visual informations on the figure become invisible, obtain chaos graph, utilize mathematical function that noise figure is remembered, so that the noise with each point in the chaos graph removes when needed, recover original visual information figure.
3,2 D chaotic graphics method for security and antiforge purpose according to claim 1, it is characterized in that: the visual information figure is done security and antiforge purpose handle, arbitrary gray values of pixel points in the visual information figure is stored on another any pixel, obtain chaos graph, utilize mathematical function that it is remembered, read so that will be stored in the gray-scale value of each point when needed, recover the original gray-scale value of each point.
4,2 D chaotic graphics method for security and antiforge purpose according to claim 1, it is characterized in that a kind of rule random noise as can be known that superposes of each gray values of pixel points on the visual information figure, arbitrary gray values of pixel points is stored on another any pixel again, obtain chaos graph, utilize the mathematical function memory, so that recover the original gray-scale value of each point when needed.
5,2 D chaotic graphics method for security and antiforge purpose according to claim 1, it is characterized in that arbitrary gray values of pixel points is stored on another any pixel, a kind of rule random noise as can be known again superposes each gray values of pixel points on the visual information figure, obtain chaos graph, utilize the mathematical function memory, so that recover the original gray-scale value of each point when needed.
6,2 D chaotic graphics method for security and antiforge purpose according to claim 1 and 2, it is characterized in that the chaos graph that will generate with printing such as dot matrix, laser, ink-jet, the hot transfer printing of temperature-sensitive, clip making machine or be printed on paper, card, PVC, metal surface or the non-metal material surfaces such as glass, plastics, or carve on the information carrier material with engraving technology.
7,2 D chaotic graphics method for security and antiforge purpose according to claim 1 and 2, it is characterized in that extracting figure with laser read device, optical scanner or the digital camera or the video camera etc. of grating belt, and utilize special software to carry out corresponding inverse transformation, obtain required information.
8,2 D chaotic graphics method for security and antiforge purpose according to claim 1, it is characterized in that when design visual information figure, duplicate the key message in whole or the part visual information figure, it is suitably dwindled certain appropriate location that is placed in the figure, at this moment, chaos graph has error correction.
CNB001332724A 2000-11-28 2000-11-28 2D chaotic graphics method for security and antiforge purpose Expired - Fee Related CN1140875C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB001332724A CN1140875C (en) 2000-11-28 2000-11-28 2D chaotic graphics method for security and antiforge purpose

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB001332724A CN1140875C (en) 2000-11-28 2000-11-28 2D chaotic graphics method for security and antiforge purpose

Publications (2)

Publication Number Publication Date
CN1355500A CN1355500A (en) 2002-06-26
CN1140875C true CN1140875C (en) 2004-03-03

Family

ID=4595612

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB001332724A Expired - Fee Related CN1140875C (en) 2000-11-28 2000-11-28 2D chaotic graphics method for security and antiforge purpose

Country Status (1)

Country Link
CN (1) CN1140875C (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101882296A (en) * 2010-05-07 2010-11-10 邹阿金 Method for hiding Chebyshev neural network chaotic digital watermark information
CN103761555A (en) * 2013-04-16 2014-04-30 立德高科(北京)数码科技有限责任公司 Image anti-counterfeiting recognition method applied to motor vehicle driving licenses
CN104778593A (en) * 2015-04-23 2015-07-15 湖北金三峡印务有限公司 Anti-counterfeiting image encrypting and detecting method
CN106427235B (en) * 2016-09-06 2018-06-26 广州市三环永新科技有限公司 A kind of lottery ticket printer method for anti-counterfeit with anti-counterfeiting printing
CN113313503B (en) * 2021-06-18 2022-07-12 鸿博股份有限公司 Lottery anti-counterfeiting method and terminal

Also Published As

Publication number Publication date
CN1355500A (en) 2002-06-26

Similar Documents

Publication Publication Date Title
JP4417999B2 (en) System and method for decoding digitally encoded images
US10726151B2 (en) Methods and apparatus for securely displaying digital images
US6869023B2 (en) Linking documents through digital watermarking
US7025269B2 (en) Barcodes including embedded security features and space saving interleaved text
US8033477B2 (en) Optically variable personalized indicia for identification documents
US8612854B2 (en) Methods and apparatus for securely displaying digital images
US20080044089A1 (en) System & Method for Authenticating Objects Using Multiple-Level Encoding and Decoding
WO2003049007B1 (en) System and method for validating a digital image and corresponding data
JPH03185585A (en) Method and device for deciding validity of id card
CN1691087B (en) System and method for decoding digital coding image
CN1140875C (en) 2D chaotic graphics method for security and antiforge purpose
Noore et al. Embedding biometric identifiers in 2D barcodes for improved security
CN100587764C (en) Method for encryption and decryption of data using pixel
KR100879961B1 (en) Puzzle Typed KeyCode With Image, and Security System and Method Using It
US20030152250A1 (en) Personal identification instrument and method therefor
KR100407464B1 (en) Multi-step encryption/decryption apparatus and method by pixel unit
JP2002516777A (en) Identification documents with specific reduced scale printing of documents
PL243755B1 (en) Method to create label security
BG112050A (en) A method and a marking (imaging) of inquiry and protection against fraud and falsification, using encrypted changes in the dimentional positioning of certain encoded elements of the image
Kumar Study of Security Features for Enhancing the Security of Secured Documents of Universities
Audumbar et al. Optical Watermark Based On Digital Printing
Audumbar et al. High Security Optical Watermark based on Digital Printing
Kadhom Authentication using Hidden Encrypted Barcode

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C14 Grant of patent or utility model
GR01 Patent grant
C19 Lapse of patent right due to non-payment of the annual fee
CF01 Termination of patent right due to non-payment of annual fee