CN115293311A - Color watermark anti-counterfeiting method and device based on micro-point code - Google Patents

Color watermark anti-counterfeiting method and device based on micro-point code Download PDF

Info

Publication number
CN115293311A
CN115293311A CN202211219310.3A CN202211219310A CN115293311A CN 115293311 A CN115293311 A CN 115293311A CN 202211219310 A CN202211219310 A CN 202211219310A CN 115293311 A CN115293311 A CN 115293311A
Authority
CN
China
Prior art keywords
code
counterfeiting
graph
original
detected
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211219310.3A
Other languages
Chinese (zh)
Other versions
CN115293311B (en
Inventor
鞠翔
贾元新
苟佳洁
匡扶
孙可
严维同
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Microdot Science And Technology Co ltd
Original Assignee
Beijing Microdot Science And Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Microdot Science And Technology Co ltd filed Critical Beijing Microdot Science And Technology Co ltd
Priority to CN202211219310.3A priority Critical patent/CN115293311B/en
Publication of CN115293311A publication Critical patent/CN115293311A/en
Application granted granted Critical
Publication of CN115293311B publication Critical patent/CN115293311B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Abstract

The invention provides a color watermark anti-counterfeiting method and a device based on a micro-point code, wherein the method comprises the following steps: generating a dot matrix code graph by using any original code value based on a code system of the micro dot code; processing the original code value by using a dynamic encryption algorithm and a dynamic encryption parameter corresponding to the original code value to obtain an original graph anti-counterfeiting feature embedded password; determining size templates, randomly distributed positions, embedded information of geometric invariance positions and embedded information of geometric variability positions of a plurality of graph anti-counterfeiting features embedded in the dot code pattern according to the original graph anti-counterfeiting feature embedded password and a graph anti-counterfeiting feature embedding algorithm; embedding a plurality of pattern anti-counterfeiting features into the dot matrix code pattern to obtain a color watermark pattern security code electronic document; and printing the electronic document with the color watermark pattern security code into a color watermark pattern security code physical identification so as to detect the color watermark pattern security code physical identification to be detected to judge the authenticity.

Description

Color watermark anti-counterfeiting method and device based on micro-point code
Technical Field
The invention relates to the technical field of anti-counterfeiting, in particular to a color watermark anti-counterfeiting method and device based on a micro-point code.
Background
The most common two types of one-object-one-code anti-counterfeiting schemes currently exist: the first type is digital verification based on two-dimensional codes and numbers, and the application defects are that the safety is poor: the two-dimensional code and the number which are visible on the printed matter are used as the ID of the article and can be counterfeited in batches at low cost, various pattern numbers can be copied after being visible due to the manufacturing source of the two-dimensional code, the hidden verification code corresponding to the ID usually needs a fragile coating process, can be checked only by uncovering and scraping after being purchased by a consumer, and can not effectively check the correctness of the ID and the verification code before being purchased under nondestructive verification; the second type is based on artificial or natural random detail characteristics during printing to acquire images after printing, and adopts an image uploading or downloading mode to extract and compare the image details during terminal user verification, so that although the defect that the first type cannot perform pre-purchase anti-counterfeiting verification on consumers is overcome, the second type has the defects that a production line of a production enterprise needs to be modified, special image acquisition analysis uploading software and hardware are erected, high-definition image details stored at the cloud end occupy a large amount of storage cost, and obvious flow and time are consumed when a user performs anti-counterfeiting detection. The two types of common problems are poor user experience, such as long time for searching the database for duplicate generated by a large number of unique codes, slow and high-definition image downloading of random unique codes in the database or long time for verifying authenticity by cloud comparison of local detection image uploading.
Disclosure of Invention
The embodiment of the invention aims to provide a color watermark anti-counterfeiting method and a color watermark anti-counterfeiting device based on a micro-point code, and the color watermark anti-counterfeiting method and the color watermark anti-counterfeiting device based on the micro-point code are more balanced in multiple aspects of comprehensive cost, inspection experience and anti-counterfeiting performance.
In order to achieve the above object, an embodiment of the present invention provides a color watermark anti-counterfeiting method based on a micro-point code, where the method includes: generating a dot matrix code image by using any original code value based on the code system of the micro-dot code; processing the original code value by using a dynamic encryption algorithm and a dynamic encryption parameter corresponding to the original code value to obtain an original graph anti-counterfeiting feature embedded password; determining size templates, randomly distributed positions, embedded information of geometric invariance positions and embedded information of geometric variability positions of a plurality of graph anti-counterfeiting features embedded in the dot code pattern according to the original graph anti-counterfeiting feature embedded password and a graph anti-counterfeiting feature embedding algorithm; embedding the plurality of pattern anti-counterfeiting features into the dot matrix code pattern according to the size template, the random distribution positions, the information embedded in the geometric invariance positions and the information embedded in the geometric variability positions to obtain a color watermark pattern security code electronic document; storing a dynamic encryption parameter corresponding to the original code value, an original graph anti-counterfeiting feature fingerprint corresponding to the original code value and an N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch to a server, wherein the original graph anti-counterfeiting feature fingerprint is obtained by processing the electronic document of the color watermark graph security code by using the original graph anti-counterfeiting feature embedded password and a graph anti-counterfeiting feature extraction algorithm corresponding to the graph anti-counterfeiting feature embedded algorithm; and printing the electronic document of the color watermark pattern security code into a color watermark pattern security code real object identifier so as to detect the color watermark pattern security code real object identifier to be detected according to the dynamic encryption parameter corresponding to the original code value, the original pattern anti-counterfeiting feature fingerprint corresponding to the original code value and the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch so as to judge authenticity.
Preferably, the processing the original code value by using a dynamic encryption algorithm and a dynamic encryption parameter corresponding to the original code value to obtain an original graphic anti-counterfeiting feature embedded password comprises: based on a linear congruence method, executing n times of random number generation operation to obtain an original graph anti-counterfeiting feature embedded password prototype; embedding the password prototype into the original anti-counterfeiting characteristic of the graph and converting the password prototype into a byte array; putting the first 8 bits or the last 8 bits in the byte array into a primary value array; converting the primary initial value array into a float64 type, and taking a decimal part as an initial value x0 of a well-known Logistic mapping chaotic encryption algorithm; and according to the initial value x0, ln times of Logistic iteration is executed by combining the parameters L alpha and Ln of the dynamic encryption algorithm of the original code value, and the front 10 bits of the effective number of the random floating point number obtained by iterative operation are used as the anti-counterfeiting feature embedded password of the original graph, wherein L alpha is a scaling coefficient in the Logistic algorithm, and Ln is the iteration times.
Preferably, the determining, according to the original graphical anti-counterfeiting feature embedded password and the graphical anti-counterfeiting feature embedding algorithm, the size templates, the random distribution positions, the information embedded in the geometric invariance positions and the information embedded in the geometric variability positions of the plurality of graphical anti-counterfeiting features embedded in the dot code pattern comprises: taking the remainder of dividing the last bit of the original graph anti-counterfeiting feature embedded password by 3 as a parameter of a size template of a plurality of graph anti-counterfeiting features, wherein the size template comprises a large size, a medium size and a small size; traversing coordinate positions where code points can appear in the dot matrix code graph, and taking part of the coordinate positions as random distribution positions for drawing and embedding the anti-counterfeiting features of the plurality of graphs; when the coordinate positions where the eight code points adjacent to the random distribution position on the left upper side, right left side, left lower side, right upper side, right upper side can appear have no code point, determining the random distribution position as a geometric variability position; traversing all geometric variability positions, and taking the original graph anti-counterfeiting feature embedded password as an initial random number seed to iterate to obtain an integer random number m1; dividing the integer random number m1 by 34 to obtain a remainder k1; if the remainder k1 is greater than or equal to 5, no graph is embedded in the geometric variability position; if the remainder k1 is less than 5, determining information of embedding a first specific graph template in the geometric variability position according to the remainder k1; dividing the integer random number m1 by 5 to obtain a remainder c1; determining information for adding color in the first specific graph template according to the remainder c1; taking the integer random number m1 as a random number seed, and taking the remainder k1 as iteration times to obtain an integer random number e1; dividing the integer random number e1 by 4 to obtain a remainder t1; determining information for performing geometric transformation on the first specific graph template according to the remainder t1; when no code point exists in the coordinate positions where four adjacent code points can appear right left, right and above the randomly distributed positions, and code points exist in the coordinate positions where four adjacent code points can appear left upper, left lower, right upper and right lower, the randomly distributed positions are determined to be geometric invariance positions; traversing all geometric invariance positions, and taking the original graph anti-counterfeiting feature embedded password as an initial random number seed to iteratively calculate an integer random number m2; dividing the integer random number m2 by 34 to obtain a remainder k2; if the remainder k2 is greater than or equal to 5, no graph is embedded in the geometric invariance position; if the remainder k2 is less than 5, determining that the information of a second specific graph template is embedded in the geometric invariance position according to the remainder k2; dividing the integer random number m2 by 5 to obtain a remainder c2; and determining information for adding colors in the second specific graph template according to the remainder c 2.
Preferably, the detecting the color watermark pattern security code physical identifier to be detected to judge the authenticity according to the dynamic encryption parameter corresponding to the original code value, the original pattern anti-counterfeiting feature fingerprint corresponding to the original code value and the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold corresponding to the current printing batch comprises: extracting a code value to be detected of the color watermark graphic security code object identification to be detected; when the extraction is unsuccessful within the preset time or the extracted code value to be detected is not stored in the server, a counterfeit product is prompted; when the extracted code value to be detected is stored in the server, acquiring a dynamic encryption parameter corresponding to the code value to be detected, an original graph anti-counterfeiting feature fingerprint corresponding to the code value to be detected and an N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch from the server; processing the code value to be detected by using the dynamic encryption algorithm and the dynamic encryption parameter corresponding to the code value to be detected to obtain an embedded password of the anti-counterfeiting characteristic of the graph to be detected; according to the pattern anti-counterfeiting feature embedding password to be detected and the pattern anti-counterfeiting feature extraction algorithm, obtaining a pattern anti-counterfeiting feature fingerprint to be detected of the color watermark pattern security code real object identification to be detected; comparing the graph anti-counterfeiting characteristic fingerprint to be detected with an original graph anti-counterfeiting characteristic fingerprint corresponding to the code value to be detected, and calculating the matching rate of two character strings in the same character set encoding mode to obtain a single-frame passing result; when the number of the single-frame passing results is accumulated to N, calculating a multi-frame passing rate statistic value; when the multi-frame passing rate statistic value is smaller than the authenticity judgment threshold value of the N frames of anti-counterfeiting feature fingerprints corresponding to the current printing batch, prompting a counterfeit product; and prompting the genuine product when the multi-frame passing rate statistic value is greater than or equal to the authenticity judgment threshold value of the N frames of anti-counterfeiting feature fingerprints corresponding to the current printing batch.
Preferably, the method further comprises: acquiring graph anti-counterfeiting characteristic fingerprints of M color watermark graph security code real object identifications corresponding to the same original code value; comparing the image anti-counterfeiting characteristic fingerprints of the color watermark image security code physical identification corresponding to M identical original code values with the original image anti-counterfeiting characteristic fingerprints corresponding to the original code values to obtain an average value of M single-frame matching rates; and when the average value is smaller than the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold values corresponding to the current printing batch, updating the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold values corresponding to the current printing batch to the average value and sending the average value to the server.
Preferably, the step of obtaining the fingerprint of the security code object identifier of the color watermark image to be detected according to the embedded password of the security feature of the image to be detected and the extraction algorithm of the security feature of the image to be detected includes: comparing the graph anti-counterfeiting feature embedding password to be detected with an original graph anti-counterfeiting feature embedding password corresponding to the code value to be detected, and writing a comparison result into the graph anti-counterfeiting feature fingerprint to be detected; verifying the color of the central point of the pattern anti-counterfeiting feature of the color watermark pattern security code real object identifier to be detected, and obtaining a first verification result; verifying the geometric transformation size of the graph anti-counterfeiting feature of the color watermark graph security code real object identification to be detected, and obtaining a second verification result; verifying the shape of the pattern anti-counterfeiting feature of the color watermark pattern security code real object identifier to be detected, and obtaining a third verification result; obtaining a comparison result according to the first verification result, the second verification result, the third verification result and the respective threshold values, and writing the comparison result into the anti-counterfeiting characteristic fingerprint of the graph to be detected; and outputting the anti-counterfeiting characteristic fingerprint of the graph to be detected.
Preferably, the code value can be a character string encoded by any character, when the code value of the micro-point code is converted into a binary system, an obvious gap larger than or equal to 1 data position exists between data, the color watermark pattern safety code object mark manufactured by using the micro-point code has at least 90% robustness in a 20mm-20mm area, can be decoded in a contaminated area to any residual 3mm-3mm complete area, and can be read under an interference pattern except for linear, nodular and special-shaped code points.
The embodiment of the invention also provides a color watermark anti-counterfeiting device based on the micro-point code, which comprises: the system comprises a code map generating module, a password acquiring module, a document acquiring module, a parameter storage module and an identification processing module, wherein the code map generating module is used for generating a dot matrix code map by using any original code value based on a code system of a micro-point code; the password acquisition module is used for processing the original code value by using a dynamic encryption algorithm and a dynamic encryption parameter corresponding to the original code value to obtain an original graph anti-counterfeiting feature embedded password; the document acquisition module is used for: determining size templates, randomly distributed positions, embedded information of geometric invariance positions and embedded information of geometric variability positions of a plurality of graph anti-counterfeiting features embedded in the dot code pattern according to the original graph anti-counterfeiting feature embedded password and a graph anti-counterfeiting feature embedding algorithm; embedding the plurality of pattern anti-counterfeiting features into the dot matrix code pattern according to the size template, the random distribution positions, the information embedded in the geometric invariance positions and the information embedded in the geometric variability positions to obtain a color watermark pattern security code electronic document; the parameter storage module is used for storing a dynamic encryption parameter corresponding to the original code value, an original graph anti-counterfeiting feature fingerprint corresponding to the original code value and an N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch to a server, wherein the original graph anti-counterfeiting feature fingerprint is obtained by processing the electronic document of the color watermark graph security code by using the original graph anti-counterfeiting feature embedded password and a graph anti-counterfeiting feature extraction algorithm corresponding to the graph anti-counterfeiting feature embedded algorithm; the mark processing module is used for printing the electronic document of the color watermark pattern security code into a color watermark pattern security code real object mark so as to detect the color watermark pattern security code real object mark to be detected according to the dynamic encryption parameter corresponding to the original code value, the original pattern anti-counterfeiting feature fingerprint corresponding to the original code value and the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch so as to judge authenticity.
Preferably, the password obtaining module is configured to: based on a linear congruence method, executing n times of random number generation operation to obtain an original graph anti-counterfeiting feature embedded password prototype; converting the original graph anti-counterfeiting feature embedded password prototype into a byte array; putting the first 8 bits or the last 8 bits in the byte array into a primary value array; converting the primary initial value array into a float64 type, and taking a decimal part as an initial value x0 of a well-known Logistic mapping chaotic encryption algorithm; and according to the initial value x0, ln times of Logistic iteration is executed by combining the parameters L alpha and Ln of the dynamic encryption algorithm of the original code value, and the front 10 bits of the effective number of the random floating point number obtained by iterative operation are used as the anti-counterfeiting feature embedded password of the original graph, wherein L alpha is a scaling coefficient in the Logistic algorithm, and Ln is the iteration times.
Preferably, the document acquisition module is configured to: taking the remainder of dividing the last bit of the original graph anti-counterfeiting feature embedded password by 3 as a parameter of a size template of the plurality of graph anti-counterfeiting features, wherein the size template comprises a large size, a medium size and a small size; traversing coordinate positions where code points can appear in the dot matrix code graph, and taking part of the coordinate positions as random distribution positions for drawing and embedding the anti-counterfeiting features of the plurality of graphs; when the coordinate positions where the eight code points adjacent to the random distribution position on the left upper side, right left side, left lower side, right upper side, right upper side can appear have no code point, determining the random distribution position as a geometric variability position; traversing all geometric variability positions, and taking the original graph anti-counterfeiting feature embedded password as an initial random number seed to iterate to obtain an integer random number m1; dividing the integer random number m1 by 34 to obtain a remainder k1; if the remainder k1 is larger than or equal to 5, no graph is embedded in the geometric variability position; if the remainder k1 is less than 5, determining information of embedding a first specific graph template in the geometric variability position according to the remainder k1; dividing the integer random number m1 by 5 to obtain a remainder c1; determining information for adding colors in the first specific graph template according to the remainder c1; taking the integer random number m1 as a random number seed, and taking the remainder k1 as iteration times to obtain an integer random number e1; dividing the integer random number e1 by 4 to obtain a remainder t1; determining information for performing geometric transformation on the first specific graph template according to the remainder t1; when no code point exists in the coordinate positions where four adjacent code points can appear right left, right and above the randomly distributed positions, and code points exist in the coordinate positions where four adjacent code points can appear left upper, left lower, right upper and right lower, the randomly distributed positions are determined to be geometric invariance positions; traversing all geometric invariance positions, and taking the original graph anti-counterfeiting feature embedded password as an initial random number seed to iterate to obtain an integer random number m2; dividing the integer random number m2 by 34 to obtain a remainder k2; if the remainder k2 is larger than or equal to 5, no graph is embedded in the geometric invariance position; if the remainder k2 is less than 5, determining that the information of a second specific graph template is embedded in the geometric invariance position according to the remainder k2; dividing the integer random number m2 by 5 to obtain a remainder c2; and determining information for adding color in the second specific graph template according to the remainder c 2.
Preferably, the identification processing module is configured to: extracting a code value to be detected of the color watermark graphic security code real object identification to be detected; when the extraction is unsuccessful within the preset time or the extracted code value to be detected is not stored in the server, a counterfeit product is prompted; when the extracted code value to be detected is stored in the server, acquiring a dynamic encryption parameter corresponding to the code value to be detected, an original graph anti-counterfeiting feature fingerprint corresponding to the code value to be detected and an N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch from the server; processing the code value to be detected by using the dynamic encryption algorithm and the dynamic encryption algorithm corresponding to the code value to be detected to obtain an embedded password of the anti-counterfeiting feature of the graph to be detected; according to the anti-counterfeiting feature embedding password of the pattern to be detected and the pattern anti-counterfeiting feature extraction algorithm, obtaining the anti-counterfeiting feature fingerprint of the pattern to be detected of the color watermark pattern security code physical identification to be detected; comparing the graph anti-counterfeiting characteristic fingerprint to be detected with an original graph anti-counterfeiting characteristic fingerprint corresponding to the code value to be detected, and calculating the matching rate of two character strings in the same character set encoding mode to obtain a single-frame passing result; when the number of the single-frame passing results is accumulated to N, calculating a multi-frame passing rate statistic value; when the multi-frame passing rate statistic value is smaller than the authenticity judgment threshold value of the N frames of anti-counterfeiting feature fingerprints corresponding to the current printing batch, prompting a counterfeit product; and prompting the genuine product when the multi-frame passing rate statistic value is greater than or equal to the authenticity judgment threshold value of the N frames of anti-counterfeiting feature fingerprints corresponding to the current printing batch.
Preferably, the apparatus further comprises a parameter adjusting module for: acquiring graph anti-counterfeiting characteristic fingerprints of M color watermark graph security code real object identifications corresponding to the same original code value; comparing the image anti-counterfeiting characteristic fingerprints of the color watermark image security code physical identification corresponding to M identical original code values with the original image anti-counterfeiting characteristic fingerprints corresponding to the original code values to obtain an average value of M single-frame matching rates; and when the average value is smaller than the authenticity judgment threshold value of the N frames of anti-counterfeiting characteristic fingerprints corresponding to the current printing batch, updating the authenticity judgment threshold value of the N frames of anti-counterfeiting characteristic fingerprints corresponding to the current printing batch as the average value to the server.
Preferably, the identification processing module is configured to: comparing the anti-counterfeiting characteristic embedded password of the graph to be detected with the original anti-counterfeiting characteristic embedded password corresponding to the code value to be detected, and writing a comparison result into the anti-counterfeiting characteristic fingerprint of the graph to be detected; verifying the color of the central point of the pattern anti-counterfeiting feature of the color watermark pattern security code real object identifier to be detected, and obtaining a first verification result; verifying the geometric transformation size of the graphic anti-counterfeiting feature of the color watermark graphic security code real object identifier to be detected, and obtaining a second verification result; verifying the shape of the pattern anti-counterfeiting feature of the color watermark pattern security code real object identifier to be detected, and obtaining a third verification result; obtaining comparison results according to the first verification result, the second verification result, the third verification result and the respective threshold values, and writing the comparison results into the anti-counterfeiting characteristic fingerprint of the graph to be detected; and outputting the anti-counterfeiting characteristic fingerprint of the graph to be detected.
Through the technical scheme, the security is improved by selecting the non-open-source micro-point code system to replace the traditional open-source code system, a counterfeiter is prevented from directly acquiring code values through software of the open-source two-dimensional code decoding algorithm and generating the code values to forge single codes, and even guessing numbers according to an attempted observation rule to forge a large number of one-object one-code batch forgings; because a non-open source code system is selected, continuous numbers can be directly used as code value IDs, and the feedback time of system inspection is greatly shortened; the technology of embedding and extracting the anti-counterfeiting characteristic of the graph is added to the traditional digital verification technology, and the original non-anti-copying printed matter has the anti-copying effect on the basis of the micro-point code graph; the dynamic encryption technology is used for establishing the relationship between the code value ID and the anti-counterfeiting feature embedded password, so that an attacker cannot effectively obtain the code value of each code even through decompiling and cracking programs due to the dynamic property, and the technical safety of the anti-counterfeiting scheme is greatly improved.
Additional features and advantages of embodiments of the invention will be set forth in the detailed description which follows.
Drawings
The accompanying drawings, which are included to provide a further understanding of the embodiments of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the embodiments of the invention without limiting the embodiments of the invention. In the drawings:
fig. 1 is a flowchart of a color watermark anti-counterfeiting method based on a micro-point code according to an embodiment of the present invention;
FIG. 2 is a flowchart of a method for determining an embedded password of an original graphical anti-counterfeiting feature according to an embodiment of the present invention;
FIG. 3 is a flowchart of a method for determining a plurality of anti-counterfeiting features embedded in the dot code pattern according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of a process for determining a plurality of graphical security features provided in accordance with one embodiment of the present invention;
FIG. 5 is a schematic diagram of an electronic document with a color watermark pattern security code according to an embodiment of the present invention;
fig. 6 is a flowchart of a method for detecting a physical identifier of a security code of a color watermark pattern to be detected according to an embodiment of the present invention;
FIG. 7 is a flowchart of a method for determining a fingerprint of a security feature of a pattern to be detected according to an embodiment of the present invention;
FIG. 8 is a flowchart of a method for dynamically adjusting a decision threshold according to an embodiment of the invention;
fig. 9 is a schematic structural diagram of a color watermark anti-counterfeiting device based on a micro-dot code according to an embodiment of the invention.
Detailed Description
The following describes in detail embodiments of the present invention with reference to the drawings. It should be understood that the detailed description and specific examples, while indicating embodiments of the invention, are given by way of illustration and explanation only, not limitation.
Fig. 1 is a flowchart of a color watermark anti-counterfeiting method based on a micro-point code according to an embodiment of the present invention. As shown in fig. 1, the method includes:
s101, based on the code system of the micro-point codes, generating a dot matrix code image by using any original code value;
the micro-dot code is a sparse dot matrix code with high robustness, is an encoding algorithm and a decoding algorithm which are not open sources, and the code pattern cannot be read by other open source code decoding algorithms, compared with the traditional method that code values are converted into dense two-dimensional codes with binary systems 1 and 0 respectively arranged in a deep code dot form and a shallow code dot form, the code values of the micro-dot code are converted into binary data, obvious gaps of more than or equal to 1 data position exist between the binary data, and the code values can be character strings of any character codes.
The color watermark pattern security code object identification manufactured by using the micro-dot codes supports that more than 90% robustness is achieved in 20mm x 20mm, contamination is supported until any residual 3mm x 3mm complete area can still be decoded, 15% fault tolerance is achieved in the 3mm x 3mm minimum readable area, and interference patterns except linear, cluster and special-shaped code dots can still be read. The lattice code system meeting the robustness condition provides powerful guarantee for embedding anti-counterfeiting characteristics with enough quantity, area and position independence.
The code value of the traditional digital code check must ensure random discreteness to prevent a counterfeiter from decoding randomly, guess the law and try out the source code system for encoding for free to easily forge. And this embodiment can use continuous digit as sign indicating number value, very big promotion sign indicating number production's efficiency and prevent guessing. Meanwhile, the micro dot codes can achieve the effect of retaining the aesthetic property of the almost invisible anti-counterfeiting mark outside 15cm and the aesthetic feeling of the brand.
In the embodiment, a plurality of micro-point codes which are disclosed or not disclosed at present are selected as codes to be processed for anti-counterfeiting. The purpose of selecting the micro-point code system is as follows: can generate the two-dimensional code image printing of arbitrary size (generally more than 3 mm) according to anti-fake detection demand on stock surface, compare that traditional intensive two-dimensional code needs 8 mm's anti-fake detection size less influence the packing beautifully, have more anti-fake disguise at least. Compared with traditional high-density two-dimensional Code images such as Data Matrix, maxiCode, aztec, QR Code, PDF417, vericode, ultracode, code 49, code 16K and the like, the micro-point Code image visually represents more light-colored lattices and has no obvious boundary which can be distinguished by human eyes.
The embodiment of the present invention is described only for any original code value, but those skilled in the art should understand that other different original code values exist for the anti-counterfeiting of different articles due to the principle of one object and one code. For other original code values, the processing of the embodiment of the present invention may also be used in the same way, and is not described herein again.
Step S102, processing the original code value by using a dynamic encryption algorithm and a dynamic encryption parameter corresponding to the original code value to obtain an original graphic anti-counterfeiting feature embedded password;
wherein, as shown in fig. 2, the following steps S201-205 of the present invention provide an embodiment of obtaining the original graphic security feature embedded password, which is preferable for the embedded graphic security feature of the present invention, but those skilled in the art should know that the present invention is not limited thereto.
Step S201, based on a linear congruence method, executing n times of random number generation operation to obtain an original graph anti-counterfeiting feature embedded password prototype;
wherein n is the dynamic encryption parameter corresponding to the original code value.
Step S202, the original graph anti-counterfeiting feature is embedded into a password prototype and converted into a byte array;
step S203, taking the first 8 bits or the last 8 bits in the byte array and putting the first 8 bits or the last 8 bits into a primary value array;
step S204, converting the primary initial value array into a float64 type, and taking a decimal part as an initial value x0 of a well-known Logistic mapping chaotic encryption algorithm;
wherein x0 ∈ (0, 1).
And S205, according to the initial value x0, combining the parameters L alpha and Ln of the dynamic encryption algorithm of the original code value, executing Ln times of Logistic iteration, and taking the first 10 bits of the effective number of the random floating point number obtained by iteration operation as the anti-counterfeiting feature embedded password of the original graph, wherein L alpha is a scaling coefficient in the Logistic algorithm, and Ln is the iteration times.
Therein, it is to be understood that the preferred original graphical security feature embedding password for the embedded graphical security feature of the present invention is a 10 digit number. The embodiment of the invention improves the anti-cracking performance of the technology through dynamic variability, and the corresponding verification improves the resistance of batch counterfeiting.
Step S103, determining size templates, randomly distributed positions, information embedded in geometric invariance positions and information embedded in geometric variability positions of a plurality of graph anti-counterfeiting features embedded in the dot matrix code pattern according to the original graph anti-counterfeiting feature embedded password and a graph anti-counterfeiting feature embedded algorithm;
wherein, as shown in fig. 3, step S103 includes the following steps S301 to S318,
step S301, taking the remainder of dividing the last bit of the original graph anti-counterfeiting feature embedded password by 3 as a parameter of a size template of a plurality of graph anti-counterfeiting features, wherein the size template comprises a large size, a medium size and a small size;
wherein, the remainder may be 0,1, 2, corresponding to three templates, large, medium, and small, respectively.
Step S302, traversing coordinate positions where code points can appear in the dot matrix code image, and taking part of the coordinate positions as random distribution positions for drawing and embedding the anti-counterfeiting features of a plurality of graphs;
wherein traversing the coordinate positions where code points can occur in the lattice code graph and the geometric variability positions and geometric invariance positions described below are shown in fig. 4.
Step S303, when the coordinate positions where the eight code points adjacent to the random distribution position on the upper left, right left, left lower, right, right upper and right upper can appear are all free of code points, determining the random distribution position as a geometric variability position;
step S304, traversing all geometric variability positions, and iterating by using the original graph anti-counterfeiting feature embedded password as an initial random number seed to obtain an integer random number m1;
step S305, dividing the integer random number m1 by 34 to obtain a remainder k1;
step S306, if the remainder k1 is greater than or equal to 5, no graph is embedded in the geometric variability position;
step S307, if the remainder k1 is less than 5, determining that the information of a first specific graph template is embedded in the geometric variability position according to the remainder k1;
wherein k1 is only 0 to 4, and can be represented by the following: namely triangle-0, circle-1, five-pointed star-2, cross-3, square-4.
Step S308, dividing the integer random number m1 by 5 to obtain a remainder c1;
step S309, determining information of adding colors in the first specific graph template according to the remainder c1;
wherein c1 is only 0 to 4, and can be represented as follows: i.e. deep red-0, yellow-1, blue-2, green-3, violet-4.
Step S310, the integer random number m1 is used as a random number seed, and the remainder k1 is used as iteration times to obtain an integer random number e1;
step S311, dividing the integer random number e1 by 4 to obtain a remainder t1;
step S312, determining information for performing geometric transformation on the first specific graph template according to the remainder t1;
wherein t1 can only be 0 to 3, and can be represented by the following: namely, the horizontal stretching is 1.5 times to 1 time, the vertical stretching is 1.5 times to 2 times, and the clockwise rotation is 45 degrees to 3 times without changing.
Step S313, when no code point exists in the coordinate positions where four adjacent code points can appear right left, right and above the random distribution position, and a code point exists in the coordinate positions where four adjacent code points can appear above left, below left, above right and below right, the random distribution position is determined to be a geometric invariance position;
step S314, traversing all geometric invariance positions, and taking the original graph anti-counterfeiting feature embedded password as an initial random number seed to iteratively calculate an integer random number m2;
step S315, dividing the integer random number m2 by 34 to obtain a remainder k2;
step S316, if the remainder k2 is greater than or equal to 5, no graph is embedded in the geometric invariance position;
step S317, if the remainder k2 is less than 5, determining that the information of a second specific graph template is embedded in the geometric invariance position according to the remainder k2;
wherein k2 is only 0 to 4, and can be represented as follows: namely a triangle-0, a circle-1, a five-pointed star-2, a cross-3 and a square-4.
Step S318, dividing the integer random number m2 by 5 to obtain a remainder c2;
step S319, determining information for adding color to the second specific graphic template according to the remainder c 2.
Wherein c2 is only 0 to 4, and can be represented by the following: i.e. deep red-0, yellow-1, blue-2, green-3, violet-4.
Step S104, embedding the anti-counterfeiting characteristics of the plurality of graphs into the dot matrix code graph according to the size template, the random distribution positions, the information embedded in the geometric invariance positions and the information embedded in the geometric variability positions to obtain a color watermark graph security code electronic document;
wherein, fig. 5 is a schematic diagram of an electronic document with a color watermark pattern security code. As shown in fig. 5, a total of 5 graphic anti-counterfeiting features are embedded in the dot matrix code image, which are respectively a dark red square, a green square and rotated clockwise by 45 °, a purple triangle, a blue square and a yellow circle.
Step S105, storing a dynamic encryption parameter corresponding to the original code value, an original graph anti-counterfeiting feature fingerprint corresponding to the original code value and an N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch to a server, wherein the original graph anti-counterfeiting feature fingerprint is obtained by processing the electronic document of the color watermark graph security code by using the original graph anti-counterfeiting feature embedded password and a graph anti-counterfeiting feature extraction algorithm corresponding to the graph anti-counterfeiting feature embedded algorithm;
the authenticity judgment threshold value of the anti-counterfeiting feature fingerprint of N (N is more than or equal to 3 and less than or equal to 10) frames corresponding to the current printing batch can be uniformly preset according to subjective experience, and N can be adjusted according to the performance of the smart phone and the user experience expectation. And storing the dynamic encryption parameters corresponding to the original code values, the original pattern anti-counterfeiting feature fingerprints corresponding to the original code values and the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold values corresponding to the current printing batch into a server for later use when other color watermark pattern security code real object identifications are detected. An example of the specific manner in which a fingerprint (e.g., an original graphical security feature fingerprint) may be obtained is set forth in detail below.
And S106, printing the electronic document of the color watermark pattern security code into a color watermark pattern security code physical identification so as to detect the color watermark pattern security code physical identification to be detected according to the dynamic encryption parameters corresponding to the original code value, the original pattern anti-counterfeiting feature fingerprint corresponding to the original code value and the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold values corresponding to the current printing batch so as to judge authenticity.
As shown in fig. 6, the detecting the color watermark image security code object identifier to be detected includes steps S601 to 609:
step S601, extracting a code value to be detected of the color watermark graphic security code object identification to be detected;
the method comprises the steps of continuously obtaining an image of a color watermark graphic security code real object identification to be detected by using a smart phone preview frame, trying to obtain a code value to be detected of the current color watermark graphic security code real object identification to be detected through a dot matrix code decoding algorithm, and continuously obtaining the next preview frame image if the code value cannot be obtained through decoding.
Step S602, when the extraction is unsuccessful within a preset time or the extracted code value to be detected is not stored in the server, a counterfeit is prompted;
wherein, preferably, if the decoding is unsuccessful for more than 15 seconds, the user is prompted for the suspected counterfeit detected. Or the extracted code value to be detected does not find the same original code value at the server, and then the user is prompted to detect suspected counterfeits.
Step S603, when the extracted code value to be detected is stored in the server, acquiring a dynamic encryption parameter corresponding to the code value to be detected, an original pattern anti-counterfeiting feature fingerprint corresponding to the code value to be detected and an N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch from the server;
step S604, processing the code value to be detected by using the dynamic encryption algorithm and the dynamic encryption parameter corresponding to the code value to be detected to obtain an embedded password of the anti-counterfeiting feature of the graph to be detected;
the processing manner of this step is similar to that of step S102, and is not described herein again.
Step S605, according to the anti-counterfeiting characteristic embedding password of the pattern to be detected and the pattern anti-counterfeiting characteristic extraction algorithm, obtaining the anti-counterfeiting characteristic fingerprint of the pattern to be detected of the color watermark pattern security code object identification to be detected;
as shown in FIG. 7, the graphical security feature fingerprint to be detected can be obtained through the following steps S701-S706, and the original graphical security feature fingerprint described above can also be obtained in a similar manner.
Step S701, comparing the graph anti-counterfeiting feature embedding password to be detected with an original graph anti-counterfeiting feature embedding password corresponding to the code value to be detected, and writing a comparison result into the graph anti-counterfeiting feature fingerprint to be detected;
step S702, verifying the color of the central point of the graphic anti-counterfeiting feature of the color watermark graphic security code real object identifier to be detected, and obtaining a first verification result;
traversing all geometric invariance positions and geometric variability positions, obtaining the central point position of each embedded graph anti-counterfeiting feature and the RGB value of the color information of the central point position, inquiring the RGB numerical value of the position coordinate corresponding to the color watermark graph security code real object identification to be detected, calculating the Mean Square Error (MSE) of three channels, accumulating the MSE into the RGB mean square error of all central point colors, dividing the value by the sum of the numbers of all geometric invariance positions and geometric variability positions to obtain the average value of all central point RGB value mean square errors, and recording the average value as val _ color to obtain a first verification result.
Step S703, verifying the geometric transformation size of the pattern anti-counterfeiting feature of the color watermark pattern security code object identification to be detected, and obtaining a second verification result;
traversing all geometric invariance positions and geometric variability positions to obtain the position, shape, size template and geometric transformation information of the central point of each embedded graph anti-counterfeiting feature, calculating to obtain the maximum value and the minimum value of the X-direction value and the maximum value and the minimum value of the Y-direction value of each embedded graph anti-counterfeiting feature theoretically (if the embedded graph anti-counterfeiting feature is a geometrically-variable graph, calculating a geometrically-transformed graph), obtaining the maximum value and the minimum value of the X-direction value of the area corresponding to the color watermark graph object identifier to be detected, calculating the Mean Square Error (MSE) of four pairs of theoretical values and the value to be detected, accumulating the MSE to be the mean square error of all embedded graph anti-counterfeiting features, dividing the value by the sum of the number of all geometric invariance positions and geometric variability positions to obtain the mean square error of all graph position size boundaries, and recording the mean square error as val _ size to obtain a second verification result.
Step S704, verifying the shape of the graph anti-counterfeiting feature of the color watermark graph security code object identification to be detected, and obtaining a third verification result;
wherein the closest match shape SC is first calculated: calculating the size template parameters by the method, and further calculating to obtain shape characteristic values of theoretical convexity, eccentricity, compactness, roundness and the like of all the anti-counterfeiting characteristics of the embedded graph as a basis table M for shape matching; a matching success count variable s _ count =0. Traversing all the geometric invariability positions and the geometric variability positions to obtain theoretical shape information (such as a circle, a square, a triangle and the like) ST of each embedded graphic anti-counterfeiting feature; and calculating shape characteristic values of each embedded pattern anti-counterfeiting characteristic of the color watermark pattern security code real object identification to be detected, and matching the closest shape SC according to the principle that the distance between each shape characteristic value and the shape is the shortest according to the absolute value of the value in the table M (namely, the shape of the coordinate point closest to the four-dimensional coordinate point formed by the shape characteristic values is searched according to the table M in shape matching and is taken as the closest matching shape SC).
The print sharpness weight is then calculated: generating a gray-scale image copy of a color watermark image security code object identification to be detected, recording the average gray scale of a background area without code points and embedded image anti-counterfeiting features of the gray-scale image as Gmax, recording the gray scale of a central point as Gmin for each embedded image anti-counterfeiting feature area in a geometric invariability position and a geometric variability position, recording the gray scale of the central point as Gmin in the embedded image anti-counterfeiting feature area, recording the number of pixel points with Gi being not more than Gmin + (Gmax-Gmin) 0.5 as the number of clear points G _ clear, recording the total number of the pixel points of the embedded image anti-counterfeiting features as G _ all, and printing sharpness weight wp being wp = G _ clear/G _ all.
And traversing the geometric invariance position and the geometric variability position, calculating SC, ST and wp of each embedded graph anti-counterfeiting feature area, if SC and ST are successfully matched, adding the current wp to the s _ count, and otherwise, subtracting the current wp from the s _ count. And after the traversal is finished, the value of s _ count is a third verification result.
Step S705, according to the first verification result, the second verification result, the third verification result and the respective threshold values, obtaining comparison results and writing the comparison results into the anti-counterfeiting characteristic fingerprint of the graph to be detected;
and obtaining different comparison results aiming at different relations between an array consisting of the first verification result, the second verification result and the third verification result and a threshold value, wherein the comparison results can be represented by characters and written in the anti-counterfeiting characteristic fingerprint of the graph to be detected.
And S706, outputting the anti-counterfeiting characteristic fingerprint of the graph to be detected.
And finally, outputting the fingerprint to obtain the anti-counterfeiting characteristic fingerprint of the graph to be detected.
Step S606, comparing the anti-counterfeiting characteristic fingerprint of the graph to be detected with the anti-counterfeiting characteristic fingerprint of the original graph corresponding to the code value to be detected, and calculating the matching rate of two character strings in the same character set encoding mode to obtain a single-frame passing result;
step S607, when the number of the single frame passing results is accumulated to N, calculating the multi-frame passing rate statistic value;
wherein, preferably, 3. Ltoreq. N.ltoreq.10. And calculating a multi-frame passing rate statistic value by taking the 'single-frame passing number p divided by N' as a formula. The statistics of the multi-frame judgment result is more accurate, and the probability of judging whether the genuine products are fake or the counterfeit printed products are true due to light, angle and jitter is reduced.
Step S608, when the multi-frame passing rate statistic value is smaller than the authenticity judgment threshold value of the N frames of anti-counterfeiting feature fingerprints corresponding to the current printing batch, a counterfeit is prompted;
and step S609, prompting a genuine product when the multi-frame throughput rate statistic value is larger than or equal to the authenticity judgment threshold value of the N frames of anti-counterfeiting characteristic fingerprints corresponding to the current printing batch.
Fig. 8 is a flowchart of a method for dynamically adjusting a decision threshold according to an embodiment of the present invention. As shown in fig. 8, the method includes:
step S801, acquiring image anti-counterfeiting characteristic fingerprints of M color watermark image security code physical identifiers corresponding to the same original code value;
because the printing is a process that characteristic changes are necessarily generated randomly, fingerprints generated by a genuine product (an electronic file is printed to be an image of a printed matter real object acquired by a camera) are different from original fingerprints (an image of the electronic file), and the fingerprints are not 100% identical, but the difference is within a certain statistical threshold. But the counterfeit will be more distant from the printing inevitably after reproduction. The two can be separated by setting the false-proof judgment threshold value of the anti-counterfeiting characteristic fingerprint of N frames. Therefore, in order to enable the authenticity judgment threshold value of the N frames of anti-counterfeiting characteristic fingerprints corresponding to the current printing batch to be more accurate, the invention carries out the step of dynamically adjusting the judgment threshold value. Firstly, directly acquiring printed M (for example, 100) pattern anti-counterfeiting characteristic fingerprints of color watermark pattern security code real object identifications corresponding to the same original code value.
S802, comparing the image anti-counterfeiting characteristic fingerprints of the color watermark image security code physical identification corresponding to M same original code values with the original image anti-counterfeiting characteristic fingerprint corresponding to the original code values to obtain an average value of M single-frame matching rates;
here, the single frame matching rate, that is, the abcd and abc3 matching rates, is 75%, for example. This embodiment only detects to M color watermark figure security code physical identification, has realized need not to reform transform the cost of producing the line to manufacturing enterprise and has saved.
And step S803, when the average value is smaller than the N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch, updating the N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch to the average value to the server.
Because the risk that the printed product deviates from the preset multi-frame passing rate due to the printing deviation of the pattern anti-counterfeiting features of different printing batches caused by the printing randomness exists all the time, the passing rate quality inspection of the good product of the whole printing batch is realized at extremely low cost and efficiency after the calibration by the embodiment.
Fig. 9 is a schematic structural diagram of a color watermark anti-counterfeiting device based on a micro-point code according to an embodiment of the invention. As shown in fig. 9, the apparatus includes: the system comprises a code map generating module 1, a password acquiring module 2, a document acquiring module 3, a parameter storage module 4, an identification processing module 5 and a parameter adjusting module 6, wherein the code map generating module 1 is used for generating a dot matrix code map by using any original code value based on the code system of a micro-point code; the password acquisition module 2 is used for processing the original code value by using a dynamic encryption algorithm and a dynamic encryption parameter corresponding to the original code value to obtain an original graphic anti-counterfeiting feature embedded password; the document acquisition module 3 is configured to: determining size templates, randomly distributed positions, embedded information of geometric invariance positions and embedded information of geometric variability positions of a plurality of graphic anti-counterfeiting features embedded in the dot code pattern according to the original graphic anti-counterfeiting feature embedded password and a graphic anti-counterfeiting feature embedding algorithm; embedding the plurality of pattern anti-counterfeiting features into the dot matrix code pattern according to the size template, the random distribution positions, the information embedded in the geometric invariance positions and the information embedded in the geometric variability positions to obtain a color watermark pattern security code electronic document; the parameter storage module 4 is configured to store a dynamic encryption parameter corresponding to the original code value, an original pattern anti-counterfeiting feature fingerprint corresponding to the original code value, and an N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch to a server, where the original pattern anti-counterfeiting feature fingerprint is obtained by processing the electronic document with the color watermark pattern security code by using the original pattern anti-counterfeiting feature embedded password and a pattern anti-counterfeiting feature extraction algorithm corresponding to the pattern anti-counterfeiting feature embedded algorithm; the mark processing module 5 is configured to print the electronic document with the color watermark pattern security code into a color watermark pattern security code physical mark, so as to detect the color watermark pattern security code physical mark to be detected according to the dynamic encryption parameter corresponding to the original code value, the original pattern anti-counterfeiting feature fingerprint corresponding to the original code value, and the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold corresponding to the current printing batch, so as to judge authenticity.
Preferably, the password obtaining module 2 is configured to: based on a linear congruence method, executing n times of random number generation operation to obtain an original graph anti-counterfeiting feature embedded password prototype; converting the original graph anti-counterfeiting feature embedded password prototype into a byte array; taking the first 8 bits or the last 8 bits in the byte array and putting the first 8 bits or the last 8 bits in a primary value array; converting the primary initial value array into a float64 type, and taking a decimal part as an initial value x0 of a well-known Logistic mapping chaotic encryption algorithm; and according to the initial value x0, ln times of Logistic iteration is executed by combining the parameters L alpha and Ln of the dynamic encryption algorithm of the original code value, and the front 10 bits of the effective number of the random floating point number obtained by iterative operation are used as the anti-counterfeiting feature embedded password of the original graph, wherein L alpha is a scaling coefficient in the Logistic algorithm, and Ln is the iteration times.
Preferably, the document acquiring module 3 is configured to: taking the remainder of dividing the last bit of the original graph anti-counterfeiting feature embedded password by 3 as a parameter of a size template of the plurality of graph anti-counterfeiting features, wherein the size template comprises a large size, a medium size and a small size; traversing coordinate positions where code points can appear in the dot matrix code image, and taking part of the coordinate positions as randomly distributed positions for drawing and embedding the anti-counterfeiting features of the plurality of graphs; when the coordinate positions where the eight code points adjacent to the random distribution position on the left upper side, right left side, left lower side, right side, right upper side and right upper side can appear have no code point, determining the random distribution position as a geometric variability position; traversing all geometric variability positions, and taking the original graph anti-counterfeiting feature embedded password as an initial random number seed to iterate to obtain an integer random number m1; dividing the integer random number m1 by 34 to obtain a remainder k1; if the remainder k1 is greater than or equal to 5, no graph is embedded in the geometric variability position; if the remainder k1 is less than 5, determining information of embedding a first specific graph template in the geometric variability position according to the remainder k1; dividing the integer random number m1 by 5 to obtain a remainder c1; determining information for adding color in the first specific graph template according to the remainder c1; taking the integer random number m1 as a random number seed, and taking the remainder k1 as iteration times to obtain an integer random number e1; dividing the integer random number e1 by 4 to obtain a remainder t1; determining information for performing geometric transformation on the first specific graph template according to the remainder t1; when no code point exists in the coordinate positions where four adjacent code points can appear at the right left, right lower, right upper and lower positions of the random distribution position and code points exist in the coordinate positions where four adjacent code points can appear at the left upper, left lower, right upper and right lower, the random distribution position is determined to be a geometric invariance position; traversing all geometric invariance positions, and taking the original graph anti-counterfeiting feature embedded password as an initial random number seed to iterate to obtain an integer random number m2; dividing the integer random number m2 by 34 to obtain a remainder k2; if the remainder k2 is greater than or equal to 5, no graph is embedded in the geometric invariance position; if the remainder k2 is less than 5, determining that the information of a second specific graph template is embedded in the geometric invariance position according to the remainder k2; dividing the integer random number m2 by 5 to obtain a remainder c2; and determining information for adding colors in the second specific graph template according to the remainder c 2.
Preferably, the identification processing module 5 is configured to: extracting a code value to be detected of the color watermark graphic security code real object identification to be detected; when the extraction is unsuccessful within the preset time or the extracted code value to be detected is not stored in the server, a counterfeit product is prompted; when the extracted code value to be detected is stored in the server, acquiring a dynamic encryption parameter corresponding to the code value to be detected, an original graph anti-counterfeiting feature fingerprint corresponding to the code value to be detected and an N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch from the server; processing the code value to be detected by using the dynamic encryption algorithm and the dynamic encryption algorithm corresponding to the code value to be detected to obtain an embedded password of the anti-counterfeiting feature of the graph to be detected; according to the anti-counterfeiting feature embedding password of the pattern to be detected and the pattern anti-counterfeiting feature extraction algorithm, obtaining the anti-counterfeiting feature fingerprint of the pattern to be detected of the color watermark pattern security code physical identification to be detected; comparing the graph anti-counterfeiting characteristic fingerprint to be detected with an original graph anti-counterfeiting characteristic fingerprint corresponding to the code value to be detected, and calculating the matching rate of two character strings in the same character set encoding mode to obtain a single-frame passing result; when the number of the single-frame passing results is accumulated to N, calculating a multi-frame passing rate statistic value; when the multi-frame throughput rate statistic value is smaller than the authenticity judgment threshold value of the N frames of anti-counterfeiting characteristic fingerprints corresponding to the current printing batch, prompting a counterfeit product; and prompting the genuine product when the multi-frame passing rate statistic value is greater than or equal to the authenticity judgment threshold value of the N frames of anti-counterfeiting characteristic fingerprints corresponding to the current printing batch.
Preferably, the apparatus further comprises a parameter adjustment module 6 for: acquiring graph anti-counterfeiting characteristic fingerprints of M color watermark graph security code real object identifications corresponding to the same original code value; comparing the image anti-counterfeiting characteristic fingerprints of the color watermark image security code real object identifications corresponding to M identical original code values with the original image anti-counterfeiting characteristic fingerprints corresponding to the original code values to obtain an average value of M single-frame matching rates; and when the average value is smaller than the authenticity judgment threshold value of the N frames of anti-counterfeiting characteristic fingerprints corresponding to the current printing batch, updating the authenticity judgment threshold value of the N frames of anti-counterfeiting characteristic fingerprints corresponding to the current printing batch as the average value to the server.
Preferably, the identification processing module 5 is configured to: comparing the graph anti-counterfeiting feature embedding password to be detected with an original graph anti-counterfeiting feature embedding password corresponding to the code value to be detected, and writing a comparison result into the graph anti-counterfeiting feature fingerprint to be detected; verifying the color of the central point of the graphic anti-counterfeiting feature of the color watermark graphic security code real object identifier to be detected, and obtaining a first verification result; verifying the geometric transformation size of the graphic anti-counterfeiting feature of the color watermark graphic security code real object identifier to be detected, and obtaining a second verification result; verifying the shape of the pattern anti-counterfeiting feature of the color watermark pattern security code real object identifier to be detected, and obtaining a third verification result; obtaining comparison results according to the first verification result, the second verification result, the third verification result and the respective threshold values, and writing the comparison results into the anti-counterfeiting characteristic fingerprint of the graph to be detected; and outputting the anti-counterfeiting characteristic fingerprint of the graph to be detected.
The embodiments of the color watermark anti-counterfeiting device based on the micro-point code are similar to the embodiments of the color watermark anti-counterfeiting method based on the micro-point code, and are not described herein again.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both permanent and non-permanent, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of additional identical elements in the process, method, article, or apparatus comprising the element.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (13)

1. A color watermark anti-counterfeiting method based on a micro-point code is characterized by comprising the following steps:
generating a dot matrix code graph by using any original code value based on a code system of the micro dot code;
processing the original code value by using a dynamic encryption algorithm and a dynamic encryption parameter corresponding to the original code value to obtain an original graph anti-counterfeiting feature embedded password;
determining size templates, randomly distributed positions, embedded information of geometric invariance positions and embedded information of geometric variability positions of a plurality of graphic anti-counterfeiting features embedded in the dot code pattern according to the original graphic anti-counterfeiting feature embedded password and a graphic anti-counterfeiting feature embedding algorithm;
embedding the plurality of pattern anti-counterfeiting features into the dot matrix code pattern according to the size template, the random distribution positions, the information embedded in the geometric invariance positions and the information embedded in the geometric variability positions to obtain a color watermark pattern security code electronic document;
storing a dynamic encryption parameter corresponding to the original code value, an original graph anti-counterfeiting feature fingerprint corresponding to the original code value and an N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch to a server, wherein the original graph anti-counterfeiting feature fingerprint is obtained by processing the electronic document of the color watermark graph security code by using the original graph anti-counterfeiting feature embedded password and a graph anti-counterfeiting feature extraction algorithm corresponding to the graph anti-counterfeiting feature embedded algorithm;
and printing the electronic document with the color watermark pattern security code into a color watermark pattern security code real object identification so as to detect the color watermark pattern security code real object identification to be detected according to the dynamic encryption parameter corresponding to the original code value, the original pattern anti-counterfeiting feature fingerprint corresponding to the original code value and the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold values corresponding to the current printing batch so as to judge authenticity.
2. The color watermark anti-counterfeiting method based on the micro-point code according to claim 1, wherein the step of processing the original code value by using a dynamic encryption algorithm and a dynamic encryption parameter corresponding to the original code value to obtain an original graphic anti-counterfeiting feature embedded password comprises the following steps:
based on a linear congruence method, executing n times of random number generation operation to obtain an original graph anti-counterfeiting feature embedded password prototype;
converting the original graph anti-counterfeiting feature embedded password prototype into a byte array;
putting the first 8 bits or the last 8 bits in the byte array into a primary value array;
converting the primary initial value array into a float64 type, and taking a decimal part as an initial value x0 of a well-known Logistic mapping chaotic encryption algorithm;
and according to the initial value x0, ln times of Logistic iteration is executed by combining the parameters L alpha and Ln of the dynamic encryption algorithm of the original code value, and the front 10 bits of the effective number of the random floating point number obtained by iterative operation are used as the anti-counterfeiting feature embedded password of the original graph, wherein L alpha is a scaling coefficient in the Logistic algorithm, and Ln is the iteration times.
3. The method for preventing color watermarks according to claim 1, wherein the determining of the size templates, the randomly distributed positions, the embedded information of the geometric invariance positions and the embedded information of the geometric variability positions of the plurality of graphical anti-counterfeiting features embedded in the dot code pattern according to the original graphical anti-counterfeiting feature embedded password and the graphical anti-counterfeiting feature embedding algorithm comprises:
taking the remainder of dividing the last bit of the original graph anti-counterfeiting feature embedded password by 3 as the parameters of the size templates of the plurality of graph anti-counterfeiting features, wherein the size templates comprise a large size, a medium size and a small size;
traversing coordinate positions where code points can appear in the dot matrix code graph, and taking part of the coordinate positions as random distribution positions for drawing and embedding the anti-counterfeiting features of the plurality of graphs;
when the coordinate positions where the eight code points adjacent to the random distribution position on the left upper side, right left side, left lower side, right upper side, right upper side can appear have no code point, determining the random distribution position as a geometric variability position;
traversing all geometric variability positions, and taking the original graph anti-counterfeiting feature embedded password as an initial random number seed to iterate to obtain an integer random number m1;
dividing the integer random number m1 by 34 to obtain a remainder k1;
if the remainder k1 is greater than or equal to 5, no graph is embedded in the geometric variability position; if the remainder k1 is less than 5, determining information for embedding a first specific graph template in the geometric variability position according to the remainder k1;
dividing the integer random number m1 by 5 to obtain a remainder c1;
determining information for adding colors in the first specific graph template according to the remainder c1;
taking the integer random number m1 as a random number seed, and taking the remainder k1 as iteration times to obtain an integer random number e1;
dividing the integer random number e1 by 4 to obtain a remainder t1;
determining information for performing geometric transformation on the first specific graph template according to the remainder t1;
when no code point exists in the coordinate positions where four adjacent code points can appear right left, right and above the randomly distributed positions, and code points exist in the coordinate positions where four adjacent code points can appear left upper, left lower, right upper and right lower, the randomly distributed positions are determined to be geometric invariance positions;
traversing all geometric invariance positions, and iteratively calculating an integer random number m2 by taking the original graph anti-counterfeiting feature embedded password as an initial random number seed;
dividing the integer random number m2 by 34 to obtain a remainder k2;
if the remainder k2 is larger than or equal to 5, no graph is embedded in the geometric invariance position; if the remainder k2 is less than 5, determining that the information of a second specific graph template is embedded in the geometric invariance position according to the remainder k2;
dividing the integer random number m2 by 5 to obtain a remainder c2;
and determining information for adding colors in the second specific graph template according to the remainder c 2.
4. The color watermark anti-counterfeiting method based on the micro-point code as claimed in claim 1, wherein the step of detecting the color watermark pattern security code physical identification to be detected to judge the authenticity according to the dynamic encryption parameter corresponding to the original code value, the original pattern anti-counterfeiting feature fingerprint corresponding to the original code value and the N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch comprises the following steps:
extracting a code value to be detected of the color watermark graphic security code object identification to be detected;
when the extraction is unsuccessful within the preset time or the extracted code value to be detected is not stored in the server, a counterfeit product is prompted;
when the extracted code value to be detected is stored in the server, acquiring a dynamic encryption parameter corresponding to the code value to be detected, an original graph anti-counterfeiting feature fingerprint corresponding to the code value to be detected and an N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch from the server;
processing the code value to be detected by using the dynamic encryption algorithm and the dynamic encryption parameter corresponding to the code value to be detected to obtain an embedded password of the anti-counterfeiting characteristic of the graph to be detected;
according to the pattern anti-counterfeiting feature embedding password to be detected and the pattern anti-counterfeiting feature extraction algorithm, obtaining a pattern anti-counterfeiting feature fingerprint to be detected of the color watermark pattern security code real object identification to be detected;
comparing the graph anti-counterfeiting characteristic fingerprint to be detected with an original graph anti-counterfeiting characteristic fingerprint corresponding to the code value to be detected, and calculating the matching rate of two character strings in the same character set encoding mode to obtain a single-frame passing result;
when the number of the single-frame passing results is accumulated to N, calculating a multi-frame passing rate statistic value;
when the multi-frame passing rate statistic value is smaller than the authenticity judgment threshold value of the N frames of anti-counterfeiting feature fingerprints corresponding to the current printing batch, prompting a counterfeit product;
and prompting the genuine product when the multi-frame passing rate statistic value is greater than or equal to the authenticity judgment threshold value of the N frames of anti-counterfeiting characteristic fingerprints corresponding to the current printing batch.
5. The method for preventing forgery of color watermark based on micro-dot code according to claim 1, further comprising:
acquiring graph anti-counterfeiting characteristic fingerprints of M color watermark graph security code real object identifications corresponding to the same original code value;
comparing the image anti-counterfeiting characteristic fingerprints of the color watermark image security code physical identification corresponding to M identical original code values with the original image anti-counterfeiting characteristic fingerprints corresponding to the original code values to obtain an average value of M single-frame matching rates;
and when the average value is smaller than the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold values corresponding to the current printing batch, updating the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold values corresponding to the current printing batch to the average value and sending the average value to the server.
6. The color watermark anti-counterfeiting method based on the micro-point code according to claim 4, wherein the step of obtaining the anti-counterfeiting feature fingerprint of the to-be-detected color watermark graphic security code physical identification according to the to-be-detected graphic anti-counterfeiting feature embedded password and the graphic anti-counterfeiting feature extraction algorithm comprises the following steps:
comparing the graph anti-counterfeiting feature embedding password to be detected with an original graph anti-counterfeiting feature embedding password corresponding to the code value to be detected, and writing a comparison result into the graph anti-counterfeiting feature fingerprint to be detected;
verifying the color of the central point of the graphic anti-counterfeiting feature of the color watermark graphic security code real object identifier to be detected, and obtaining a first verification result;
verifying the geometric transformation size of the graphic anti-counterfeiting feature of the color watermark graphic security code real object identifier to be detected, and obtaining a second verification result;
verifying the shape of the pattern anti-counterfeiting feature of the color watermark pattern security code real object identifier to be detected, and obtaining a third verification result;
obtaining comparison results according to the first verification result, the second verification result, the third verification result and the respective threshold values, and writing the comparison results into the anti-counterfeiting characteristic fingerprint of the graph to be detected;
and outputting the anti-counterfeiting characteristic fingerprint of the graph to be detected.
7. The color watermark anti-counterfeiting method based on the micro-dot code as claimed in claim 1, wherein the code value can be a character string encoded by any character, when the code value of the micro-dot code is converted into a binary system, an obvious gap larger than or equal to 1 data position exists between data, the color watermark pattern security code physical identification made by the micro-dot code has at least 90% of robustness in a 20mm-20mm area, can be decoded in a defiled area to any residual 3mm-3mm complete area, and can be read under an interference pattern except for linear, nodular and special-shaped code points.
8. A color watermark anti-counterfeiting device based on micro-point codes is characterized by comprising:
a code pattern generating module, a password acquiring module, a document acquiring module, a parameter storing module and an identification processing module, wherein,
the code map generation module is used for generating a dot matrix code map by using any original code value based on a code system of a micro-point code;
the password acquisition module is used for processing the original code value by using a dynamic encryption algorithm and a dynamic encryption parameter corresponding to the original code value to obtain an original graph anti-counterfeiting feature embedded password;
the document acquisition module is used for:
determining size templates, randomly distributed positions, embedded information of geometric invariance positions and embedded information of geometric variability positions of a plurality of graph anti-counterfeiting features embedded in the dot code pattern according to the original graph anti-counterfeiting feature embedded password and a graph anti-counterfeiting feature embedding algorithm;
embedding the plurality of pattern anti-counterfeiting features into the dot matrix code pattern according to the size template, the random distribution positions, the information embedded in the geometric invariance positions and the information embedded in the geometric variability positions to obtain a color watermark pattern security code electronic document;
the parameter storage module is used for storing a dynamic encryption parameter corresponding to the original code value, an original graph anti-counterfeiting feature fingerprint corresponding to the original code value and an N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch to a server, wherein the original graph anti-counterfeiting feature fingerprint is obtained by processing the electronic document of the color watermark graph security code by using the original graph anti-counterfeiting feature embedded password and a graph anti-counterfeiting feature extraction algorithm corresponding to the graph anti-counterfeiting feature embedded algorithm;
the mark processing module is used for printing the electronic document of the color watermark pattern security code into a color watermark pattern security code real object mark so as to detect the color watermark pattern security code real object mark to be detected according to the dynamic encryption parameter corresponding to the original code value, the original pattern anti-counterfeiting feature fingerprint corresponding to the original code value and the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch so as to judge authenticity.
9. The color watermark anti-counterfeiting device based on the micro-point code according to claim 8, wherein the password acquisition module is used for:
based on a linear congruence method, executing n times of random number generation operation to obtain an original graph anti-counterfeiting feature embedded password prototype;
converting the original graph anti-counterfeiting feature embedded password prototype into a byte array;
taking the first 8 bits or the last 8 bits in the byte array and putting the first 8 bits or the last 8 bits in a primary value array;
converting the primary initial value array into a float64 type, and taking a decimal part as an initial value x0 of a well-known Logistic mapping chaotic encryption algorithm;
and according to the initial value x0, combining the parameters L alpha and Ln of the dynamic encryption algorithm of the original code value, executing Ln times of Logistic iteration, and taking the first 10 bits of the effective number of the random floating point number obtained by iterative operation as the original graph anti-counterfeiting feature embedded password, wherein L alpha is a scaling coefficient in the Logistic algorithm, and Ln is the iteration times.
10. The micro-dot code based color watermark anti-counterfeiting device according to claim 8, wherein the document acquisition module is configured to:
taking the remainder of dividing the last bit of the original graph anti-counterfeiting feature embedded password by 3 as a parameter of a size template of the plurality of graph anti-counterfeiting features, wherein the size template comprises a large size, a medium size and a small size;
traversing coordinate positions where code points can appear in the dot matrix code graph, and taking part of the coordinate positions as random distribution positions for drawing and embedding the anti-counterfeiting features of the plurality of graphs;
when the coordinate positions where the eight code points adjacent to the random distribution position on the left upper side, right left side, left lower side, right upper side, right upper side can appear have no code point, determining the random distribution position as a geometric variability position;
traversing all geometric variability positions, and taking the original graph anti-counterfeiting feature embedded password as an initial random number seed to iterate to obtain an integer random number m1;
dividing the integer random number m1 by 34 to obtain a remainder k1;
if the remainder k1 is greater than or equal to 5, no graph is embedded in the geometric variability position; if the remainder k1 is less than 5, determining information of embedding a first specific graph template in the geometric variability position according to the remainder k1;
dividing the integer random number m1 by 5 to obtain a remainder c1;
determining information for adding colors in the first specific graph template according to the remainder c1;
taking the integer random number m1 as a random number seed, and taking the remainder k1 as iteration times to obtain an integer random number e1;
dividing the integer random number e1 by 4 to obtain a remainder t1;
determining information for performing geometric transformation on the first specific graph template according to the remainder t1;
when no code point exists in the coordinate positions where four adjacent code points can appear right left, right and above the randomly distributed positions, and code points exist in the coordinate positions where four adjacent code points can appear left upper, left lower, right upper and right lower, the randomly distributed positions are determined to be geometric invariance positions;
traversing all geometric invariance positions, and taking the original graph anti-counterfeiting feature embedded password as an initial random number seed to iterate to obtain an integer random number m2;
dividing the integer random number m2 by 34 to obtain a remainder k2;
if the remainder k2 is greater than or equal to 5, no graph is embedded in the geometric invariance position; if the remainder k2 is less than 5, determining that the information of a second specific graph template is embedded in the geometric invariance position according to the remainder k2;
dividing the integer random number m2 by 5 to obtain a remainder c2;
and determining information for adding colors in the second specific graph template according to the remainder c 2.
11. The color watermark anti-counterfeiting device based on the micro-point code according to claim 8, wherein the identification processing module is used for:
extracting a code value to be detected of the color watermark graphic security code object identification to be detected;
when the extraction is unsuccessful within the preset time or the extracted code value to be detected is not stored in the server, a counterfeit product is prompted;
when the extracted code value to be detected is stored in the server, acquiring a dynamic encryption parameter corresponding to the code value to be detected, an original graph anti-counterfeiting feature fingerprint corresponding to the code value to be detected and an N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch from the server;
processing the code value to be detected by using the dynamic encryption algorithm and the dynamic encryption algorithm corresponding to the code value to be detected to obtain an embedded password of the anti-counterfeiting characteristic of the graph to be detected;
according to the anti-counterfeiting feature embedding password of the pattern to be detected and the pattern anti-counterfeiting feature extraction algorithm, obtaining the anti-counterfeiting feature fingerprint of the pattern to be detected of the color watermark pattern security code physical identification to be detected;
comparing the graph anti-counterfeiting characteristic fingerprint to be detected with an original graph anti-counterfeiting characteristic fingerprint corresponding to the code value to be detected, and calculating the matching rate of two character strings in the same character set encoding mode to obtain a single-frame passing result;
when the number of the single-frame passing results is accumulated to N, calculating a multi-frame passing rate statistic value;
when the multi-frame throughput rate statistic value is smaller than the authenticity judgment threshold value of the N frames of anti-counterfeiting characteristic fingerprints corresponding to the current printing batch, prompting a counterfeit product;
and prompting the genuine product when the multi-frame passing rate statistic value is greater than or equal to the authenticity judgment threshold value of the N frames of anti-counterfeiting feature fingerprints corresponding to the current printing batch.
12. The color watermark anti-counterfeiting device based on the micro-point code according to claim 8, characterized by further comprising a parameter adjusting module for:
acquiring graph anti-counterfeiting characteristic fingerprints of M color watermark graph security code real object identifications corresponding to the same original code value;
comparing the image anti-counterfeiting characteristic fingerprints of the color watermark image security code real object identifications corresponding to M identical original code values with the original image anti-counterfeiting characteristic fingerprints corresponding to the original code values to obtain an average value of M single-frame matching rates;
and when the average value is smaller than the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold values corresponding to the current printing batch, updating the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold values corresponding to the current printing batch to the average value and sending the average value to the server.
13. The microdot-code-based color watermark anti-counterfeiting device according to claim 11, wherein the identification processing module is configured to:
comparing the graph anti-counterfeiting feature embedding password to be detected with an original graph anti-counterfeiting feature embedding password corresponding to the code value to be detected, and writing a comparison result into the graph anti-counterfeiting feature fingerprint to be detected;
verifying the color of the central point of the graphic anti-counterfeiting feature of the color watermark graphic security code real object identifier to be detected, and obtaining a first verification result;
verifying the geometric transformation size of the graph anti-counterfeiting feature of the color watermark graph security code real object identification to be detected, and obtaining a second verification result;
verifying the shape of the pattern anti-counterfeiting feature of the color watermark pattern security code real object identifier to be detected, and obtaining a third verification result;
obtaining comparison results according to the first verification result, the second verification result, the third verification result and the respective threshold values, and writing the comparison results into the anti-counterfeiting characteristic fingerprint of the graph to be detected;
and outputting the anti-counterfeiting characteristic fingerprint of the graph to be detected.
CN202211219310.3A 2022-10-08 2022-10-08 Color watermark anti-counterfeiting method and device based on micro-point code Active CN115293311B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211219310.3A CN115293311B (en) 2022-10-08 2022-10-08 Color watermark anti-counterfeiting method and device based on micro-point code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211219310.3A CN115293311B (en) 2022-10-08 2022-10-08 Color watermark anti-counterfeiting method and device based on micro-point code

Publications (2)

Publication Number Publication Date
CN115293311A true CN115293311A (en) 2022-11-04
CN115293311B CN115293311B (en) 2022-12-02

Family

ID=83834739

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211219310.3A Active CN115293311B (en) 2022-10-08 2022-10-08 Color watermark anti-counterfeiting method and device based on micro-point code

Country Status (1)

Country Link
CN (1) CN115293311B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115860033A (en) * 2023-01-31 2023-03-28 北京微点科学技术有限公司 Anti-counterfeiting method and device for color partition micro-point code identification capable of grading and identifying counterfeiting
CN117474029A (en) * 2023-12-28 2024-01-30 中科微点技术有限公司 AI polarization enhancement chart code wave frequency acquisition imaging identification method based on block chain

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108133378A (en) * 2017-12-20 2018-06-08 北京六个橙子科技有限责任公司 For the anti-fake label of foodstuff traceability, label generating method, system and method
CN110533430A (en) * 2018-05-08 2019-12-03 刘振民 A kind of antifake method for products and system and electronic device
CN113313225A (en) * 2021-07-09 2021-08-27 北京微点科技有限公司 Anti-counterfeiting method based on sparse dot matrix code
CN113538006A (en) * 2021-06-18 2021-10-22 中科谱光科技(北京)有限公司 Product tracing method and device, electronic equipment and storage medium
CN114022945A (en) * 2022-01-10 2022-02-08 国家邮政局邮政业安全中心 Real-name receiving, sending and vision checking equipment and real-name receiving, sending and vision checking method
US20220198570A1 (en) * 2019-01-27 2022-06-23 Hainan Paipaikan Information Technology Co., Ltd. Anti-fake packing method for product liability insurance
CN114745091A (en) * 2022-04-11 2022-07-12 上海诺标信息技术有限公司 Intelligent Ross color block multiple chaotic graph encryption anti-decoding anti-counterfeiting technology
CN115151315A (en) * 2020-09-21 2022-10-04 卡塔梦蒂特恩霍特有限责任公司 Set of playing cards

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108133378A (en) * 2017-12-20 2018-06-08 北京六个橙子科技有限责任公司 For the anti-fake label of foodstuff traceability, label generating method, system and method
CN110533430A (en) * 2018-05-08 2019-12-03 刘振民 A kind of antifake method for products and system and electronic device
US20220198570A1 (en) * 2019-01-27 2022-06-23 Hainan Paipaikan Information Technology Co., Ltd. Anti-fake packing method for product liability insurance
CN115151315A (en) * 2020-09-21 2022-10-04 卡塔梦蒂特恩霍特有限责任公司 Set of playing cards
CN113538006A (en) * 2021-06-18 2021-10-22 中科谱光科技(北京)有限公司 Product tracing method and device, electronic equipment and storage medium
CN113313225A (en) * 2021-07-09 2021-08-27 北京微点科技有限公司 Anti-counterfeiting method based on sparse dot matrix code
CN114022945A (en) * 2022-01-10 2022-02-08 国家邮政局邮政业安全中心 Real-name receiving, sending and vision checking equipment and real-name receiving, sending and vision checking method
CN114745091A (en) * 2022-04-11 2022-07-12 上海诺标信息技术有限公司 Intelligent Ross color block multiple chaotic graph encryption anti-decoding anti-counterfeiting technology

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115860033A (en) * 2023-01-31 2023-03-28 北京微点科学技术有限公司 Anti-counterfeiting method and device for color partition micro-point code identification capable of grading and identifying counterfeiting
CN115860033B (en) * 2023-01-31 2023-05-16 北京微点科学技术有限公司 Anti-counterfeiting method and device for color partition micro-point code mark capable of classifying and identifying counterfeiting
CN117474029A (en) * 2023-12-28 2024-01-30 中科微点技术有限公司 AI polarization enhancement chart code wave frequency acquisition imaging identification method based on block chain
CN117474029B (en) * 2023-12-28 2024-03-22 中科微点技术有限公司 AI polarization enhancement chart code wave frequency acquisition imaging identification method based on block chain

Also Published As

Publication number Publication date
CN115293311B (en) 2022-12-02

Similar Documents

Publication Publication Date Title
US10410309B2 (en) Classification and authentication of identification documents using a convolutional neural network
CN115293311B (en) Color watermark anti-counterfeiting method and device based on micro-point code
CN103761799B (en) A kind of bill anti-counterfeit method based on texture image feature and device
JP5528457B2 (en) Geometric code authentication method and apparatus
RU2648582C1 (en) Ways and computer device for determining whether the sign is the authentic
KR20150093254A (en) Unique identification information from marked features
CA2963113A1 (en) Storing identification data as virtual personally identifiable information
JP2016540329A (en) Two-dimensional barcode and authentication method of such barcode
RU2458395C2 (en) Methods and apparatus for ensuring integrity and authenticity of documents
KR101978109B1 (en) Methods for determining if a mark is genuine,
CN113313225B (en) Anti-counterfeiting method based on sparse dot matrix code
CN113435556A (en) Code generation and decoding method and anti-counterfeiting method of dot matrix code
US20180033020A1 (en) System and apparatus for detecting forgery features on identification documents
CA2954089A1 (en) Systems and methods for authentication of physical features on identification documents
EA027635B1 (en) Security element, printed matter comprising said security element and method to inspect authenticity of said printed matter
Joshi et al. Source printer classification using printer specific local texture descriptor
CN116664961B (en) Intelligent identification method and system for anti-counterfeit label based on signal code
JP2017017673A (en) Method for protecting authenticity of article, item, document, package and/or label from imitation, forgery and theft
CN110009080B (en) Two-dimensional code generation method, verification method, server and two-dimensional code
CN115423063B (en) Anti-copying shading anti-counterfeiting method and device based on micro-point code
CN115329919B (en) Random additional point anti-counterfeiting method and device based on micro point code
CN110942076B (en) Method and system for generating anti-counterfeiting mark of ceramic product
CN116681098A (en) Method and system for generating anti-counterfeiting mark image based on two-dimensional code generation
CN115470878B (en) Variable anti-counterfeiting super-line anti-counterfeiting method and device based on micro-point code
WO2020251380A1 (en) Method for validation of authenticity of an image present in an object, object with increased security level and method for preparation thereof, computer equipment, computer program and appropriate reading means

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant