CN115329919B - Random additional point anti-counterfeiting method and device based on micro point code - Google Patents
Random additional point anti-counterfeiting method and device based on micro point code Download PDFInfo
- Publication number
- CN115329919B CN115329919B CN202211219471.2A CN202211219471A CN115329919B CN 115329919 B CN115329919 B CN 115329919B CN 202211219471 A CN202211219471 A CN 202211219471A CN 115329919 B CN115329919 B CN 115329919B
- Authority
- CN
- China
- Prior art keywords
- code
- counterfeiting
- pattern
- original
- detected
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/44—Secrecy systems
- H04N1/448—Rendering the image unintelligible, e.g. scrambling
- H04N1/4486—Rendering the image unintelligible, e.g. scrambling using digital data encryption
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Finance (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Development Economics (AREA)
- Accounting & Taxation (AREA)
- Power Engineering (AREA)
- Entrepreneurship & Innovation (AREA)
- Multimedia (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The invention provides a random additional point anti-counterfeiting method and device based on a micro-point code, wherein the method comprises the following steps: generating a dot matrix code pattern by using any original code value based on the code system of the micro-point code; processing the original code value by using a dynamic encryption algorithm and dynamic encryption parameters corresponding to the original code value to obtain an original pattern anti-counterfeiting characteristic embedded password; determining code point row numbers, code point column numbers, embedding directions, embedding offset and the number of pixels which are externally added relative to the center of a code point of a plurality of pattern anti-counterfeiting features of an embedded dot matrix code pattern according to an original pattern anti-counterfeiting feature embedding password and a pattern anti-counterfeiting feature embedding algorithm; embedding a plurality of graphic anti-counterfeiting features into the dot matrix code pattern to obtain a random additional dot matrix security code electronic document; printing the random additional point figure safety code electronic document into a random additional point figure safety code physical identifier so as to detect the random additional point figure safety code physical identifier to be detected and judge the authenticity.
Description
Technical Field
The invention relates to the technical field of anti-counterfeiting, in particular to a random additional point anti-counterfeiting method and device based on micro point codes.
Background
The most common two types of one-object one-code anti-counterfeiting schemes in the current mainstream are: the first type is digital verification based on two-dimension codes and numbers, and the application defect is that the security is poor: the two-dimensional code and the number which are visible on the printed matter can be used as the ID of the object and forged in batches with low cost, various pattern numbers can be copied due to the fact that the two-dimensional code is manufactured into an open source, the hidden verification code corresponding to the ID usually needs a fragile covering coating process, and can be checked only after being uncovered and scraped after being purchased by a consumer, and under nondestructive verification, the correctness of the ID and the verification code can not be effectively checked before being purchased; the second type is to collect the post-printing image based on the man-made or natural random detail characteristics, and to use the image uploading or downloading mode to extract and compare the image details when the terminal user verifies, while overcoming the shortcoming that the first type cannot verify the pre-purchase anti-counterfeiting of the consumer, the second type has the defects that the production line of the manufacturing enterprise needs to be modified, the special image collection and analysis uploading software and hardware are erected, the cloud storage high definition image details occupy a large amount of storage cost, and the user needs to consume obvious flow and time when performing anti-counterfeiting detection. The two types of common problems are poor user experience, such as the time for generating a large number of unique codes to check the database, slow inquiry of random unique codes in the database, high-definition image downloading or long authenticity verification time for uploading and cloud comparison of local detection images.
Disclosure of Invention
The embodiment of the invention aims to provide a random additional point anti-counterfeiting method and device based on a micro-point code, which are more balanced in comprehensive cost, checking experience and anti-counterfeiting performance.
In order to achieve the above object, an embodiment of the present invention provides a random additional point anti-counterfeiting method based on a micro-point code, the method including: generating a dot matrix code pattern by using any original code value based on the code system of the micro-point code; processing the original code value by using a dynamic encryption algorithm and dynamic encryption parameters corresponding to the original code value to obtain an original graph anti-counterfeiting characteristic embedded password; determining code point row numbers, code point column numbers, embedding directions, embedding offset and the number of pixels which are outwards added relative to the center of the code points of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code pattern according to the password embedded in the original graphic anti-counterfeiting features and a graphic anti-counterfeiting feature embedding algorithm; embedding the plurality of graphic anti-counterfeiting features in the dot matrix code pattern according to the code dot line number, the code dot column number, the embedding direction, the embedding offset and the number of pixels added outwards from the center of the relative code dot to obtain a random additional dot pattern security code electronic document; storing dynamic encryption parameters corresponding to the original code values, original pattern anti-counterfeiting feature fingerprints corresponding to the original code values and N frames of anti-counterfeiting feature fingerprint authenticity judging thresholds corresponding to the current printing batch to a server, wherein the original pattern anti-counterfeiting feature fingerprints are obtained by processing the random additional point pattern security code electronic document by using the original pattern anti-counterfeiting feature embedded password and a pattern anti-counterfeiting feature extraction algorithm corresponding to the pattern anti-counterfeiting feature embedding algorithm; and printing the random additional point figure security code electronic document into a random additional point figure security code physical identifier so as to detect the random additional point figure security code physical identifier to be detected according to the dynamic encryption parameters corresponding to the original code value, the original figure security feature fingerprint corresponding to the original code value and the N frame security feature fingerprint authenticity judgment threshold corresponding to the current printing batch to judge authenticity.
Preferably, processing the original code value by using a dynamic encryption algorithm and a dynamic encryption parameter corresponding to the original code value, and obtaining the original graphic anti-counterfeiting characteristic embedded password includes: based on a linear congruence method, performing n times of random number generation operation to obtain an original figure anti-counterfeiting characteristic embedded password prototype; embedding the original graph anti-counterfeiting characteristic into a password prototype, intercepting and splitting the password prototype into 5 character strings; respectively carrying out MD5 encryption on the 5 character strings to obtain 5 encrypted character strings; and respectively taking the first 4 bits or the last 4 bits of the 5 encrypted character strings to generate 5 arrays with the length of 4, and combining the arrays to obtain the original figure anti-counterfeiting characteristic embedded password.
Preferably, determining the code point row number, the code point column number, the embedding direction, the embedding offset and the number of pixels added outwards relative to the center of the code point of the plurality of graphic anti-counterfeiting features embedded in the dot matrix code pattern according to the original graphic anti-counterfeiting feature embedding password and the graphic anti-counterfeiting feature embedding algorithm comprises: the 1 st bit to the 4 th bit of the password embedded with the anti-counterfeiting characteristic of the original graph are converted into a first digital array through ASCII coding; taking the first 4 or the last 4 numbers of the first digital array, setting the odd number in each number as 1 and the even number as 0, and generating a first binary number with 4 bits; converting the first binary number into a decimal number to obtain code point line numbers of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code pattern; the 5 th bit to 8 th bit of the embedded password of the original graph anti-counterfeiting characteristic is converted into a second digital array through ASCII coding; taking the first 4 or the last 4 numbers of the second digital array, setting the odd number in each number as 1 and the even number as 0, and generating a second binary number with 4 bits; converting the second binary digits into decimal digits to obtain code point column numbers of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code patterns; the 9 th to 12 th bits of the original graphic anti-counterfeiting characteristic embedded password are converted into a third digital array through ASCII coding; taking the first 4 or the last 4 numbers of the third digital array, setting the odd number in each number as 1 and the even number as 0, and generating a 4-bit third binary digit; converting the third binary number into a decimal number, dividing by 2, rounding down and then adding 1 to obtain a first integer; determining the embedding direction of a plurality of graphic anti-counterfeiting features embedded into the dot matrix code pattern according to the first integer; the 13 th bit to the 16 th bit of the password embedded with the anti-counterfeiting characteristic of the original graph are converted into a fourth digital array through ASCII coding; taking the first 4 or the last 4 numbers of the fourth digital array, setting the odd number in each number as 1 and the even number as 0, and generating a 4-bit fourth binary digit; converting the fourth binary number into a decimal number, dividing by 4, and rounding downwards to obtain a second integer; determining the embedding offset of the multiple graphic anti-counterfeiting features embedded in the dot matrix code pattern according to the second integer; the 17 th bit to the 20 th bit of the password embedded with the anti-counterfeiting characteristic of the original graph are converted into a fifth digital array through ASCII coding; taking the first 4 or the last 4 numbers of the fifth digital array, setting the odd number in each number as 1 and the even number as 0, and generating a fifth binary number with 4 bits; converting the fifth binary number into a decimal number, dividing by 2, rounding down and adding 1 to obtain a third integer; and determining the number of pixels which are added outwards relative to the centers of code points of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code pattern according to the third integer.
Preferably, detecting the random additional dot pattern security code physical identifier to be detected to determine authenticity according to the dynamic encryption parameter corresponding to the original code value, the original pattern security feature fingerprint corresponding to the original code value, and the N-frame security feature fingerprint authenticity determination threshold corresponding to the current printing batch includes: extracting a code value to be detected of the random additional point pattern security code physical identifier to be detected; prompting counterfeits when the extraction is unsuccessful or the extracted code value to be detected is not stored in the server in preset time; when the extracted code value to be detected is stored in the server, acquiring dynamic encryption parameters corresponding to the code value to be detected, original graph anti-counterfeiting feature fingerprints corresponding to the code value to be detected and N frames of anti-counterfeiting feature fingerprint authenticity judgment thresholds corresponding to the current printing batch from the server; processing the code value to be detected by using the dynamic encryption algorithm and dynamic encryption parameters corresponding to the code value to be detected to obtain an embedded password of the pattern anti-counterfeiting feature to be detected; according to the to-be-detected figure anti-counterfeiting feature embedded password and the figure anti-counterfeiting feature extraction algorithm, obtaining a to-be-detected figure anti-counterfeiting feature fingerprint of the random additional point figure security code physical identifier to be detected; comparing the anti-counterfeiting characteristic fingerprint of the pattern to be detected with the original anti-counterfeiting characteristic fingerprint of the pattern corresponding to the code value to be detected, and calculating the matching rate of two character strings under the same character set coding mode to obtain a single-frame passing result; calculating a multi-frame passing rate statistical value when the number of the single-frame passing results is accumulated to N; prompting counterfeits when the multi-frame passing rate statistic value is smaller than the N-frame anti-counterfeiting characteristic fingerprint authenticity judgment threshold value corresponding to the current printing batch; and prompting the genuine product when the multi-frame passing rate statistic value is larger than or equal to the N-frame anti-counterfeiting characteristic fingerprint authenticity judgment threshold value corresponding to the current printing batch.
Preferably, the method further comprises: obtaining pattern anti-counterfeiting feature fingerprints of random additional point pattern security code physical marks corresponding to M identical original code values; comparing the pattern anti-counterfeiting feature fingerprints of the random additional point pattern security code physical marks corresponding to the M same original code values with the original pattern anti-counterfeiting feature fingerprints corresponding to the original code values to obtain an average value of M single-frame matching rates; and when the average value is smaller than the N-frame anti-counterfeiting characteristic fingerprint authenticity judgment threshold value corresponding to the current printing batch, updating the N-frame anti-counterfeiting characteristic fingerprint authenticity judgment threshold value corresponding to the current printing batch to the average value to the server.
Preferably, according to the to-be-detected pattern anti-counterfeiting feature embedded password and the pattern anti-counterfeiting feature extraction algorithm, obtaining the to-be-detected pattern anti-counterfeiting feature fingerprint of the random additional point pattern security code physical identifier to be detected includes: comparing the to-be-detected pattern anti-counterfeiting feature embedded password with an original pattern anti-counterfeiting feature embedded password corresponding to the to-be-detected code value, and writing a comparison result into the to-be-detected pattern anti-counterfeiting feature fingerprint; verifying the outline length of the pattern anti-counterfeiting feature of the random additional dot pattern security code physical identifier to be detected, and obtaining a first verification result; verifying the area hit of the pattern anti-counterfeiting feature of the random additional pattern security code physical identifier to be detected, and obtaining a second verification result; verifying the corner points of the graphic anti-counterfeiting feature of the random additional point graphic security code physical identifier to be detected, and obtaining a third verification result; obtaining a comparison result and writing the to-be-detected graph anti-counterfeiting characteristic fingerprint according to the first verification result, the second verification result, the third verification result and the respective threshold values; outputting the anti-counterfeiting characteristic fingerprint of the pattern to be detected.
Preferably, the code value can be any character coded character string, when the code value of the micro point code is converted into binary, there is an obvious gap between data with 1 or more data positions, and the random additional point graphic security code physical identifier manufactured by using the micro point code has at least 90% robustness in a 20mm x 20mm area, can be decoded from the stain to any 3mm x 3mm complete area, and can be read under the interference graphic beyond the linear, bulk and special-shaped code points.
The embodiment of the invention also provides a random additional point anti-counterfeiting device based on the micro-point code, which comprises: the code pattern generation module is used for generating a dot matrix code pattern by using any original code value based on a code system of the micro-point code; the password acquisition module is used for processing the original code value by using a dynamic encryption algorithm and dynamic encryption parameters corresponding to the original code value to obtain an original graph anti-counterfeiting characteristic embedded password; the document acquisition module is used for: determining code point row numbers, code point column numbers, embedding directions, embedding offset and the number of pixels which are outwards added relative to the center of the code points of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code pattern according to the password embedded in the original graphic anti-counterfeiting features and a graphic anti-counterfeiting feature embedding algorithm; embedding the plurality of graphic anti-counterfeiting features in the dot matrix code pattern according to the code dot line number, the code dot column number, the embedding direction, the embedding offset and the number of pixels added outwards from the center of the relative code dot to obtain a random additional dot pattern security code electronic document; the parameter storage module is used for storing dynamic encryption parameters corresponding to the original code values, original graph anti-counterfeiting feature fingerprints corresponding to the original code values and N frames of anti-counterfeiting feature fingerprints corresponding to the current printing batch to a server, wherein the original graph anti-counterfeiting feature fingerprints are obtained by processing the random additional point graph safe code electronic document by using the original graph anti-counterfeiting feature embedded password and the graph anti-counterfeiting feature extraction algorithm corresponding to the graph anti-counterfeiting feature embedding algorithm; the identification processing module is used for printing the random additional point figure safety code electronic document into a random additional point figure safety code physical identification so as to detect the random additional point figure safety code physical identification to be detected according to the dynamic encryption parameters corresponding to the original code values, the original figure anti-counterfeiting characteristic fingerprints corresponding to the original code values and the N frame anti-counterfeiting characteristic fingerprint authenticity judgment threshold corresponding to the current printing batch to judge authenticity.
Preferably, the password obtaining module is configured to: based on a linear congruence method, performing n times of random number generation operation to obtain an original figure anti-counterfeiting characteristic embedded password prototype; embedding the original graph anti-counterfeiting characteristic into a password prototype, intercepting and splitting the password prototype into 5 character strings; respectively carrying out MD5 encryption on the 5 character strings to obtain 5 encrypted character strings; and respectively taking the first 4 bits or the last 4 bits of the 5 encrypted character strings to generate 5 arrays with the length of 4, and combining the arrays to obtain the original figure anti-counterfeiting characteristic embedded password.
Preferably, the document acquisition module is configured to: the 1 st bit to the 4 th bit of the password embedded with the anti-counterfeiting characteristic of the original graph are converted into a first digital array through ASCII coding; taking the first 4 or the last 4 numbers of the first digital array, setting the odd number in each number as 1 and the even number as 0, and generating a first binary number with 4 bits; converting the first binary number into a decimal number to obtain code point line numbers of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code pattern; the 5 th bit to 8 th bit of the embedded password of the original graph anti-counterfeiting characteristic is converted into a second digital array through ASCII coding; taking the first 4 or the last 4 numbers of the second digital array, setting the odd number in each number as 1 and the even number as 0, and generating a second binary number with 4 bits; converting the second binary digits into decimal digits to obtain code point column numbers of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code patterns; the 9 th to 12 th bits of the original graphic anti-counterfeiting characteristic embedded password are converted into a third digital array through ASCII coding; taking the first 4 or the last 4 numbers of the third digital array, setting the odd number in each number as 1 and the even number as 0, and generating a 4-bit third binary digit; converting the third binary number into a decimal number, dividing by 2, rounding down and then adding 1 to obtain a first integer; determining the embedding direction of a plurality of graphic anti-counterfeiting features embedded into the dot matrix code pattern according to the first integer; the 13 th bit to the 16 th bit of the password embedded with the anti-counterfeiting characteristic of the original graph are converted into a fourth digital array through ASCII coding; taking the first 4 or the last 4 numbers of the fourth digital array, setting the odd number in each number as 1 and the even number as 0, and generating a 4-bit fourth binary digit; converting the fourth binary number into a decimal number, dividing by 4, and rounding downwards to obtain a second integer; determining the embedding offset of the multiple graphic anti-counterfeiting features embedded in the dot matrix code pattern according to the second integer; the 17 th bit to the 20 th bit of the password embedded with the anti-counterfeiting characteristic of the original graph are converted into a fifth digital array through ASCII coding; taking the first 4 or the last 4 numbers of the fifth digital array, setting the odd number in each number as 1 and the even number as 0, and generating a fifth binary number with 4 bits; converting the fifth binary number into a decimal number, dividing by 2, rounding down and adding 1 to obtain a third integer; and determining the number of pixels which are added outwards relative to the centers of code points of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code pattern according to the third integer.
Preferably, the identification processing module is configured to: extracting a code value to be detected of the random additional point pattern security code physical identifier to be detected; prompting counterfeits when the extraction is unsuccessful or the extracted code value to be detected is not stored in the server in preset time; when the extracted code value to be detected is stored in the server, acquiring dynamic encryption parameters corresponding to the code value to be detected, original graph anti-counterfeiting feature fingerprints corresponding to the code value to be detected and N frames of anti-counterfeiting feature fingerprint authenticity judgment thresholds corresponding to the current printing batch from the server; processing the code value to be detected by using the dynamic encryption algorithm and dynamic encryption parameters corresponding to the code value to be detected to obtain an embedded password of the pattern anti-counterfeiting feature to be detected; according to the to-be-detected figure anti-counterfeiting feature embedded password and the figure anti-counterfeiting feature extraction algorithm, obtaining a to-be-detected figure anti-counterfeiting feature fingerprint of the random additional point figure security code physical identifier to be detected; comparing the anti-counterfeiting characteristic fingerprint of the pattern to be detected with the original anti-counterfeiting characteristic fingerprint of the pattern corresponding to the code value to be detected, and calculating the matching rate of two character strings under the same character set coding mode to obtain a single-frame passing result; calculating a multi-frame passing rate statistical value when the number of the single-frame passing results is accumulated to N; prompting counterfeits when the multi-frame passing rate statistic value is smaller than the N-frame anti-counterfeiting characteristic fingerprint authenticity judgment threshold value corresponding to the current printing batch; and prompting the genuine product when the multi-frame passing rate statistic value is larger than or equal to the N-frame anti-counterfeiting characteristic fingerprint authenticity judgment threshold value corresponding to the current printing batch.
Preferably, the apparatus further comprises a parameter adjustment module for: obtaining pattern anti-counterfeiting feature fingerprints of random additional point pattern security code physical marks corresponding to M identical original code values; comparing the pattern anti-counterfeiting feature fingerprints of the random additional point pattern security code physical marks corresponding to the M same original code values with the original pattern anti-counterfeiting feature fingerprints corresponding to the original code values to obtain an average value of M single-frame matching rates; and when the average value is smaller than the N-frame anti-counterfeiting characteristic fingerprint authenticity judgment threshold value corresponding to the current printing batch, updating the N-frame anti-counterfeiting characteristic fingerprint authenticity judgment threshold value corresponding to the current printing batch to the average value to the server.
Preferably, the identification processing module is configured to: comparing the to-be-detected pattern anti-counterfeiting feature embedded password with an original pattern anti-counterfeiting feature embedded password corresponding to the to-be-detected code value, and writing a comparison result into the to-be-detected pattern anti-counterfeiting feature fingerprint; verifying the outline length of the pattern anti-counterfeiting feature of the random additional dot pattern security code physical identifier to be detected, and obtaining a first verification result; verifying the area hit of the pattern anti-counterfeiting feature of the random additional pattern security code physical identifier to be detected, and obtaining a second verification result; verifying the corner points of the graphic anti-counterfeiting feature of the random additional point graphic security code physical identifier to be detected, and obtaining a third verification result; obtaining a comparison result and writing the to-be-detected graph anti-counterfeiting characteristic fingerprint according to the first verification result, the second verification result, the third verification result and the respective threshold values; outputting the anti-counterfeiting characteristic fingerprint of the pattern to be detected.
According to the technical scheme, the safety is improved by selecting the non-open-source micro-point code system to replace the traditional open-source code system, so that counterfeiters are prevented from directly obtaining code values through software of an open-source two-dimensional code decoding algorithm and generating the code values to realize single code counterfeiting, and even a large number of one-object one-code batch counterfeiting is realized according to trial observation rule guesses; because the non-open source code system is selected, the continuous numbers can be directly used as the code value ID, and the system checking feedback time is greatly shortened; the technology of embedding and extracting the anti-counterfeiting characteristic of the graph is added to the traditional digital verification technology, and the printed matter which is originally not prevented from being copied has the anti-copying effect based on the micro-point code graph; the relation between the code value ID and the anti-counterfeiting characteristic embedded password is established by using a dynamic encryption technology, and the dynamic property ensures that even an attacker cannot effectively acquire the code value of each code through decompiling and cracking programs, so that the technical safety of the anti-counterfeiting scheme is greatly improved; and other colors are not required, so that the anti-counterfeiting characteristic embedding support for the industrialized high-speed variable single black code spraying process is increased.
Additional features and advantages of embodiments of the invention will be set forth in the detailed description which follows.
Drawings
The accompanying drawings are included to provide a further understanding of embodiments of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain, without limitation, the embodiments of the invention. In the drawings:
FIG. 1 is a flow chart of a random additional point anti-counterfeiting method based on micro-point codes according to an embodiment of the invention;
FIG. 2 is a flow chart of a method for determining an embedded password of an original graphical security feature provided by an embodiment of the present invention;
FIG. 3 is a flow chart of a method for determining multiple graphic security features embedded in the dot matrix code pattern according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of the distribution of an original graphical security feature embedded password provided by an embodiment of the present invention;
FIG. 5 is a schematic illustration of the embedding direction of a plurality of graphical security features provided in an embodiment of the present invention;
FIG. 6 is a schematic illustration of an embedding offset for a plurality of graphical security features provided in accordance with one embodiment of the present invention;
FIG. 7 is a schematic diagram of the number of pixels applied outward from the center of a code dot of a plurality of graphical security features according to one embodiment of the present invention;
FIG. 8A is a diagram of a dot matrix code pattern according to an embodiment of the present invention;
FIG. 8B is a schematic diagram of a random additional point graphic security code electronic document provided in an embodiment of the invention;
FIG. 9 is a flowchart of a method for detecting a random additional dot pattern security code physical identifier to be detected according to an embodiment of the present invention;
FIG. 10 is a flowchart of a method for determining a fingerprint of a security feature of a graphic to be detected according to an embodiment of the present invention;
FIG. 11 is a flow chart of a method for dynamically adjusting a decision threshold according to an embodiment of the present invention;
fig. 12 is a schematic structural diagram of a random additional point anti-counterfeiting device based on a micro-point code according to an embodiment of the present invention.
Detailed Description
The following describes the detailed implementation of the embodiments of the present invention with reference to the drawings. It should be understood that the detailed description and specific examples, while indicating and illustrating the invention, are not intended to limit the invention.
Fig. 1 is a flowchart of a random additional point anti-counterfeiting method based on a micro-point code according to an embodiment of the present invention. As shown in fig. 1, the method includes:
step S101, generating a dot matrix code pattern by using any original code value based on the code system of the micro-point code;
the micro-point code is a sparse dot matrix code with high robustness, and is an encoding algorithm and a decoding algorithm without open source, the code diagram can not be read by other open source code system decoding algorithms, compared with the traditional dense two-dimensional code which converts code values into binary 1 and 0 and respectively arranges the binary 1 and the binary 0 in a deep and shallow code point form, the code value of the micro-point code is converted into binary data, and a clear gap with more than or equal to 1 data position exists between the binary data and the data, and the code value can be a character string of any character codes.
The random additional point figure safety code physical identification manufactured by the micro point code supports the robustness of more than 90% in 20mm x 20mm, supports the decoding still from the pollution to the whole area of any 3mm x 3mm, still has 15% fault tolerance in the minimum readable area of 3mm x 3mm, and supports the reading still under the interference figure beyond the linear, bulk and special-shaped code points. The lattice code system meeting the robustness condition provides powerful guarantee for embedding the anti-counterfeiting characteristics with enough quantity, area and position independence.
The code value of the traditional digital verification must ensure random discreteness to prevent counterfeiters from decoding randomly, guessing rules and freely trying to code by using a source code system to be easy to counterfeit. The embodiment can use continuous numbers as the code values, so that the efficiency of code value generation and number guessing prevention are greatly improved. Meanwhile, the micro-point code can achieve the effect of keeping the aesthetic property of the anti-counterfeiting mark and the aesthetic feeling of the brand which are almost invisible and visible outside 15 cm.
In this embodiment, a plurality of micro-point codes which are disclosed or not disclosed at present are selected as the code system to be anti-counterfeit processed. The purpose of selecting the micro-point code system is that: the anti-counterfeiting detection method can generate two-dimensional code images with any size (generally 3mm or more) according to the anti-counterfeiting detection requirement, and print the two-dimensional code images on the surface of a printing stock, and compared with the traditional dense two-dimensional code, the anti-counterfeiting detection size of at least 8mm or 8mm is less, so that the package appearance is less affected, and the anti-counterfeiting concealment is realized. Compared with the traditional Data Matrix, maxiCode, aztec, QR Code, PDF417, vericode, ultracode, code, code 16K and other high-density two-dimensional Code images, the micro-point Code image is visually represented by light-colored grids more and has no obvious boundary which can be distinguished by human eyes.
The embodiments of the present invention are described only with respect to any original code value, but those skilled in the art should appreciate that other different original code values exist for anti-counterfeiting of different articles due to the one-to-one code principle. For other original code values, the processing of the embodiments of the present invention may also be used, and will not be described herein.
Step S102, processing the original code value by using a dynamic encryption algorithm and dynamic encryption parameters corresponding to the original code value to obtain an original figure anti-counterfeiting characteristic embedded password;
in which, as shown in fig. 2, the following steps S201-204 of the present invention provide an embodiment of obtaining the original graphical security feature embedded password that is preferable for the embedded graphical security feature of the present invention, but those skilled in the art should know that it is not limited thereto.
Step S201, based on a linear congruence method, executing n times of random number generation operation to obtain an original figure anti-counterfeiting characteristic embedded password prototype;
wherein n is the dynamic encryption parameter corresponding to the original code value.
Step S202, embedding the original graph anti-counterfeiting characteristic into a password prototype, intercepting and splitting the original graph anti-counterfeiting characteristic into 5 character strings;
step S203, performing MD5 encryption on the 5 character strings respectively to obtain 5 encrypted character strings;
Step S204, the first 4 bits or the last 4 bits of the 5 encrypted character strings are respectively taken, 5 arrays with the length of 4 are generated, and the original graphic anti-counterfeiting characteristic embedded password is obtained by combining the arrays.
Wherein it is understood that the preferred original graphical security feature embedded password for the embedded graphical security feature of the present invention is a 20-bit string. The dynamic variability of the embodiment of the invention improves the technology cracking resistance, and the correspondence verification improves the batch forging resistance.
Step S103, determining code point row numbers, code point column numbers, embedding directions, embedding offset and the number of pixels which are externally added relative to the center of the code points of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code pattern according to the original graphic anti-counterfeiting feature embedding password and the graphic anti-counterfeiting feature embedding algorithm;
step S103, as shown in fig. 3, includes steps S301 to S318, as shown in fig. 4, of determining code point line numbers of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code pattern by first 4 bits of an original graphic anti-counterfeiting feature embedded password; 5-8 bits determine code point column numbers of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code pattern; 9-12 bits determine the embedding direction of the multiple graphic anti-counterfeiting features embedded in the dot matrix code pattern; 13-16 bits determine the embedding offset of the multiple graphic anti-counterfeiting features embedded in the dot matrix code pattern; the 17-20 bits determine the number of pixels added outwards relative to the center of the code points of the plurality of graphic security features embedded in the dot matrix code pattern.
The steps S301 to S318 specifically include:
step S301, converting the 1 st to 4 th bits of the original graphic anti-counterfeiting characteristic embedded password into a first digital array through ASCII coding;
step S302, taking the first 4 or the last 4 numbers of the first digital array, setting the odd number in each number as 1 and the even number as 0, and generating a first binary number with 4 bits;
step S303, converting the first binary number into a decimal number to obtain code point line numbers of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code pattern;
wherein a plurality of graphical security features are embedded in all code points of the row.
Step S304, converting the 5 th-8 th bit of the embedded password of the original figure anti-counterfeiting characteristic into a second digital array through ASCII coding;
step S305, taking the first 4 or the last 4 numbers of the second digital array, setting the odd number in each number as 1 and the even number as 0, and generating a second binary number with 4 bits;
step S306, converting the second binary digits into decimal digits to obtain code point column numbers of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code pattern;
wherein a plurality of graphical security features are embedded in all code points of the column.
Step S307, the 9 th to 12 th bits of the original figure anti-counterfeiting characteristic embedded password are converted into a third digital array through ASCII coding;
Step S308, taking the first 4 or the last 4 numbers of the third digital array, setting the odd number in each number as 1 and the even number as 0, and generating a third binary number with 4 bits;
step S309, converting the third binary number into a decimal number, dividing by 2, rounding down and adding 1 to obtain a first integer;
step S310, determining the embedding direction of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code pattern according to the first integer;
wherein, as shown in FIG. 5, 1 is less than or equal to the first integer is less than or equal to 8, and each numerical value corresponds to one direction. The number 1 is aligned right and left, the number 2 is aligned right and left, the number 3 is aligned right and left, the number 4 is aligned right and right, the number 5 is aligned right and left, the number 6 is aligned right and left, the number 7 is aligned right and left, and the number 8 is aligned right and left.
Step S311, converting the 13 th-16 th bit of the original figure anti-counterfeiting characteristic embedded password into a fourth digital array through ASCII coding;
step S312, taking the first 4 or the last 4 numbers of the fourth digital array, setting the odd number in each number as 1 and the even number as 0, and generating a fourth binary number with 4 bits;
step S313, converting the fourth binary number into a decimal number, dividing by 4, and rounding down to obtain a second integer;
Step S314, determining the embedding offset of the plurality of graphic anti-counterfeiting features embedded in the dot matrix code pattern according to the second integer;
as shown in FIG. 6, the second integer 0.ltoreq.3, each value corresponding to an offset, 0 representing an offset of 0,1 representing an offset of 1,2 representing an offset of 2, and 3 representing an offset of 3. And finally determining the embedding offset of the anti-counterfeiting characteristic points in the corresponding direction.
Step S315, converting the 17 th-20 th bit of the original figure anti-counterfeiting characteristic embedded password into a fifth digital array through ASCII coding;
step S316, taking the first 4 or the last 4 numbers of the fifth digital array, setting the odd number in each number as 1 and the even number as 0, and generating a fifth binary number with 4 bits;
step S317, converting the fifth binary number into a decimal number, dividing by 2, rounding down and adding 1 to obtain a third integer;
step S318, determining the number of pixels added outwards from the centers of the relative code points of the plurality of graphic anti-counterfeiting features embedded in the dot matrix code pattern according to the third integer.
Wherein, as shown in FIG. 7, the third integer is less than or equal to 1 and less than or equal to 8, each numerical value corresponds to a number of levels of the added security feature, and each level corresponds to a number of pixels added outwards relative to the center of the image. Fig. 7 shows the anti-counterfeiting feature points with 3 number of levels (third integer) added when the code points are aligned right and left and the offset is 3.
The pattern anti-counterfeiting feature embedded by the embodiment of the invention is a pure black dot, and an effective anti-counterfeiting feature embedding mode is provided for a code spraying printing process in which color dots cannot be embedded.
Step S104, embedding the plurality of graphic anti-counterfeiting features in the dot matrix code pattern according to the code dot row number, the code dot column number, the embedding direction, the embedding offset and the number of pixels added outwards from the center of the corresponding code dot to obtain a random additional dot pattern security code electronic document;
wherein fig. 8B is a schematic diagram of a random additional dot pattern security code electronic document. The dot matrix code pattern is obtained by using the step S103 to embed the pattern anti-counterfeiting feature on the basis of the dot matrix code pattern of FIG. 8A, wherein the basis of the embedded pattern anti-counterfeiting feature is that the code dot row number is 2, the code dot column number is 3, the adding direction is aligned right and left, the offset is 3, and the number is 6.
Step S105, storing the dynamic encryption parameters corresponding to the original code values, the original pattern anti-counterfeiting feature fingerprints corresponding to the original code values and N frames of anti-counterfeiting feature fingerprints corresponding to the current printing batch to a server, wherein the original pattern anti-counterfeiting feature fingerprints are obtained by processing the random additional dot pattern security code electronic document by using the original pattern anti-counterfeiting feature embedded password and the pattern anti-counterfeiting feature extraction algorithm corresponding to the pattern anti-counterfeiting feature embedding algorithm;
The fingerprint authenticity judgment threshold value of the N (N is more than or equal to 3 and less than or equal to 10) frame anti-counterfeiting characteristic corresponding to the current printing batch can be preset uniformly according to subjective experience, and N can be adjusted according to the performance of the intelligent mobile phone and the user experience expectation. And the dynamic encryption parameters corresponding to the original code values, the original pattern anti-counterfeiting characteristic fingerprints corresponding to the original code values and the N-frame anti-counterfeiting characteristic fingerprint authenticity judgment thresholds corresponding to the current printing batch are stored in a server for later use when detecting other random additional point pattern security code physical identifiers. A specific manner of obtaining a fingerprint (e.g., an original graphical security feature fingerprint) will be provided in detail below as an example.
And S106, printing the random additional point figure safety code electronic document into a random additional point figure safety code physical identifier so as to detect the random additional point figure safety code physical identifier to be detected according to the dynamic encryption parameters corresponding to the original code value, the original figure anti-counterfeiting characteristic fingerprint corresponding to the original code value and the N frame anti-counterfeiting characteristic fingerprint authenticity judgment threshold corresponding to the current printing batch to judge authenticity.
As shown in fig. 9, detecting the random additional dot pattern security code physical identifier to be detected includes steps S901-909:
Step S901, extracting a code value to be detected of the random additional point pattern security code physical identifier to be detected;
and continuously acquiring an image of the random additional point pattern security code physical identifier to be detected by using the smart phone preview frame, attempting to calculate the code value to be detected of the random additional point pattern security code physical identifier to be detected currently through a point code decoding algorithm, and continuously acquiring the next preview frame image if the code value cannot be decoded.
Step S902, prompting a counterfeiter when the extraction is unsuccessful or the extracted code value to be detected is not stored in the server in a preset time;
wherein preferably the decoding is unsuccessful for more than 15 seconds, the user is prompted to detect a suspected counterfeit. Or if the extracted code value to be detected does not find the same original code value at the server, prompting the user to detect the suspected counterfeit.
Step S903, when the extracted code value to be detected is stored in the server, acquiring a dynamic encryption parameter corresponding to the code value to be detected, an original pattern anti-counterfeiting feature fingerprint corresponding to the code value to be detected and an N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold corresponding to the current printing batch from the server;
Step S904, processing the code value to be detected by using the dynamic encryption algorithm and the dynamic encryption parameter corresponding to the code value to be detected to obtain an embedded password of the anti-counterfeiting characteristic of the graph to be detected;
the processing manner of this step is similar to that of step S102, and will not be described here again.
Step S905, obtaining a to-be-detected pattern anti-counterfeiting feature fingerprint of the to-be-detected random additional point pattern security code physical identifier according to the to-be-detected pattern anti-counterfeiting feature embedded password and the pattern anti-counterfeiting feature extraction algorithm;
as shown in fig. 10, the fingerprint of the security feature to be detected may be obtained by the following steps S1001 to S1006, and the original fingerprint of the security feature may be obtained in a similar manner.
Step S1001, comparing the to-be-detected pattern anti-counterfeiting feature embedded password with the original pattern anti-counterfeiting feature embedded password corresponding to the to-be-detected code value, and writing the comparison result into the to-be-detected pattern anti-counterfeiting feature fingerprint;
step S1002, verifying the outline length of the graphic anti-counterfeiting feature of the random additional dot graphic security code physical identifier to be detected, and obtaining a first verification result;
Wherein, code points are divided into two groups: code points embedded with the graphic anti-counterfeiting feature and code points not embedded with the graphic anti-counterfeiting feature. And respectively calculating the theoretical image contour length Lt of each code point. And then obtaining the outline information of each code point position on the random additional point figure safety code physical identification to be detected, and calculating to obtain the detection outline length Lr of each code point position of the random additional point figure safety code physical identification to be detected. The Mean Square Error (MSE) of the theoretical image contour length Lt and the detected contour length Lr of the two groups of code points is calculated and recorded as Ey and En, respectively. And calculating to obtain two weighted sums of mean square error values by adopting the code point contour verification parameter weights wy of the embedded pattern anti-counterfeiting features and the code point contour verification parameter weights wn of the non-embedded pattern anti-counterfeiting features, wherein ea=ey+wy+en. And obtaining a first verification result.
Step S1003, verifying the area hit of the graphic anti-counterfeiting feature of the random additional dot graphic security code physical identifier to be detected, and obtaining a second verification result;
wherein for one of the code points (including the embedded pattern portion if there is an embedded pattern), an array St of position coordinate value pairs (xt, yt) of all points included is calculated. Then, an array Sr of position coordinate value pairs (xr, yr) of all points contained in the code point (containing the embedded pattern part if the embedded pattern exists) patterns at the corresponding code point positions is calculated on the random additional point pattern security code physical object identification to be detected. And (3) recording an initial value Ms of the area hit verification parameter as 0, calculating the matching rate of the position coordinate value pairs in St and Sr, if the matching rate is larger than a preset area local hit threshold value of the embedded pattern, successfully matching the code points, adding 1 to the Ms, and otherwise subtracting 1 from the Ms. And after detecting and matching each code point, obtaining a second verification result.
Step S1004, verifying the corner points of the graphic anti-counterfeiting feature of the random additional point graphic security code physical identifier to be detected, and obtaining a third verification result;
and aiming at the code point of one embedded pattern anti-counterfeiting feature, obtaining the angular point position coordinates of the code point theory of the embedded pattern anti-counterfeiting feature and the gradient direction at the angular point according to the information such as the position of the code point of the embedded pattern anti-counterfeiting feature. Initializing an angular point verification parameter Ma of the embedded pattern anti-counterfeiting characteristic to 0, judging whether the angular point exists at an angular point position coordinate corresponding to a random additional dot pattern security code physical identifier to be detected, if so, further judging whether the gradient direction at the angular point meets the preset direction judgment error threshold requirement, if the code point meets the threshold requirement, adding Ma by 1, otherwise subtracting Ma by 1. And detecting whether each code point meets the threshold requirement or not, and obtaining a third verification result.
Step 1005, obtaining a comparison result and writing the to-be-detected graphic anti-counterfeiting characteristic fingerprint according to the first verification result, the second verification result, the third verification result and the respective threshold values;
and aiming at different relations between the array formed by the first verification result, the second verification result and the third verification result and the threshold value, different comparison results are obtained, wherein the comparison results can be represented by characters and are written into the anti-counterfeiting characteristic fingerprint of the graph to be detected.
Step S1006, outputting the pattern anti-counterfeiting characteristic fingerprint to be detected.
And finally outputting the fingerprint to obtain the anti-counterfeiting characteristic fingerprint of the pattern to be detected.
Step S906, comparing the anti-counterfeiting characteristic fingerprint of the pattern to be detected with the original anti-counterfeiting characteristic fingerprint of the pattern corresponding to the code value to be detected, and calculating the matching rate of two character strings under the same character set coding mode to obtain a single-frame passing result;
step S907, when the number of single frame passing results is accumulated to N, calculating a multi-frame passing rate statistic value;
wherein, preferably, N is more than or equal to 3 and less than or equal to 10. And calculating to obtain a multi-frame passing rate statistical value by using the formula of dividing the single frame passing number p by N. The multi-frame judging result statistics is more accurate, and the probability of judging the genuine or the counterfeit printed matter caused by light rays, angles and jitter is reduced.
Step S908, when the multi-frame passing rate statistic value is smaller than the N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch, prompting a counterfeiter;
and step S909, prompting the genuine product when the multi-frame passing rate statistic value is greater than or equal to the authenticity judgment threshold value of the N frames of anti-counterfeiting characteristic fingerprints corresponding to the current printing batch.
FIG. 11 is a flow chart of a method for dynamically adjusting a decision threshold according to an embodiment of the present invention. As shown in fig. 11, the method includes:
Step 1101, obtaining pattern anti-counterfeiting feature fingerprints of random additional pattern security code physical identifiers corresponding to M identical original code values;
the printing is a process of necessarily randomly generating characteristic change, so that fingerprints generated by genuine products (images acquired by cameras for electronic files printed into printed matter) and original fingerprints (images of electronic files) are different, and are not 100% identical, but the difference is within a certain statistical threshold. But the counterfeit will be copied and then necessarily separated from the printing by a larger distance. The fingerprint authenticity judgment threshold value of the N frames of anti-counterfeiting features can be set to separate the fingerprint authenticity judgment threshold value from the N frames of anti-counterfeiting features. Therefore, in order to make the true and false judgment threshold value of the N frames of anti-counterfeiting characteristic fingerprints corresponding to the current printing batch more accurate, the invention carries out the step of dynamically adjusting the judgment threshold value. Namely, first, directly obtaining the graphic anti-counterfeiting characteristic fingerprints of the random additional point graphic security code physical identifications corresponding to the printed M (for example, 100) same original code values.
Step 1102, comparing the pattern anti-counterfeiting feature fingerprints of the random additional point pattern security code physical marks corresponding to the M same original code values with the original pattern anti-counterfeiting feature fingerprints corresponding to the original code values to obtain average values of M single frame matching rates;
The single frame matching rate, that is, abcd and abc3 matching rates, for example, is 75%. The embodiment only detects the physical identifications of the M random additional point figure security codes, thereby realizing cost saving for a production enterprise without modifying a production line.
And step S1103, when the average value is smaller than the N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch, updating the N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch to the average value to the server.
The risk that the genuine products deviate from the preset multi-frame passing rate due to the printing deviation of the pattern anti-counterfeiting characteristics of different printing batches caused by the printing randomness always exists, so that the genuine product passing rate quality inspection of the whole printing batch is realized with extremely low cost and efficiency after the calibration of the embodiment.
Fig. 12 is a schematic structural diagram of a random additional point anti-counterfeiting device based on a micro-point code according to an embodiment of the present invention. As shown in fig. 12, the apparatus includes: the code pattern generation module 1, the password acquisition module 2, the document acquisition module 3, the parameter storage module 4, the identification processing module 5 and the parameter adjustment module 6, wherein the code pattern generation module 1 is used for generating a dot matrix code pattern by using any original code value based on the code pattern of the micro dot code; the password acquisition module 2 is used for processing the original code value by using a dynamic encryption algorithm and dynamic encryption parameters corresponding to the original code value to obtain an original graph anti-counterfeiting characteristic embedded password; the document acquisition module 3 is configured to: determining code point row numbers, code point column numbers, embedding directions, embedding offset and the number of pixels which are outwards added relative to the center of the code points of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code pattern according to the password embedded in the original graphic anti-counterfeiting features and a graphic anti-counterfeiting feature embedding algorithm; embedding the plurality of graphic anti-counterfeiting features in the dot matrix code pattern according to the code dot line number, the code dot column number, the embedding direction, the embedding offset and the number of pixels added outwards from the center of the relative code dot to obtain a random additional dot pattern security code electronic document; the parameter storage module 4 is configured to store, to a server, a dynamic encryption parameter corresponding to the original code value, an original graphic security feature fingerprint corresponding to the original code value, and an N-frame security feature fingerprint authenticity judgment threshold corresponding to a current printing batch, where the original graphic security feature fingerprint is obtained by processing the random additional dot graphic security code electronic document by using the original graphic security feature embedded password and a graphic security feature extraction algorithm corresponding to the graphic security feature embedding algorithm; the identification processing module 5 is configured to print the random additional point graphic security code electronic document into a random additional point graphic security code physical identifier, so as to detect the random additional point graphic security code physical identifier to be detected according to the dynamic encryption parameter corresponding to the original code value, the original graphic security feature fingerprint corresponding to the original code value, and the N frame security feature fingerprint authenticity judgment threshold corresponding to the current printing batch, so as to judge authenticity.
Preferably, the password obtaining module 2 is configured to: based on a linear congruence method, performing n times of random number generation operation to obtain an original figure anti-counterfeiting characteristic embedded password prototype; embedding the original graph anti-counterfeiting characteristic into a password prototype, intercepting and splitting the password prototype into 5 character strings; respectively carrying out MD5 encryption on the 5 character strings to obtain 5 encrypted character strings; and respectively taking the first 4 bits or the last 4 bits of the 5 encrypted character strings to generate 5 arrays with the length of 4, and combining the arrays to obtain the original figure anti-counterfeiting characteristic embedded password.
Preferably, the document obtaining module 3 is configured to: the 1 st bit to the 4 th bit of the password embedded with the anti-counterfeiting characteristic of the original graph are converted into a first digital array through ASCII coding; taking the first 4 or the last 4 numbers of the first digital array, setting the odd number in each number as 1 and the even number as 0, and generating a first binary number with 4 bits; converting the first binary number into a decimal number to obtain code point line numbers of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code pattern; the 5 th bit to 8 th bit of the embedded password of the original graph anti-counterfeiting characteristic is converted into a second digital array through ASCII coding; taking the first 4 or the last 4 numbers of the second digital array, setting the odd number in each number as 1 and the even number as 0, and generating a second binary number with 4 bits; converting the second binary digits into decimal digits to obtain code point column numbers of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code patterns; the 9 th to 12 th bits of the original graphic anti-counterfeiting characteristic embedded password are converted into a third digital array through ASCII coding; taking the first 4 or the last 4 numbers of the third digital array, setting the odd number in each number as 1 and the even number as 0, and generating a 4-bit third binary digit; converting the third binary number into a decimal number, dividing by 2, rounding down and then adding 1 to obtain a first integer; determining the embedding direction of a plurality of graphic anti-counterfeiting features embedded into the dot matrix code pattern according to the first integer; the 13 th bit to the 16 th bit of the password embedded with the anti-counterfeiting characteristic of the original graph are converted into a fourth digital array through ASCII coding; taking the first 4 or the last 4 numbers of the fourth digital array, setting the odd number in each number as 1 and the even number as 0, and generating a 4-bit fourth binary digit; converting the fourth binary number into a decimal number, dividing by 4, and rounding downwards to obtain a second integer; determining the embedding offset of the multiple graphic anti-counterfeiting features embedded in the dot matrix code pattern according to the second integer; the 17 th bit to the 20 th bit of the password embedded with the anti-counterfeiting characteristic of the original graph are converted into a fifth digital array through ASCII coding; taking the first 4 or the last 4 numbers of the fifth digital array, setting the odd number in each number as 1 and the even number as 0, and generating a fifth binary number with 4 bits; converting the fifth binary number into a decimal number, dividing by 2, rounding down and adding 1 to obtain a third integer; and determining the number of pixels which are added outwards relative to the centers of code points of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code pattern according to the third integer.
Preferably, the identification processing module 5 is configured to: extracting a code value to be detected of the random additional point pattern security code physical identifier to be detected; prompting counterfeits when the extraction is unsuccessful or the extracted code value to be detected is not stored in the server in preset time; when the extracted code value to be detected is stored in the server, acquiring dynamic encryption parameters corresponding to the code value to be detected, original graph anti-counterfeiting feature fingerprints corresponding to the code value to be detected and N frames of anti-counterfeiting feature fingerprint authenticity judgment thresholds corresponding to the current printing batch from the server; processing the code value to be detected by using the dynamic encryption algorithm and dynamic encryption parameters corresponding to the code value to be detected to obtain an embedded password of the pattern anti-counterfeiting feature to be detected; according to the to-be-detected figure anti-counterfeiting feature embedded password and the figure anti-counterfeiting feature extraction algorithm, obtaining a to-be-detected figure anti-counterfeiting feature fingerprint of the random additional point figure security code physical identifier to be detected; comparing the anti-counterfeiting characteristic fingerprint of the pattern to be detected with the original anti-counterfeiting characteristic fingerprint of the pattern corresponding to the code value to be detected, and calculating the matching rate of two character strings under the same character set coding mode to obtain a single-frame passing result; calculating a multi-frame passing rate statistical value when the number of the single-frame passing results is accumulated to N; prompting counterfeits when the multi-frame passing rate statistic value is smaller than the N-frame anti-counterfeiting characteristic fingerprint authenticity judgment threshold value corresponding to the current printing batch; and prompting the genuine product when the multi-frame passing rate statistic value is larger than or equal to the N-frame anti-counterfeiting characteristic fingerprint authenticity judgment threshold value corresponding to the current printing batch.
Preferably, the apparatus further comprises a parameter adjustment module 6 for: obtaining pattern anti-counterfeiting feature fingerprints of random additional point pattern security code physical marks corresponding to M identical original code values; comparing the pattern anti-counterfeiting feature fingerprints of the random additional point pattern security code physical marks corresponding to the M same original code values with the original pattern anti-counterfeiting feature fingerprints corresponding to the original code values to obtain an average value of M single-frame matching rates; and when the average value is smaller than the N-frame anti-counterfeiting characteristic fingerprint authenticity judgment threshold value corresponding to the current printing batch, updating the N-frame anti-counterfeiting characteristic fingerprint authenticity judgment threshold value corresponding to the current printing batch to the average value to the server.
Preferably, the identification processing module 5 is configured to: comparing the to-be-detected pattern anti-counterfeiting feature embedded password with an original pattern anti-counterfeiting feature embedded password corresponding to the to-be-detected code value, and writing a comparison result into the to-be-detected pattern anti-counterfeiting feature fingerprint; verifying the outline length of the pattern anti-counterfeiting feature of the random additional dot pattern security code physical identifier to be detected, and obtaining a first verification result; verifying the area hit of the pattern anti-counterfeiting feature of the random additional pattern security code physical identifier to be detected, and obtaining a second verification result; verifying the corner points of the graphic anti-counterfeiting feature of the random additional point graphic security code physical identifier to be detected, and obtaining a third verification result; obtaining a comparison result and writing the to-be-detected graph anti-counterfeiting characteristic fingerprint according to the first verification result, the second verification result, the third verification result and the respective threshold values; outputting the anti-counterfeiting characteristic fingerprint of the pattern to be detected.
The embodiments of the random additional point anti-counterfeiting device based on the micro-point code are similar to the embodiments of the random additional point anti-counterfeiting method based on the micro-point code, and are not repeated here.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, etc., such as Read Only Memory (ROM) or flash RAM. Memory is an example of a computer-readable medium.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises an element.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and changes may be made to the present application by those skilled in the art. Any modifications, equivalent substitutions, improvements, etc. which are within the spirit and principles of the present application are intended to be included within the scope of the claims of the present application.
Claims (11)
1. A random additional point anti-counterfeiting method based on a micro-point code, which is characterized by comprising the following steps:
generating a dot matrix code pattern by using any original code value based on the code system of the micro-point code;
processing the original code value by using a dynamic encryption algorithm and dynamic encryption parameters corresponding to the original code value to obtain an original graph anti-counterfeiting characteristic embedded password;
determining code point row numbers, code point column numbers, embedding directions, embedding offset and the number of pixels which are outwards added relative to the center of the code points of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code pattern according to the password embedded in the original graphic anti-counterfeiting features and a graphic anti-counterfeiting feature embedding algorithm;
embedding the plurality of graphic anti-counterfeiting features in the dot matrix code pattern according to the code dot line number, the code dot column number, the embedding direction, the embedding offset and the number of pixels added outwards from the center of the relative code dot to obtain a random additional dot pattern security code electronic document;
Storing dynamic encryption parameters corresponding to the original code values, original pattern anti-counterfeiting feature fingerprints corresponding to the original code values and N frames of anti-counterfeiting feature fingerprint authenticity judging thresholds corresponding to the current printing batch to a server, wherein the original pattern anti-counterfeiting feature fingerprints are obtained by processing the random additional point pattern security code electronic document by using the original pattern anti-counterfeiting feature embedded password and a pattern anti-counterfeiting feature extraction algorithm corresponding to the pattern anti-counterfeiting feature embedding algorithm;
printing the random additional point figure security code electronic document into a random additional point figure security code physical identifier so as to detect the random additional point figure security code physical identifier to be detected according to the dynamic encryption parameter corresponding to the original code value, the original figure anti-counterfeiting characteristic fingerprint corresponding to the original code value and the N frame anti-counterfeiting characteristic fingerprint authenticity judgment threshold corresponding to the current printing batch, wherein the detecting the random additional point figure security code physical identifier to be detected so as to judge authenticity comprises the following steps:
extracting a code value to be detected of the random additional point pattern security code physical identifier to be detected;
prompting counterfeits when the extraction is unsuccessful or the extracted code value to be detected is not stored in the server in preset time;
When the extracted code value to be detected is stored in the server, acquiring dynamic encryption parameters corresponding to the code value to be detected, original graph anti-counterfeiting feature fingerprints corresponding to the code value to be detected and N frames of anti-counterfeiting feature fingerprint authenticity judgment thresholds corresponding to the current printing batch from the server;
processing the code value to be detected by using the dynamic encryption algorithm and dynamic encryption parameters corresponding to the code value to be detected to obtain an embedded password of the pattern anti-counterfeiting feature to be detected;
according to the to-be-detected figure anti-counterfeiting feature embedded password and the figure anti-counterfeiting feature extraction algorithm, obtaining a to-be-detected figure anti-counterfeiting feature fingerprint of the random additional point figure security code physical identifier to be detected;
comparing the anti-counterfeiting characteristic fingerprint of the pattern to be detected with the original anti-counterfeiting characteristic fingerprint of the pattern corresponding to the code value to be detected, and calculating the matching rate of two character strings under the same character set coding mode to obtain a single-frame passing result;
calculating a multi-frame passing rate statistical value when the number of the single-frame passing results is accumulated to N;
prompting counterfeits when the multi-frame passing rate statistic value is smaller than the N-frame anti-counterfeiting characteristic fingerprint authenticity judgment threshold value corresponding to the current printing batch;
And prompting the genuine product when the multi-frame passing rate statistic value is larger than or equal to the N-frame anti-counterfeiting characteristic fingerprint authenticity judgment threshold value corresponding to the current printing batch.
2. The micro-point code based random additional point anti-counterfeiting method according to claim 1, wherein the processing the original code value by using a dynamic encryption algorithm and a dynamic encryption parameter corresponding to the original code value to obtain an original graphic anti-counterfeiting feature embedded password comprises:
based on a linear congruence method, performing n times of random number generation operation to obtain an original figure anti-counterfeiting characteristic embedded password prototype;
embedding the original graph anti-counterfeiting characteristic into a password prototype, intercepting and splitting the password prototype into 5 character strings;
respectively carrying out MD5 encryption on the 5 character strings to obtain 5 encrypted character strings;
and respectively taking the first 4 bits or the last 4 bits of the 5 encrypted character strings to generate 5 arrays with the length of 4, and combining the arrays to obtain the original figure anti-counterfeiting characteristic embedded password.
3. The micro-dot code based random additional dot anti-counterfeiting method according to claim 1, wherein determining the code dot row number, the code dot column number, the embedding direction, the embedding offset, and the number of pixels added outward relative to the center of the code dot of the plurality of graphic anti-counterfeiting features embedded in the dot matrix code pattern according to the original graphic anti-counterfeiting feature embedded password and the graphic anti-counterfeiting feature embedding algorithm comprises:
The 1 st bit to the 4 th bit of the password embedded with the anti-counterfeiting characteristic of the original graph are converted into a first digital array through ASCII coding;
taking the first 4 or the last 4 numbers of the first digital array, setting the odd number in each number as 1 and the even number as 0, and generating a first binary number with 4 bits;
converting the first binary number into a decimal number to obtain code point line numbers of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code pattern;
the 5 th bit to 8 th bit of the embedded password of the original graph anti-counterfeiting characteristic is converted into a second digital array through ASCII coding;
taking the first 4 or the last 4 numbers of the second digital array, setting the odd number in each number as 1 and the even number as 0, and generating a second binary number with 4 bits;
converting the second binary digits into decimal digits to obtain code point column numbers of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code patterns;
the 9 th to 12 th bits of the original graphic anti-counterfeiting characteristic embedded password are converted into a third digital array through ASCII coding;
taking the first 4 or the last 4 numbers of the third digital array, setting the odd number in each number as 1 and the even number as 0, and generating a 4-bit third binary digit;
Converting the third binary number into a decimal number, dividing by 2, rounding down and then adding 1 to obtain a first integer;
determining the embedding direction of a plurality of graphic anti-counterfeiting features embedded into the dot matrix code pattern according to the first integer;
the 13 th bit to the 16 th bit of the password embedded with the anti-counterfeiting characteristic of the original graph are converted into a fourth digital array through ASCII coding;
taking the first 4 or the last 4 numbers of the fourth digital array, setting the odd number in each number as 1 and the even number as 0, and generating a 4-bit fourth binary digit;
converting the fourth binary number into a decimal number, dividing by 4, and rounding downwards to obtain a second integer;
determining the embedding offset of the multiple graphic anti-counterfeiting features embedded in the dot matrix code pattern according to the second integer;
the 17 th bit to the 20 th bit of the password embedded with the anti-counterfeiting characteristic of the original graph are converted into a fifth digital array through ASCII coding;
taking the first 4 or the last 4 numbers of the fifth digital array, setting the odd number in each number as 1 and the even number as 0, and generating a fifth binary number with 4 bits;
converting the fifth binary number into a decimal number, dividing by 2, rounding down and adding 1 to obtain a third integer;
And determining the number of pixels which are added outwards relative to the centers of code points of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code pattern according to the third integer.
4. The random additional point anti-counterfeiting method based on the micro-point code according to claim 1, wherein the method further comprises:
obtaining pattern anti-counterfeiting feature fingerprints of random additional point pattern security code physical marks corresponding to M identical original code values;
comparing the pattern anti-counterfeiting feature fingerprints of the random additional point pattern security code physical marks corresponding to the M same original code values with the original pattern anti-counterfeiting feature fingerprints corresponding to the original code values to obtain an average value of M single-frame matching rates;
and when the average value is smaller than the N-frame anti-counterfeiting characteristic fingerprint authenticity judgment threshold value corresponding to the current printing batch, updating the N-frame anti-counterfeiting characteristic fingerprint authenticity judgment threshold value corresponding to the current printing batch to the average value to the server.
5. The micro-point code-based random additional point anti-counterfeiting method according to claim 1, wherein obtaining the to-be-detected graphic anti-counterfeiting feature fingerprint of the to-be-detected random additional point graphic security code physical identifier according to the to-be-detected graphic anti-counterfeiting feature embedded password and the graphic anti-counterfeiting feature extraction algorithm comprises:
Comparing the to-be-detected pattern anti-counterfeiting feature embedded password with an original pattern anti-counterfeiting feature embedded password corresponding to the to-be-detected code value, and writing a comparison result into the to-be-detected pattern anti-counterfeiting feature fingerprint;
verifying the outline length of the pattern anti-counterfeiting feature of the random additional dot pattern security code physical identifier to be detected, and obtaining a first verification result;
verifying the area hit of the pattern anti-counterfeiting feature of the random additional pattern security code physical identifier to be detected, and obtaining a second verification result;
verifying the corner points of the graphic anti-counterfeiting feature of the random additional point graphic security code physical identifier to be detected, and obtaining a third verification result;
obtaining a comparison result and writing the to-be-detected graph anti-counterfeiting characteristic fingerprint according to the first verification result, the second verification result, the third verification result and the respective threshold values;
outputting the anti-counterfeiting characteristic fingerprint of the pattern to be detected.
6. The random additional point anti-counterfeiting method based on the micro point code according to claim 1, wherein the code value is a character string coded by any character, when the code value of the micro point code is converted into binary, an obvious gap of 1 data position or more exists between data, the random additional point graphic security code physical identifier manufactured by using the micro point code has robustness of at least 90% in an area of 20mm x 20mm, can be decoded from the stain to the whole area of 3mm x 3mm, and can be read under an interference graph except a linear, bulk or special-shaped code point.
7. A random additional point anti-counterfeiting device based on a micro-point code, which is characterized by comprising:
the code diagram generating module, the password obtaining module, the document obtaining module, the parameter storage module and the identification processing module, wherein,
the code pattern generation module is used for generating a dot matrix code pattern by using any original code value based on the code system of the micro-point code;
the password acquisition module is used for processing the original code value by using a dynamic encryption algorithm and dynamic encryption parameters corresponding to the original code value to obtain an original graph anti-counterfeiting characteristic embedded password;
the document acquisition module is used for:
determining code point row numbers, code point column numbers, embedding directions, embedding offset and the number of pixels which are outwards added relative to the center of the code points of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code pattern according to the password embedded in the original graphic anti-counterfeiting features and a graphic anti-counterfeiting feature embedding algorithm;
embedding the plurality of graphic anti-counterfeiting features in the dot matrix code pattern according to the code dot line number, the code dot column number, the embedding direction, the embedding offset and the number of pixels added outwards from the center of the relative code dot to obtain a random additional dot pattern security code electronic document;
The parameter storage module is used for storing dynamic encryption parameters corresponding to the original code values, original graph anti-counterfeiting feature fingerprints corresponding to the original code values and N frames of anti-counterfeiting feature fingerprints corresponding to the current printing batch to a server, wherein the original graph anti-counterfeiting feature fingerprints are obtained by processing the random additional point graph safe code electronic document by using the original graph anti-counterfeiting feature embedded password and the graph anti-counterfeiting feature extraction algorithm corresponding to the graph anti-counterfeiting feature embedding algorithm;
the identification processing module is configured to print the random additional point graphic security code electronic document into a random additional point graphic security code physical identifier, so that detecting the random additional point graphic security code physical identifier to be detected to determine authenticity according to the dynamic encryption parameter corresponding to the original code value, the original graphic security feature fingerprint corresponding to the original code value, and the N-frame security feature fingerprint authenticity determination threshold corresponding to the current printing lot includes:
extracting a code value to be detected of the random additional point pattern security code physical identifier to be detected;
prompting counterfeits when the extraction is unsuccessful or the extracted code value to be detected is not stored in the server in preset time;
When the extracted code value to be detected is stored in the server, acquiring dynamic encryption parameters corresponding to the code value to be detected, original graph anti-counterfeiting feature fingerprints corresponding to the code value to be detected and N frames of anti-counterfeiting feature fingerprint authenticity judgment thresholds corresponding to the current printing batch from the server;
processing the code value to be detected by using the dynamic encryption algorithm and dynamic encryption parameters corresponding to the code value to be detected to obtain an embedded password of the pattern anti-counterfeiting feature to be detected;
according to the to-be-detected figure anti-counterfeiting feature embedded password and the figure anti-counterfeiting feature extraction algorithm, obtaining a to-be-detected figure anti-counterfeiting feature fingerprint of the random additional point figure security code physical identifier to be detected;
comparing the anti-counterfeiting characteristic fingerprint of the pattern to be detected with the original anti-counterfeiting characteristic fingerprint of the pattern corresponding to the code value to be detected, and calculating the matching rate of two character strings under the same character set coding mode to obtain a single-frame passing result;
calculating a multi-frame passing rate statistical value when the number of the single-frame passing results is accumulated to N;
prompting counterfeits when the multi-frame passing rate statistic value is smaller than the N-frame anti-counterfeiting characteristic fingerprint authenticity judgment threshold value corresponding to the current printing batch;
And prompting the genuine product when the multi-frame passing rate statistic value is larger than or equal to the N-frame anti-counterfeiting characteristic fingerprint authenticity judgment threshold value corresponding to the current printing batch.
8. The micro point code based random point of attachment anti-counterfeiting device according to claim 7, wherein the password acquisition module is configured to:
based on a linear congruence method, performing n times of random number generation operation to obtain an original figure anti-counterfeiting characteristic embedded password prototype;
embedding the original graph anti-counterfeiting characteristic into a password prototype, intercepting and splitting the password prototype into 5 character strings;
respectively carrying out MD5 encryption on the 5 character strings to obtain 5 encrypted character strings;
and respectively taking the first 4 bits or the last 4 bits of the 5 encrypted character strings to generate 5 arrays with the length of 4, and combining the arrays to obtain the original figure anti-counterfeiting characteristic embedded password.
9. The random point-of-attachment anti-counterfeiting device based on the micro-point code according to claim 7, wherein the document acquisition module is configured to:
the 1 st bit to the 4 th bit of the password embedded with the anti-counterfeiting characteristic of the original graph are converted into a first digital array through ASCII coding;
taking the first 4 or the last 4 numbers of the first digital array, setting the odd number in each number as 1 and the even number as 0, and generating a first binary number with 4 bits;
Converting the first binary number into a decimal number to obtain code point line numbers of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code pattern;
the 5 th bit to 8 th bit of the embedded password of the original graph anti-counterfeiting characteristic is converted into a second digital array through ASCII coding;
taking the first 4 or the last 4 numbers of the second digital array, setting the odd number in each number as 1 and the even number as 0, and generating a second binary number with 4 bits;
converting the second binary digits into decimal digits to obtain code point column numbers of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code patterns;
the 9 th to 12 th bits of the original graphic anti-counterfeiting characteristic embedded password are converted into a third digital array through ASCII coding;
taking the first 4 or the last 4 numbers of the third digital array, setting the odd number in each number as 1 and the even number as 0, and generating a 4-bit third binary digit;
converting the third binary number into a decimal number, dividing by 2, rounding down and then adding 1 to obtain a first integer;
determining the embedding direction of a plurality of graphic anti-counterfeiting features embedded into the dot matrix code pattern according to the first integer;
the 13 th bit to the 16 th bit of the password embedded with the anti-counterfeiting characteristic of the original graph are converted into a fourth digital array through ASCII coding;
Taking the first 4 or the last 4 numbers of the fourth digital array, setting the odd number in each number as 1 and the even number as 0, and generating a 4-bit fourth binary digit;
converting the fourth binary number into a decimal number, dividing by 4, and rounding downwards to obtain a second integer;
determining the embedding offset of the multiple graphic anti-counterfeiting features embedded in the dot matrix code pattern according to the second integer;
the 17 th bit to the 20 th bit of the password embedded with the anti-counterfeiting characteristic of the original graph are converted into a fifth digital array through ASCII coding;
taking the first 4 or the last 4 numbers of the fifth digital array, setting the odd number in each number as 1 and the even number as 0, and generating a fifth binary number with 4 bits;
converting the fifth binary number into a decimal number, dividing by 2, rounding down and adding 1 to obtain a third integer;
and determining the number of pixels which are added outwards relative to the centers of code points of a plurality of graphic anti-counterfeiting features embedded in the dot matrix code pattern according to the third integer.
10. The micro-point code based random point of attachment anti-counterfeiting device according to claim 7, further comprising a parameter adjustment module for:
obtaining pattern anti-counterfeiting feature fingerprints of random additional point pattern security code physical marks corresponding to M identical original code values;
Comparing the pattern anti-counterfeiting feature fingerprints of the random additional point pattern security code physical marks corresponding to the M same original code values with the original pattern anti-counterfeiting feature fingerprints corresponding to the original code values to obtain an average value of M single-frame matching rates;
and when the average value is smaller than the N-frame anti-counterfeiting characteristic fingerprint authenticity judgment threshold value corresponding to the current printing batch, updating the N-frame anti-counterfeiting characteristic fingerprint authenticity judgment threshold value corresponding to the current printing batch to the average value to the server.
11. The random point-of-attachment anti-counterfeiting device based on the micro-point code according to claim 7, wherein the identification processing module is configured to:
comparing the to-be-detected pattern anti-counterfeiting feature embedded password with an original pattern anti-counterfeiting feature embedded password corresponding to the to-be-detected code value, and writing a comparison result into the to-be-detected pattern anti-counterfeiting feature fingerprint;
verifying the outline length of the pattern anti-counterfeiting feature of the random additional dot pattern security code physical identifier to be detected, and obtaining a first verification result;
verifying the area hit of the pattern anti-counterfeiting feature of the random additional pattern security code physical identifier to be detected, and obtaining a second verification result;
Verifying the corner points of the graphic anti-counterfeiting feature of the random additional point graphic security code physical identifier to be detected, and obtaining a third verification result;
obtaining a comparison result and writing the to-be-detected graph anti-counterfeiting characteristic fingerprint according to the first verification result, the second verification result, the third verification result and the respective threshold values;
outputting the anti-counterfeiting characteristic fingerprint of the pattern to be detected.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211219471.2A CN115329919B (en) | 2022-10-08 | 2022-10-08 | Random additional point anti-counterfeiting method and device based on micro point code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211219471.2A CN115329919B (en) | 2022-10-08 | 2022-10-08 | Random additional point anti-counterfeiting method and device based on micro point code |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115329919A CN115329919A (en) | 2022-11-11 |
CN115329919B true CN115329919B (en) | 2023-05-12 |
Family
ID=83914491
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211219471.2A Active CN115329919B (en) | 2022-10-08 | 2022-10-08 | Random additional point anti-counterfeiting method and device based on micro point code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115329919B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115470878B (en) * | 2022-10-08 | 2023-05-02 | 北京微点科学技术有限公司 | Variable anti-counterfeiting super-line anti-counterfeiting method and device based on micro-point code |
CN117745299B (en) * | 2023-10-31 | 2024-07-19 | 北京国立信科技术有限公司 | Two-dimensional code-based anti-counterfeiting method and system |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107341676A (en) * | 2017-07-17 | 2017-11-10 | 深圳天净喔溯源科技有限公司 | False proof mark and the method for tracing to the source |
WO2019218624A1 (en) * | 2018-05-14 | 2019-11-21 | 励元科技(上海)有限公司 | Anti-counterfeiting identification method for micro-diffusion printing |
CN110796221A (en) * | 2019-10-18 | 2020-02-14 | 周晓明 | Anti-counterfeit label generation method, anti-counterfeit label verification method and system and anti-counterfeit label |
CN212433790U (en) * | 2020-01-15 | 2021-01-29 | 福建追溯科技有限公司 | Plastic outer packaging body with miniature dot code pattern |
CN113435556A (en) * | 2021-07-14 | 2021-09-24 | 三维码(厦门)网络科技有限公司 | Code generation and decoding method and anti-counterfeiting method of dot matrix code |
CN113538006A (en) * | 2021-06-18 | 2021-10-22 | 中科谱光科技(北京)有限公司 | Product tracing method and device, electronic equipment and storage medium |
CN114239780A (en) * | 2021-12-06 | 2022-03-25 | 常州志鸿智能科技有限公司 | Anti-counterfeiting tracing code generation and verification method based on dot matrix |
WO2022155983A1 (en) * | 2021-01-20 | 2022-07-28 | 上海驰亚信息技术有限公司 | Method for building dot matrix code, method for generating and reading dot matrix code, terminal, and dot matrix code system |
CN114897120A (en) * | 2022-07-14 | 2022-08-12 | 青岛罗博科技有限公司 | Dot code, dot code decoding method, system and electronic equipment |
-
2022
- 2022-10-08 CN CN202211219471.2A patent/CN115329919B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107341676A (en) * | 2017-07-17 | 2017-11-10 | 深圳天净喔溯源科技有限公司 | False proof mark and the method for tracing to the source |
WO2019218624A1 (en) * | 2018-05-14 | 2019-11-21 | 励元科技(上海)有限公司 | Anti-counterfeiting identification method for micro-diffusion printing |
CN110796221A (en) * | 2019-10-18 | 2020-02-14 | 周晓明 | Anti-counterfeit label generation method, anti-counterfeit label verification method and system and anti-counterfeit label |
CN212433790U (en) * | 2020-01-15 | 2021-01-29 | 福建追溯科技有限公司 | Plastic outer packaging body with miniature dot code pattern |
WO2022155983A1 (en) * | 2021-01-20 | 2022-07-28 | 上海驰亚信息技术有限公司 | Method for building dot matrix code, method for generating and reading dot matrix code, terminal, and dot matrix code system |
CN113538006A (en) * | 2021-06-18 | 2021-10-22 | 中科谱光科技(北京)有限公司 | Product tracing method and device, electronic equipment and storage medium |
CN113435556A (en) * | 2021-07-14 | 2021-09-24 | 三维码(厦门)网络科技有限公司 | Code generation and decoding method and anti-counterfeiting method of dot matrix code |
CN114239780A (en) * | 2021-12-06 | 2022-03-25 | 常州志鸿智能科技有限公司 | Anti-counterfeiting tracing code generation and verification method based on dot matrix |
CN114897120A (en) * | 2022-07-14 | 2022-08-12 | 青岛罗博科技有限公司 | Dot code, dot code decoding method, system and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN115329919A (en) | 2022-11-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN115329919B (en) | Random additional point anti-counterfeiting method and device based on micro point code | |
CN103761799B (en) | A kind of bill anti-counterfeit method based on texture image feature and device | |
CN106529633B (en) | Generation method, coding/decoding method and the device of two dimensional code | |
CN108229596B (en) | Combined two-dimensional code, electronic certificate carrier, generating and reading device and method | |
KR101581196B1 (en) | Unique identification information from marked features | |
US9594993B2 (en) | Two dimensional barcode and method of authentication of such barcode | |
CN115293311B (en) | Color watermark anti-counterfeiting method and device based on micro-point code | |
US20160350568A1 (en) | Two-dimensional (2-d) code generating method, detecting method, detecting apparatus, and anti-counterfeit label | |
CN113313225B (en) | Anti-counterfeiting method based on sparse dot matrix code | |
CN109190736B (en) | Anti-counterfeiting two-dimensional code and generation method and generation application system thereof | |
CN105205674A (en) | Product anti-counterfeiting method based on two-dimensional code | |
MX2011003119A (en) | Method and device for authenticating geometrical codes. | |
EA031834B1 (en) | Method for identifying authenticity of an item having security marking on its surface | |
CN110009080B (en) | Two-dimensional code generation method, verification method, server and two-dimensional code | |
CN115423063B (en) | Anti-copying shading anti-counterfeiting method and device based on micro-point code | |
CN116703427A (en) | Anti-counterfeiting tracing method combining dot matrix code and digital watermark | |
CN115470878B (en) | Variable anti-counterfeiting super-line anti-counterfeiting method and device based on micro-point code | |
CN115759161A (en) | Two-dimensional code anti-counterfeiting method, two-dimensional code anti-counterfeiting code generation system and verification system | |
US20150193900A1 (en) | Composite device and application process and apparatus thereof | |
CN103955658B (en) | two-dimension code anti-fake method and system | |
CN114330621A (en) | Two-dimensional code anti-counterfeiting method and device based on identification information and storage medium | |
EP2790133B1 (en) | Security feature and object with security feature | |
RU2798086C1 (en) | Marking of objects, manufacturing and authentication method | |
CN114254719B (en) | Anti-counterfeiting two-dimensional code generation method and device | |
CN117557440A (en) | Depth fake video detection method and device based on security code and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20230417 Address after: Room K1010, Room 1001, 10th Floor, Building 2, Fourth District, Wangjing Dongyuan, Chaoyang District, Beijing 100102 Applicant after: Beijing Microdot Science and Technology Co.,Ltd. Applicant after: Microcode (Liaoning) Technology Co.,Ltd. Address before: Room K1010, Room 1001, 10th Floor, Building 2, Fourth District, Wangjing Dongyuan, Chaoyang District, Beijing 100102 Applicant before: Beijing Microdot Science and Technology Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |