CN115423063A - Anti-copying shading anti-counterfeiting method and device based on micro dot codes - Google Patents

Anti-copying shading anti-counterfeiting method and device based on micro dot codes Download PDF

Info

Publication number
CN115423063A
CN115423063A CN202211219529.3A CN202211219529A CN115423063A CN 115423063 A CN115423063 A CN 115423063A CN 202211219529 A CN202211219529 A CN 202211219529A CN 115423063 A CN115423063 A CN 115423063A
Authority
CN
China
Prior art keywords
graph
counterfeiting
code
original
detected
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211219529.3A
Other languages
Chinese (zh)
Other versions
CN115423063B (en
Inventor
鞠翔
贾元新
苟佳洁
匡扶
孙可
王喜勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Microdot Science And Technology Co ltd
Microcode Liaoning Technology Co ltd
Original Assignee
Beijing Microdot Science And Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Microdot Science And Technology Co ltd filed Critical Beijing Microdot Science And Technology Co ltd
Priority to CN202211219529.3A priority Critical patent/CN115423063B/en
Publication of CN115423063A publication Critical patent/CN115423063A/en
Application granted granted Critical
Publication of CN115423063B publication Critical patent/CN115423063B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/448Rendering the image unintelligible, e.g. scrambling
    • H04N1/4486Rendering the image unintelligible, e.g. scrambling using digital data encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • Accounting & Taxation (AREA)
  • Power Engineering (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention provides a copying-proof shading anti-counterfeiting method and device based on a micro-point code, wherein the method comprises the following steps: generating a dot matrix code graph by using any original code value based on a code system of the micro dot code; processing the original code value by using a dynamic encryption algorithm and a dynamic encryption parameter corresponding to the original code value to obtain an original graph anti-counterfeiting feature embedded password; determining the outer circle radius, the inner circle radius, the boundary interval, the circle center position and the ring color of a plurality of graph anti-counterfeiting features of the embedded point array code graph according to the original graph anti-counterfeiting feature embedded password and the graph anti-counterfeiting feature embedded algorithm; embedding a plurality of pattern anti-counterfeiting features into the dot matrix code pattern to obtain an anti-copying shading pattern safety code electronic document; and printing the anti-copying shading pattern safety code electronic document into an anti-copying shading pattern safety code physical identification so as to detect the anti-copying shading pattern safety code physical identification to be detected to judge the authenticity.

Description

Anti-copying shading anti-counterfeiting method and device based on micro dot codes
Technical Field
The invention relates to the technical field of anti-counterfeiting, in particular to a copying shading anti-counterfeiting method and device based on a micro-point code.
Background
The most common two types of one-object-one-code anti-counterfeiting schemes currently prevail: the first type is digital verification based on two-dimensional codes and numbers, and the application defects are that the safety is poor: the visible two-dimensional code and the number on the printed matter are used as the ID of the article and can be counterfeited in batches at low cost, because the two-dimensional code is made and opened, the figures of various patterns can be copied if the figures are visible, the hidden verification code corresponding to the ID usually needs a fragile coating process, the verification code can be checked only by uncovering and scraping after the purchase of a consumer, and the correctness of the ID and the verification code can not be effectively checked before the purchase under the non-destructive verification; the second type is based on artificial or natural random detail characteristics during printing, and adopts an image uploading or downloading mode to extract and compare image details during verification of a terminal user, although the defect that the first type of anti-counterfeiting verification cannot be performed before consumers purchase is overcome, the second type of anti-counterfeiting verification method has the defects that a production line of a production enterprise needs to be modified, special image acquisition analysis uploading software and hardware are erected, high-definition image details stored in a cloud end occupy a large amount of storage cost, and obvious flow and time need to be consumed when the user performs anti-counterfeiting detection. The two types of common problems are poor user experience, such as long time for searching the database for duplicate generated by a large number of unique codes, slow and high-definition image downloading of random unique codes in the database or long time for verifying authenticity by cloud comparison of local detection image uploading.
Disclosure of Invention
The invention aims to provide a method and a device for preventing copying shading from counterfeiting based on a micro-point code, and the method and the device for preventing copying shading from counterfeiting based on the micro-point code are more balanced in multiple aspects of comprehensive cost, inspection experience and anti-counterfeiting performance.
In order to achieve the above object, an embodiment of the present invention provides a copy-proof shading anti-counterfeiting method based on a microdot code, where the method includes: generating a dot matrix code image by using any original code value based on the code system of the micro-dot code; processing the original code value by using a dynamic encryption algorithm and a dynamic encryption parameter corresponding to the original code value to obtain an original graph anti-counterfeiting feature embedded password; determining the outer circle radius, the inner circle radius, the boundary interval, the circle center position and the ring color of a plurality of graph anti-counterfeiting features embedded into the dot code pattern according to the original graph anti-counterfeiting feature embedded password and the graph anti-counterfeiting feature embedded algorithm; embedding the plurality of pattern anti-counterfeiting features into the dot matrix code pattern according to the outer circle radius, the inner circle radius, the boundary interval, the circle center position and the ring color to obtain an anti-copying shading pattern security code electronic document; storing a dynamic encryption parameter corresponding to the original code value, an original graph anti-counterfeiting feature fingerprint corresponding to the original code value and an N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch to a server, wherein the original graph anti-counterfeiting feature fingerprint is obtained by processing the anti-copying shading graph security code electronic document by using the original graph anti-counterfeiting feature embedded password and a graph anti-counterfeiting feature extraction algorithm corresponding to the graph anti-counterfeiting feature embedded algorithm; and printing the anti-copying shading graph security code electronic document into an anti-copying shading graph security code physical identification so as to detect the anti-copying shading graph security code physical identification to be detected according to the dynamic encryption parameter corresponding to the original code value, the original graph anti-counterfeiting feature fingerprint corresponding to the original code value and the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold corresponding to the current printing batch so as to judge authenticity.
Preferably, the processing the original code value by using a dynamic encryption algorithm and a dynamic encryption parameter corresponding to the original code value to obtain an original graphic anti-counterfeiting feature embedded password comprises: generating factors alpha and beta based on a linear congruence method; generating a key and a padding number iv of the encryption parameter 128byte according to the factors alpha and beta respectively; AES-CBC encrypting the original code value using the key and the pad number iv; embedding a character string obtained by using hash operation on the encrypted original code value as an original graph anti-counterfeiting feature into a password prototype; converting the original graph anti-counterfeiting feature embedded password prototype into a byte array; putting the first 8 bits or the last 8 bits in the byte array into a primary value array; converting the primary initial value array into a float64 type, and taking a decimal part as an initial value x0 of a well-known Logistic mapping chaotic encryption algorithm; and according to the initial value x0, ln times of Logistic iteration is executed by combining the parameters L alpha and Ln of the dynamic encryption algorithm of the original code value, and the front 20 bits of the effective number of the random floating point number obtained by iterative operation are used as the anti-counterfeiting feature embedded password of the original graph, wherein L alpha is a scaling coefficient in the Logistic algorithm, and Ln is the iteration times.
Preferably, determining the outer circle radius, the inner circle radius, the boundary interval, the circle center position and the circle color of the plurality of graph anti-counterfeiting features embedded in the dot code pattern according to the original graph anti-counterfeiting feature embedded password and the graph anti-counterfeiting feature embedded algorithm comprises: using the original graph anti-counterfeiting feature embedded password as an integer random number seed to iterate for M times to obtain M integer random numbers; determining the outer circle radius, the inner circle radius and the boundary interval of a plurality of graphic anti-counterfeiting features by using the M integer random numbers, wherein the outer circle radius, the inner circle radius and the boundary interval of one graphic anti-counterfeiting feature are determined every three adjacent integer random numbers from the first integer random number; determining the side length of a circumscribed square of each graph anti-counterfeiting feature according to the excircle radius and the boundary interval of each graph anti-counterfeiting feature; arranging the external squares of all the graph anti-counterfeiting features from the upper left corner of the dot matrix code image according to the determined sequence of the graph anti-counterfeiting features to determine the circle center position of each graph anti-counterfeiting feature embedded into the dot matrix code image, wherein the arrangement mode of the external squares of all the graph anti-counterfeiting features comprises the following steps: 1) After adding the external square on the current row, when the sum of the side lengths of the external square in the row direction is less than or equal to the difference between the width W of the dot matrix code image and the row tail distance edge threshold s1, and when the sum of the side lengths of the external square in the column direction is less than or equal to the height H of the dot matrix code image, the external square is normally arranged from left to right on the current row; 2) After adding an external square to the current row, the sum of the side lengths of the external squares in the row direction is greater than the difference between the width W of the dot matrix code graph and the row tail distance edge threshold s1, but is less than or equal to the width W of the dot matrix code graph, and if after adding the external square to the leftmost side of the next row, the sum of the side lengths of the external squares in the column direction is less than or equal to the difference between the height H of the dot matrix code graph and the row tail distance edge threshold s1, the external squares are arranged on the leftmost side of the next row; 3) After the external square is newly added on the current row, when the sum of the side lengths of the external squares in the row direction is larger than the width W of the dot matrix code graph or the sum of the side lengths of the external squares in the column direction is larger than the height H of the dot matrix code graph, the external squares are not arranged; 4) After adding an external square on the current row, finishing the arrangement when the sum of the side lengths of the external squares in the row direction is greater than the difference between the width W of the dot matrix code image and the row tail distance edge threshold s1 but is less than or equal to the width W of the dot matrix code image and the sum of the side lengths of the external squares in the column direction is greater than the difference between the height H of the dot matrix code image and the row tail distance edge threshold s 1; using the original graph anti-counterfeiting feature embedded password as an integer random number seed iteration to obtain an integer random number for each graph anti-counterfeiting feature; the color of the ring of each graphical security feature is determined based on the remainder of dividing the integer random number for each graphical security feature by 6.
Preferably, the step of detecting the copy-proof ground mark figure security code physical identification to be detected to judge the authenticity according to the dynamic encryption parameter corresponding to the original code value, the original figure anti-counterfeiting feature fingerprint corresponding to the original code value and the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch comprises the following steps: extracting a code value to be detected of the copy-proof shading graph security code object identification to be detected; when the extraction is unsuccessful within the preset time or the extracted code value to be detected is not stored in the server, a counterfeit product is prompted; when the extracted code value to be detected is stored in the server, acquiring a dynamic encryption parameter corresponding to the code value to be detected, an original graph anti-counterfeiting feature fingerprint corresponding to the code value to be detected and an N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch from the server; processing the code value to be detected by using the dynamic encryption algorithm and the dynamic encryption parameter corresponding to the code value to be detected to obtain an embedded password of the anti-counterfeiting feature of the graph to be detected; according to the anti-counterfeiting feature embedding password of the graph to be detected and the graph anti-counterfeiting feature extraction algorithm, obtaining the anti-counterfeiting feature fingerprint of the graph to be detected of the anti-copying shading graph security code physical identification to be detected; comparing the graph anti-counterfeiting characteristic fingerprint to be detected with an original graph anti-counterfeiting characteristic fingerprint corresponding to the code value to be detected, and calculating the matching rate of two character strings in the same character set encoding mode to obtain a single-frame passing result; when the number of the single-frame passing results is accumulated to N, calculating a multi-frame passing rate statistic value; when the multi-frame passing rate statistic value is smaller than the authenticity judgment threshold value of the N frames of anti-counterfeiting feature fingerprints corresponding to the current printing batch, prompting a counterfeit product; and prompting the genuine product when the multi-frame passing rate statistic value is greater than or equal to the authenticity judgment threshold value of the N frames of anti-counterfeiting feature fingerprints corresponding to the current printing batch.
Preferably, the method further comprises: acquiring M graph anti-counterfeiting characteristic fingerprints of anti-copying shading graph security code real object identification corresponding to the same original code value; comparing the graph anti-counterfeiting characteristic fingerprints of the anti-copying shading graph security code real object identification corresponding to M identical original code values with the original graph anti-counterfeiting characteristic fingerprint corresponding to the original code values to obtain an average value of M single-frame matching rates; and when the average value is smaller than the authenticity judgment threshold value of the N frames of anti-counterfeiting characteristic fingerprints corresponding to the current printing batch, updating the authenticity judgment threshold value of the N frames of anti-counterfeiting characteristic fingerprints corresponding to the current printing batch as the average value to the server.
Preferably, the step of obtaining the fingerprint of the anti-counterfeiting feature of the to-be-detected copy-proof shading graph security code object identifier according to the to-be-detected graph anti-counterfeiting feature embedded password and the graph anti-counterfeiting feature extraction algorithm comprises the following steps: comparing the graph anti-counterfeiting feature embedding password to be detected with an original graph anti-counterfeiting feature embedding password corresponding to the code value to be detected, and writing a comparison result into the graph anti-counterfeiting feature fingerprint to be detected; verifying the position of the graphic anti-counterfeiting feature of the copy-proof shading graphic security code object identifier to be detected, and obtaining a first verification result; verifying the size of the graphic anti-counterfeiting feature of the copy-proof shading graphic security code object identifier to be detected, and obtaining a second verification result; verifying the color of the pattern anti-counterfeiting characteristic of the copy-proof shading pattern safety code object identification to be detected, and obtaining a third verification result; obtaining comparison results according to the first verification result, the second verification result, the third verification result and the respective threshold values, and writing the comparison results into the anti-counterfeiting characteristic fingerprint of the graph to be detected; and outputting the anti-counterfeiting characteristic fingerprint of the graph to be detected.
Preferably, the code value can be a character string encoded by any character, when the code value of the micro-dot code is converted into a binary system, an obvious gap larger than or equal to 1 data position exists between data, the copy-proof shading pattern safety code object mark manufactured by using the micro-dot code has at least 90% robustness in a 20mm-20mm area, can be decoded in a contaminated area to any residual 3mm-3mm complete area, and can be read under an interference pattern except linear, nodular and special-shaped code points.
The embodiment of the invention also provides a copying-proof shading anti-counterfeiting device based on the micro-point code, which comprises: the system comprises a code map generating module, a password acquiring module, a document acquiring module, a parameter storage module and an identification processing module, wherein the code map generating module is used for generating a dot matrix code map by using any original code value based on a code system of a micro-dot code; the password acquisition module is used for processing the original code value by using a dynamic encryption algorithm and a dynamic encryption parameter corresponding to the original code value to obtain an original graph anti-counterfeiting feature embedded password; the document acquisition module is used for: determining the outer circle radius, the inner circle radius, the boundary interval, the circle center position and the ring color of a plurality of graph anti-counterfeiting features embedded into the dot code pattern according to the original graph anti-counterfeiting feature embedded password and the graph anti-counterfeiting feature embedded algorithm; embedding the plurality of pattern anti-counterfeiting features into the dot matrix code pattern according to the outer circle radius, the inner circle radius, the boundary interval, the circle center position and the ring color to obtain an anti-copying shading pattern security code electronic document; the parameter storage module is used for storing dynamic encryption parameters corresponding to the original code values, original graph anti-counterfeiting feature fingerprints corresponding to the original code values and N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold values corresponding to the current printing batch to a server, wherein the original graph anti-counterfeiting feature fingerprints are obtained by processing the anti-copying shading graph security code electronic document by using the original graph anti-counterfeiting feature embedded password and a graph anti-counterfeiting feature extraction algorithm corresponding to the graph anti-counterfeiting feature embedded algorithm; the identification processing module is used for printing the anti-copying shading pattern safety code electronic document into an anti-copying shading pattern safety code real object identification, so that the anti-copying shading pattern safety code real object identification to be detected is detected to judge the authenticity according to the dynamic encryption parameters corresponding to the original code value, the original pattern anti-counterfeiting feature fingerprint corresponding to the original code value and the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold corresponding to the current printing batch.
Preferably, the password obtaining module is configured to: generating factors alpha and beta based on a linear congruence method; generating a key and a padding number iv of the encryption parameter 128byte according to the factors alpha and beta respectively; AES-CBC encrypting the original code value using the key and the pad number iv; embedding a character string obtained by using hash operation on the encrypted original code value as an original graph anti-counterfeiting feature into a password prototype; embedding the password prototype into the original anti-counterfeiting characteristic of the graph and converting the password prototype into a byte array; taking the first 8 bits or the last 8 bits in the byte array and putting the first 8 bits or the last 8 bits in a primary value array; converting the primary initial value array into a float64 type, and taking a decimal part as an initial value x0 of a well-known Logistic mapping chaotic encryption algorithm; and according to the initial value x0, combining the parameters L alpha and Ln of the dynamic encryption algorithm of the original code value, executing Ln times of Logistic iteration, and taking the first 20 bits of the effective digits of the random floating point number obtained by iterative operation as the original graph anti-counterfeiting feature embedded password, wherein L alpha is a scaling coefficient in the Logistic algorithm, and Ln is the iteration times.
Preferably, the document acquisition module is configured to: using the original graph anti-counterfeiting feature embedded password as an integer random number seed to iterate for M times to obtain M integer random numbers; determining the outer circle radius, the inner circle radius and the boundary interval of a plurality of pattern anti-counterfeiting features by using the M integer random numbers, wherein the outer circle radius, the inner circle radius and the boundary interval of one pattern anti-counterfeiting feature are determined every three adjacent integer random numbers from the first integer random number; determining the side length of a circumscribed square of each graph anti-counterfeiting feature according to the excircle radius and the boundary interval of each graph anti-counterfeiting feature; arranging the external squares of all the graph anti-counterfeiting features from the upper left corner of the dot matrix code image according to the determined sequence of the graph anti-counterfeiting features to determine the circle center position of each graph anti-counterfeiting feature embedded into the dot matrix code image, wherein the arrangement mode of the external squares of all the graph anti-counterfeiting features comprises the following steps: 1) After adding the external square on the current row, when the sum of the side lengths of the external square in the row direction is less than or equal to the difference between the width W of the dot matrix code image and the row tail distance edge threshold s1, and when the sum of the side lengths of the external square in the column direction is less than or equal to the height H of the dot matrix code image, the external square is normally arranged from left to right on the current row; 2) After adding an external square to the current row, the sum of the side lengths of the external squares in the row direction is greater than the difference between the width W of the dot matrix code graph and the row tail distance edge threshold s1, but is less than or equal to the width W of the dot matrix code graph, and if after adding the external square to the leftmost side of the next row, the sum of the side lengths of the external squares in the column direction is less than or equal to the difference between the height H of the dot matrix code graph and the row tail distance edge threshold s1, the external squares are arranged on the leftmost side of the next row; 3) After the external square is newly added on the current row, when the sum of the side lengths of the external squares in the row direction is larger than the width W of the dot matrix code graph or the sum of the side lengths of the external squares in the column direction is larger than the height H of the dot matrix code graph, the external squares are not arranged; 4) After adding an external square on the current row, finishing the arrangement when the sum of the side lengths of the external squares in the row direction is greater than the difference between the width W of the dot matrix code image and the row tail distance edge threshold s1 but is less than or equal to the width W of the dot matrix code image and the sum of the side lengths of the external squares in the column direction is greater than the difference between the height H of the dot matrix code image and the row tail distance edge threshold s 1; using the original graph anti-counterfeiting feature embedded password as an integer random number seed iteration to obtain an integer random number for each graph anti-counterfeiting feature; the color of the ring of each graphical security feature is determined based on the remainder of dividing the integer random number for each graphical security feature by 6.
Preferably, the identification processing module is configured to: extracting a code value to be detected of the copy-proof shading graph security code object identification to be detected; when the extraction is unsuccessful within the preset time or the extracted code value to be detected is not stored in the server, a counterfeit product is prompted; when the extracted code value to be detected is stored in the server, acquiring a dynamic encryption parameter corresponding to the code value to be detected, an original graph anti-counterfeiting feature fingerprint corresponding to the code value to be detected and an N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch from the server; processing the code value to be detected by using the dynamic encryption algorithm and the dynamic encryption algorithm corresponding to the code value to be detected to obtain an embedded password of the anti-counterfeiting feature of the graph to be detected; according to the anti-counterfeiting feature embedding password of the graph to be detected and the graph anti-counterfeiting feature extraction algorithm, obtaining the anti-counterfeiting feature fingerprint of the graph to be detected of the anti-copying shading graph security code physical identification to be detected; comparing the anti-counterfeiting characteristic fingerprint of the graph to be detected with the anti-counterfeiting characteristic fingerprint of the original graph corresponding to the code value to be detected, and calculating the matching rate of two character strings in the same character set encoding mode to obtain a single-frame passing result; when the number of the single-frame passing results is accumulated to N, calculating a multi-frame passing rate statistic value; when the multi-frame passing rate statistic value is smaller than the authenticity judgment threshold value of the N frames of anti-counterfeiting feature fingerprints corresponding to the current printing batch, prompting a counterfeit product; and prompting the genuine product when the multi-frame passing rate statistic value is greater than or equal to the authenticity judgment threshold value of the N frames of anti-counterfeiting characteristic fingerprints corresponding to the current printing batch.
Preferably, the apparatus further comprises a parameter adjusting module for: acquiring M graph anti-counterfeiting characteristic fingerprints of anti-copying shading graph security code real object identifications corresponding to the same original code value; comparing the image anti-counterfeiting characteristic fingerprints of the anti-copying shading image security code physical identification corresponding to M identical original code values with the original image anti-counterfeiting characteristic fingerprints corresponding to the original code values to obtain an average value of M single-frame matching rates; and when the average value is smaller than the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold values corresponding to the current printing batch, updating the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold values corresponding to the current printing batch to the average value and sending the average value to the server.
Preferably, the identification processing module is configured to: comparing the graph anti-counterfeiting feature embedding password to be detected with an original graph anti-counterfeiting feature embedding password corresponding to the code value to be detected, and writing a comparison result into the graph anti-counterfeiting feature fingerprint to be detected; verifying the position of the pattern anti-counterfeiting feature of the copy-proof shading pattern safety code object identification to be detected, and obtaining a first verification result; verifying the size of the graph anti-counterfeiting feature of the copy-proof shading graph security code object identification to be detected, and obtaining a second verification result; verifying the color of the pattern anti-counterfeiting characteristic of the copy-proof shading pattern safety code object identification to be detected, and obtaining a third verification result; obtaining comparison results according to the first verification result, the second verification result, the third verification result and the respective threshold values, and writing the comparison results into the anti-counterfeiting characteristic fingerprint of the graph to be detected; and outputting the anti-counterfeiting characteristic fingerprint of the graph to be detected.
Through the technical scheme, the security is improved by selecting the non-open-source micro-point code system to replace the traditional open-source code system, so that a counterfeiter is prevented from directly acquiring code values through software of an open-source two-dimensional code decoding algorithm and generating the code values to forge single codes, and even guessing numbers according to an attempt observation rule to forge a large number of one-object one-code batch forgings; because a non-open source code system is selected, continuous numbers can be directly used as code value IDs, and the feedback time of system inspection is greatly shortened; the technology of embedding and extracting the anti-counterfeiting characteristic of the graph is added to the traditional digital verification technology, and the original non-anti-copying printed matter has the anti-copying effect on the basis of the micro-point code graph; the dynamic encryption technology is used for establishing the relationship between the code value ID and the anti-counterfeiting feature embedded password, so that an attacker cannot effectively obtain the code value of each code even through decompiling and cracking programs due to the dynamic property, and the technical safety of the anti-counterfeiting scheme is greatly improved.
Additional features and advantages of embodiments of the invention will be set forth in the detailed description which follows.
Drawings
The accompanying drawings, which are included to provide a further understanding of the embodiments of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the embodiments of the invention without limiting the embodiments of the invention. In the drawings:
FIG. 1 is a flowchart of a method for preventing copying shading and counterfeiting based on a micro-point code according to an embodiment of the present invention;
FIG. 2 is a flowchart of a method for determining an embedded password of an original graphical anti-counterfeiting feature according to an embodiment of the present invention;
FIG. 3 is a flowchart of a method for determining a plurality of anti-counterfeiting features embedded in the dot code pattern according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of a process for determining a plurality of graphical security features provided in accordance with one embodiment of the present invention;
FIG. 5 is a schematic diagram of an electronic document with a copy-proof shading pattern security code according to an embodiment of the present invention;
fig. 6 is a flowchart of a method for detecting physical identifiers of copy-proof shading graphic security codes to be detected according to an embodiment of the present invention;
FIG. 7 is a flowchart of a method for determining a fingerprint of a security feature of a pattern to be detected according to an embodiment of the present invention;
FIG. 8 is a flow chart of a method for dynamically adjusting decision thresholds according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of a copy-proof shading anti-counterfeiting device based on a micro-dot code according to an embodiment of the present invention.
Detailed Description
The following describes in detail embodiments of the present invention with reference to the drawings. It should be understood that the detailed description and specific examples, while indicating embodiments of the invention, are given by way of illustration and explanation only, not limitation.
Fig. 1 is a flowchart of a method for preventing copying shading and forgery based on a microdot code according to an embodiment of the present invention. As shown in fig. 1, the method includes:
s101, based on the code system of the micro-point codes, generating a dot matrix code graph by using any original code value;
the micro dot code is a sparse dot code with high robustness, and is an encoding algorithm and a decoding algorithm which are not open sources, the code pattern can not be read by decoding algorithms of other open source codes, compared with a traditional dense two-dimensional code in which code values are converted into binary systems 1 and 0 which are respectively arranged in a deep code dot form and a shallow code dot form, obvious gaps of more than or equal to 1 data position exist between data which are converted into binary systems by the micro dot code, and the code value can be a character string of any character code.
The copy-preventing shading graph security code object identification made by using micro dot codes supports more than 90% of robustness in 20mm x 20mm, supports contamination to any residual 3mm x 3mm complete area and can still be decoded, still has 15% of fault tolerance in the 3mm x 3mm minimum readable area, and supports that interference graphs except linear, massive and special-shaped code dots can still be read. The lattice code system meeting the robustness condition provides powerful guarantee for embedding anti-counterfeiting characteristics with enough quantity, area and position independence.
The code value of the traditional digital code check must ensure random discreteness to prevent a counterfeiter from decoding randomly, guess the law and try out the source code system for encoding for free so as to be easily counterfeited. And this embodiment can use continuous digit as the code value, greatly promotes the efficiency and the anti-guess number that the code value generated. Meanwhile, the micro dot codes can achieve the effect of almost invisible anti-counterfeiting mark attractiveness and brand aesthetic feeling retention when the anti-counterfeiting mark is seen outside 15 cm.
In the embodiment, a plurality of micro-point codes which are disclosed or not disclosed at present are selected as codes to be processed for anti-counterfeiting. The purpose of selecting the micro-point code system is as follows: can generate the two-dimensional code image printing of arbitrary size (generally more than 3 mm) according to anti-fake detection demand on stock surface, compare that traditional intensive two-dimensional code needs 8 mm's anti-fake detection size less influence the packing beautifully, have more anti-fake disguise at least. Compared with traditional high-density two-dimensional Code images such as Data Matrix, maxiCode, aztec, QR Code, PDF417, vericode, ultracode, code 49, code 16K and the like, the sparse two-dimensional Code image visually represents more light-colored lattices and has no obvious boundary which can be distinguished by human eyes.
The embodiment of the present invention is described only for any original code value, but those skilled in the art should know that other different original code values exist for the anti-counterfeiting of different articles due to the principle of one article and one code. For other original code values, the processing of the embodiment of the present invention may also be used in the same way, and is not described herein again.
Step S102, processing the original code value by using a dynamic encryption algorithm and a dynamic encryption parameter corresponding to the original code value to obtain an original graph anti-counterfeiting feature embedded password;
wherein, as shown in fig. 2, the following steps S201-208 of the present invention provide an embodiment of obtaining the original graphic security feature embedded password, which is preferable for the embedded graphic security feature of the present invention, but those skilled in the art should know that the present invention is not limited thereto.
Step S201, generating factors alpha and beta based on a linear congruence method;
step S202, respectively generating a key and a padding number iv of the encryption parameter 128byte according to the factors alpha and beta;
wherein, the factors α and β are the dynamic encryption parameters corresponding to the original code value.
Step S203, using the key and the padding number iv to carry out AES-CBC encryption on the original code value;
step S204, using a character string obtained after hash operation on the encrypted original code value as an original graph anti-counterfeiting feature to be embedded into a password prototype;
step S205, converting the original graph anti-counterfeiting feature embedded password prototype into a byte array;
step S206, the first 8 bits or the last 8 bits in the byte array are taken to be put into a primary value array;
step S207, converting the primary initial value array into a float64 type, and taking a decimal part as an initial value x0 of a well-known Logistic mapping chaotic encryption algorithm;
wherein x0 ∈ (0, 1).
And S208, according to the initial value x0, combining the parameters L alpha and Ln of the dynamic encryption algorithm of the original code value, executing Ln times of Logistic iteration, and taking the first 20 bits of the effective number of the random floating point number obtained by iteration operation as the anti-counterfeiting feature embedded password of the original graph, wherein L alpha is a scaling coefficient in the Logistic algorithm, and Ln is the iteration times.
Where it is understood that the preferred original graphical security feature embedded password for the inventive embedded graphical security feature is a 20 digit number. The embodiment of the invention improves the anti-cracking performance of the technology through dynamic variability, and the correspondence verification improves the resistance of batch counterfeiting.
Step S103, determining the outer circle radius, the inner circle radius, the boundary interval, the circle center position and the color of a circular ring of a plurality of graph anti-counterfeiting features embedded in the dot code graph according to the original graph anti-counterfeiting feature embedded password and the graph anti-counterfeiting feature embedded algorithm;
wherein, as shown in fig. 3, step S103 includes the following steps S301 to S318,
step S301, using the original graph anti-counterfeiting feature embedded password as an integer random number seed to iterate for M times to obtain M integer random numbers;
step S302, using the M integer random numbers to determine the outer circle radius, the inner circle radius and the boundary interval of a plurality of graph anti-counterfeiting features, wherein the outer circle radius, the inner circle radius and the boundary interval of one graph anti-counterfeiting feature are determined every three adjacent integer random numbers from the first integer random number;
for example, if M is 9, the 1 st to 3 rd integer random numbers determine the outer circle radius, the inner circle radius and the boundary interval of the first graphic anti-counterfeiting feature, wherein the 1 st integer random number determines the outer circle radius of the graphic anti-counterfeiting feature, the 2 nd integer random number determines the inner circle radius of the graphic anti-counterfeiting feature, and the 3 rd integer random number determines the boundary interval of the graphic anti-counterfeiting feature; determining the excircle radius, the inner circle radius and the boundary interval of a second graphic anti-counterfeiting feature by using 4 th to 6 th integer random numbers, wherein the 4 th integer random number determines the excircle radius of the graphic anti-counterfeiting feature, the 5 th integer random number determines the inner circle radius of the graphic anti-counterfeiting feature, and the 6 th integer random number determines the boundary interval of the graphic anti-counterfeiting feature; and 7-9 integer random numbers are used for determining the excircle radius, the inner circle radius and the boundary interval of the third graphic anti-counterfeiting feature, wherein the 7 th integer random number is used for determining the excircle radius of the graphic anti-counterfeiting feature, the 8 th integer random number is used for determining the inner circle radius of the graphic anti-counterfeiting feature, and the 9 th integer random number is used for determining the boundary interval of the graphic anti-counterfeiting feature.
Step S303, determining the side length of a circumscribed square of each graph anti-counterfeiting feature according to the excircle radius and the boundary interval of each graph anti-counterfeiting feature;
the side length D0=2 (R0 + D0) of the external square of each graph anti-counterfeiting feature, wherein R0 is the excircle radius of the graph anti-counterfeiting feature, and D0 is the boundary interval of the graph anti-counterfeiting feature.
Step S304, arranging the external squares of all the anti-counterfeiting characteristics of the graphs from the upper left corner of the dot matrix code pattern according to the determined sequence of the anti-counterfeiting characteristics of the graphs so as to determine the circle center position of each anti-counterfeiting characteristic of the graphs embedded in the dot matrix code pattern, wherein the arrangement mode of the external squares of all the anti-counterfeiting characteristics of the graphs comprises the following steps: 1) After adding an external square in the current row, if the sum of the side lengths of the external squares in the row direction is less than or equal to the difference between the width W of the dot matrix code image and the edge threshold value s1 of the row tail distance and the sum of the side lengths of the external squares in the column direction is less than or equal to the height H of the dot matrix code image, normally arranging the dot matrix code image from left to right in the current row; 2) After adding an external square to the current row, the sum of the side lengths of the external squares in the row direction is greater than the difference between the width W of the dot matrix code graph and the row tail distance edge threshold s1, but is less than or equal to the width W of the dot matrix code graph, and if the sum of the side lengths of the external squares in the column direction is less than or equal to the difference between the height H of the dot matrix code graph and the row tail distance edge threshold s1 after adding the external square to the leftmost side of the next row, the external squares are arranged on the leftmost side of the next row; 3) After adding the external square on the current row, when the sum of the side lengths of the external square in the row direction is larger than the width W of the dot matrix code graph or the sum of the side lengths of the external square in the column direction is larger than the height H of the dot matrix code graph, the external square is not arranged; 4) After adding an external square on the current row, finishing the arrangement when the sum of the side lengths of the external squares in the row direction is greater than the difference between the width W of the dot matrix code image and the row tail distance edge threshold s1 but is less than or equal to the width W of the dot matrix code image and the sum of the side lengths of the external squares in the column direction is greater than the difference between the height H of the dot matrix code image and the row tail distance edge threshold s 1;
after the side length of each external square is known, the squares are fully paved from left to right and from top to bottom, and the center of each square is the coordinate position of the center of a circle. When the square is fully paved, the upper left corner point of the next square is overlapped with the upper right corner point of the previous square, if the overlap conflict exists between the changed lines and the range of the previous line of squares, the square is translated downwards to a conflict-free position, namely the y coordinate of the upper left corner point is equal to the y coordinate of the lower boundary of the conflict square. As shown in fig. 4, squares 1 to 4 are external squares of 4 graphic anti-counterfeiting features, and are laid in sequence, the top left corner of the 2 nd square coincides with the top right corner of the 1 st square, the top left corner of the 3 rd square coincides with the top right corner of the 2 nd square, and the 4 th square cannot be in the same row as the previous 3 squares, and is laid in the next row, so as to avoid overlapping conflict with the 3 rd square in the previous row, and therefore, the y coordinate of the top left corner of the 4 th square is equal to the y coordinate of the lower boundary of the conflicting square.
Step S305, using the original graph anti-counterfeiting feature embedded password as an integer random number seed iteration to obtain an integer random number for each graph anti-counterfeiting feature;
and step S306, determining the color of the circular ring of each pattern anti-counterfeiting feature according to the remainder of dividing the integer random number of each pattern anti-counterfeiting feature by 6.
Wherein, the remainder of dividing by 6 is only 0 to 5, corresponding to the ring color of 6 graphic anti-counterfeiting features, wherein, light gray-0, light red-1, light yellow-2, light green-3, light blue-4, light purple-5.
Step S104, embedding the anti-counterfeiting features of the plurality of graphs into the dot matrix code graph according to the outer circle radius, the inner circle radius, the boundary interval, the circle center position and the color of the ring to obtain an anti-copying shading graph security code electronic document;
wherein, FIG. 5 is a schematic view of an anti-copy shading pattern security code electronic document. As shown in fig. 5, the dot matrix code map includes 9 different-sized anti-counterfeiting features, including 4 light purple, 2 light green, 2 light yellow, and 1 light red. And preferably, in the inner ring of the graphical anti-counterfeiting feature, logo with the same color as the ring can be embedded, and the Logo can be set according to requirements.
Step S105, storing a dynamic encryption parameter corresponding to the original code value, an original graph anti-counterfeiting feature fingerprint corresponding to the original code value and an N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch to a server, wherein the original graph anti-counterfeiting feature fingerprint is obtained by processing the anti-copying shading graph security code electronic document by using the original graph anti-counterfeiting feature embedded password and a graph anti-counterfeiting feature extraction algorithm corresponding to the graph anti-counterfeiting feature embedded algorithm;
the authenticity judgment threshold value of the anti-counterfeiting characteristic fingerprint of N (N is more than or equal to 3 and less than or equal to 10) frames corresponding to the current printing batch can be uniformly preset according to subjective experience, and N can be adjusted according to the performance of the smart phone and the expectation of user experience. And storing the dynamic encryption parameters corresponding to the original code values, the original pattern anti-counterfeiting feature fingerprints corresponding to the original code values and the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold values corresponding to the current printing batch into a server for later use when detecting other anti-copying shading pattern security code physical identifiers. An example of the specific manner in which a fingerprint (e.g., an original graphical security feature fingerprint) may be obtained is set forth in detail below.
And step S106, printing the anti-copying shading graph security code electronic document into an anti-copying shading graph security code real object identification, so as to detect the anti-copying shading graph security code real object identification to be detected according to the dynamic encryption parameters corresponding to the original code value, the original graph anti-counterfeiting feature fingerprint corresponding to the original code value and the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold corresponding to the current printing batch to judge authenticity.
As shown in fig. 6, the step of detecting the copy-proof shading pattern security code object identifier to be detected includes steps S601 to 609:
s601, extracting a code value to be detected of the copy-proof shading graph security code object identifier to be detected;
the method comprises the steps of continuously obtaining an image of a copy-proof shading graph security code real object identification to be detected by using a smart phone preview frame, trying to obtain a code value to be detected of the current copy-proof shading graph security code real object identification to be detected through a dot matrix code decoding algorithm, and continuously obtaining the next preview frame image if the code value cannot be obtained through decoding.
Step S602, when the extraction is unsuccessful within the preset time or the extracted code value to be detected is not stored in the server, a counterfeit product is prompted;
wherein, preferably, if the decoding is unsuccessful for more than 15 seconds, the user is prompted for the suspected counterfeit detected. Or the extracted code value to be detected does not find the same original code value at the server, and then the user is prompted to detect suspected counterfeits.
Step S603, when the extracted code value to be detected is stored in the server, acquiring a dynamic encryption parameter corresponding to the code value to be detected, an original pattern anti-counterfeiting feature fingerprint corresponding to the code value to be detected and an N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch from the server;
step S604, processing the code value to be detected by using the dynamic encryption algorithm and the dynamic encryption parameter corresponding to the code value to be detected to obtain an embedded password of the anti-counterfeiting characteristic of the graph to be detected;
the processing manner of this step is similar to that of step S102, and is not described herein again.
Step S605, according to the anti-counterfeiting characteristic embedding password of the graph to be detected and the graph anti-counterfeiting characteristic extraction algorithm, obtaining the anti-counterfeiting characteristic fingerprint of the graph to be detected of the anti-copying shading graph security code object identification to be detected;
as shown in fig. 7, the fingerprint of the graphic security feature to be detected can be obtained through the following steps S701 to S706, and the above-mentioned original fingerprint of the graphic security feature can also be obtained in a similar manner.
Step S701, comparing the anti-counterfeiting characteristic embedded password of the graph to be detected with an original anti-counterfeiting characteristic embedded password corresponding to the code value to be detected, and writing a comparison result into the anti-counterfeiting characteristic fingerprint of the graph to be detected;
step S702, verifying the position of the graph anti-counterfeiting feature of the copy-proof shading graph security code object identification to be detected, and obtaining a first verification result;
the method comprises the steps of determining theoretical circle center coordinates of all graph anti-counterfeiting features, and calculating the average value of Euclidean distances between the theoretical circle center coordinates of all the graph anti-counterfeiting features and the circle center coordinates of the corresponding graph anti-counterfeiting features to be detected as a first verification result.
Step S703, verifying the size of the graphic anti-counterfeiting feature of the copy-proof shading graphic security code object mark to be detected, and obtaining a second verification result;
and calculating the theoretical ring width of the graphic anti-counterfeiting feature, wherein the theoretical ring width of the graphic anti-counterfeiting feature = the theoretical ring excircle radius-the theoretical ring inner circle radius. And calculating the width of the to-be-detected ring of the to-be-detected pattern anti-counterfeiting feature, wherein the width of the to-be-detected ring = the excircle radius of the to-be-detected ring-the inner circle radius of the to-be-detected ring. And calculating the Mean Square Error (MSE) of the theoretical ring widths of all the embedded pattern anti-counterfeiting features and the ring widths of the corresponding pattern anti-counterfeiting features to be detected as a second verification result.
Step S704, verifying the color of the graphic anti-counterfeiting feature of the copy-proof shading graphic security code object identification to be detected, and obtaining a third verification result;
wherein, the pixel area of the ring theory is determined according to the size and the position of the pattern anti-counterfeiting feature. Traversing the region to obtain the numerical values of the three channels of R, G and B of each pixel point, obtaining the weight arrays (gr, gg and gb) of each channel when the image is converted from the RGB color space to the Gray image according to the known color psychology principle, and calculating the theoretical Gray value after the numerical values of the channels of R, G and B in each region are converted according to the formula Gray = R × gr + G × gg + B × gb; and calculating the average value of the actual gray values of all pixels in all the circular ring areas in the anti-counterfeiting feature of the graph to be detected. And calculating the Mean Square Error (MSE) of the theoretical gray values of all the embedded graphic anti-counterfeiting features and the average value of the actual gray values of all the pixels of the corresponding graphic anti-counterfeiting features to be detected as a third verification result.
Step S705, according to the first verification result, the second verification result, the third verification result and the respective threshold values, obtaining comparison results and writing the comparison results into the anti-counterfeiting characteristic fingerprint of the graph to be detected;
and obtaining different comparison results according to different relations between an array consisting of the first verification result, the second verification result and the third verification result and a threshold, wherein the comparison results can be represented by characters and written into the anti-counterfeiting characteristic fingerprint of the graph to be detected.
And S706, outputting the anti-counterfeiting characteristic fingerprint of the graph to be detected.
And finally, outputting the fingerprint to obtain the anti-counterfeiting characteristic fingerprint of the graph to be detected.
Step S606, comparing the anti-counterfeiting characteristic fingerprint of the graph to be detected with the anti-counterfeiting characteristic fingerprint of the original graph corresponding to the code value to be detected, and calculating the matching rate of two character strings in the same character set encoding mode to obtain a single-frame passing result;
step S607, when the number of the single frame passing results is accumulated to N, calculating the multi-frame passing rate statistic value;
wherein, preferably, 3. Ltoreq. N.ltoreq.10. And calculating a multi-frame passing rate statistic value by taking the 'single-frame passing number p divided by N' as a formula. The statistics of the multi-frame judgment results is more accurate, and the probability of judging whether the genuine products are fake or whether the forged printed products are fake due to light, angle and jitter is reduced.
Step S608, when the multi-frame passing rate statistic value is smaller than the authenticity judgment threshold value of the N frames of anti-counterfeiting feature fingerprints corresponding to the current printing batch, a counterfeit is prompted;
and step S609, prompting a genuine product when the multi-frame passing rate statistic value is greater than or equal to the authenticity judgment threshold value of the N frames of anti-counterfeiting feature fingerprints corresponding to the current printing batch.
Fig. 8 is a flowchart of a method for dynamically adjusting a decision threshold according to an embodiment of the present invention. As shown in fig. 8, the method includes:
s801, acquiring graph anti-counterfeiting characteristic fingerprints of anti-copying shading graph security code real object identifications corresponding to M same original code values;
because the printing is a process that characteristic changes are necessarily generated randomly, fingerprints generated by a genuine product (an electronic file is printed to be an image of a printed matter real object acquired by a camera) are different from original fingerprints (an image of the electronic file), and the fingerprints are not 100% identical, but the difference is within a certain statistical threshold. But the counterfeits are necessarily far from the print after being reproduced. The two can be separated by setting the false-proof judgment threshold value of the anti-counterfeiting characteristic fingerprint of N frames. Therefore, in order to enable the authenticity judgment threshold value of the N frames of anti-counterfeiting characteristic fingerprints corresponding to the current printing batch to be more accurate, the invention carries out the step of dynamically adjusting the judgment threshold value. Firstly, directly acquiring the printed M (for example, 100) graphic anti-counterfeiting characteristic fingerprints of the anti-copying base-pattern graphic security code real object identifier corresponding to the same original code value.
Step S802, comparing the image anti-counterfeiting characteristic fingerprints of the anti-copying shading image safety code object identifications corresponding to M identical original code values with the original image anti-counterfeiting characteristic fingerprints corresponding to the original code values to obtain an average value of M single-frame matching rates;
here, the single frame matching rate, that is, the abcd and abc3 matching rates, is 75%, for example. This embodiment only detects to M prevents duplicating shading figure security code physical identification, has realized need not to reform transform the cost of producing the line to manufacturing enterprise and has saved.
And step S803, when the average value is smaller than the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold values corresponding to the current printing batch, updating the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold values corresponding to the current printing batch into the average value to the server.
Because the risk that the printed product deviates from the preset multi-frame passing rate due to the printing deviation of the pattern anti-counterfeiting features of different printing batches caused by the printing randomness exists all the time, the passing rate quality inspection of the good product of the whole printing batch is realized at extremely low cost and efficiency after the calibration by the embodiment.
Fig. 9 is a schematic structural diagram of a copy-proof shading anti-counterfeiting device based on a micro-dot code according to an embodiment of the present invention. As shown in fig. 9, the apparatus includes: the system comprises a code map generating module 1, a password acquiring module 2, a document acquiring module 3, a parameter storage module 4, an identification processing module 5 and a parameter adjusting module 6, wherein the code map generating module 1 is used for generating a dot matrix code map by using any original code value based on the code system of a micro-point code; the password acquisition module 2 is used for processing the original code value by using a dynamic encryption algorithm and a dynamic encryption parameter corresponding to the original code value to obtain an original graphic anti-counterfeiting feature embedded password; the document acquisition module 3 is configured to: determining the outer circle radius, the inner circle radius, the boundary interval, the circle center position and the ring color of a plurality of graph anti-counterfeiting features embedded into the dot code pattern according to the original graph anti-counterfeiting feature embedded password and the graph anti-counterfeiting feature embedded algorithm; embedding the plurality of pattern anti-counterfeiting features into the dot matrix code pattern according to the outer circle radius, the inner circle radius, the boundary interval, the circle center position and the ring color to obtain an anti-copying shading pattern security code electronic document; the parameter storage module 4 is configured to store a dynamic encryption parameter corresponding to the original code value, an original pattern anti-counterfeiting feature fingerprint corresponding to the original code value, and an N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch to a server, where the original pattern anti-counterfeiting feature fingerprint is obtained by processing the anti-copying shading pattern security code electronic document using the original pattern anti-counterfeiting feature embedded password and a pattern anti-counterfeiting feature extraction algorithm corresponding to the pattern anti-counterfeiting feature embedded algorithm; the mark processing module 5 is configured to print the anti-copying shading pattern security code electronic document into an anti-copying shading pattern security code physical mark, so as to detect the anti-copying shading pattern security code physical mark to be detected according to the dynamic encryption parameter corresponding to the original code value, the original pattern anti-counterfeiting feature fingerprint corresponding to the original code value, and the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold corresponding to the current printing batch, so as to judge authenticity.
Preferably, the password obtaining module 2 is configured to: generating factors alpha and beta based on a linear congruence method; generating a key and a padding number iv of the encryption parameter 128byte according to the factors alpha and beta respectively; AES-CBC encrypting the original code value using the key and the pad number iv; embedding a character string obtained by using hash operation on the encrypted original code value as an original graph anti-counterfeiting feature into a password prototype; embedding the password prototype into the original anti-counterfeiting characteristic of the graph and converting the password prototype into a byte array; taking the first 8 bits or the last 8 bits in the byte array and putting the first 8 bits or the last 8 bits in a primary value array; converting the primary initial value array into a float64 type, and taking a decimal part as an initial value x0 of a well-known Logistic mapping chaotic encryption algorithm; and according to the initial value x0, combining the parameters L alpha and Ln of the dynamic encryption algorithm of the original code value, executing Ln times of Logistic iteration, and taking the first 20 bits of the effective digits of the random floating point number obtained by iterative operation as the original graph anti-counterfeiting feature embedded password, wherein L alpha is a scaling coefficient in the Logistic algorithm, and Ln is the iteration times.
Preferably, the document acquiring module 3 is configured to: using the original graph anti-counterfeiting feature embedded password as an integer random number seed to iterate for M times to obtain M integer random numbers; determining the outer circle radius, the inner circle radius and the boundary interval of a plurality of graphic anti-counterfeiting features by using the M integer random numbers, wherein the outer circle radius, the inner circle radius and the boundary interval of one graphic anti-counterfeiting feature are determined every three adjacent integer random numbers from the first integer random number; determining the side length of a circumscribed square of each graph anti-counterfeiting feature according to the excircle radius and the boundary interval of each graph anti-counterfeiting feature; arranging the external squares of all the graph anti-counterfeiting features from the upper left corner of the dot matrix code image according to the determined sequence of the graph anti-counterfeiting features to determine the circle center position of each graph anti-counterfeiting feature embedded into the dot matrix code image, wherein the arrangement mode of the external squares of all the graph anti-counterfeiting features comprises the following steps: 1) After adding an external square in the current row, if the sum of the side lengths of the external squares in the row direction is less than or equal to the difference between the width W of the dot matrix code image and the edge threshold value s1 of the row tail distance and the sum of the side lengths of the external squares in the column direction is less than or equal to the height H of the dot matrix code image, normally arranging the dot matrix code image from left to right in the current row; 2) After adding an external square to the current row, the sum of the side lengths of the external squares in the row direction is greater than the difference between the width W of the dot matrix code graph and the row tail distance edge threshold s1, but is less than or equal to the width W of the dot matrix code graph, and if the sum of the side lengths of the external squares in the column direction is less than or equal to the difference between the height H of the dot matrix code graph and the row tail distance edge threshold s1 after adding the external square to the leftmost side of the next row, the external squares are arranged on the leftmost side of the next row; 3) After adding the external square on the current row, when the sum of the side lengths of the external square in the row direction is larger than the width W of the dot matrix code graph or the sum of the side lengths of the external square in the column direction is larger than the height H of the dot matrix code graph, the external square is not arranged; 4) After adding an external square on the current row, finishing the arrangement when the sum of the side lengths of the external squares in the row direction is greater than the difference between the width W of the dot matrix code image and the row tail distance edge threshold s1 but is less than or equal to the width W of the dot matrix code image and the sum of the side lengths of the external squares in the column direction is greater than the difference between the height H of the dot matrix code image and the row tail distance edge threshold s 1; using the original graph anti-counterfeiting feature embedded password as an integer random number seed iteration to obtain an integer random number for each graph anti-counterfeiting feature; the color of the ring of each graphical security feature is determined based on the remainder of dividing the integer random number for each graphical security feature by 6.
Preferably, the identification processing module 5 is configured to: extracting a code value to be detected of the copy-proof shading graph security code object identification to be detected; when the extraction is unsuccessful within the preset time or the extracted code value to be detected is not stored in the server, a counterfeit product is prompted; when the extracted code value to be detected is stored in the server, acquiring a dynamic encryption parameter corresponding to the code value to be detected, an original graph anti-counterfeiting feature fingerprint corresponding to the code value to be detected and an N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch from the server; processing the code value to be detected by using the dynamic encryption algorithm and the dynamic encryption algorithm corresponding to the code value to be detected to obtain an embedded password of the anti-counterfeiting characteristic of the graph to be detected; according to the anti-counterfeiting feature embedding password of the graph to be detected and the graph anti-counterfeiting feature extraction algorithm, obtaining the anti-counterfeiting feature fingerprint of the graph to be detected of the anti-copying shading graph security code physical identification to be detected; comparing the graph anti-counterfeiting characteristic fingerprint to be detected with an original graph anti-counterfeiting characteristic fingerprint corresponding to the code value to be detected, and calculating the matching rate of two character strings in the same character set encoding mode to obtain a single-frame passing result; when the number of the single-frame passing results is accumulated to N, calculating a multi-frame passing rate statistic value; when the multi-frame passing rate statistic value is smaller than the authenticity judgment threshold value of the N frames of anti-counterfeiting feature fingerprints corresponding to the current printing batch, prompting a counterfeit product; and prompting the genuine product when the multi-frame passing rate statistic value is greater than or equal to the authenticity judgment threshold value of the N frames of anti-counterfeiting characteristic fingerprints corresponding to the current printing batch.
Preferably, the apparatus further comprises a parameter adjusting module 6 for: acquiring M graph anti-counterfeiting characteristic fingerprints of anti-copying shading graph security code real object identification corresponding to the same original code value; comparing the image anti-counterfeiting characteristic fingerprints of the anti-copying shading image security code physical identification corresponding to M identical original code values with the original image anti-counterfeiting characteristic fingerprints corresponding to the original code values to obtain an average value of M single-frame matching rates; and when the average value is smaller than the authenticity judgment threshold value of the N frames of anti-counterfeiting characteristic fingerprints corresponding to the current printing batch, updating the authenticity judgment threshold value of the N frames of anti-counterfeiting characteristic fingerprints corresponding to the current printing batch as the average value to the server.
Preferably, the identification processing module 5 is configured to: comparing the anti-counterfeiting characteristic embedded password of the graph to be detected with the original anti-counterfeiting characteristic embedded password corresponding to the code value to be detected, and writing a comparison result into the anti-counterfeiting characteristic fingerprint of the graph to be detected; verifying the position of the pattern anti-counterfeiting feature of the copy-proof shading pattern safety code object identification to be detected, and obtaining a first verification result; verifying the size of the graph anti-counterfeiting feature of the copy-proof shading graph security code object identification to be detected, and obtaining a second verification result; verifying the color of the pattern anti-counterfeiting characteristic of the copy-proof shading pattern safety code object identification to be detected, and obtaining a third verification result; obtaining comparison results according to the first verification result, the second verification result, the third verification result and the respective threshold values, and writing the comparison results into the anti-counterfeiting characteristic fingerprint of the graph to be detected; and outputting the anti-counterfeiting characteristic fingerprint of the graph to be detected.
The embodiments of the anti-copy shading anti-counterfeiting device based on the microdot code are similar to the embodiments of the anti-copy shading anti-counterfeiting method based on the microdot code, and are not described again here.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Disks (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of additional identical elements in the process, method, article, or apparatus comprising the element.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (13)

1. A copying-proof shading anti-counterfeiting method based on a micro-point code is characterized by comprising the following steps:
generating a dot matrix code graph by using any original code value based on a code system of the micro dot code;
processing the original code value by using a dynamic encryption algorithm and a dynamic encryption parameter corresponding to the original code value to obtain an original graph anti-counterfeiting feature embedded password;
determining the outer circle radius, the inner circle radius, the boundary interval, the circle center position and the ring color of a plurality of graph anti-counterfeiting features embedded into the dot code pattern according to the original graph anti-counterfeiting feature embedded password and the graph anti-counterfeiting feature embedded algorithm;
embedding the anti-counterfeiting features of the plurality of graphs into the dot matrix code graph according to the outer circle radius, the inner circle radius, the boundary interval, the circle center position and the color of the ring to obtain an anti-copying shading graph security code electronic document;
storing a dynamic encryption parameter corresponding to the original code value, an original graph anti-counterfeiting feature fingerprint corresponding to the original code value and an N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch to a server, wherein the original graph anti-counterfeiting feature fingerprint is obtained by processing the anti-copying shading graph security code electronic document by using the original graph anti-counterfeiting feature embedded password and a graph anti-counterfeiting feature extraction algorithm corresponding to the graph anti-counterfeiting feature embedded algorithm;
and printing the anti-copying shading graph security code electronic document into an anti-copying shading graph security code physical identification so as to detect the anti-copying shading graph security code physical identification to be detected according to the dynamic encryption parameter corresponding to the original code value, the original graph anti-counterfeiting feature fingerprint corresponding to the original code value and the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold corresponding to the current printing batch so as to judge authenticity.
2. The method for preventing copying shading and counterfeiting based on the micro-point code according to claim 1, wherein the step of processing the original code value by using a dynamic encryption algorithm and a dynamic encryption parameter corresponding to the original code value to obtain an original graphic anti-counterfeiting feature embedded password comprises the following steps:
generating factors alpha and beta based on a linear congruence method;
generating a key and a padding number iv of an encryption parameter 128byte according to the factors alpha and beta respectively;
AES-CBC encrypting the original code value using the key and the pad number iv;
embedding a character string obtained by using hash operation on the encrypted original code value as an original graph anti-counterfeiting feature into a password prototype;
embedding the password prototype into the original anti-counterfeiting characteristic of the graph and converting the password prototype into a byte array;
taking the first 8 bits or the last 8 bits in the byte array and putting the first 8 bits or the last 8 bits in a primary value array;
converting the primary initial value array into a float64 type, and taking a decimal part as an initial value x0 of a well-known Logistic mapping chaotic encryption algorithm;
and according to the initial value x0, combining the parameters L alpha and Ln of the dynamic encryption algorithm of the original code value, executing Ln times of Logistic iteration, and taking the first 20 bits of the effective digits of the random floating point number obtained by iterative operation as the original graph anti-counterfeiting feature embedded password, wherein L alpha is a scaling coefficient in the Logistic algorithm, and Ln is the iteration times.
3. The method for preventing copying shading anti-counterfeiting according to claim 1, wherein the step of determining the outer circle radius, the inner circle radius, the boundary interval, the circle center position and the circle color of the plurality of graph anti-counterfeiting features embedded in the dot code graph according to the original graph anti-counterfeiting feature embedded password and the graph anti-counterfeiting feature embedded algorithm comprises the following steps:
using the original graph anti-counterfeiting feature embedded password as an integer random number seed to iterate for M times to obtain M integer random numbers;
determining the outer circle radius, the inner circle radius and the boundary interval of a plurality of pattern anti-counterfeiting features by using the M integer random numbers, wherein the outer circle radius, the inner circle radius and the boundary interval of one pattern anti-counterfeiting feature are determined every three adjacent integer random numbers from the first integer random number;
determining the side length of a circumscribed square of each graph anti-counterfeiting feature according to the excircle radius and the boundary interval of each graph anti-counterfeiting feature;
arranging the external squares of all the graph anti-counterfeiting features from the upper left corner of the dot matrix code image according to the determined sequence of the graph anti-counterfeiting features to determine the circle center position of each graph anti-counterfeiting feature embedded into the dot matrix code image, wherein the arrangement mode of the external squares of all the graph anti-counterfeiting features comprises the following steps:
after adding an external square in the current row, if the sum of the side lengths of the external squares in the row direction is less than or equal to the difference between the width W of the dot matrix code image and the edge threshold value s1 of the row tail distance and the sum of the side lengths of the external squares in the column direction is less than or equal to the height H of the dot matrix code image, normally arranging the dot matrix code image from left to right in the current row;
after adding an external square to the current row, the sum of the side lengths of the external squares in the row direction is greater than the difference between the width W of the dot matrix code graph and the row tail distance edge threshold s1, but is less than or equal to the width W of the dot matrix code graph, and if after adding the external square to the leftmost side of the next row, the sum of the side lengths of the external squares in the column direction is less than or equal to the difference between the height H of the dot matrix code graph and the row tail distance edge threshold s1, the external squares are arranged on the leftmost side of the next row;
after the external square is newly added on the current row, when the sum of the side lengths of the external squares in the row direction is larger than the width W of the dot matrix code graph or the sum of the side lengths of the external squares in the column direction is larger than the height H of the dot matrix code graph, the external squares are not arranged;
after adding an external square on the current row, finishing the arrangement when the sum of the side lengths of the external squares in the row direction is greater than the difference between the width W of the dot matrix code image and the row tail distance edge threshold s1 but is less than or equal to the width W of the dot matrix code image and the sum of the side lengths of the external squares in the column direction is greater than the difference between the height H of the dot matrix code image and the row tail distance edge threshold s 1;
using the original graph anti-counterfeiting feature embedded password as an integer random number seed iteration to obtain an integer random number for each graph anti-counterfeiting feature;
the color of the ring of each graphical security feature is determined based on the remainder of dividing the integer random number for each graphical security feature by 6.
4. The method for preventing copying the shading and anti-counterfeiting based on the microdot code according to claim 1, wherein the step of detecting the real object identifier of the anti-copying shading graph security code to be detected to judge the authenticity according to the dynamic encryption parameter corresponding to the original code value, the original graph anti-counterfeiting feature fingerprint corresponding to the original code value and the authenticity judgment threshold value of the N frames of anti-counterfeiting feature fingerprints corresponding to the current printing batch comprises the following steps:
extracting a code value to be detected of the copy-proof shading graph security code object identification to be detected;
when the extraction is unsuccessful within the preset time or the extracted code value to be detected is not stored in the server, a counterfeit product is prompted;
when the extracted code value to be detected is stored in the server, acquiring a dynamic encryption parameter corresponding to the code value to be detected, an original graph anti-counterfeiting feature fingerprint corresponding to the code value to be detected and an N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch from the server;
processing the code value to be detected by using the dynamic encryption algorithm and the dynamic encryption parameter corresponding to the code value to be detected to obtain an embedded password of the anti-counterfeiting feature of the graph to be detected;
according to the anti-counterfeiting feature embedding password of the graph to be detected and the graph anti-counterfeiting feature extraction algorithm, obtaining the anti-counterfeiting feature fingerprint of the graph to be detected of the anti-copying shading graph security code physical identification to be detected;
comparing the graph anti-counterfeiting characteristic fingerprint to be detected with an original graph anti-counterfeiting characteristic fingerprint corresponding to the code value to be detected, and calculating the matching rate of two character strings in the same character set encoding mode to obtain a single-frame passing result;
when the number of the single-frame passing results is accumulated to N, calculating a multi-frame passing rate statistic value;
when the multi-frame throughput rate statistic value is smaller than the authenticity judgment threshold value of the N frames of anti-counterfeiting characteristic fingerprints corresponding to the current printing batch, prompting a counterfeit product;
and prompting the genuine product when the multi-frame passing rate statistic value is greater than or equal to the authenticity judgment threshold value of the N frames of anti-counterfeiting feature fingerprints corresponding to the current printing batch.
5. The method for preventing copying shading and counterfeiting based on the micro-point code as claimed in claim 1, characterized by further comprising the following steps:
acquiring M graph anti-counterfeiting characteristic fingerprints of anti-copying shading graph security code real object identifications corresponding to the same original code value;
comparing the image anti-counterfeiting characteristic fingerprints of the anti-copying shading image security code physical identification corresponding to M identical original code values with the original image anti-counterfeiting characteristic fingerprints corresponding to the original code values to obtain an average value of M single-frame matching rates;
and when the average value is smaller than the authenticity judgment threshold value of the N frames of anti-counterfeiting characteristic fingerprints corresponding to the current printing batch, updating the authenticity judgment threshold value of the N frames of anti-counterfeiting characteristic fingerprints corresponding to the current printing batch as the average value to the server.
6. The method for preventing the copy shading anti-counterfeiting function based on the micro-point code as claimed in claim 4, wherein the step of obtaining the fingerprint of the anti-counterfeiting feature to be detected of the anti-copy shading graphic security code physical mark to be detected according to the embedded password of the anti-counterfeiting feature to be detected and the graphic anti-counterfeiting feature extraction algorithm comprises the following steps:
comparing the anti-counterfeiting characteristic embedded password of the graph to be detected with the original anti-counterfeiting characteristic embedded password corresponding to the code value to be detected, and writing a comparison result into the anti-counterfeiting characteristic fingerprint of the graph to be detected;
verifying the position of the graphic anti-counterfeiting feature of the copy-proof shading graphic security code object identifier to be detected, and obtaining a first verification result;
verifying the size of the graphic anti-counterfeiting feature of the copy-proof shading graphic security code object identifier to be detected, and obtaining a second verification result;
verifying the color of the graphic anti-counterfeiting feature of the copy-proof shading graphic security code object identification to be detected, and obtaining a third verification result;
obtaining a comparison result according to the first verification result, the second verification result, the third verification result and the respective threshold values, and writing the comparison result into the anti-counterfeiting characteristic fingerprint of the graph to be detected;
and outputting the anti-counterfeiting characteristic fingerprint of the graph to be detected.
7. The method for preventing the copy of the shading from the false as claimed in claim 1, wherein the code value can be a character string encoded by any character, when the code value of the micro dot code is converted into binary, there is an obvious gap of 1 or more data positions between data, the anti-copy shading pattern made by the micro dot code is used as a real object mark, the robustness is at least 90% in the area of 20mm x 20mm, the anti-copy shading pattern can be decoded in any residual area of 3mm, and the anti-copy shading pattern can be read under the interference pattern except for linear, bulk and special-shaped code dots.
8. A copying-proof shading anti-counterfeiting device based on micro-point codes is characterized by comprising:
a code pattern generating module, a password acquiring module, a document acquiring module, a parameter storing module and an identification processing module, wherein,
the code map generation module is used for generating a dot matrix code map by using any original code value based on the code system of the micro-dot code;
the password acquisition module is used for processing the original code value by using a dynamic encryption algorithm and a dynamic encryption parameter corresponding to the original code value to obtain an original graph anti-counterfeiting feature embedded password;
the document acquisition module is used for:
determining the outer circle radius, the inner circle radius, the boundary interval, the circle center position and the ring color of a plurality of graph anti-counterfeiting features embedded into the dot code pattern according to the original graph anti-counterfeiting feature embedded password and the graph anti-counterfeiting feature embedded algorithm;
embedding the plurality of pattern anti-counterfeiting features into the dot matrix code pattern according to the outer circle radius, the inner circle radius, the boundary interval, the circle center position and the ring color to obtain an anti-copying shading pattern security code electronic document;
the parameter storage module is used for storing dynamic encryption parameters corresponding to the original code values, original graph anti-counterfeiting feature fingerprints corresponding to the original code values and N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold values corresponding to the current printing batch to a server, wherein the original graph anti-counterfeiting feature fingerprints are obtained by processing the anti-copying shading graph security code electronic document by using the original graph anti-counterfeiting feature embedded password and a graph anti-counterfeiting feature extraction algorithm corresponding to the graph anti-counterfeiting feature embedded algorithm;
the identification processing module is used for printing the anti-copying shading pattern safety code electronic document into an anti-copying shading pattern safety code real object identification, so that the anti-copying shading pattern safety code real object identification to be detected is detected to judge the authenticity according to the dynamic encryption parameters corresponding to the original code value, the original pattern anti-counterfeiting feature fingerprint corresponding to the original code value and the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold corresponding to the current printing batch.
9. The microdot-code-based copy-proof shading and counterfeiting prevention device according to claim 8, wherein the password acquisition module is used for:
generating factors alpha and beta based on a linear congruence method;
generating a key and a padding number iv of an encryption parameter 128byte according to the factors alpha and beta respectively;
AES-CBC encrypting the original code value using the key and the pad number iv;
embedding a character string obtained by using hash operation on the encrypted original code value as an original graph anti-counterfeiting feature into a password prototype;
embedding the password prototype into the original anti-counterfeiting characteristic of the graph and converting the password prototype into a byte array;
taking the first 8 bits or the last 8 bits in the byte array and putting the first 8 bits or the last 8 bits in a primary value array;
converting the primary initial value array into a float64 type, and taking a decimal part as an initial value x0 of a well-known Logistic mapping chaotic encryption algorithm;
and according to the initial value x0, ln times of Logistic iteration is executed by combining the parameters L alpha and Ln of the dynamic encryption algorithm of the original code value, and the front 20 bits of the effective number of the random floating point number obtained by iterative operation are used as the anti-counterfeiting feature embedded password of the original graph, wherein L alpha is a scaling coefficient in the Logistic algorithm, and Ln is the iteration times.
10. The microdot-code-based copy-proof shading and counterfeiting prevention device according to claim 8, wherein the document acquisition module is used for:
using the original graph anti-counterfeiting feature embedded password as an integer random number seed to iterate for M times to obtain M integer random numbers;
determining the outer circle radius, the inner circle radius and the boundary interval of a plurality of pattern anti-counterfeiting features by using the M integer random numbers, wherein the outer circle radius, the inner circle radius and the boundary interval of one pattern anti-counterfeiting feature are determined every three adjacent integer random numbers from the first integer random number;
determining the side length of a circumscribed square of each graph anti-counterfeiting feature according to the excircle radius and the boundary interval of each graph anti-counterfeiting feature;
arranging the external squares of all the graph anti-counterfeiting features from the upper left corner of the dot matrix code image according to the determined sequence of the graph anti-counterfeiting features to determine the circle center position of each graph anti-counterfeiting feature embedded into the dot matrix code image, wherein the arrangement mode of the external squares of all the graph anti-counterfeiting features comprises the following steps:
1) After adding the external square on the current row, when the sum of the side lengths of the external square in the row direction is less than or equal to the difference between the width W of the dot matrix code image and the row tail distance edge threshold s1, and when the sum of the side lengths of the external square in the column direction is less than or equal to the height H of the dot matrix code image, the external square is normally arranged from left to right on the current row;
2) After adding an external square to the current row, the sum of the side lengths of the external squares in the row direction is greater than the difference between the width W of the dot matrix code graph and the row tail distance edge threshold s1, but is less than or equal to the width W of the dot matrix code graph, and if the sum of the side lengths of the external squares in the column direction is less than or equal to the difference between the height H of the dot matrix code graph and the row tail distance edge threshold s1 after adding the external square to the leftmost side of the next row, the external squares are arranged on the leftmost side of the next row;
3) After adding the external square on the current row, when the sum of the side lengths of the external square in the row direction is larger than the width W of the dot matrix code graph or the sum of the side lengths of the external square in the column direction is larger than the height H of the dot matrix code graph, the external square is not arranged;
4) After adding an external square on the current row, finishing the arrangement when the sum of the side lengths of the external squares in the row direction is greater than the difference between the width W of the dot matrix code image and the row tail distance edge threshold s1 but is less than or equal to the width W of the dot matrix code image and the sum of the side lengths of the external squares in the column direction is greater than the difference between the height H of the dot matrix code image and the row tail distance edge threshold s 1;
using the original graph anti-counterfeiting feature embedded password as an integer random number seed iteration to obtain an integer random number for each graph anti-counterfeiting feature;
the color of the ring of each graphical security feature is determined based on the remainder of dividing the integer random number for each graphical security feature by 6.
11. The microdot-code-based copy-proof shading and counterfeiting device according to claim 8, wherein the identification processing module is configured to:
extracting a code value to be detected of the copy-proof shading graph security code object identification to be detected;
when the extraction is unsuccessful within the preset time or the extracted code value to be detected is not stored in the server, a counterfeit product is prompted;
when the extracted code value to be detected is stored in the server, acquiring a dynamic encryption parameter corresponding to the code value to be detected, an original graph anti-counterfeiting feature fingerprint corresponding to the code value to be detected and an N-frame anti-counterfeiting feature fingerprint authenticity judgment threshold value corresponding to the current printing batch from the server;
processing the code value to be detected by using the dynamic encryption algorithm and the dynamic encryption algorithm corresponding to the code value to be detected to obtain an embedded password of the anti-counterfeiting feature of the graph to be detected;
according to the anti-counterfeiting feature embedding password of the graph to be detected and the graph anti-counterfeiting feature extraction algorithm, obtaining the anti-counterfeiting feature fingerprint of the graph to be detected of the anti-copying shading graph security code object identification to be detected;
comparing the graph anti-counterfeiting characteristic fingerprint to be detected with an original graph anti-counterfeiting characteristic fingerprint corresponding to the code value to be detected, and calculating the matching rate of two character strings in the same character set encoding mode to obtain a single-frame passing result;
when the number of the single-frame passing results is accumulated to N, calculating a multi-frame passing rate statistic value;
when the multi-frame throughput rate statistic value is smaller than the authenticity judgment threshold value of the N frames of anti-counterfeiting characteristic fingerprints corresponding to the current printing batch, prompting a counterfeit product;
and prompting the genuine product when the multi-frame passing rate statistic value is greater than or equal to the authenticity judgment threshold value of the N frames of anti-counterfeiting feature fingerprints corresponding to the current printing batch.
12. The microdot-code-based copy-proof shading and counterfeiting device according to claim 8, further comprising a parameter adjusting module for:
acquiring M graph anti-counterfeiting characteristic fingerprints of anti-copying shading graph security code real object identification corresponding to the same original code value;
comparing the graph anti-counterfeiting characteristic fingerprints of the anti-copying shading graph security code real object identification corresponding to M identical original code values with the original graph anti-counterfeiting characteristic fingerprint corresponding to the original code values to obtain an average value of M single-frame matching rates;
and when the average value is smaller than the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold values corresponding to the current printing batch, updating the N frames of anti-counterfeiting feature fingerprint authenticity judgment threshold values corresponding to the current printing batch to the average value and sending the average value to the server.
13. The microdot-code-based copy-proof shading and counterfeiting device according to claim 11, wherein the identification processing module is configured to:
comparing the graph anti-counterfeiting feature embedding password to be detected with an original graph anti-counterfeiting feature embedding password corresponding to the code value to be detected, and writing a comparison result into the graph anti-counterfeiting feature fingerprint to be detected;
verifying the position of the graphic anti-counterfeiting feature of the copy-proof shading graphic security code object identifier to be detected, and obtaining a first verification result;
verifying the size of the graphic anti-counterfeiting feature of the copy-proof shading graphic security code object identifier to be detected, and obtaining a second verification result;
verifying the color of the graphic anti-counterfeiting feature of the copy-proof shading graphic security code object identification to be detected, and obtaining a third verification result;
obtaining comparison results according to the first verification result, the second verification result, the third verification result and the respective threshold values, and writing the comparison results into the anti-counterfeiting characteristic fingerprint of the graph to be detected;
and outputting the anti-counterfeiting characteristic fingerprint of the graph to be detected.
CN202211219529.3A 2022-10-08 2022-10-08 Anti-copying shading anti-counterfeiting method and device based on micro-point code Active CN115423063B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211219529.3A CN115423063B (en) 2022-10-08 2022-10-08 Anti-copying shading anti-counterfeiting method and device based on micro-point code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211219529.3A CN115423063B (en) 2022-10-08 2022-10-08 Anti-copying shading anti-counterfeiting method and device based on micro-point code

Publications (2)

Publication Number Publication Date
CN115423063A true CN115423063A (en) 2022-12-02
CN115423063B CN115423063B (en) 2023-06-09

Family

ID=84205956

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211219529.3A Active CN115423063B (en) 2022-10-08 2022-10-08 Anti-copying shading anti-counterfeiting method and device based on micro-point code

Country Status (1)

Country Link
CN (1) CN115423063B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116828127A (en) * 2023-08-30 2023-09-29 北京点聚信息技术有限公司 Fingerprint encryption storage method combined with document data

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103106635A (en) * 2012-12-26 2013-05-15 浙江大学 Hiding method and device for digital camouflage information
US20180205548A1 (en) * 2015-09-17 2018-07-19 Shenzhen Qianhai Quantum Cloud Technology Co., Ltd. Anti-counterfeit method
CN113313225A (en) * 2021-07-09 2021-08-27 北京微点科技有限公司 Anti-counterfeiting method based on sparse dot matrix code
US20220198570A1 (en) * 2019-01-27 2022-06-23 Hainan Paipaikan Information Technology Co., Ltd. Anti-fake packing method for product liability insurance

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103106635A (en) * 2012-12-26 2013-05-15 浙江大学 Hiding method and device for digital camouflage information
US20180205548A1 (en) * 2015-09-17 2018-07-19 Shenzhen Qianhai Quantum Cloud Technology Co., Ltd. Anti-counterfeit method
US20220198570A1 (en) * 2019-01-27 2022-06-23 Hainan Paipaikan Information Technology Co., Ltd. Anti-fake packing method for product liability insurance
CN113313225A (en) * 2021-07-09 2021-08-27 北京微点科技有限公司 Anti-counterfeiting method based on sparse dot matrix code

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116828127A (en) * 2023-08-30 2023-09-29 北京点聚信息技术有限公司 Fingerprint encryption storage method combined with document data
CN116828127B (en) * 2023-08-30 2023-10-27 北京点聚信息技术有限公司 Fingerprint encryption storage method combined with document data

Also Published As

Publication number Publication date
CN115423063B (en) 2023-06-09

Similar Documents

Publication Publication Date Title
US10373033B2 (en) Two dimensional barcode and method of authentication of such barcode
CN115293311B (en) Color watermark anti-counterfeiting method and device based on micro-point code
KR101581196B1 (en) Unique identification information from marked features
JP5552528B2 (en) Method and device for securing documents
RU2477522C2 (en) Method and apparatus for protecting documents
JP5696040B2 (en) Method and apparatus for identifying a printing plate for a document
CA2586274C (en) Mixed code, and method and apparatus for generating the same, and method and apparatus for decoding the same
CN115329919B (en) Random additional point anti-counterfeiting method and device based on micro point code
CN113313225B (en) Anti-counterfeiting method based on sparse dot matrix code
CN105205674A (en) Product anti-counterfeiting method based on two-dimensional code
CN105550730A (en) Safe two-dimensional code manufacture method and decoding method, and safe two-dimensional code identifier
CN116664961B (en) Intelligent identification method and system for anti-counterfeit label based on signal code
CN115423063B (en) Anti-copying shading anti-counterfeiting method and device based on micro-point code
EA031834B1 (en) Method for identifying authenticity of an item having security marking on its surface
US8931697B2 (en) System for detecting reorigination of barcodes
CN110009080B (en) Two-dimensional code generation method, verification method, server and two-dimensional code
JP2009130911A (en) Paper, and method of producing paper
CN115470878B (en) Variable anti-counterfeiting super-line anti-counterfeiting method and device based on micro-point code
CN116681098A (en) Method and system for generating anti-counterfeiting mark image based on two-dimensional code generation
CN113888198A (en) Anti-counterfeiting method based on anti-counterfeiting characteristic correction
CN117499551B (en) Encryption anti-counterfeiting printing method based on binary signals
US11816756B1 (en) Anti-leak digital document marking system and method using distributed ledger
JP5850370B2 (en) Printed material production method, printed material and authenticity determination method
CN115230359A (en) Intelligent digital printing anti-counterfeiting mark generation and use method
CN104778593A (en) Anti-counterfeiting image encrypting and detecting method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230414

Address after: Room K1010, Room 1001, 10th Floor, Building 2, Fourth District, Wangjing Dongyuan, Chaoyang District, Beijing 100102

Applicant after: Beijing Microdot Science and Technology Co.,Ltd.

Applicant after: Microcode (Liaoning) Technology Co.,Ltd.

Address before: Room K1010, Room 1001, 10th Floor, Building 2, Fourth District, Wangjing Dongyuan, Chaoyang District, Beijing 100102

Applicant before: Beijing Microdot Science and Technology Co.,Ltd.

GR01 Patent grant
GR01 Patent grant