WO2017148420A1 - 一种随机纹理防伪方法、防伪识别系统、防伪系统和防伪产品 - Google Patents
一种随机纹理防伪方法、防伪识别系统、防伪系统和防伪产品 Download PDFInfo
- Publication number
- WO2017148420A1 WO2017148420A1 PCT/CN2017/075468 CN2017075468W WO2017148420A1 WO 2017148420 A1 WO2017148420 A1 WO 2017148420A1 CN 2017075468 W CN2017075468 W CN 2017075468W WO 2017148420 A1 WO2017148420 A1 WO 2017148420A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- feature
- identified
- identifier
- counterfeit
- counterfeiting
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09F—DISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
- G09F3/00—Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G02—OPTICS
- G02B—OPTICAL ELEMENTS, SYSTEMS OR APPARATUS
- G02B25/00—Eyepieces; Magnifying glasses
- G02B25/002—Magnifying glasses
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/22—Matching criteria, e.g. proximity measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
- G06K19/06178—Constructional details the marking having a feature size being smaller than can be seen by the unaided human eye
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T11/00—2D [Two Dimensional] image generation
- G06T11/001—Texturing; Colouring; Generation of texture or colour
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09F—DISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
- G09F3/00—Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
- G09F3/02—Forms or constructions
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09F—DISPLAYING; ADVERTISING; SIGNS; LABELS OR NAME-PLATES; SEALS
- G09F3/00—Labels, tag tickets, or similar identification or indication means; Seals; Postage or like stamps
- G09F3/02—Forms or constructions
- G09F3/0297—Forms or constructions including a machine-readable marking, e.g. a bar code
Definitions
- the invention belongs to the technical field of texture anti-counterfeiting, and particularly relates to a random texture anti-counterfeiting method, an anti-counterfeiting identification system, an anti-counterfeiting system and an anti-counterfeiting product.
- Random texture anti-counterfeiting technology is a promising anti-counterfeiting technology, which will eventually solve the public anti-counterfeiting problem. This is because the formation of random texture distribution involves an uncontrollable stochastic process, which is the second time that the producer himself cannot. The same distribution pattern is formed at a low cost like the first random distribution, and the later distribution requires a higher cost than the first distribution. This cost difference is greater than the fraud profit. The anti-counterfeiting effect.
- Random anti-counterfeiting technology has been in the field of public identification since its application to the present, and has never entered the field of public identification. The reason is that the texture distribution pattern formed by the distribution is limited by the resolution under the condition of naked eye recognition or existing mobile phone photo recognition. Low-cost process simulation, such as printed patterns, concave and convex patterns printed by UV, patterns formed by embossing, and patterns formed by laser micro-carving, patterns formed by integrated circuit lithography, etc., can be controlled at a low cost in the prior art.
- Copy patterns are prone to "image deception", deceiving the human eye, deceiving the phone without micro-magnification, deceiving the hand, deceiving the needle to pick and observe, resulting in the failure of texture anti-counterfeiting.
- the object of the present invention is to provide an anti-counterfeiting method, an anti-counterfeiting identification system and an anti-counterfeiting system relating to the inherent features of a texture element.
- the texture element is small, the human eye cannot directly distinguish the texture element feature of the single texture element, so printing and printing appear. Processes such as embossing and falsification of texture anti-counterfeiting marks. Although such marks can imitate their distribution characteristics, they cannot imitate their inherent features.
- the identification of inherent features can highly effectively ensure the reliability of random texture anti-counterfeiting marks.
- the object of the invention is achieved in this way.
- a random texture anti-counterfeiting method includes the following steps:
- Step 1 selecting an anti-counterfeit mark 2 randomly distributed with the texel 1;
- Step 2 acquiring a distribution image of the randomly distributed texel 1 and/or a feature of the distribution image on the anti-counterfeit identifier 2 as a distribution feature, and storing the generated storage distribution feature 3 in the background of the identification system; acquiring the texture element 1 Intrinsic feature 4, the intrinsic feature 4 refers to the texel feature of the same visual feature that each texel 1 of the anti-counterfeit tag 2 has when viewed under magnified conditions, and the human eye cannot distinguish without the magnified condition ;
- Step 3 attach the anti-counterfeit mark 2 to the package of the anti-counterfeit object or the anti-counterfeit object;
- Step 4 When identifying, acquire the to-be-identified distribution feature 3' of the texel 1' randomly distributed on the anti-counterfeit identification 2' to be identified and the intrinsic feature 4' to be identified, and obtain the acquired distribution feature 3' and the inherent feature to be identified 4' with the identification system stored in the background The storage distribution feature 3 and the acquired intrinsic feature 4 are respectively compared.
- the anti-counterfeiting identifier 2' to be identified is false, and the anti-counterfeiting to be recognized by the anti-counterfeiting identifier 2' is The object is false;
- the intrinsic feature 4' to be identified refers to the texel feature of the same visual feature that each tex element 1' on the anti-counterfeit mark 2' to be observed when viewed under the magnified condition, without Under the magnified condition, the human eye cannot distinguish.
- the “acquisition of the eigenfeatures 4′ to be identified on the anti-counterfeit identification 2 to be identified” is specifically obtained by the identifier to obtain a random distribution of the anti-counterfeit identification 2′ to be identified by the identifier.
- the texture element 1' is to identify the intrinsic feature 4', wherein the field of view of the identifier when the intrinsic feature 4' to be identified is acquired is less than or equal to 1.5 cm.
- the step 4 "acquiring the to-be-identified distribution feature 3' and the to-be-identified intrinsic feature 4'" of the randomly distributed texture element 1' on the anti-counterfeit identification 2' to be identified is implemented by an identifier; wherein the identifier Included in the mobile phone and a magnifying glass that can be disposed on the ingest path of the mobile phone camera, when the recognizer acquires the intrinsic feature 4' to be recognized, the magnifier of the recognizer is installed on the ingest path of the mobile phone camera; or the identifier includes a mobile phone An external micro camera connected to the mobile phone for wired or wireless connection obtains the intrinsic feature 4' to be identified by an external micro camera.
- the magnifying glass comprises an adhesive layer through which the magnifying glass is adhered to the mobile phone.
- the magnifying lens comprises a lens, a support portion and an adhesive layer, the lens is fixed to one side of the support portion, and the adhesive layer is fixed on the other side of the support portion.
- the side of the support portion protrudes from the side of the lens.
- the comparison of the distribution feature 3' to be identified and the storage distribution feature 3 in the step 4 is automatically performed in the background of the identification system; the comparison of the intrinsic feature 4' and the intrinsic feature 4 to be identified in the step 4 is The background of the recognition system is automatically or manually performed.
- the obtaining the to-be-identified distribution feature 3' and the to-be-identified intrinsic feature 4' of the randomly distributed texture element 1' on the anti-counterfeit identification 2 to be identified in the step 4 is realized by one shot by the identifier. Taking a partial enlarged image or a full enlarged image of at least a part of the texel 1' of the security feature 2' to be identified;
- the identifier includes a mobile phone and a magnifying glass that can be disposed on an ingest path of the mobile phone camera.
- the magnifying glass is installed on the ingest path of the mobile phone camera; or the identifier includes a mobile phone and an external connection with the mobile phone or the wireless connection a micro camera that is photographed by the external micro camera when photographing; or, the identifier includes a computer and an external micro camera connected to the computer by wire or wirelessly, and is photographed by an external micro camera when photographing; or
- the identifier is an independent identifier, and the independent identifier includes a microscopic camera.
- the “acquired identification feature 3′ and the intrinsic feature to be identified 4′” of the randomly distributed texture element 1′ on the to-be-identified anti-counterfeit identification 2′ are acquired twice by the identifier. ;
- the identifier includes a mobile phone and a magnifying glass that can be set on the ingest path of the mobile phone camera.
- the magnifying glass is not set on the ingesting path of the mobile phone camera, and the anti-counterfeiting to be recognized is directly obtained through the mobile phone camera.
- the identifier includes a mobile phone and an external micro camera connected to the mobile phone and connected to the mobile phone.
- the image of the distribution feature to be identified of the anti-counterfeit identification 2' to be identified is directly obtained by the mobile phone camera.
- the intrinsic feature 4' to be identified is acquired, an enlarged image of the texel 1' on the anti-counterfeit mark 2' to be identified is acquired by the external micro camera.
- each of the anti-counterfeiting identifiers 2 further includes at least one code 5,
- the code 5 corresponds to the anti-counterfeit identifier 2, or the code 5 corresponds to a plurality of the anti-counterfeit identifiers 2;
- each of the anti-counterfeit identifications 2' to be identified also includes at least one code 5';
- the obtaining the to-be-identified distribution feature 3' and the to-be-identified intrinsic feature 4' of the randomly distributed texture element 1' on the anti-counterfeit identification 2 to be identified in the step 4 includes: capturing the anti-counterfeit identification 2' to be recognized by the identifier once. Include at least a partially magnified image or a full magnified image encoding 5' and a portion of the texel 1';
- the identifier includes a mobile phone and a magnifying glass that can be disposed on an ingest path of the mobile phone camera.
- the magnifying glass is installed on the ingest path of the mobile phone camera; or the identifier includes a mobile phone and an external connection with the mobile phone or the wireless connection a micro camera that is photographed by the external micro camera when photographing; or, the identifier includes a computer and an external micro camera connected to the computer by wire or wirelessly, and is photographed by an external micro camera when photographing; or
- the identifier is an independent identifier, and the independent identifier includes a microscopic camera.
- the side length of the code is less than 4 mm and the area of the coded area is less than 16 mm 2 ; preferably, the code 5' of the anti-counterfeit mark 2' to be identified is a two-dimensional code.
- each of the anti-counterfeiting identifiers 2 further includes at least one code 5,
- the code 5 corresponds to the anti-counterfeit identifier 2, or the code 5 corresponds to a plurality of the anti-counterfeit identifiers 2;
- each of the anti-counterfeit identifications 2' to be identified also includes at least one code 5';
- the obtaining the to-be-identified distribution feature 3' and the to-be-identified intrinsic feature 4' of the randomly distributed texture element 1' on the anti-counterfeit identification 2 to be identified in the step 4 includes: acquiring the anti-counterfeit identification to be identified twice by the identifier 2' code 5', to be identified distribution feature 3' and to be identified inherent feature 4';
- the identifier includes a mobile phone and a magnifying glass that can be set on the ingest path of the mobile phone camera.
- the magnifying glass is not set on the ingest path of the mobile phone camera, and the anti-counterfeit identification to be recognized is directly obtained through the mobile phone camera.
- Encoding 5' when acquiring the distribution feature 3' to be identified and the intrinsic feature 4' to be identified, the magnifying glass is installed on the ingesting path of the mobile phone camera, and the at least part of the texture on the anti-counterfeit identification 2' to be identified is obtained through the mobile phone camera and the magnifying glass.
- a partially enlarged image or a full enlarged image of the element 1'; or the identifier includes a mobile phone and an external micro camera connected to the mobile phone by wire or wirelessly.
- the mobile phone camera When acquiring the code 5', the mobile phone camera directly obtains the anti-counterfeit identification 2' to be identified.
- Encoding 5' when obtaining the distribution feature 3' to be identified and the intrinsic feature 4' to be identified, obtaining a partially enlarged image of at least part of the texel 1' on the anti-counterfeit identification 2' to be identified by an external micro camera or fully magnifying image.
- the code 5' of the anti-counterfeit identifier 2' to be identified is a two-dimensional code, and the side length of the two-dimensional code is greater than 5 mm.
- each of the anti-counterfeiting identifiers 2 further includes at least one code 5,
- the code 5 corresponds to the anti-counterfeit identifier 2, or the code 5 corresponds to a plurality of the anti-counterfeit identifiers 2;
- each of the anti-counterfeit identifications 2' to be identified also includes at least one code 5';
- the obtaining the to-be-identified distribution feature 3' and the to-be-identified intrinsic feature 4' of the randomly distributed texture element 1' on the anti-counterfeit identification 2 to be identified in the step 4 includes: acquiring the anti-counterfeit identification to be identified twice by the identifier 2' code 5', to be identified distribution feature 3' and to be identified inherent feature 4';
- the identifier includes a magnifying glass installed on the ingest path of the mobile phone camera, and the two acquisitions include: obtaining the code 5' of the anti-counterfeit identification 2' to be recognized through the mobile phone camera and the magnifying glass, and obtaining through the mobile phone camera and the magnifying glass.
- An external micro camera with wired or wireless connection the two acquisitions include: obtaining an encoding 5' of the anti-counterfeit identification 2' to be identified by an external micro camera, and acquiring at least the anti-counterfeiting identification 2' to be identified by the external micro camera Include a partial enlarged image or a full enlarged image of the partial texel 1' to obtain the distribution feature 3' to be identified and the inherent feature 4' to be identified;
- the identifier includes a computer and an external micro camera connected to the computer in a wired or wireless manner, and the two acquisitions include: obtaining an encoding 5' of the anti-counterfeit identification 2' to be identified by an external micro camera, and acquiring by an external micro camera A partial enlarged image or a full enlarged image of at least part of the texel 1' to be identified on the security feature 2' to be identified to obtain the distribution feature 3' to be identified and the inherent feature 4' to be identified;
- the identifier is an independent identifier, the independent identifier includes a micro camera, and the two acquisitions include: acquiring a code 5' of the anti-counterfeit identification 2' to be identified by a micro camera of the independent identifier, and independently identifying The micro camera of the device acquires a partial enlarged image or a full enlarged image of at least part of the texel 1' on the anti-counterfeit identification 2' to be identified to obtain the distribution feature 3' to be identified and the inherent feature 4' to be identified.
- the side length of the code is less than 4 mm and/or the area of the coded area is less than 16 mm 2 ; preferably, the code 5 ′ of the anti-counterfeit mark 2 ′ to be identified is a two-dimensional code.
- the identifier is connected to the background of the identification system in a wired or wireless manner, and the step 4 further includes: the identifier transmitting the enlarged image to the background, and the background receiving the enlarged image and processing the generated image
- the distribution feature 3 ′ is to be identified, or the identifier is to be sent to the background by the mobile phone camera to directly acquire the to-be-identified distribution feature image of the anti-counterfeit identification 2 ′ to be identified, and the background receives the to-be-identified distribution feature image as the distribution feature to be identified.
- the background automatically compares the to-be-identified distribution feature 3' with the storage distribution feature 3 stored in the background one by one or the background-to-recognition distribution feature 3' and the background according to the code 5'
- the storage distribution features 3 are automatically aligned one by one, wherein the encoding is associated with one or more distribution features of the anti-counterfeit identification 2 in advance;
- the identifier sends the enlarged image to the background, and the background receives the enlarged image and processes it to generate the to-be-identified distribution feature 3' and sends it back to the recognizer, and the background is based on the received code 5' Retrieving one or more storage distribution features 3 for returning to the recognizer; the display of the recognizer displaying the received distribution feature 3' to be identified and the storage distribution feature 3 for manual comparison by the recognizer, wherein the encoding Pre-existing with one or more of the anti-counterfeiting marks 2 Associated with the distribution characteristics;
- the step 4 further comprises: comparing the intrinsic feature 4' to be identified, which is shown in the enlarged image, with the intrinsic feature 4.
- the “aligning the intrinsic feature 4 to be identified shown by the enlarged image with all the intrinsic features 4” is specifically: transmitting the enlarged image to the background and in the background of the identification system according to the to-be-identified anti-counterfeit identification 2 ′
- the distribution feature or the inherent feature of the coded call of the to-be-identified anti-counterfeit tag 2' is manually or automatically compared in the background.
- the intrinsic feature refers to storing the intrinsic feature acquired in step 2 in the background of the recognition system, for the same
- a kind of anti-counterfeit mark 2 formed by a kind of texture element is stored in the background when the inherent feature is first acquired, and from the second time, the storage distribution feature of the anti-counterfeit mark 2 and the inherent feature of the anti-counterfeit mark 2 stored in the background are established.
- the enlarged image and the identifier observed at the identifier end are in accordance with the distribution feature of the to-be-identified anti-counterfeit identification 2' or the inherent feature of the anti-counterfeit identification 2' to be recognized at the identifier end.
- the intrinsic feature refers to storing the intrinsic feature acquired in step 2 in the background of the identification system, and a type of anti-counterfeit identifier 2 formed for the same type of texture element is stored in the background when the first feature is acquired for the first time.
- the storage distribution feature of the anti-counterfeit identifier 2 is associated with the inherent feature of the anti-counterfeit identifier 2 stored in the background or the code distribution and the storage distribution feature of the corresponding anti-counterfeit identifier 2 and the anti-counterfeit identifier are encoded by the encoding.
- the intrinsic features establish a connection, at which point the recognizer end includes a display for comparison, the intrinsic feature 4 being shown by an enlarged picture of the tex element of the anti-counterfeit identification obtained in step 2;
- the magnified picture is an enlarged picture of the anti-counterfeit mark 2 showing the intrinsic feature 4 taken in step 2.
- the texel 1 on the anti-counterfeit mark 2 is a densely arranged texture distribution, and the texture density is not less than 100/cm 2 in the texture distribution region; preferably, the texture density is not less than 1000/cm 2 Preferably, the texture density is not less than 10,000 / cm 2 .
- the texel 1 on the security feature 2 is a densely arranged texture distribution in which the area of the average single texel 1 is less than 0.3 mm 2 ; preferably, the average single texel 1 The area is less than 0.1 mm 2 ; preferably, the area of the average single texel 1 is less than 0.05 mm 2 .
- the identification system includes an identifier and a background, and the identifier is connected to the background by wire or wirelessly;
- the storage distribution feature 3 of the anti-counterfeit identifier 2 is pre-stored in the background, and the storage distribution feature 3 refers to a distribution image of the texel 1 randomly distributed on the anti-counterfeit identifier 2 and/or a feature of the distribution image as a distribution feature. And storing the generated storage distribution feature 3 in the background of the identification system;
- the identification system further includes an intrinsic feature 4 of the texel 1 having the anti-counterfeit logo 2, wherein the intrinsic feature 4 refers to The texel feature of each texel 1 of the security mark 2 having the same visual feature when viewed under magnified conditions, and the human eye cannot distinguish without the magnification condition;
- the identifier acquires the to-be-identified distribution feature 3' of the texture element 1' randomly distributed on the anti-counterfeit identification 2' to be attached on the package of the anti-counterfeit object or the anti-counterfeit object, and the intrinsic feature 4' to be identified, the intrinsic to be identified
- the feature 4' refers to a texel feature of the same visual feature that each texel 1' on the anti-counterfeit mark 2' to be observed when viewed under the magnified condition, and the human eye cannot distinguish it under the condition of no magnification;
- the identification system compares the to-be-identified distribution feature 3' and the in-identification feature 4' to be recognized by the identifier with the storage distribution feature 3 stored in the background and the intrinsic feature 4 in the recognition system, respectively, when one of the comparison results When it is different, it is determined that the anti-counterfeit identifier 2' to be identified is false, and the anti-counterfeit object to which the anti-counterfeiting identifier 2' to be identified is false.
- the field of view diameter of the identifier is less than or equal to 1.5 cm.
- the identifier comprises a mobile phone and a magnifying glass which can be arranged on the ingesting path of the mobile phone camera, and when the identifier acquires the intrinsic feature 4' to be recognized, the magnifying glass of the identifier is installed on the ingesting path of the mobile phone camera; or ,
- the identifier includes a mobile phone and an external micro camera connected to the mobile phone in a wired or wireless manner, and the intrinsic feature 4' to be identified is obtained by an external micro camera.
- the magnifying glass comprises an adhesive layer through which the magnifying glass is adhered to the mobile phone.
- the magnifying lens comprises a lens, a support portion and an adhesive layer, the lens is fixed to one side of the support portion, and the adhesive layer is fixed on the other side of the support portion.
- the side of the support portion protrudes from the side of the lens.
- the recognizer obtains a magnified image of the anti-counterfeit mark 2' to be recognized by one shot, wherein when the recognizer includes a mobile phone and a magnifying glass that can be set on the ingest path of the mobile phone camera, the magnifying glass is installed when photographing On the ingesting path of the mobile phone camera, when the identifier includes a mobile phone and an external micro camera connected to the mobile phone in a wired or wireless manner, the external micro camera is used for shooting.
- the identifier obtains the to-be-identified distribution feature 3' and the in-vivo feature 4' to be identified, respectively, by randomly acquiring the texture element 1' randomly distributed on the anti-counterfeit identification 2' to be identified, wherein the identifier includes the mobile phone
- the magnifying glass can be set on the ingesting path of the mobile phone camera, when the distribution feature 3' to be identified is acquired, the magnifying glass is not set on the ingesting path of the mobile phone camera, and the to-be-identified distribution of the anti-counterfeiting identification 2' to be identified is directly obtained through the mobile phone camera.
- the magnifying glass is mounted on the ingesting path of the mobile phone camera, and the enlarged image of the texel 1' on the anti-counterfeit identification 2' to be recognized is obtained through the mobile phone camera and the magnifying glass, when the identifier
- the image of the distribution feature to be identified of the anti-counterfeit identification 2' to be identified is directly obtained by the mobile phone camera, and the inherent feature to be identified is obtained.
- an enlarged image of the texel 1' on the anti-counterfeit logo 2' to be identified is obtained by an external micro camera.
- each of the anti-counterfeit identifiers 2 further includes at least one code 5, the code 5 and the anti-counterfeit mark 2 One-to-one correspondence, or the code 5 corresponds to a plurality of the anti-counterfeiting marks 2;
- each of the anti-counterfeit identifications 2' to be identified also includes at least one code 5';
- the identifier captures at least one partial enlarged image or all enlarged images of the coded 5' and the partial texels 1' of the to-be-identified security feature 2';
- the identifier includes a mobile phone and a magnifying glass that can be set on the ingesting path of the mobile phone camera
- the magnifying glass is installed on the ingesting path of the mobile phone camera when shooting.
- the identifier includes a mobile phone and an external micro camera connected to the mobile phone in a wired or wireless manner
- the external micro camera is used for shooting.
- each of the anti-counterfeit identifiers 2 further includes at least one code 5, the code 5 is in one-to-one correspondence with the anti-counterfeit mark 2, or the code 5 corresponds to a plurality of the anti-counterfeit marks 2;
- each of the anti-counterfeit identifications 2' to be identified also includes at least one code 5';
- the identifier acquires the code 5' of the anti-counterfeit identification 2' to be identified, the distribution feature 3' to be identified, and the inherent feature 4' to be identified in two steps;
- the identifier includes a mobile phone and a magnifying glass that can be set on the ingesting path of the mobile phone camera
- the magnifying glass is not set on the ingesting path of the mobile phone camera, and the anti-counterfeiting identification to be recognized is directly obtained through the mobile phone camera.
- the code 5', or the magnifying glass is installed on the ingestion path of the mobile phone camera, and obtains the code 5' of the anti-counterfeit identification 2' to be recognized through the mobile phone camera and the magnifying glass, when the distribution feature 3' to be identified and the inherent feature 4' to be identified are acquired,
- the magnifying glass is installed on the ingesting path of the mobile phone camera, and obtains a partial enlarged image or a full enlarged image of at least a part of the texel 1' on the anti-counterfeit identification 2' to be recognized through the mobile phone camera and the magnifying glass;
- the identifier includes a mobile phone and an external micro camera connected to the mobile phone by wire or wirelessly
- the mobile phone camera directly obtains the code 5' of the anti-counterfeit identification 2' to be identified, or obtains through an external micro camera.
- the code 5' of the anti-counterfeit identifier 2' to be identified when the distribution feature 3' to be identified and the intrinsic feature 4' to be identified are acquired, the at least partial texture element 1' on the anti-counterfeit identification 2' to be identified is obtained by the external micro camera. Partially magnified or fully magnified.
- the identifier comprises a computer and an external micro camera connected to the computer in a wired or wireless manner, and is photographed by an external micro camera when photographing; or the identifier is an independent identifier, and the independent identifier includes Micro camera.
- the recognizer acquires a magnified image of the anti-counterfeit mark 2' to be identified by one shot.
- each of the anti-counterfeit identifiers 2 further includes at least one code 5, the code 5 is in one-to-one correspondence with the anti-counterfeit mark 2, or the code 5 corresponds to a plurality of the anti-counterfeit marks 2;
- each of the anti-counterfeit identifications 2' to be identified also includes at least one code 5';
- the identifier captures at least one partial enlarged image or all enlarged images of the encoded 5' and partial texels 1' to be recognized at one time; or the identifier acquires the anti-counterfeit identification 2' to be identified twice. Encoding 5', the distribution feature to be identified 3' and the intrinsic feature 4' to be identified,
- the two acquisitions include: obtaining an encoding 5' of the anti-counterfeit identification 2' to be identified by an external micro camera, and passing the external microscope The camera acquires a partial enlarged image or a full enlarged image of at least a part of the texel 1' on the anti-counterfeit mark 2' to be identified;
- the independent identifier includes a micro camera
- the two acquisitions include: acquiring the code 5' of the anti-counterfeit identification 2' to be identified by the micro camera of the independent identifier, and passing The micro-camera of the independent recognizer acquires a partially enlarged image or a full enlarged image of at least a part of the texel 1' on the anti-counterfeit mark 2' to be identified.
- the identifier sends the enlarged image to the background, and the background receives the enlarged image and processes the generated image to generate the to-be-identified distribution feature 3 ′, or the identifier directly acquires the anti-counterfeit identification 2 to be identified through the mobile phone camera.
- the to-be-identified distribution feature image is sent to the background, and the background receives the to-be-identified distribution feature image as the to-be-identified distribution feature 3'.
- the background automatically compares the to-be-identified distribution feature 3' with the storage distribution feature 3 stored in the background one by one or the one or more storage distributions that are to be recognized by the background according to the code 5' Feature 3 performs an automatic comparison one by one, wherein the encoding is previously associated with one or more distribution features of the anti-counterfeit identification 2;
- the identifier sends the enlarged image to the background, and the background receives the enlarged image and processes it to generate the to-be-identified distribution feature 3' and sends it back to the recognizer, and the background is based on the received code 5' Retrieving one or more storage distribution features 3 for returning to the recognizer; the display of the recognizer displaying the received distribution feature 3' to be identified and the storage distribution feature 3 for manual comparison by the recognizer, wherein the encoding Pre-associated with one or more of the distribution features of the anti-counterfeit identification 2.
- the identifier transmits the enlarged image to the background and performs manual or automatic comparison in the background with the inherent feature of the identification of the anti-counterfeit identification 2' to be identified or the identification of the anti-counterfeit identification 2' to be identified in the background of the identification system.
- a type of anti-counterfeit mark 2 formed by the same type of texture element is stored in the background when the inherent feature is first acquired.
- the storage distribution feature of the anti-counterfeit mark 2 and the anti-counterfeit mark stored in the background are
- the intrinsic feature is associated or the code is associated with the storage distribution feature of the corresponding anti-counterfeit tag 2 and the intrinsic feature of the anti-counterfeit tag, the intrinsic feature 4 being shown by an enlarged picture of the acquired anti-counterfeit tagged texture element;
- the enlarged image and the identifier observed at the identifier end are in accordance with the distribution feature of the to-be-identified anti-counterfeit identification 2' or the inherent feature of the anti-counterfeit identification 2' to be recognized at the identifier end.
- Manual comparison a type of anti-counterfeiting mark 2 formed by the same kind of texture element is stored in the background when the inherent feature is first acquired. From the second time, the storage distribution feature of the anti-counterfeit mark 2 and the anti-counterfeiting stored in the background are stored.
- the intrinsic feature of the identifier 2 is associated or the code is associated with the storage distribution feature of the corresponding anti-counterfeit tag 2 and the intrinsic feature of the anti-counterfeit tag.
- the recognizer end includes a display for comparison, the intrinsic feature 4 is shown by an enlarged picture of the texel of the obtained anti-counterfeit logo;
- the magnified picture is an enlarged picture of the security feature 2 showing the intrinsic feature 4 taken.
- a random texture anti-counterfeiting system comprising an anti-counterfeiting object, an anti-counterfeit identifier and a random texture anti-counterfeiting identification system, wherein the anti-counterfeiting identifier is attached to a package of an anti-counterfeit object or an anti-counterfeit object, and the anti-counterfeit identifier is randomly distributed with a texture element 1
- the anti-counterfeit identifier 2 the distribution image of the texel 1 randomly distributed on the anti-counterfeit logo 2 and/or the feature of the distribution image as a distribution feature, and storing the storage distribution feature 3 in the background, the anti-counterfeit logo 2 further including an intrinsic feature 4,
- the intrinsic feature refers to the texel feature of the same visual feature that each texel 1 of the anti-counterfeit mark 2 has when viewed under magnified conditions, and the human eye cannot distinguish it under the condition of no magnification;
- the anti-counterfeiting identification system of the random texture acquires the to-be-identified distribution feature 3' and the to-be-identified distribution feature 3' and the to-be-identified distribution feature 3' to be randomly distributed on the anti-counterfeit identification 2' to be identified.
- the identification inherent feature 4' is compared with the inherent feature 4 of the storage distribution feature 3 in the background. When one of the comparison results is different, it is determined that the anti-counterfeit identification 2' to be identified is false, and the anti-counterfeiting identification 2' is to be identified.
- the attached anti-counterfeit object is false;
- the intrinsic feature to be identified 4' refers to the texel feature of the same visual feature that each tex element 1' on the anti-counterfeit mark 2' to be observed when viewed under the magnified condition
- the human eye cannot distinguish without magnification.
- the random texture anti-counterfeiting identification system is the random texture anti-counterfeiting identification system according to any one of claims 20-34.
- the texel 1 on the anti-counterfeit mark 2 is a densely arranged texture distribution, and the texture density is not less than 100/cm 2 in the texture distribution region; preferably, the texture density is not less than 1000/cm 2 Preferably, the texture density is not less than 10,000 / cm 2 .
- the texel 1 on the security feature 2 is a densely arranged texture distribution in which the area of the average single texel 1 is less than 0.3 mm 2 ; preferably, the average single texel 1 an area smaller than 0.1mm 2; preferably, the average grain area of a single element is less than 0.05mm 2.
- the invention also provides a random texture anti-counterfeiting product, which is used in the random texture anti-counterfeiting system described above, characterized in that: the anti-counterfeiting product comprises an anti-counterfeiting object, an anti-counterfeiting mark and a magnifying glass.
- the anti-counterfeiting identifier is an anti-counterfeiting identifier on which a texel element is randomly distributed.
- the security feature is attached to the anti-counterfeit object or the package of the anti-counterfeit object.
- the magnifying glass can be used to form an identifier with the mobile phone to identify the anti-counterfeiting identifier, and the magnifying glass serves as a detachable component of the identifier, and the magnifying glass is used as an identifier when the magnifying glass is mounted on the ingesting path of the mobile phone camera
- the component when the magnifying glass is not mounted on the ingestion path of the handset camera, the magnifying glass acts as a non-executing component of the identifier.
- the anti-counterfeit identifier has a distribution feature and an intrinsic feature, and the distribution feature is a distribution image of a randomly distributed texture element and/or a feature of the distribution image on the anti-counterfeit identifier; the intrinsic feature refers to a random distribution on the anti-counterfeit identifier.
- the identifier of the magnifying glass as the execution component and/or the non-executing component can acquire the to-be-identified distribution feature of the anti-counterfeit identification to be identified and the intrinsic feature to be identified and compare with the distribution feature and the intrinsic feature respectively to determine the trueness of the anti-counterfeit object. If the result of the comparison is not the same, it is determined that the anti-counterfeiting identifier to be identified is false, and the anti-counterfeiting object attached to the anti-counterfeiting identifier is false, and the intrinsic feature to be identified refers to each of the anti-counterfeiting identifiers to be identified.
- the magnifying glass serves as an executing component.
- the invention provides a random texture anti-counterfeiting method, which comprises a double comparison of distribution features and intrinsic features.
- the applicant first proposed the concept of intrinsic features, that is, each texture element 1 of the anti-counterfeit mark 2 is under the condition of being enlarged.
- the reliability of the anti-counterfeiting mark can be highly effectively ensured, and even in the case where the texel enters the common field or the stencil element is selected from the common field, it can be highly effectively guaranteed to the same extent.
- the reliability of the anti-counterfeiting mark is highly effectively ensured, and even in the case where the texel enters the common field or the stencil element is selected from the common field, it can be highly effectively guaranteed to the same extent.
- the field of view diameter of the identifier is less than or equal to 1.5 cm, under such conditions, the intrinsic features can function more fully, ie each texture element 1' The same visual characteristics are indistinguishable under direct observation by the human eye, and can be clearly distinguished by means of the recognizer and the field of view diameter is less than or equal to 1.5 cm.
- the identifier uses a mobile phone plus a magnifying glass.
- mobile phones have become a popular communication tool. In most places, they are already full of people or people.
- the magnifying glass is cheap and easy to obtain.
- the identifier obtained by the combination of mobile phone and magnifying glass enables the general public to identify the anti-counterfeit logo. True and false, truly low-cost first-line anti-counterfeiting, this is the first time to obtain high-reliability, low-cost first-line anti-counterfeiting. Of course, you can also replace the magnifying glass with an external microscope camera.
- the magnifying glass and the mobile phone are connected by an adhesive layer, and the adhesive layer is used as a connecting component, and the price is low.
- the adhesive layer is used as a connecting component, and the price is low.
- the magnifying lens comprises a lens, a support portion and an adhesive layer, the lens is fixed to one side of the support portion, and the adhesive layer is fixed on the other side of the support portion, wherein On the side of the adhesive layer, the side of the support portion protrudes from the side of the lens to ensure that the support portion is adhered to the mobile phone to prevent the lens from protruding to hinder the adhesion of the magnifying glass.
- the present application also provides a random texture anti-counterfeiting identification system and a random texture anti-counterfeiting system, and obtains the same beneficial technical effects.
- the purpose of the anti-counterfeiting products provided is to solve the problem of high cost of anti-counterfeiting identification by using a magnifying glass in public anti-counterfeiting.
- the magnifying glass is relatively expensive, and only the anti-counterfeiting identification is put together with the product, so that the cost of the anti-counterfeiting product is high and cannot enter the public security field; with the development of science and technology, especially the appearance of the injection magnifying glass, the magnifying glass is made The cost is greatly reduced, which in turn makes the magnifying glass enter the first-line anti-counterfeiting from the second-line anti-counterfeiting, that is, public anti-counterfeiting, making the anti-counterfeiting object, magnifying glass and anti-counterfeiting mark enter the public anti-counterfeiting field as a whole product, which becomes a possibility of promotion.
- Figure 1 is an uncoded random texture anti-counterfeiting identifier
- Figure 2 is an encoded random texture anti-counterfeiting identifier
- 3 is a coded random texture anti-counterfeit mark, and the recognizer captures a partially enlarged image in the texture distribution of the security mark;
- Figure 4 is a mobile phone or computer external micro camera
- Figure 5 is an optical magnifying lens of a combined lens
- Figure 6 is a single convex lens with mounting wings
- Figure 7 is a lenticular lens with mounting wings
- Figure 8 is a single convex lens without mounting wings
- Figure 9 is a schematic diagram of a wired external microscope camera
- Figure 10 is a schematic diagram of a wireless external microscope camera of the mobile phone
- Figure 11 is a schematic view of an optical magnifier with a multi-lens external to the mobile phone camera
- Figure 12 is a schematic view of an optical magnifying glass with a single lens attached to the mobile phone camera.
- Fig. 13 is a schematic view showing an anti-counterfeit mark 2 and an enlarged picture 7 showing the intrinsic feature 4 of the single TEXT element 1 on the package of the anti-counterfeit product (anti-counterfeit object).
- FIG. 14 is a schematic diagram showing, on the texture security mark 2, a texture element showing a single texture element 1 intrinsic feature 4 enlarged picture 7, coded and randomly distributed.
- Fig. 15 is a schematic view showing a texture anti-counterfeit mark 2 and a two-dimensional code including an intrinsic feature magnified picture 7 printed on a package of an anti-counterfeit product (anti-counterfeit object).
- Figure 16 is an enlarged picture 7 of the intrinsic feature 4 of the texel 1 being a stereo feature and a color feature with two different color elements.
- Figure 17 is an enlarged picture 7 of the intrinsic feature 4 of the texel 1 being a shadow feature. .
- Figure 18 is a schematic diagram showing a magnified picture 7 of the intrinsic feature 4 of the texel 1 displayed on the screen of the mobile phone (the display of the recognizer), the intrinsic feature 4 being a stereo feature and a color feature with two different color elements.
- Figure 19 is a diagram showing the intrinsic feature 4 of the texel 1 displayed on the screen of the mobile phone (the display of the recognizer) Intended, the intrinsic feature 4 is a shadow feature.
- Distribution image of anti-counterfeiting mark The distribution image of randomly distributed texels on the anti-counterfeit mark is different for each piece, and the combination can reach 10 20 or more without repeating, enough for all products in the world to be used for 100 years without repeating, so the distribution image of texture It is a kind of code that is not repeated.
- the anti-counterfeiting mark can be encoded without coding.
- the infinite use rule of texture anti-counterfeiting It means that the texture anti-counterfeiting technology will not affect the anti-counterfeiting effect after using a large number of product categories, which is determined by the texture anti-counterfeiting principle. This is because the first random distribution of texture distribution is a low-cost uncontrollable stochastic process; while the traditional anti-counterfeiting anti-counterfeiting principle is based on unique equipment, unique craftsmanship, technical secrets, etc., once it breaks through, it spreads everywhere. Losing the effect, based on this, the traditional anti-counterfeiting technology can only be used effectively to ensure a certain anti-counterfeiting effect.
- Each anti-counterfeit identifier further includes at least one code, the code on the one-to-one corresponding to the anti-counterfeit identifier 2, or the code thereon corresponds to the plurality of anti-counterfeit identifiers 2; the function of the encoding is to address in the background, and quickly call out Pre-stored features; an important benefit of encoding corresponding to multiple anti-counterfeiting labels is that the printing can be batch printed with a common printing mechanism, which is very efficient and low cost.
- the image sensor in the independent identifier and the external micro camera of the present invention preferably uses CMOS or CCD.
- Distribution characteristics refer to the spatial position distribution of the texture formed in the random process, as well as the random orientation of the texture at this spatial position, the random rotation direction in the multi-rotation direction, the random texture color in the multi-color texture, etc., and The recognizer is perceptible.
- Intrinsic features refer to the physical characteristics of a single texture element on the anti-counterfeiting mark, including the three-dimensional structure of the texture element, the color, the subtle color distribution on the texture, etc., and have nothing to do with the random distribution process.
- the low-cost controllable processes in the prior art include Printing methods, various inkjet printing, including UV printing with touch-sensitive thin lines, 3D printing, various lithography processes, etc.; in order to eliminate such low-cost fraudulent processes, especially for these frauds
- the process texture structure design and the design-based magnification recognition method can make such a distinction that the inherent features of the texture are identified by the present invention.
- the identification system includes an anti-counterfeiting object, an anti-counterfeiting identifier, a recognizer, a database, a background, and the like.
- Mobile phone the mobile phone of the present invention generally refers to an existing smart phone without a built-in micro-amplified camera, and the general mobile phone has Both cameras are designed for ordinary landscape portrait photography. Based on the optical lens, the lens cannot be combined with micro-amplification and ordinary photography, and the public demand for micro-camera is not strong. Therefore, the existing mobile phone has not yet seen itself. Micro-camera mobile phones, especially with micro-amplified cameras for texture anti-counterfeiting recognition.
- This embodiment provides a random texture anti-counterfeiting method, including the following steps:
- Step 1 Select the anti-counterfeit mark 2 randomly distributed with the texel 1; as shown in FIG.
- Step 2 acquiring a distribution image of the randomly distributed texel 1 and/or a feature of the distribution image on the anti-counterfeit identifier 2 as a distribution feature, and storing the generated storage distribution feature 3 in the background of the identification system; acquiring the inherentity of the texel 1 Feature 4, the intrinsic feature 4 refers to a texel feature of the same visual feature that each texel 1 of the anti-counterfeit mark 2 has when viewed under magnified conditions, and the human eye cannot distinguish, under the condition of no magnification, the texture Element 1 needs to be at least 5-10 times magnified relative to its size to be discernible; for example, the recognizer shown in Figure 3 captures a partially magnified image in the texture distribution of the security feature 2.
- the obtaining of the intrinsic feature 4 of the texel 1 herein means that the first acquisition of the intrinsic feature of the anti-counterfeit mark formed by the same texel can be performed by taking a magnified photograph and storing it as an intrinsic feature of the anti-counterfeit mark.
- Step 3 Attach the anti-counterfeit mark 2 to the package of the anti-counterfeit object or the anti-counterfeit object; as shown in FIG. 13 or FIG.
- Step 4 When identifying, acquire the to-be-identified distribution feature 3' of the texel 1' randomly distributed on the anti-counterfeit identification 2' to be identified and the intrinsic feature 4' to be identified, and obtain the acquired distribution feature 3' and the inherent feature to be identified 4′ is compared with the storage distribution feature 3 stored in the background of the identification system and the acquired intrinsic feature 4 respectively. When one of the comparison results is different, it is determined that the anti-counterfeit identification 2′ to be identified is false, and then to be identified.
- the anti-counterfeit object attached to the anti-counterfeit mark 2' is false; the intrinsic feature 4' to be identified refers to the same visual feature that each of the texture elements 1' on the anti-counterfeit mark 2' to be recognized when viewed under the magnified condition The characteristics of the texels are not distinguishable by the human eye without magnification.
- a random texture anti-counterfeiting method includes a double alignment of the distribution feature and the intrinsic feature, that is, the intrinsic feature means that each texture element 1 of the anti-counterfeit mark 2 has the same when viewed under the enlarged condition.
- the characteristic of the texel of the visual feature which is indistinguishable by the human eye under no magnification; such a pattern by the printed pattern, the UV-printed concave-convex pattern, the embossing process, and the laser micro-carving pattern, similar integrated circuit light
- the prior art low-cost controllable replica pattern such as the pattern formed by the engraving process, fails because these methods cannot duplicate the inherent features of the anti-counterfeit logo; at the same time, for the external theft, the counterfeiters who manufacture the anti-counterfeit logo texture elements, even insiders Under the condition of non-placement, the same anti-counterfeit mark cannot be obtained at all.
- the anti-counterfeiting method can highly reliably ensure the reliability of the anti-counterfeit mark, even in the case where the texture element enters the common field or selects the texture element from the common field.
- the reliability of the anti-counterfeit mark is ensured to a high degree.
- the step 4 “acquiring the to-be-identified distribution feature 3′ and the to-be-identified intrinsic feature 4′′ of the randomly distributed texture element 1 ′ on the anti-counterfeit identification 2 to be identified is implemented by the identifier;
- the identifier includes a mobile phone and a magnifying glass that can be disposed on an ingest path of the mobile phone camera. As shown in FIG. 12 and FIG. 11, when the identifier acquires the intrinsic feature 4' to be identified, the magnifier of the identifier is installed on the mobile phone. On the path of the camera's ingestion; or,
- the identifier includes a mobile phone and an external micro camera connected to the mobile phone in a wired or wireless manner. As shown in FIG. 9 and FIG. 10, the intrinsic feature 4' to be identified is obtained by an external micro camera.
- the identifier can be a mobile phone plus a magnifying glass, as shown in Figures 12 and 11.
- mobile phones have become a popular communication tool. In most places, they are already full of people or people.
- the magnifying glass is cheap and easy to obtain.
- the identifier obtained by the combination of mobile phone and magnifying glass enables the general public to identify the anti-counterfeit logo. True and false, truly low-cost first-line anti-counterfeiting, this is the first time to obtain high-reliability, low-cost first-line anti-counterfeiting.
- the magnifying glass can also be replaced with an external micro camera, as shown in Figures 9 and 10.
- the comparison of the distribution feature 3' to be identified and the storage distribution feature 3 in the step 4 is automatically performed in the background of the identification system;
- the alignment of the intrinsic feature 4' and the intrinsic feature 4 to be identified in the step 4 is performed automatically or manually in the background of the identification system. Since the comparison between the distribution feature to be identified and the inherent feature to be identified is performed in the background, there is no technical obstacle for the identifier, and the process is “zero burden”, and the identification is very simple and convenient for the identifier.
- This embodiment is a case where no encoding is included.
- the “received distribution feature 3′ and the intrinsic feature to be identified 4′” of the tiling element 1′ randomly distributed on the anti-counterfeit identification 2 to be identified in the step 4 are passed through the identifier once.
- the identifier includes a mobile phone and a magnifying glass that can be disposed on the ingesting path of the mobile phone camera, as shown in FIG. 12 and FIG. 11 , when the shooting is performed, the magnifying glass is installed on the ingesting path of the mobile phone camera; or the identifier includes a mobile phone.
- an external micro camera connected to the mobile phone by wire or wirelessly, as shown in FIG. 9 and FIG. 10, when shooting, by the external micro camera; or the identifier includes a computer and a wired or wireless connection with the computer
- the external micro camera is photographed by an external micro camera during shooting; or the identifier is an independent identifier, and the independent identifier includes a micro camera.
- the independent identifier includes at least one optical amplifying portion, a camera, and a built-in identification-dedicated APP.
- the identifier is connected to the background of the identification system in a wired or wireless manner;
- the step 4 further includes: the identifier sending the enlarged image to the background, the background receiving the enlarged image and processing the generated image to generate the to-be-identified distribution feature 3 ′, and then the background to be identified by the distribution feature 3 'Automatic comparison with the storage distribution feature 3 stored in the background;
- the background of the to-be-identified distribution feature 3' is automatically compared with the background storage storage feature 3, and finally the comparison result is only integrated with the comparison result of the intrinsic feature and the intrinsic feature to be identified, that is, the authenticity is notified to the recognizer, which is for identifying
- the identification process in the recognition is "foolish", and the recognition result can be known without much consideration, which greatly simplifies the identification process of the recognizer.
- the step 4 further comprises: comparing the intrinsic feature 4' to be identified, which is shown in the enlarged image, with the intrinsic feature 4.
- the recognizer end includes a display for comparison, and the intrinsic feature 4 is shown by an enlarged picture of the texel of the anti-counterfeit mark acquired in step 2;
- This embodiment is a case where no encoding is included.
- the difference from the embodiment 1 is that the “acquiring identification feature 3′ and the intrinsic feature to be recognized 4′” of the texel 1′ randomly distributed on the anti-counterfeit identification 2 to be identified in the step 4 are passed through the identifier. Obtained twice;
- the identifier includes a mobile phone and a magnifying glass that can be disposed on the ingesting path of the mobile phone camera. As shown in FIG. 12 and FIG. 11, when the distribution feature 3' to be identified is acquired, the magnifying glass is not disposed on the ingesting path of the mobile phone camera. The mobile phone camera directly obtains the to-be-identified distribution feature image of the anti-counterfeit identification 2' to be identified. When the intrinsic feature 4' to be identified is acquired, the magnifying glass is installed on the ingesting path of the mobile phone camera, and the anti-counterfeiting identification to be recognized is obtained through the mobile phone camera and the magnifying glass.
- a magnified image of the 'texture element 1'; or the identifier includes a mobile phone and an external micro camera connected to the mobile phone in a wired or wireless manner, as shown in Figures 9 and 10, when the distribution feature 3' to be identified is acquired Obtaining the to-be-identified distribution feature image of the anti-counterfeit identification 2' to be recognized directly by the mobile phone camera, and obtaining the enlarged image of the texture element 1' on the anti-counterfeit identification 2' to be recognized by the external micro-camera when acquiring the intrinsic feature 4' to be identified .
- the distribution feature 3' to be identified and the intrinsic feature 4' to be identified are obtained through the identifier twice, so that the recognition mode is more abundant, and the fraud is more difficult for the counterfeiter.
- the mobile phone camera directly acquires the distribution feature image to be identified.
- the field of view is larger than the field of view of installing the magnifying glass or directly through the external microscope camera, and the distribution pattern containing more texels can be obtained to avoid the situation that the number of the distribution patterns of the obtained texels is too low.
- the identifier is connected to the background of the identification system in a wired or wireless manner, and the step 4 further includes:
- the identifier transmits the to-be-identified distribution feature image of the to-be-identified anti-counterfeit identification 2' directly acquired by the mobile phone camera to the background, and the background receives the to-be-identified distribution feature image as the to-be-identified distribution feature 3', and the background will
- the distribution feature 3' to be identified and the storage distribution feature 3 stored in the background are automatically compared one by one;
- step 4 further includes:
- the intrinsic feature 4' to be identified is compared with the intrinsic feature 4.
- Recognizer-side artificial display comparison the in-depth feature that is captured at the recognizer end and the intrinsic feature of the recognizer in the background of the recognition system according to the distribution feature of the anti-counterfeit identification 2' to be identified is at the recognizer end
- Artificial alignment the inherent feature refers to storing the intrinsic features acquired in step 2 in the background of the recognition system, formed for the same texture element.
- a type of anti-counterfeit identifier 2 is stored in the background when the inherent feature is first acquired.
- the storage distribution feature of the anti-counterfeit identifier 2 is associated with the inherent feature of the anti-counterfeit identifier 2 stored in the background, so that only The inherent features of the anti-counterfeit identification 2 need to be stored once, and the amount of data of the background storage system is greatly reduced; as shown in FIG. 18 and FIG. 19, at this time, the identifier end includes a display for comparison, and the intrinsic feature 4 passes. An enlarged picture of the texel of the anti-counterfeit identification obtained in step 2; or
- This embodiment shows a case where encoding is not included and two acquisitions are employed.
- each of the anti-counterfeit identifiers 2 further includes at least one code 5,
- the code 5 corresponds to the anti-counterfeit identifier 2, or the code 5 corresponds to a plurality of the anti-counterfeit identifiers 2;
- each of the anti-counterfeit identifications 2' to be identified further includes at least one code 5'; as shown in FIG. 2, FIG. 13-15,
- one code can be one code, which means that each anti-counterfeit mark corresponds to a unique code; it can also be multi-coded, which means that multiple anti-counterfeit marks use the same same information encoding, and an important advantage of multiple standard codes. In fact, it can be printed in batches with a common printing mechanism, which is very efficient and low-cost.
- the obtaining the to-be-identified distribution feature 3' and the to-be-identified intrinsic feature 4' of the randomly distributed texture element 1' on the anti-counterfeit identification 2 to be identified in the step 4 includes:
- the identifier includes a mobile phone and a magnifying glass that can be disposed on an ingesting path of the mobile phone camera, as shown in FIG. 11 and FIG. 12, when the shooting is performed, the magnifying glass is installed on the ingesting path of the mobile phone camera; or the identifier includes a mobile phone.
- an external micro camera connected to the mobile phone by wire or wirelessly, as shown in FIG. 9 and FIG. 10, when shooting, by the external micro camera; or the identifier includes a computer and a wired or wireless connection with the computer External micro camera, when shooting, through an external microscope camera; or,
- the identifier is an independent identifier, and the independent identifier includes a microscopic camera.
- the independent identifier includes at least one optical amplifying portion, a camera, and a built-in identification-dedicated APP.
- the encoded side length is less than 4 mm and/or the area of the coding area is less than 16 mm 2 ; preferably, the above-mentioned code 5' of the anti-counterfeit identification 2' to be identified is a two-dimensional code. That is, under the condition of magnification recognition, a small-sized two-dimensional code is allowed to be used.
- the identifier is connected to the background of the identification system by wire or wirelessly,
- the step 4 further includes: (the first scheme of the distribution feature comparison)
- the identifier transmits an enlarged image to the background, and the background receives the enlarged image and processes the generated image to generate a distribution feature 3' to be identified.
- the background automatically compares the to-be-identified distribution feature 3' with the storage distribution feature 3 stored in the background one by one or the one or more storage distribution features that are to be recognized by the background according to the encoding. Perform automatic comparison one by one;
- the recognizer sends the enlarged image to the background, the background receives the enlarged image and processes it to generate the to-be-identified distribution feature 3' and sends it back to the recognizer, and the background retrieves one or according to the received code 5' A plurality of storage distribution features 3 are sent back to the recognizer; the display of the recognizer displays the received distribution feature 3' to be identified and the storage distribution feature 3 for manual comparison by the recognizer, wherein the code is pre-existing with one or A plurality of distribution features of the anti-counterfeiting identifier 2 are associated;
- step 4 further includes:
- the intrinsic feature 4' to be identified is compared with the intrinsic feature 4.
- the intrinsic feature 4 is shown by an enlarged picture of the texel identified by the security feature obtained in step 2; or
- Recognizer-side artificial display comparison the enlarged image observed at the recognizer end and the identifier are manually identified in the background of the recognition system according to the inherent feature of the identification of the anti-counterfeit identification 2' to be identified at the recognizer end Alignment, the inherent feature refers to storing the intrinsic feature acquired in step 2 in the background of the identification system, and a type of anti-counterfeit mark 2 formed for the same type of texture element is stored in the background when the first time acquiring its inherent feature, from the first From the second time, the code is associated with the storage distribution feature of each anti-counterfeit mark 2 of the class and the inherent feature of the anti-counterfeit mark, so that only the inherent features of the anti-counterfeit mark 2 are stored once, which greatly reduces the background.
- the amount of data of the storage system as shown in FIGS. 18 and 19, at this time, the recognizer end includes a display for comparison, and the intrinsic feature 4 is shown by an enlarged picture of the texture element of the anti-counterfeit mark acquired
- Retrieving the stored storage distribution feature 3 and/or the intrinsic feature 4 by encoding is equivalent to addressing by encoding, greatly reducing the background comparison time or recalling the stored storage distribution feature 3 and/or the intrinsic feature 4 The time for manual comparison.
- each of the anti-counterfeit identifiers 2 further includes at least one code 5,
- the code 5 corresponds to the anti-counterfeit identifier 2, or the code 5 corresponds to a plurality of the anti-counterfeit identifiers 2;
- each of the anti-counterfeit identifications 2' to be identified further includes at least one code 5'; as shown in FIG. 2, FIG. 13-15,
- one code can be one code, which means that each anti-counterfeit mark corresponds to a unique code; it can also be multi-coded, which means that multiple anti-counterfeit marks use the same same information encoding, and an important advantage of multiple standard codes. In fact, it can be printed in batches with a common printing mechanism, which is very efficient and low-cost.
- the obtaining the to-be-identified distribution feature 3' and the to-be-identified intrinsic feature 4' of the randomly distributed texture element 1' on the anti-counterfeit identification 2 to be identified in the step 4 includes:
- the identifier when the identifier includes a mobile phone and a magnifying glass that can be set on the ingest path of the mobile phone camera, as shown in FIG. 11 and FIG. 12, when the code 5' is acquired, the magnifying glass is not set on the ingesting path of the mobile phone camera, through the mobile phone camera.
- the code 5' of the anti-counterfeit identification 2' to be identified is directly obtained.
- the magnifying glass is installed on the ingest path of the mobile phone camera, and the anti-counterfeit identification to be identified is obtained through the mobile phone camera and the magnifying glass. a partial enlarged image or a full enlarged image of at least part of the texel 1' on 2'; or
- the identifier includes a mobile phone and an external micro camera connected to the mobile phone and wired or wirelessly, as shown in FIGS. 9 and 10, when acquiring the code 5', the mobile phone camera directly obtains the code 5' of the anti-counterfeit identification 2' to be recognized, when obtained.
- the distribution feature 3' and the intrinsic feature 4' to be identified are to be identified, a partial enlarged image or a full enlarged image of at least part of the texel 1' on the to-be-identified security feature 2' is obtained by an external micro camera.
- the code 5' of the anti-counterfeit identification 2' to be identified is directly obtained through the mobile phone camera, and the currently used wisdom is adopted.
- the code 5' of the anti-counterfeit mark 2' to be identified is a two-dimensional code
- the side length of the two-dimensional code is greater than 5 mm.
- the identifier is connected to the background of the identification system by wire or wirelessly,
- the step 4 further includes: (the first technical solution of the distribution feature comparison)
- the identifier sends the enlarged image to the background, the background receives the enlarged image and processes it to generate the to-be-identified distribution feature 3', and the background identifies the distribution feature 3' to be identified and the background according to the code 5' Or multiple storage distribution features 3 are automatically compared one by one;
- the recognizer sends the enlarged image to the background, the background receives the enlarged image and processes it to generate the to-be-identified distribution feature 3' and sends it back to the recognizer, and the background retrieves one or according to the received code 5'
- a plurality of storage distribution features 3 are sent back to the recognizer; the display of the recognizer displays the received distribution feature 3' to be identified and the storage distribution feature 3 for manual comparison by the recognizer
- step 4 further includes:
- the intrinsic feature 4' to be identified is compared with the intrinsic feature 4.
- the background automatic or manual comparison transmits the enlarged image to the background and performs manual or automatic comparison in the background with the intrinsic feature called according to the code of the anti-counterfeit identification 2' to be identified in the background of the identification system, the inherent feature refers to
- the intrinsic feature obtained in step 2 is stored in the background of the identification system, and a type of anti-counterfeiting mark 2 formed for the same type of texture element is stored in the background when the first feature is acquired for the first time, and the code is encoded by the second time from the second time.
- each anti-counterfeit identifier 2 of the class is associated with the inherent feature of the anti-counterfeit identifier, so that only the inherent features of the anti-counterfeit identifier 2 are stored once, and the amount of data of the background storage system is greatly reduced;
- Feature 4 is shown by an enlarged picture of the texel identified by the security feature obtained in step 2; or
- the recognizer manual display compares the enlarged image observed at the recognizer end with the intrinsic feature of the recognizer in the background of the recognition system according to the code of the to-be-identified anti-counterfeit mark 2' at the recognizer end.
- the inherent feature refers to storing the intrinsic feature acquired in step 2 in the background of the identification system, and a type of anti-counterfeit identifier 2 formed for the same type of texture element is stored in the background when the first time acquiring its intrinsic feature, from the second time.
- the identifier end includes a display for comparison.
- the intrinsic feature 4 is shown by an enlarged picture of the texel identified by the security feature obtained in step 2; or
- the recognizer manually enlarges the image and compares the enlarged image observed at the recognizer end with the printed on the anti-counterfeit mark 2 and / or an enlarged picture attached to the package of the security object or the security object to manually compare whether the inherent feature 4' to be identified and the intrinsic feature 4 are identical, the enlarged picture being the inherent feature 4 taken in step 2 A magnified picture of the security logo 2.
- Retrieving the stored storage distribution feature 3 and/or the intrinsic feature 4 by encoding is equivalent to addressing by encoding, greatly reducing the background comparison time or recalling the stored storage distribution feature 3 and/or the intrinsic feature 4 The time for manual comparison.
- each of the anti-counterfeit identifiers 2 further includes at least one code 5,
- the code 5 corresponds to the anti-counterfeit identifier 2, or the code 5 corresponds to a plurality of the anti-counterfeit identifiers 2;
- each of the anti-counterfeit identifications 2' to be identified further includes at least one code 5'; as shown in FIG. 3 and FIG. 13-15,
- one code can be one code, which means that each anti-counterfeit mark corresponds to a unique code; it can also be multi-coded, which means that multiple anti-counterfeit marks use the same same information encoding, and an important benefit of multiple standard codes. In fact, it can be printed in batches with a common printing mechanism, which is very efficient and low-cost.
- the obtaining the to-be-identified distribution feature 3' and the to-be-identified intrinsic feature 4' of the randomly distributed texture element 1' on the anti-counterfeit identification 2 to be identified in the step 4 includes:
- the two acquisitions include: obtaining the code of the anti-counterfeit identification 2' to be identified by the mobile phone camera and the magnifying glass. And obtaining, by the mobile phone camera and the magnifying glass, a partially enlarged image or a full enlarged image of at least a part of the texel 1' on the anti-counterfeit mark 2' to be recognized; or
- the two acquisitions include: acquiring the code 5' of the anti-counterfeit identification 2' to be identified by the external micro camera. And obtaining, by the external micro camera, a partially enlarged image or a full enlarged image of at least part of the texel 1' on the anti-counterfeit identification 2' to be identified;
- the two acquisitions include: obtaining an code 5' of the anti-counterfeit identification 2' to be identified by an external micro camera, and obtaining the image by the external micro camera Identifying a partially enlarged image or a full enlarged image of at least a portion of the texel 1' on the security feature 2';
- the two acquisitions include: acquiring the code 5' of the anti-counterfeit identification 2' to be identified by the microscopic camera of the independent identifier, and passing through the independent identifier
- the micro camera acquires a partially enlarged image or a full enlarged image of at least a part of the texel 1' on the anti-counterfeit mark 2' to be identified.
- the encoded side length is less than 4 mm and/or the area of the coding region is less than 16 mm 2 .
- the code 5' of the anti-counterfeit mark 2' to be identified is a two-dimensional code. That is, under the magnification recognition condition, a small-sized two-dimensional code is allowed to be used.
- the identifier is connected to the background of the identification system by wire or wirelessly,
- the step 4 further includes: (the first technical solution of the distribution feature comparison)
- the identifier sends the enlarged image to the background, the background receives the enlarged image and processes it to generate the to-be-identified distribution feature 3', and the background identifies the distribution feature 3' to be identified and the background according to the code 5' Or multiple storage distribution features 3 are automatically compared one by one;
- the recognizer sends the enlarged image to the background, the background receives the enlarged image and processes it to generate the to-be-identified distribution feature 3' and sends it back to the recognizer, and the background retrieves one or according to the received code 5'
- a plurality of storage distribution features 3 are sent back to the recognizer; the display of the recognizer displays the received distribution feature 3' to be identified and the storage distribution feature 3 for manual comparison by the recognizer;
- step 4 further includes:
- the intrinsic feature 4' to be identified is compared with the intrinsic feature 4.
- the enlarged image observed at the recognizer end and the intrinsic feature of the recognizer in the background of the recognition system according to the code of the anti-counterfeit mark 2' to be recognized are artificially compared at the recognizer end
- the intrinsic feature refers to storing the intrinsic feature acquired in step 2 in the background of the identification system
- a type of anti-counterfeit tag 2 formed for the same type of texture element is stored in the background when the first time acquiring its intrinsic feature, from the second From the second time
- the code is associated with the storage distribution feature of each anti-counterfeit mark 2 of the class and the inherent feature of the anti-counterfeit mark, so that only the inherent features of the anti-counterfeit mark 2 are stored once, which greatly reduces the background storage.
- the recognizer end includes a display for comparison, and the intrinsic feature 4 is shown by an enlarged picture of the texel of the anti-counterfeit mark acquired in step 2; or
- the recognizer manually enlarges the image by comparing the enlarged image observed at the recognizer end with the enlarged image printed on the anti-counterfeit mark 2 and/or attached to the package of the anti-counterfeit object or the anti-counterfeit object, to be compared Whether the intrinsic feature 4' and the intrinsic feature 4 are identical, the magnified picture is an enlargement of the anti-counterfeit mark 2 showing the intrinsic feature 4 taken in step 2 image.
- Retrieving the stored storage distribution feature 3 and/or the intrinsic feature 4 by encoding is equivalent to addressing by encoding, greatly reducing the background comparison time or recalling the stored storage distribution feature 3 and/or the intrinsic feature 4 The time for manual comparison.
- the “acquisition of the eigen-featured feature 4′ to be identified on the anti-counterfeit identification 2 to be identified is specifically:
- the identifier Obtaining, by the identifier, a randomly distributed texel 1 'the intrinsic feature 4' to be identified on the anti-counterfeit identification 2' to be identified, wherein the field of view of the identifier when the intrinsic feature 4 to be identified is acquired is less than or equal to 1.5 cm; Under such conditions, the intrinsic features can function more fully, that is, the same visual features of each texture element 1' cannot be resolved under direct observation by the human eye, and it is clear by the identifier and the field of view diameter is less than or equal to 1.5 cm. Resolve.
- the recognizer employs a mobile phone 9 plus a magnifying glass, as shown in FIGS. 11 and 12.
- Mobile phones are popular communication tools in the modern era. In most places, they are already full of people or multiple hands.
- Magnifiers can include a single lens 12 (as shown in Figure 8) or multiple lenses 11, a single lens 12 or multiple
- the lens 11 is a polymer material, which is inexpensive and easy to obtain.
- a single lens or a plurality of lenses may be a single side (as shown in FIG. 8) or a double-sided convex lens (as shown in FIG.
- an identifier obtained by a combination of a mobile phone and a magnifying lens makes The general public can identify the authenticity of the anti-counterfeiting logo, and truly achieve the low-cost first-line anti-counterfeiting, which is the first time to obtain high-reliability, low-cost first-line anti-counterfeiting.
- the magnifying glass includes an adhesive layer through which the magnifying glass is adhered to the mobile phone.
- the adhesive layer is inexpensive, and ensures effective fixing between the magnifying glass and the mobile phone when used. After use, it is easy to remove and not damage the mobile phone.
- the magnifying lens may further include a mounting wing 121 or a mounting wing 131 on which the adhesive layer is disposed.
- the magnifying glass includes a lens, a support portion and an adhesive layer, the lens is fixed to one side of the support portion, and the adhesive layer is fixed on the other side of the support portion.
- the side surface of the support portion protrudes from the side surface of the lens, and the support portion is adhered to the mobile phone to prevent the lens from protruding to hinder the adhesion of the magnifying glass.
- the texel 1 on the anti-counterfeit mark 2 is a densely arranged texture distribution, and the texture density is not less than 100/cm in order to comprehensively consider the shooting effect and the artificial projection of the single mark. 2 ; preferably, the texture density is not less than 1000 / cm 2 ;
- the texture density is not less than 10000/cm 2 Since the texture distribution pattern is taken by the external magnification of the mobile phone, the single texture distribution pattern can be small, so that the number of textures per unit area can be more, so the single target artificial placement The imitation is even higher.
- the texel 1 on the anti-counterfeit mark 2 is a densely arranged texture distribution, and an area of the average single texel 1 in the texture distribution area may be set according to different selected cameras and/or magnifiers.
- the area of the average single texel 1 is less than 0.3 mm 2 ; preferably, the area of the average single texel 1 is less than 0.1 mm 2 ;
- the average single texel element 1 has an area of less than 0.05 mm 2 . Due to the use of magnifying recognition, a single texel can be made very small, as long as the recognizer can distinguish the intrinsic features of its texture. Due to such measures, the identification texture of the existing mobile phone can be as small as 100um, and the special recognition The device can be smaller, reaching orders of magnitude on the order of a few microns.
- the embodiment provides a random texture anti-counterfeiting identification system, the identification system includes an identifier and a background, and the identifier is connected to the background by wire or wirelessly;
- the storage distribution feature 3 of the anti-counterfeit identifier 2 is pre-stored in the background, and the storage distribution feature 3 refers to a distribution image of the texel 1 randomly distributed on the anti-counterfeit identifier 2 and/or a feature of the distribution image as a distribution feature. And storing the generated storage distribution feature 3 in the background of the identification system;
- the identification system further includes an intrinsic feature 4 of the texel 1 of the anti-counterfeit logo 2, which refers to the same visual feature that each texel 1 of the anti-counterfeit logo 2 has when viewed under magnified conditions. Texture element characteristics, which cannot be distinguished by the human eye without magnification;
- the identifier acquires the to-be-identified distribution feature 3' of the texture element 1' randomly distributed on the anti-counterfeit identification 2' to be attached on the package of the anti-counterfeit object or the anti-counterfeit object, and the intrinsic feature 4' to be identified, the intrinsic to be identified
- the feature 4' refers to a texel feature of the same visual feature that each texel 1' on the anti-counterfeit mark 2' to be observed when viewed under the magnified condition, and the human eye cannot distinguish it under the condition of no magnification;
- the identification system compares the to-be-identified distribution feature 3' and the in-identification feature 4' to be recognized by the identifier with the storage distribution feature 3 stored in the background and the intrinsic feature 4 in the recognition system, respectively, when one of the comparison results When it is different, it is determined that the anti-counterfeit identifier 2' to be identified is false, and the anti-counterfeit object to which the anti-counterfeiting identifier 2' to be identified is false.
- a random texture anti-counterfeiting identification system includes a double alignment of distribution features and intrinsic features, that is, an intrinsic feature refers to each texture element 1 of the anti-counterfeit mark 2 that is observed when being enlarged.
- the texel features of the same visual features which are indistinguishable by the human eye without magnification; such artifacts are formed by printed patterns, UV printed embossed patterns, embossed patterns, and laser micro-engraved patterns, similar integrated circuits
- the low-cost controllable copy pattern of the prior art such as the pattern formed by the photolithography process is invalid, because these means cannot duplicate the inherent features of the anti-counterfeit mark; at the same time, the counterfeiters who manufacture the anti-counterfeit identification of the texture elements for external theft, even internal personnel It is said that the same anti-counterfeiting mark can not be obtained under non-placement conditions, which effectively overcomes the complexity of the texture element itself by relying on the leading technical advantage of the counterfeiter to pass the secret texture in the effective time.
- the elements are anti-counterfeiting.
- the anti-counterfeiting identification system can highly reliably ensure the reliability of the anti-counterfeit mark, and can ensure the anti-counterfeit mark to be highly effective to the same extent even when the texture element enters the common field or selects the texture element from the common field. Reliability.
- the identifier comprises a mobile phone and a magnifying glass which can be arranged on the ingesting path of the mobile phone camera, as shown in FIG.
- the magnifier of the recognizer is installed on the ingest path of the mobile phone camera;
- the identifier comprises a mobile phone and an external micro camera connected to the mobile phone in a wired or wireless manner, as shown in Figures 9 and 10, by means of an external micro camera to obtain the intrinsic feature 4' to be identified.
- the identifier can be used with a mobile phone and a magnifying glass.
- mobile phones have become a popular communication tool. In most places, they are already full of people or people.
- the magnifying glass is cheap and easy to obtain.
- the identifier obtained by the combination of mobile phone and magnifying glass enables the general public to identify the anti-counterfeit logo. True and false, truly low-cost first-line anti-counterfeiting, this is the first time to obtain high-reliability, low-cost first-line anti-counterfeiting. Of course, you can also replace the magnifying glass with an external microscope camera.
- Embodiment 7 The difference from Embodiment 7 is that the recognizer acquires a partial enlarged image or a full enlarged image of at least a part of the texel 1' of the to-be-identified security feature 2' by one shot.
- the identifier includes a mobile phone and a magnifying glass that can be disposed on the ingesting path of the mobile phone camera, as shown in FIG. 12 and FIG. 11, when shooting, the magnifying glass is installed on the ingesting path of the mobile phone camera.
- the identifier includes a mobile phone and an external microscope camera that is wired or wirelessly connected to the mobile phone, as shown in FIGS. 9 and 10, when photographing, the external micro camera is used for photographing.
- the mobile phone sends the enlarged image to the background, and the background receives the enlarged image and processes it to generate a distribution feature to be identified 3';
- the background automatically compares the to-be-identified distribution feature 3' with the stored storage distribution feature 3 in the background.
- the background of the to-be-identified distribution feature 3' and the background storage storage distribution feature 3 are automatically compared, and finally only the authenticity of the intrinsic feature is combined with the authenticity to inform the recognizer, which is the identification process in the identification of the identifier. "Stupid", you can not know too much to know the recognition results, greatly simplifying the identification process of the recognizer.
- the recognizer transmits the enlarged image to the background and performs manual or automatic comparison in the background with the intrinsic feature called according to the distribution feature of the to-be-identified anti-counterfeit identification 2' in the background of the recognition system, for the same
- a type of anti-counterfeiting mark 2 formed by a kind of texture element is stored in the background when the inherent feature is first acquired, and from the second time, the anti-counterfeit mark is
- the storage distribution feature of the type 2 is associated with the inherent features of the anti-counterfeit identifier 2 stored in the background, so that only the inherent features of the anti-counterfeit identifier 2 are stored once, and the amount of data of the background storage system is greatly reduced;
- the enlarged picture of the texel in the obtained anti-counterfeit mark is shown; this is "foolish" for the identification process in the recognition, and the recognition result can be obtained without considering too much, greatly simplifying the recognition process of the recognizer . or
- Recognizer-side artificial display comparison the intrinsic features of the identifier in the background of the recognition system according to the distribution feature of the anti-counterfeit identification 2' to be identified are manually compared at the recognizer end, as shown in FIG. 18 and FIG. As shown, the intrinsic features are displayed on the display of the recognizer, and a type of anti-counterfeit mark 2 formed for the same type of texture element is stored in the background when the inherent feature is first acquired, and the storage of the anti-counterfeit mark 2 is generated from the second time.
- the distribution feature is associated with the inherent features of the anti-counterfeit identifier 2 stored in the background, so that only the inherent features of the anti-counterfeit identifier 2 are stored once, and the amount of data of the background storage system is greatly reduced; at this time, the identifier includes the display.
- the intrinsic feature 4 is shown by an enlarged picture of the acquired texel of the anti-counterfeit identification; the comparison is performed on the display of the identification system, allowing the identities to participate in the identification process to interact, which is more interesting Sex. or
- the difference from the seventh embodiment is that the identifier obtains the to-be-identified distribution feature 3' and the in-identification feature 4' to be identified, respectively, by randomly acquiring the texture element 1' randomly distributed on the anti-counterfeit identifier 2' to be identified.
- the identifier when the identifier includes a mobile phone and a magnifying glass that can be disposed on the ingesting path of the mobile phone camera, as shown in FIG. 12 and FIG. 11, when the distribution feature 3 to be identified is acquired, the magnifying glass is not set in the ingesting path of the mobile phone camera.
- the image of the distribution feature to be identified of the anti-counterfeit identification 2' to be identified is directly obtained by the mobile phone camera.
- the magnifying glass is installed on the ingest path of the mobile phone camera, and the anti-counterfeit identification to be identified is obtained through the mobile phone camera and the magnifying glass. a magnified image of the 1' on the texture element,
- the identifier includes a mobile phone and an external micro camera connected to the mobile phone and connected to the mobile phone, as shown in FIG. 9 and FIG. 10, when the distribution feature 3' to be identified is acquired, the anti-counterfeit identification to be recognized is directly obtained by the mobile phone camera.
- the image of the distribution feature to be identified when the intrinsic feature 4 to be identified is acquired, obtains an enlarged image of the texture element 1' on the anti-counterfeit mark 2' to be recognized by the external micro camera.
- the distribution feature 3' to be identified and the intrinsic feature 4' to be identified are acquired twice by the recognizer, so that the recognition mode is more abundant, and the fraud is more difficult for the counterfeiter.
- the identifier transmits the to-be-identified distribution feature image of the anti-counterfeit identification 2' to be recognized by the mobile phone camera to the background, and the background receives the to-be-identified distribution feature image as the to-be-identified distribution feature 3'.
- the background automatically compares the to-be-identified distribution feature 3' with the stored storage distribution feature 3 in the background
- the recognizer transmits the enlarged image to the background and performs manual or automatic comparison in the background with the intrinsic feature called according to the distribution feature of the to-be-identified anti-counterfeit identification 2' in the background of the recognition system, for the same
- a kind of anti-counterfeit mark 2 formed by a kind of texture element is stored in the background when the inherent feature is first acquired, and from the second time, the storage distribution feature of the anti-counterfeit mark 2 and the inherent feature of the anti-counterfeit mark 2 stored in the background are established.
- the intrinsic feature 4 is shown by an enlarged picture of the texel in the acquired anti-counterfeit identification
- Recognizer-side artificial display comparison the in-depth feature that is captured at the recognizer end and the intrinsic feature of the recognizer in the background of the recognition system according to the distribution feature of the anti-counterfeit identification 2' to be identified is at the recognizer end Manual comparison, the intrinsic feature is displayed on the display of the identifier, and a type of anti-counterfeit mark 2 formed by the same type of texture element is stored in the background when the first feature is acquired for the first time, and from the second time, the anti-counterfeit mark 2 of the class is
- the storage distribution feature is associated with the inherent features of the anti-counterfeit identifier 2 stored in the background, so that only the inherent features of the anti-counterfeit identifier 2 are stored once, and the amount of data of the background storage system is greatly reduced; as shown in FIG. 18 and FIG.
- the recognizer end includes a display for comparison, and the intrinsic feature 4 is shown by an enlarged picture of the texel of the anti-counterfeit mark acquired in step 2;
- each of the anti-counterfeit identifiers 2 further includes at least one code 5,
- the code 5 corresponds to the anti-counterfeit identifier 2, or the code 5 corresponds to a plurality of the anti-counterfeit identifiers 2;
- each of the anti-counterfeit identifications 2' to be identified further includes at least one code 5'; as shown in FIG. 2, FIG. 13-15,
- one code can be one code, which means that each anti-counterfeit mark corresponds to a unique code; it can also be multi-coded, which means that multiple anti-counterfeit marks use the same same information encoding, and an important benefit of multiple standard codes. In fact, it can be printed in batches with a common printing mechanism, which is very efficient and low-cost.
- the identifier captures at least one partial enlarged image or all enlarged images of the coded 5' and the partial texels 1' of the to-be-identified security feature 2';
- the identifier includes a mobile phone and a magnifying glass that can be set on the ingest path of the mobile phone camera, as shown in FIG. 11 and As shown in Figure 12, when shooting, the magnifying glass is mounted on the ingest path of the camera of the mobile phone.
- the identifier includes a mobile phone and an external microscope camera that is wired or wirelessly connected to the mobile phone, as shown in FIGS. 9 and 10, when photographing, the external micro camera is used for photographing.
- the first solution the mobile phone sends the enlarged image to the background, and the background receives the enlarged image and processes it to generate the to-be-identified distribution feature 3',
- the background automatically compares the to-be-identified distribution feature 3' with one or more storage distribution features 3 retrieved by the background according to the code 5'.
- the mobile phone sends the enlarged image to the background, the background receives the enlarged image and processes it to generate the to-be-identified distribution feature 3' and sends it back to the mobile phone, and the background retrieves one or more according to the received code 5'
- the storage distribution feature 3 is sent back to the mobile phone; the display of the mobile phone displays the received distribution feature 3' to be identified and the storage distribution feature 3 for manual comparison by the mobile terminal.
- the mobile phone transmits the enlarged image to the background and performs manual or automatic comparison in the background with the intrinsic feature of the identification system in the background of the recognition system to identify the anti-counterfeit identification 2', for the same texture
- a type of anti-counterfeiting mark 2 formed by elements is stored in the background when the intrinsic feature is first acquired. From the second time, the encoding and the storage distribution features of each anti-counterfeit mark 2 of the class and the inherent features of the anti-counterfeit mark are established by coding.
- Recognizer manual display comparison the enlarged image observed at the recognizer end and the intrinsic feature of the recognizer in the background of the recognition system according to the code of the anti-counterfeit mark 2' to be recognized are artificially compared at the recognizer end Yes, a type of anti-counterfeiting mark 2 formed for the same type of texel is stored in the background when the first feature is acquired for the first time. From the second time, the storage distribution feature of each anti-counterfeit mark 2 of the class and the class are encoded by the second time. The inherent features of the anti-counterfeiting logo are linked, so that only the inherent features of the anti-counterfeit identification 2 are stored once, and the amount of data of the background storage system is greatly reduced; as shown in FIGS.
- the intrinsic features are displayed on the display of the identifier.
- the recognizer end includes a display for comparison, and the intrinsic feature 4 is shown by an enlarged picture of the acquired texel of the anti-counterfeit logo; or
- Retrieving the stored storage distribution feature 3 and/or the intrinsic feature 4 by encoding is equivalent to addressing by encoding, greatly reducing the background comparison time or recalling the stored storage distribution feature 3 and/or the intrinsic feature 4 The time for manual comparison.
- small coding is employed in this embodiment, including a small two-dimensional code, wherein the side length of the small code is less than 4 mm and/or the area of the coded area is less than 16 mm 2 .
- each of the anti-counterfeit identifiers 2 further includes at least one code 5,
- the code 5 corresponds to the anti-counterfeit identifier 2, or the code 5 corresponds to a plurality of the anti-counterfeit identifiers 2;
- each of the anti-counterfeit identifications 2' to be identified further includes at least one code 5'; as shown in FIG. 2 and FIG. 13-15.
- one code can be one code, which means that each anti-counterfeit mark corresponds to a unique code; it can also be multi-coded, which means that multiple anti-counterfeit marks use the same same information encoding, and an important benefit of multiple standard codes. In fact, it can be printed in batches with a common printing mechanism, which is very efficient and low-cost.
- the identifier acquires the code 5' of the anti-counterfeit identification 2' to be identified, the distribution feature 3' to be identified, and the inherent feature 4' to be identified in two steps;
- the identifier includes a mobile phone and a magnifying glass that can be set on the ingest path of the mobile phone camera, as shown in FIG. 11 and FIG. 12, when the code 5' is acquired, the magnifying glass is not set on the ingesting path of the mobile phone camera through the mobile phone.
- the camera directly obtains the code 5' of the anti-counterfeit identification 2' to be identified, or the magnifying glass is installed on the ingest path of the mobile phone camera, and obtains the code 5' of the anti-counterfeit identification 2' to be identified through the mobile phone camera and the magnifying glass, and obtains the distribution feature 3' to be identified.
- the magnifying glass is mounted on the ingesting path of the mobile phone camera, and the partial enlarged image or the entire enlarged image of at least part of the texel 1' on the anti-counterfeit identification 2' to be recognized is obtained by the mobile phone camera and the magnifying glass;
- the identifier includes a mobile phone and an external micro camera connected to the mobile phone and wired or wirelessly, as shown in FIGS. 9 and 10, when the code 5' is acquired, the mobile phone camera directly obtains the code 5' of the anti-counterfeit identification 2' to be identified. Or obtaining the code 5' of the anti-counterfeit mark 2' to be recognized by the external micro camera.
- the anti-counterfeit mark 2' to be identified is obtained by the external micro camera. At least a partial enlarged image or a full enlarged image of a portion of the texel 1' is included.
- the mobile phone sends the enlarged image to the background, and the background receives the enlarged image and processes it to generate the to-be-identified distribution feature 3', and the background identifies the distribution feature 3' to be identified and one or more of the background according to the code 5'
- the storage distribution feature 3 performs automatic comparison one by one;
- the mobile phone sends the enlarged image to the background, and the background receives the enlarged image and processes it to generate the to-be-identified distribution feature 3' and sends it back to the mobile phone, and the background picks up one or according to the received code 5'
- a plurality of storage distribution features 3 are sent back to the handset; the display of the handset displays the received distribution feature 3' to be identified and the storage distribution feature 3 for manual comparison by the recognizer.
- the mobile phone transmits the enlarged image to the background and performs manual or automatic comparison in the background with the intrinsic feature of the identification system in the background of the recognition system to identify the anti-counterfeit identification 2', for the same texture
- a type of anti-counterfeiting mark 2 formed by elements is stored in the background when the intrinsic feature is first acquired. From the second time, the encoding and the storage distribution features of each anti-counterfeit mark 2 of the class and the inherent features of the anti-counterfeit mark are established by coding.
- Recognizer manual display comparison artificially comparing the enlarged image observed on the mobile phone end with the intrinsic feature of the identifier in the background of the identification system according to the code of the anti-counterfeit identification 2' to be identified at the recognizer end
- a type of anti-counterfeit mark 2 formed by the same type of texture element is stored in the background when the inherent feature is first acquired, and from the second time, the code distribution and the storage distribution feature of each anti-counterfeit mark 2 of the class are encoded and the type of anti-counterfeiting
- the inherent features of the logo are linked so that only the inherent features of the anti-counterfeit logo 2 are stored once, which greatly reduces the amount of data in the background storage system; as shown in Figures 18 and 19, the intrinsic features are displayed on the display of the recognizer.
- the recognizer end includes a display for comparison, and the intrinsic feature 4 is shown by an enlarged picture of the acquired texel of the anti-counterfeit logo; or
- Retrieving the stored storage distribution feature 3 and/or the intrinsic feature 4 by encoding is equivalent to addressing by encoding, greatly reducing the background comparison time or recalling the stored storage distribution feature 3 and/or the intrinsic feature 4 The time for manual comparison.
- the identifier comprises a computer and an external micro camera connected to the computer in a wired or wireless manner, and is photographed by an external micro camera when shooting; or
- the identifier includes an independent identifier that includes a microscopic camera.
- the recognizer acquires a magnified image of the anti-counterfeit mark 2' to be recognized by one shot.
- each of the anti-counterfeiting identifiers 2 further includes at least one code 5,
- the code 5 corresponds to the anti-counterfeit identifier 2, or the code 5 corresponds to a plurality of the anti-counterfeit identifiers 2;
- each of the anti-counterfeit identifications 2' to be identified further includes at least one code 5'; as shown in FIG. 3 and FIG. 13-15,
- one code can be one code, which means that each anti-counterfeit mark corresponds to a unique code; it can also be multi-coded, which means that multiple anti-counterfeit marks use the same same information encoding, and an important benefit of multiple standard codes. In fact, it can be printed in batches with a common printing mechanism, which is very efficient and low-cost.
- the identifier captures at least one partial enlarged image or all enlarged images of the coded 5' and the partial texels 1' of the to-be-identified security feature 2'; or
- the identifier acquires the code 5' of the anti-counterfeit mark 2' to be identified, the distribution feature 3' to be identified, and the inherent feature 4' to be identified, in two steps.
- the two acquisitions include: obtaining an encoding 5' of the anti-counterfeit identification 2' to be identified by an external micro camera, and passing the external microscope The camera acquires a partial enlarged image or a full enlarged image of at least a part of the texel 1' on the anti-counterfeit mark 2' to be identified;
- the independent identifier includes a micro camera
- the two acquisitions include: acquiring a code 5' of the anti-counterfeit identification 2' to be identified by a micro camera of the independent identifier, and passing The micro-camera of the independent recognizer acquires a partially enlarged image or a full enlarged image of at least a part of the texel 1' on the anti-counterfeit mark 2' to be identified.
- the first solution the identifier sends the enlarged image to the background, and the background receives the enlarged image and processes it to generate a distribution feature to be identified 3', and the background will recognize the distribution feature 3' and the background
- the automatic comparison is performed one by one according to one or more storage distribution features 3 retrieved from the code 5'.
- the recognizer sends the enlarged image to the background, the background receives the enlarged image and processes it to generate the to-be-identified distribution feature 3' and sends it back to the recognizer, and the background retrieves one or according to the received code 5'
- a plurality of storage distribution features 3 are sent back to the recognizer; the display of the recognizer displays the received distribution feature 3' to be identified and the storage distribution feature 3 for manual comparison by the recognizer.
- the identifier transmits the enlarged image to the background and is intrinsic to the recognition system according to the distribution feature of the anti-counterfeit identification 2' to be identified or the code of the anti-counterfeit identification 2' to be identified.
- a type of anti-counterfeiting mark 2 formed by the same kind of texel is stored in the background when the first time acquiring its intrinsic feature, and from the second time, encoding and encoding each anti-counterfeit mark of the class 2
- the storage distribution feature is associated with the inherent features of the anti-counterfeit identification, so that only the inherent features of the anti-counterfeit identification 2 are stored once, and the amount of data of the background storage system is greatly reduced; the inherent feature 4 obtains the anti-counterfeit identification.
- a magnified picture of the texture element is shown; or
- Recognizer manual display comparison the enlarged image and the recognizer observed at the recognizer end are in the background of the recognition system according to the distribution feature of the anti-counterfeit identification 2' to be identified or the code of the anti-counterfeit identification 2' to be identified.
- Intrinsic characteristics of the call Manually comparing the anti-counterfeit identification 2 formed by the same type of texel is stored in the background when the first feature is acquired for the first time. From the second time, the code is encoded with the storage of each anti-counterfeit identifier 2 of the class.
- the distribution feature is associated with the inherent features of the anti-counterfeit identification, so that only the inherent features of the anti-counterfeit identification 2 are stored once, and the amount of data in the background storage system is greatly reduced; as shown in FIG. 18 and FIG.
- the recognizer end includes a display for comparison, the intrinsic feature 4 being shown by an enlarged picture of the acquired texel of the security feature; or
- Retrieving the stored storage distribution feature 3 and/or the intrinsic feature 4 by encoding is equivalent to addressing by encoding, greatly reducing the background comparison time or recalling the stored storage distribution feature 3 and/or the intrinsic feature 4 The time for manual comparison.
- small coding is employed in this embodiment, including a small two-dimensional code, wherein the side length of the small code is less than 4 mm and/or the area of the coded area is less than 16 mm 2 .
- Embodiment 7 As a preferred embodiment of Embodiment 7 to Embodiment 12,
- the field of view diameter of the recognizer is less than or equal to 1.5 cm.
- the intrinsic features can function more fully, that is, the same visual features of each texture element 1' cannot be resolved under direct observation by the human eye, by means of the identifier and the field of view diameter is less than or equal to 1.5 cm. Clearly distinguish.
- the recognizer employs a mobile phone 9 plus a magnifying glass, as shown in FIGS. 11 and 12.
- the magnifier can include a single lens 12 (such as Figure 6 or Figure 8) or multiple lenses 11 ( Figure 5).
- the single lens 12 or the plurality of lenses 11 are polymer materials, which are inexpensive and easy to obtain.
- the single lens or the plurality of lenses may be a single convex lens 122 (as shown in FIG. 8) or a lenticular lens 132 (FIG.
- the identifier obtained by the combination of mobile phone and magnifying glass enables the general public to distinguish the authenticity of the anti-counterfeiting mark, and truly achieve the low-cost first-line anti-counterfeiting, which is the first time to obtain high-reliability, low-cost first-line anti-counterfeiting. Of course, you can also replace the magnifying glass with an external microscope camera.
- the magnifying glass includes an adhesive layer through which the magnifying glass is adhered to the mobile phone.
- the adhesive layer is inexpensive, and ensures effective fixing between the magnifying glass and the mobile phone when used. After use, it is easy to remove and not damage the mobile phone.
- the magnifying lens may further include a mounting wing 121 or a mounting wing 131 on which the adhesive layer is disposed.
- the magnifying glass includes a lens, a support portion and an adhesive layer, the lens is fixed to one side of the support portion, and the adhesive layer is fixed on the other side of the support portion.
- the side of the support portion protrudes For the side of the lens, it is ensured that the support portion is adhered to the mobile phone to prevent the lens from protruding to hinder the adhesion of the magnifying glass.
- a random texture anti-counterfeiting system comprising: an anti-counterfeiting object, an anti-counterfeiting identifier (such as FIG. 13) and a random texture anti-counterfeiting identification system, wherein the anti-counterfeiting identifier is attached to a package of an anti-counterfeiting object or an anti-counterfeiting object, and the anti-counterfeiting
- the anti-counterfeit identifier 2 is randomly distributed with the texel 1 , the distribution image of the texel 1 randomly distributed on the anti-counterfeit logo 2 and/or the feature of the distribution image is used as a distribution feature, and the storage distribution feature 3 is generated in the background, and the anti-counterfeit identifier is generated.
- 2 further includes an intrinsic feature 4, which refers to a texel feature of the same visual feature that each texel 1 of the anti-counterfeit tag 2 has when viewed under magnified conditions, and the human eye cannot Disting
- the anti-counterfeiting identification system of the random texture acquires the to-be-identified distribution feature 3' and the to-be-identified distribution feature 3' and the to-be-identified distribution feature 3' to be randomly distributed on the anti-counterfeit identification 2' to be identified.
- the identification inherent feature 4' is compared with the inherent feature 4 of the storage distribution feature 3 in the background. When one of the comparison results is different, it is determined that the anti-counterfeit identification 2' to be identified is false, and the anti-counterfeiting identification 2' is to be identified.
- the attached anti-counterfeit object is false;
- the intrinsic feature to be identified 4' refers to the texel feature of the same visual feature that each tex element 1' on the anti-counterfeit mark 2' to be observed when viewed under the magnified condition
- the human eye cannot distinguish without magnification.
- a random texture anti-counterfeiting system includes a double alignment of distribution features and intrinsic features.
- the so-called intrinsic feature means that each texture element 1 of the anti-counterfeit mark 2 has the same when viewed under the magnified condition.
- the characteristic of the texel of the visual feature which is indistinguishable by the human eye under no magnification; such a pattern by the printed pattern, the UV-printed concave-convex pattern, the embossing process, and the laser micro-carving pattern, similar integrated circuit light
- the prior art low-cost controllable replica pattern such as the pattern formed by the engraving process, fails because these methods cannot duplicate the inherent features of the anti-counterfeit logo; at the same time, for the external theft, the counterfeiters who manufacture the anti-counterfeit logo texture elements, even insiders Under the condition of non-placement, the same anti-counterfeit mark cannot be obtained at all.
- the anti-counterfeiting system can highly reliably ensure the reliability of the anti-counterfeiting mark, and even in the case where the texel enters the common field or selects the texel from the common field, the anti-counterfeit mark can be highly effectively ensured to the same extent. reliability.
- the anti-counterfeiting identification system of the random texture is the random texture anti-counterfeiting identification system in Embodiment 7-12.
- the identification system (or the anti-counterfeiting identification system in Embodiments 7-12) further includes an enlarged identification description to be known to the identifier; the enlarged identification indication is printed on the anti-counterfeit identification 2 (eg Figure 14); and/or magnified identification instructions attached to the package of the anti-counterfeit product and product ( Figure 13 or Figure 15); and/or displayed on the display of the identifier, and/or displayed on the background display And/or the anti-counterfeit mark 2 and/or the package of the anti-counterfeit product and/or product contains a code 5, the magnified identification description may be included in the code 5; and/or the magnified identification note contains a texel Intrinsic feature 4 magnified image.
- the enlarged identification indication is printed on the anti-counterfeit identification 2 (eg Figure 14); and/or magnified identification instructions attached to the package of the anti-counterfeit product and product ( Figure 13 or Figure 15); and/or displayed on the display of the identifier, and/
- the code 5 may be a two-dimensional code.
- the texel 1 on the anti-counterfeit logo 2 is a densely arranged texture distribution
- the texel 1 on the anti-counterfeit logo 2 is a densely arranged texture distribution, in which the photographing effect is comprehensively considered and a monolithic artificially placed imitation, in which the texture density is not less than 100 / cm 2 ; preferably, the texture density is not less than 1000 / cm 2 ; preferably, the texture density is not less than 10000 / cm 2 . Since the texture distribution pattern is taken by the external magnification of the mobile phone, the single texture distribution pattern can be small, and the number of textures per unit area can be more, so the imitation of the single standard artificial placement is higher.
- the texture element 1 on the anti-counterfeit mark 2 is a densely arranged texture distribution, and the area of the average single texture element 1 in the texture distribution area can be set according to different selected cameras and/or magnifying glasses, etc.
- the area of the root texture element 1 is less than 0.3 mm 2 ; preferably, the area of the average single texture element 1 is less than 0.1 mm 2 ; preferably, the area of the average single texture element 1 is less than 0.05 mm 2 . Due to the use of magnifying recognition, a single texel can be made very small, as long as the recognizer can distinguish the overall contour of its texture. Due to such measures, the identification texture of the existing mobile phone can be as small as 100um, special recognition The device can be smaller, reaching orders of magnitude on the order of a few microns.
- the intrinsic feature 4 is a three-dimensional structure in which the texel 1 is enlarged; and/or an enlarged multi-color feature of the single multi-color texel 1,
- the single multicolor texel 1 has at least two different color units, and the different color units can be distinguished for magnifying recognition; and/or is a magnified shadow feature of the texel 1 having a certain thickness, when magnified Shadows can be produced when illuminated with oblique light, and the enlarged shadows can be observed by the human eye or can be tested by the recognizer.
- the recognizer contains an illumination source 8, which illuminates the texel 1 obliquely to observe the shadow effect of the texel 1.
- the identifier is provided with two light sources and is in different orientations, and the two light sources are alternately illuminating the texture to observe the effect of alternating texture shadows.
- an enlarged picture of the intrinsic feature is placed in the two-dimensional code and displayed on the display when the two-dimensional code is scanned, as shown in FIG.
- the intrinsic feature 4 is a three-dimensional structure in which the texel 1 is enlarged; and/or is a single multi-color texel 1, the single multi-color texel 1 having at least two different color units, and The different color units can be distinguished when the magnification condition is recognized; and/or the texture element 1 having a certain thickness can generate a shadow when enlarged and observed with oblique light, and the enlarged shadow can be observed by the human eye or It can be tested by the recognizer.
- the identification system comprises a package of products on which a magnified picture 7 of the intrinsic features 4 of the texel 1 is printed. As shown in Figure 13.
- the identification system includes a label paper printed with an enlarged picture 7 of the intrinsic feature 4 of the texel 1 placed directly into the label Inside the box of the anti-counterfeit product. As shown in Figure 14.
- the sticker paper printed with the magnified picture 7 of the intrinsic feature 4 of the texel 1 is directly attached to the anti-counterfeit product.
- Figure 15 is a diagram of attaching the texture anti-counterfeit mark 2 to the package of the anti-counterfeit product, and the package is also printed with a two-dimensional code, and the enlarged picture of the intrinsic feature is placed in the two-dimensional code and is The sweep is displayed on the recognizer display or on the background screen.
- Figure 16 is an enlarged picture 7 of the intrinsic feature 4 of the texel 1 being a stereo feature and a color feature with two different color elements.
- Figure 17 is an enlarged picture 7 of the intrinsic feature 4 of the texel 1 being a shadow feature. The enlarged picture 7 state of the intrinsic feature 4 of the texel 1 is shown.
- the identifier having the magnifying function in FIG. 17 includes an illumination source 8, and the illumination source 8 obliquely illuminates the texel 1 to observe the enlarged shadow effect of the texel 1, that is, the intrinsic feature 4 is a shadow effect, which is impossible for counterfeiting by printing or the like. .
- the identifier may also be provided with two light sources and in different orientations, and the two light sources are obliquely alternately illuminating the texture to observe the effect of alternating texture shadows.
- the magnified picture 7 of the intrinsic feature 4 of the texture element 1 may be part of an enlarged identification description that is presented in the recognition system to be known to the recognizer; the enlarged identification description is printed on the anti-counterfeit mark 2; Or magnifying the identification to be attached to the package of the anti-counterfeit product and product; and/or displayed on the display of the identifier, and/or displayed on the background display; and/or the anti-counterfeit identification 2 and/or being secured
- a two-dimensional code 5 is included on the package of the product and/or product, the enlarged identification description being included in the two-dimensional code 5; and/or the enlarged identification description includes an enlarged image of the intrinsic feature 4 of the texel.
- a random texture anti-counterfeiting identification system includes an identification system including an anti-counterfeiting mark 2, an anti-counterfeit product, a package of an anti-counterfeit product, a display of an identifier, and one or more identification devices of a background display, see Figure 13, the recognition system has an enlarged picture 7 of the intrinsic feature 4 that can be presented, the intrinsic feature 4 being an intrinsic feature of the randomly distributed texture element 1 on the security feature 2, and see Figure 14, the intrinsic feature 4 It refers to the texel feature of each texel 1 having the same visual feature when viewed enlarged, and the human eye cannot directly distinguish it under the condition of no magnification; the enlarged picture 7 of the intrinsic feature 4 is used for the anti-counterfeiting mark 2 The intrinsic feature 4 is enlarged by the enlarged image obtained to obtain the authenticity of the anti-counterfeit mark 2.
- the identification device of the identification system is further provided with an enlarged identification description, and the inherent feature 4 is disposed on the enlarged identification description.
- the identification device is further provided with a two-dimensional code 5 (see Fig. 15), and the enlarged picture 7 of the intrinsic feature is placed in the two-dimensional code and displayed on the display when the two-dimensional code 6 is scanned.
- the intrinsic feature 4 is a three-dimensional structure in which the texel 1 is magnified, see the three cuboid structures of FIGS. 16 and 17; and/or is a single multi-color texel 1, and the single multi-color texel 1 contains at least Two different color units, see the black and white colors of Figures 16, 17, and the different color units can be distinguished when the magnification condition is recognized; and/or A stencil 1 having a certain thickness, as shown in the shaded portion of Fig. 17, can produce a shadow when magnified and illuminated with oblique light, and the enlarged shadow can be observed by the human eye or can be tested by the recognizer.
- the identification process described in all of the above embodiments is performed by a dedicated APP installed inside the recognizer, wherein the acquisition of the code can be implemented by a dedicated APP or a general APP.
- the inherent features of the anti-counterfeit identification corresponding to the type in the above-mentioned embodiments, can be stored in the background, can be included in the anti-counterfeit identification, and can be included in the enlarged identification description. It can also be attached to the packaging of the anti-counterfeit object or the anti-counterfeit object. It can also be an intrinsic feature that can be remembered by the staff working in the background through observation, and can also be an inherent feature of books such as textbooks and magazines.
- the invention also provides a random texture anti-counterfeiting product, which is used in the above-mentioned random texture anti-counterfeiting system, the anti-counterfeiting product includes an anti-counterfeiting object, an anti-counterfeiting mark and a magnifying glass.
- the anti-counterfeiting identifier is an anti-counterfeiting identifier on which a texel element is randomly distributed.
- the security feature is attached to the anti-counterfeit object or the package of the anti-counterfeit object.
- the magnifying glass can be used to form an identifier with the mobile phone to identify the anti-counterfeiting identifier, and the magnifying glass serves as a detachable component of the identifier, and the magnifying glass is used as an identifier when the magnifying glass is mounted on the ingesting path of the mobile phone camera
- the component when the magnifying glass is not mounted on the ingestion path of the handset camera, the magnifying glass acts as a non-executing component of the identifier.
- the purpose of the anti-counterfeiting products provided is to solve the problem of high cost of anti-counterfeiting identification by using a magnifying glass in public anti-counterfeiting.
- the magnifying glass is relatively expensive, and only the anti-counterfeiting identification is put together with the product, so that the cost of the anti-counterfeiting product is high and cannot enter the public security field; with the development of science and technology, especially the appearance of the injection magnifying glass, The cost of the magnifying glass is greatly reduced, which in turn makes the magnifying glass enter the first-line anti-counterfeiting from the second-line anti-counterfeiting, that is, the public anti-counterfeiting, making the anti-counterfeiting object, the magnifying glass and the anti-counterfeiting mark enter the public anti-counterfeiting field as a whole product, which becomes a possibility of promotion.
- the anti-counterfeit identifier has a distribution feature and an intrinsic feature, and the distribution feature is a distribution image of a randomly distributed texture element and/or a feature of the distribution image on the anti-counterfeit identifier; the intrinsic feature refers to a random distribution on the anti-counterfeit identifier.
- the identifier of the magnifying glass as the execution component and/or the non-executing component can acquire the to-be-identified distribution feature of the anti-counterfeit identification to be identified and the intrinsic feature to be identified and compare with the distribution feature and the intrinsic feature respectively to determine the trueness of the anti-counterfeit object. If the result of the comparison is not the same, it is determined that the anti-counterfeiting identifier to be identified is false, and the anti-counterfeiting object attached to the anti-counterfeiting identifier is false, and the intrinsic feature to be identified refers to each of the anti-counterfeiting identifiers to be identified.
- the magnifying glass serves as an executing component.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Data Mining & Analysis (AREA)
- Marketing (AREA)
- Artificial Intelligence (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Accounting & Taxation (AREA)
- Entrepreneurship & Innovation (AREA)
- Life Sciences & Earth Sciences (AREA)
- Strategic Management (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Bioinformatics & Computational Biology (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Evolutionary Biology (AREA)
- Evolutionary Computation (AREA)
- General Engineering & Computer Science (AREA)
- Optics & Photonics (AREA)
- Credit Cards Or The Like (AREA)
- Inspection Of Paper Currency And Valuable Securities (AREA)
Abstract
一种随机纹理防伪方法,步骤:1:选择随机分布有纹理元素(1)的防伪标识(2);2:获取所述防伪标识(2)上随机分布的纹理元素(1)的分布图像和/或分布图像的特征作为分布特征,获取所述纹理元素的固有特征(4);步骤3:将防伪标识(2)附着在防伪对象或防伪对象的包装上;步骤4:识别时,获取待识别防伪标识(2')上随机分布的纹理元素(1')的待识别分布特征(3')和待识别固有特征(4'),将获取的待识别分布特征(3')和待识别固有特征(4')与存储的存储分布特征(3)和固有特征(4)分别进行比对,该防伪方法能够有效地保证了随机纹理防伪标识的高可靠性。此外,还提供了对应于防伪方法的防伪识别系统、防伪系统和防伪产品,获得了同样有益的技术效果。
Description
本发明属于纹理防伪技术领域,特别涉及一种随机纹理防伪方法、防伪识别系统、防伪系统和防伪产品。
随机纹理防伪技术是一项具有应用前景的防伪技术,它最终会解决公众防伪问题,这是因为随机纹理分布的形成涉及到一个不可控的随机过程,该过程就是生产者自己第二次也不能像第一次随机布散分布那样低成本的形成相同的分布图案,相对于第一次布散,后来者要形成相同的分布特征需要更高的成本,这个成本差异大于造假利润时,便实现了防伪效果。
随机防伪技术从发明应用到现在已经有十几年的历史,始终没有进入公众识别领域,原因在于布散形成的纹理分布图案,在肉眼识别或现有手机拍照识别条件下,由于分辨率的限制,会出现低成本工艺模仿,例如印刷图案、UV打印的凹凸图案、压纹工艺形成的图案、以及激光微雕形成的图案、类似集成电路光刻工艺形成的图案等现有技术的低成本可控复制图案,这些复制图案容易产生“图像欺骗”,欺骗人眼、欺骗不带显微放大的手机,欺骗手感、欺骗针挑观察,从而导致纹理防伪的失败。
发明内容
本发明的目的是提供一种涉及纹理元素固有特征的防伪方法、防伪识别系统和防伪系统,在纹理元素很小时,人眼无法直接辨别单根纹理元素的纹理元素特征,因此出现了印刷、打印、压纹等工艺来造假纹理防伪标识,这类标识虽然可模仿其分布特征,却无法模仿其固有特征,通过固有特征的识别能够高度有效地保证了随机纹理防伪标识的可靠性。
本发明的目的是这样来实现的。
一种随机纹理防伪方法,包括下列步骤:
步骤1:选择随机分布有纹理元素1的防伪标识2;
步骤2:获取所述防伪标识2上随机分布的纹理元素1的分布图像和/或分布图像的特征作为分布特征,并在识别系统的后台中存储生成存储分布特征3;获取所述纹理元素1的固有特征4,所述固有特征4是指防伪标识2的每根纹理元素1在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨;
步骤3:将防伪标识2附着在防伪对象或防伪对象的包装上;
步骤4:识别时,获取待识别防伪标识2'上随机分布的纹理元素1'的待识别分布特征3'和待识别固有特征4',将获取的待识别分布特征3'和待识别固有特征4'与识别系统后台中存储
的存储分布特征3和获取的所述固有特征4分别进行比对,当其中一个比对结果为不相同时,判断待识别防伪标识2'为假,进而待识别防伪标识2'所附着的防伪对象为假;所述待识别固有特征4'是指待识别防伪标识2'上的每根纹理元素1'在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨。
做为优选,所述步骤4中“获取待识别防伪标识2'上随机分布的纹理元素1'待识别固有特征4'”具体为:通过识别器来获取待识别防伪标识2'上随机分布的纹理元素1'待识别固有特征4',其中获取该待识别固有特征4'时的识别器的视场直径小于或等于1.5cm。
优选地,所述步骤4“获取待识别防伪标识2'上随机分布的纹理元素1'的待识别分布特征3'和待识别固有特征4'”是由识别器实现的;其中所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜,当识别器获取待识别固有特征4'时,所述识别器的放大镜安装在手机摄像头的摄取路径上;或者,所述识别器包括手机和与手机有线或无线连接的外接显微摄像头,通过外接显微摄像头来获取待识别固有特征4'。
优选地,所述放大镜包括粘胶层,通过该粘胶层将所述放大镜粘附在手机上。
优选地,所述放大镜包括透镜、支撑部和粘胶层,所述支撑部的一侧固定有所述透镜,所述支撑部的另一侧固定有所述粘胶层。
优选地,在固定有所述粘胶层侧,所述支撑部的侧面突出于所述透镜的侧面。
做为优选,所述步骤4中待识别分布特征3'和存储分布特征3的比对在识别系统的后台自动进行;所述步骤4中待识别固有特征4'和固有特征4的比对在识别系统的后台自动或人工进行。
做为优选,所述步骤4中的“获取待识别防伪标识2'上随机分布的纹理元素1'的待识别分布特征3'和待识别固有特征4'”是通过识别器一次拍摄实现的,拍摄得到待识别防伪标识2'的至少包括部分纹理元素1’的局部放大图像或全部放大图像;
其中所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜,拍摄时,放大镜安装在手机摄像头的摄取路径上;或者,所述识别器包括手机和与手机有线或无线连接的外接显微摄像头,拍摄时,通过所述外接显微摄像头进行拍摄;或者,所述识别器包括电脑和与电脑有线或无线连接的外接显微摄像头,拍摄时,通过外接显微摄像头进行拍摄;或者,所述识别器为独立识别器,所述独立识别器包括显微摄像头。
做为优选,所述步骤4中的“获取待识别防伪标识2'上随机分布的纹理元素1'的待识别分布特征3'和待识别固有特征4'”是通过识别器经过两次获取的;
其中,所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜,当获取待识别分布特征3'时,放大镜未设置在手机摄像头的摄取路径上,通过手机摄像头直接获取待识别防伪标识2'的待识别分布特征图像,当获取待识别固有特征4'时,放大镜安装在手机摄像头的摄取路径上,通过手机摄像头和放大镜获取待识别防伪标识2'上的纹理元素1'的放大图
像;或者,所述识别器包括手机和与手机有线或无线连接的外接显微摄像头,当获取待识别分布特征3'时,通过手机摄像头直接获取待识别防伪标识2'的待识别分布特征图像,当获取待识别固有特征4'时,通过外接显微摄像头获取待识别防伪标识2'上的纹理元素1'的放大图像。
做为优选,每个所述防伪标识2还包括至少一个编码5,
所述编码5与所述防伪标识2一一对应,或所述编码5与多个所述防伪标识2相对应;
相应的,每个所述待识别防伪标识2'也包括至少一个编码5';
所述步骤4中的“获取待识别防伪标识2'上随机分布的纹理元素1'的待识别分布特征3'和待识别固有特征4'”包括:通过识别器一次拍摄待识别防伪标识2'的至少包括编码5'和部分纹理元素1'的局部放大图像或全部放大图像;
其中所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜,拍摄时,放大镜安装在手机摄像头的摄取路径上;或者,所述识别器包括手机和与手机有线或无线连接的外接显微摄像头,拍摄时,通过所述外接显微摄像头进行拍摄;或者,所述识别器包括电脑和与电脑有线或无线连接的外接显微摄像头,拍摄时,通过外接显微摄像头进行拍摄;或者,所述识别器为独立识别器,所述独立识别器包括显微摄像头。
优选地,所述编码的边长小于4mm和/编码区域的面积小于16mm2;优选地,所述待识别防伪标识2'的编码5'为二维码。
做为优选,每个所述防伪标识2还包括至少一个编码5,
所述编码5与所述防伪标识2一一对应,或所述编码5与多个所述防伪标识2相对应;
相应的,每个所述待识别防伪标识2'也包括至少一个编码5';
所述步骤4中的“获取待识别防伪标识2'上随机分布的纹理元素1'的待识别分布特征3'和待识别固有特征4'”包括:通过识别器分两次获取待识别防伪标识2'的编码5'、待识别分布特征3'和待识别固有特征4';
其中,所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜,当获取编码5'时,放大镜未设置在手机摄像头的摄取路径上,通过手机摄像头直接获取待识别防伪标识2'的编码5',当获取待识别分布特征3'和待识别固有特征4'时,放大镜安装在手机摄像头的摄取路径上,通过手机摄像头和放大镜获取待识别防伪标识2'上的至少包括部分纹理元素1'的局部放大图像或全部放大图像;或者,所述识别器包括手机和与手机有线或无线连接的外接显微摄像头,当获取编码5'时,手机摄像头直接获取待识别防伪标识2'的编码5',当获取待识别分布特征3'和待识别固有特征4'时,通过外接显微摄像头获取待识别防伪标识2'上的至少包括部分纹理元素1'的局部放大图像或全部放大图像。
优选地,所述待识别防伪标识2'的编码5'为二维码,所述二维码的边长大于5mm。
做为优选,每个所述防伪标识2还包括至少一个编码5,
所述编码5与所述防伪标识2一一对应,或所述编码5与多个所述防伪标识2相对应;
相应的,每个所述待识别防伪标识2'也包括至少一个编码5';
所述步骤4中的“获取待识别防伪标识2'上随机分布的纹理元素1'的待识别分布特征3'和待识别固有特征4'”包括:通过识别器分两次获取待识别防伪标识2'的编码5'、待识别分布特征3'和待识别固有特征4';
其中,所述识别器包括手机安装在手机摄像头的摄取路径上的放大镜,所述两次获取包括:通过手机摄像头和放大镜获取待识别防伪标识2'的编码5',和通过手机摄像头和放大镜获取待识别防伪标识2'上的至少包括部分纹理元素1'的局部放大图像或全部放大图像以获取待识别分布特征3’和待识别固有特征4’;或者,所述识别器包括手机和与手机有线或无线连接的外接显微摄像头,所述两次获取包括:通过外接显微摄像头获取待识别防伪标识2'的编码5',和通过外接显微摄像头获取待识别防伪标识2'上的至少包括部分纹理元素1'的局部放大图像或全部放大图像以获取待识别分布特征3’和待识别固有特征4’;
所述识别器包括电脑和与电脑有线或无线连接的外接显微摄像头,所述两次获取包括:通过外接显微摄像头获取待识别防伪标识2'的编码5',和通过外接显微摄像头获取待识别防伪标识2'上的至少包括部分纹理元素1'的局部放大图像或全部放大图像以获取待识别分布特征3’和待识别固有特征4’;
所述识别器为独立识别器,所述独立识别器包括显微摄像头,所述两次获取包括:通过独立识别器的显微摄像头获取待识别防伪标识2'的编码5',和通过独立识别器的显微摄像头获取待识别防伪标识2'上的至少包括部分纹理元素1'的局部放大图像或全部放大图像以获取待识别分布特征3’和待识别固有特征4’。
优选地,所述编码的边长小于4mm和/或编码区域的面积小于16mm2;优选地,所述待识别防伪标识2'的编码5'为二维码,
做为优选,所述识别器与识别系统的后台有线或无线相连,所述步骤4还包括:所述识别器将放大图像发送到所述后台,所述后台接收放大图像后对其进行处理生成待识别分布特征3',或者所述识别器将通过手机摄像头直接获取待识别防伪标识2'的待识别分布特征图像发送到所述后台,所述后台接收待识别分布特征图像作为待识别分布特征3',接着,所述后台将待识别分布特征3’与后台中存储的存储分布特征3逐一进行自动比对或者后台将待识别分布特征3’与后台根据编码5’调取的一个或多个存储分布特征3逐一进行自动比对,其中所述编码预先与一个或多个所述防伪标识2的分布特征相关联;
或者,所述识别器将放大图像发送到所述后台,所述后台接收放大图像后对其进行处理生成待识别分布特征3’并发回给识别器,并所述后台根据接收到的编码5’调取一个或多个存储分布特征3发回给识别器;所述识别器的显示器显示有接收的待识别分布特征3’和存储分布特征3以供识别器端人工进行比较,其中所述编码预先与一个或多个所述防伪标识2
的分布特征相关联;
并且,所述步骤4还包括:将放大图像示出的待识别固有特征4'与所述固有特征4进行比对。
优选地,所述“将放大图像示出的待识别固有特征4'与所有固有特征4进行比对”具体为:将放大图像传输到后台并与识别系统后台中根据该待识别防伪标识2'的分布特征或该待识别防伪标识2'的编码调用的固有特征在后台进行人工或自动比对,所述固有特征是指将步骤2中获取的固有特征存储在识别系统的后台中,对于同一种纹理元素形成的一类防伪标识2在首次获取其固有特征时存入后台,从第二次起,将该类防伪标识2的存储分布特征与后台存储的该类防伪标识2的固有特征建立关联或者通过编码将编码与对应的防伪标识2的存储分布特征和该类防伪标识的固有特征建立联系,所述固有特征4通过在步骤2中获取的防伪标识的纹理元素的放大图片示出;
或者将在识别器端观察到的放大图像与识别器在识别系统的后台中根据该待识别防伪标识2'的分布特征或该待识别防伪标识2'的编码调取的固有特征在识别器端人工比对,所述固有特征是指将步骤2中获取的固有特征存储在识别系统的后台中,对于同一种纹理元素形成的一类防伪标识2在首次获取其固有特征时存入后台,从第二次起,将该类防伪标识2的存储分布特征与后台存储的该类防伪标识2的固有特征建立关联或者通过编码将编码与对应的防伪标识2的存储分布特征和该类防伪标识的固有特征建立联系,此时,识别器端包括显示器以进行比对,所述固有特征4通过在步骤2中获取的防伪标识的纹理元素的放大图片示出;
或者将识别器端观察到的放大图像与被印刷在防伪标识2上和/或附着在防伪对象或防伪对象的包装上的放大图片人工比对,来比较待识别固有特征4'和固有特征4是否相同,所述放大图片是在步骤2中拍摄的示出固有特征4的防伪标识2的放大图片。
做为优选,所述防伪标识2上的纹理元素1为密集排列的纹理分布,所述纹理分布区域内,纹理密度不小于100根/cm2;优选地,纹理密度不小于1000根/cm2;优选地,纹理密度不小于10000根/cm2。
做为优选,所述防伪标识2上的纹理元素1为密集排列的纹理分布,所述纹理分布区域内,平均单根纹理元素1的面积小于0.3mm2;优选地,平均单根纹理元素1的面积小于0.1mm2;优选地,平均单根纹理元素1的面积小于0.05mm2。
一种随机纹理防伪识别系统,
所述识别系统包括识别器和后台,所述识别器与所述后台有线或无线相连;
所述后台中预先存储有防伪标识2的存储分布特征3,所述存储分布特征3是指所述防伪标识2上随机分布的纹理元素1的分布图像和/或分布图像的特征作为分布特征,并在识别系统的后台中存储生成的存储分布特征3;
所述识别系统中还包括有防伪标识2的纹理元素1的固有特征4,所述固有特征4是指
防伪标识2的每根纹理元素1在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨;
所述识别器获取附着在防伪对象或防伪对象的包装上的待识别防伪标识2'上随机分布的纹理元素1'的待识别分布特征3'和待识别固有特征4',所述待识别固有特征4'是指待识别防伪标识2'上的每根纹理元素1'在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨;
识别系统将识别器获取的待识别分布特征3'和待识别固有特征4'与后台中存储的存储分布特征3和识别系统中的所述固有特征4分别进行比对,当其中一个比对结果为不相同时,判断待识别防伪标识2'为假,进而待识别防伪标识2'所附着的防伪对象为假。
优选地,当识别器获取待识别防伪标识2'上随机分布的纹理元素1'待识别固有特征4'时,识别器的视场直径小于或等于1.5cm。
优选地,所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜,当识别器获取待识别固有特征4'时,所述识别器的放大镜安装在手机摄像头的摄取路径上;或者,
所述识别器包括手机和与手机有线或无线连接的外接显微摄像头,通过外接显微摄像头来获取待识别固有特征4'。
优选地,所述放大镜包括粘胶层,通过该粘胶层将所述放大镜粘附在手机上。
优选地,所述放大镜包括透镜、支撑部和粘胶层,所述支撑部的一侧固定有所述透镜,所述支撑部的另一侧固定有所述粘胶层。
优选地,在固定有所述粘胶层侧,所述支撑部的侧面突出于所述透镜的侧面。
做为优选,所述识别器通过一次拍摄获取待识别防伪标识2'的放大图像,其中当所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜时,拍摄时,放大镜安装在手机摄像头的摄取路径上,当所述识别器包括手机和与手机有线或无线连接的外接显微摄像头时,拍摄时,通过所述外接显微摄像头进行拍摄。
做为优选,所述识别器经过两次分别获取待识别防伪标识2'上随机分布的纹理元素1'的待识别分布特征3'和待识别固有特征4',其中当所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜时,当获取待识别分布特征3'时,放大镜未设置在手机摄像头的摄取路径上,通过手机摄像头直接获取待识别防伪标识2'的待识别分布特征图像,当获取待识别固有特征4'时,放大镜安装在手机摄像头的摄取路径上,通过手机摄像头和放大镜获取待识别防伪标识2'上的纹理元素1'的放大图像,当所述识别器包括手机和与手机有线或无线连接的外接显微摄像头时,当获取待识别分布特征3'时,通过手机摄像头直接获取待识别防伪标识2'的待识别分布特征图像,当获取待识别固有特征4'时,通过外接显微摄像头获取待识别防伪标识2'上的纹理元素1'的放大图像。
做为优选,每个所述防伪标识2还包括至少一个编码5,所述编码5与所述防伪标识2
一一对应,或所述编码5与多个所述防伪标识2相对应;
相应的,每个所述待识别防伪标识2'也包括至少一个编码5';
所述识别器一次拍摄待识别防伪标识2'的至少包括编码5'和部分纹理元素1'的局部放大图像或全部放大图像;
其中当所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜时,拍摄时,放大镜安装在手机摄像头的摄取路径上,
当所述识别器包括手机和与手机有线或无线连接的外接显微摄像头时,拍摄时,通过所述外接显微摄像头进行拍摄。
做为优选,每个所述防伪标识2还包括至少一个编码5,所述编码5与所述防伪标识2一一对应,或所述编码5与多个所述防伪标识2相对应;
相应的,每个所述待识别防伪标识2'也包括至少一个编码5';
所述识别器分两次获取待识别防伪标识2'的编码5'、待识别分布特征3'和待识别固有特征4';
当所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜时,当获取编码5'时,放大镜未设置在手机摄像头的摄取路径上,通过手机摄像头直接获取待识别防伪标识2'的编码5',或者放大镜安装在手机摄像头的摄取路径上,通过手机摄像头和放大镜获取待识别防伪标识2'的编码5',当获取待识别分布特征3'和待识别固有特征4'时,放大镜安装在手机摄像头的摄取路径上,通过手机摄像头和放大镜获取待识别防伪标识2'上的至少包括部分纹理元素1'的局部放大图像或全部放大图像;
当所述识别器包括手机和与手机有线或无线连接的外接显微摄像头时,当获取编码5'时,手机摄像头直接获取待识别防伪标识2'的编码5',或者通过外接显微摄像头获取待识别防伪标识2'的编码5',当获取待识别分布特征3'和待识别固有特征4'时,通过外接显微摄像头获取待识别防伪标识2'上的至少包括部分纹理元素1'的局部放大图像或全部放大图像。
优选地,所述识别器包括电脑和与电脑有线或无线连接的外接显微摄像头,拍摄时,通过外接显微摄像头进行拍摄;或者,所述识别器为独立识别器,所述独立识别器包括显微摄像头。
优选地,所述识别器通过一次拍摄获取待识别防伪标识2'的放大图像。
做为优选,每个所述防伪标识2还包括至少一个编码5,所述编码5与所述防伪标识2一一对应,或所述编码5与多个所述防伪标识2相对应;
相应的,每个所述待识别防伪标识2'也包括至少一个编码5';
所述识别器一次拍摄待识别防伪标识2'的至少包括编码5'和部分纹理元素1'的局部放大图像或全部放大图像;或者,所述识别器分两次获取待识别防伪标识2'的编码5'、待识别分布特征3'和待识别固有特征4',
当所述识别器包括电脑和与电脑有线或无线连接的外接显微摄像头时,所述两次获取包括:通过外接显微摄像头获取待识别防伪标识2'的编码5',和通过外接显微摄像头获取待识别防伪标识2'上的至少包括部分纹理元素1'的局部放大图像或全部放大图像;
当所述识别器为独立识别器时,所述独立识别器包括显微摄像头,所述两次获取包括:通过独立识别器的显微摄像头获取待识别防伪标识2'的编码5',和通过独立识别器的显微摄像头获取待识别防伪标识2'上的至少包括部分纹理元素1'的局部放大图像或全部放大图像。
优选地,所述识别器将放大图像发送到后台,所述后台接收放大图像后对其进行处理生成待识别分布特征3',或者所述识别器将通过手机摄像头直接获取待识别防伪标识2'的待识别分布特征图像发送到所述后台,所述后台接收待识别分布特征图像作为待识别分布特征3',
接着,所述后台将待识别分布特征3'与后台中存储的存储分布特征3逐一进行自动比对或者后台将待识别分布特征3’与后台根据编码5’调取的一个或多个存储分布特征3逐一进行自动比对,其中所述编码预先与一个或多个所述防伪标识2的分布特征相关联;
或者,所述识别器将放大图像发送到所述后台,所述后台接收放大图像后对其进行处理生成待识别分布特征3’并发回给识别器,并所述后台根据接收到的编码5’调取一个或多个存储分布特征3发回给识别器;所述识别器的显示器显示有接收的待识别分布特征3’和存储分布特征3以供识别器端人工进行比较,其中所述编码预先与一个或多个所述防伪标识2的分布特征相关联。
做为优选,识别器将放大图像传输到后台并与识别系统后台中根据该待识别防伪标识2'的分布特征或该待识别防伪标识2'的编码调用的固有特征在后台进行人工或自动比对,对于同一种纹理元素形成的一类防伪标识2在首次获取其固有特征时存入后台,从第二次起,将该类防伪标识2的存储分布特征与后台存储的该类防伪标识2的固有特征建立关联或者通过编码将编码与对应的防伪标识2的存储分布特征和该类防伪标识的固有特征建立联系,所述固有特征4通过获取的防伪标识的纹理元素的放大图片示出;
或者将在识别器端观察到的放大图像与识别器在识别系统的后台中根据该待识别防伪标识2'的分布特征或该待识别防伪标识2'的编码调取的固有特征在识别器端人工比对,对于同一种纹理元素形成的一类防伪标识2在首次获取其固有特征时存入后台,从第二次起,将该类防伪标识2的存储分布特征与后台存储的该类防伪标识2的固有特征建立关联或者通过编码将编码与对应的防伪标识2的存储分布特征和该类防伪标识的固有特征建立联系,此时,识别器端包括显示器以进行比对,所述固有特征4通过获取的防伪标识的纹理元素的放大图片示出;
或者将识别器端观察到的放大图像与被印刷在防伪标识2上和/或附着在防伪对象或防伪对象的包装上的放大图片人工比对,来比较待识别固有特征4'和固有特征4是否相同,所述放大图片是拍摄的示出固有特征4的防伪标识2的放大图片。
一种随机纹理防伪系统,包括防伪对象、防伪标识和随机纹理的防伪识别系统,其中,所述防伪标识附着在防伪对象或防伪对象的包装上,所述防伪标识为随机分布有纹理元素1的防伪标识2,防伪标识2上随机分布的纹理元素1的分布图像和/或分布图像的特征作为分布特征,并在后台中存储生成存储分布特征3,防伪标识2还包括固有特征4,所述固有特征是指防伪标识2的每根纹理元素1在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨;
所述随机纹理的防伪识别系统通过获取待识别防伪标识2'上随机分布的纹理元素1'的待识别分布特征3'和待识别固有特征4',将获取的待识别分布特征3'和待识别固有特征4'与后台中存储分布特征3所述固有特征4分别进行比对,当其中一个比对结果为不相同时,判断待识别防伪标识2'为假,进而待识别防伪标识2'所附着的防伪对象为假;所述待识别固有特征4'是指待识别防伪标识2'上的每根纹理元素1'在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨。
做为优选,所述随机纹理的防伪识别系统为如权利要求20-34之一所述的随机纹理防伪识别系统。
做为优选,所述防伪标识2上的纹理元素1为密集排列的纹理分布,所述纹理分布区域内,纹理密度不小于100根/cm2;优选地,纹理密度不小于1000根/cm2;优选地,纹理密度不小于10000根/cm2。
做为优选,所述防伪标识2上的纹理元素1为密集排列的纹理分布,所述纹理分布区域内,平均单根纹理元素1的面积小于0.3mm2;优选地,平均单根纹理元素1的面积小于0.1mm2;优选地,平均单根纹理元素1的面积小于0.05mm2。
本发明还提供一种随机纹理防伪产品,用于上述的随机纹理防伪系统中,其特征在于:所述防伪产品包括防伪对象、防伪标识和放大镜,
其中,
所述防伪标识为其上随机分布有纹理元素的防伪标识,
所述防伪标识被附着在所述防伪对象或所述防伪对象的包装上,
所述放大镜可用于与手机组成识别器来识别所述防伪标识,所述放大镜作为所述识别器的可拆卸部件,当放大镜安装在手机摄像头的摄取路径上时,所述放大镜作为识别器的执行部件,当放大镜未安装在手机摄像头的摄取路径上时,所述放大镜作为识别器的非执行部件。
优选地,
所述防伪标识具有分布特征和固有特征,所述分布特征为该防伪标识上随机分布的纹理元素的分布图像和/或分布图像的特征;所述固有特征是指所述防伪标识上随机分布的纹理元素在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨;
放大镜作为执行部件和/或非执行部件时的识别器可获取待识别防伪标识的待识别分布特征和待识别固有特征并用于分别与所述分布特征和固有特征进行比对来判断防伪对象的真假,当有一个比对结果为不相同时,判断待识别防伪标识为假,进而待识别防伪标识所附着的防伪对象为假,所述待识别固有特征是指待识别防伪标识上的每根纹理元素在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨;
其中获取待识别防伪标识的待识别固有特征时,所述放大镜作为执行部件。
技术效果:
本发明提供了一种随机纹理防伪方法,包括了分布特征和固有特征的双重比对,申请人首次提出了固有特征的概念,即指防伪标识2的每根纹理元素1在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨;这样造假者通过印刷图案、UV打印的凹凸图案、压纹工艺形成的图案、以及激光微雕形成的图案、类似集成电路光刻工艺形成的图案等现有技术的低成本可控复制图案则失效,因为这些手段都无法复制防伪标识的固有特征,在本申请的防伪方法下立即判断为假;同时对于外部偷窃制造防伪标识的纹理元素的造假者,甚至内部人员来说,在非摆放条件下根本无法得到相同的防伪标识。显然,通过本申请的防伪方法,能够高度有效地保证防伪标识的可靠性,甚至在纹理元素进入共有领域,或从共有领域中选取纹理元素的情况下,仍能以相同程度地高度有效地保证防伪标识的可靠性。
优选地,当识别器获取待识别固有特征4'时,其识别器的视场直径小于或等于1.5cm,在这样的条件下,固有特征能够更充分地发挥作用,即每根纹理元素1'的相同的视觉特征在人眼直接观察下无法分辨,借助识别器且视场直径小于或等于1.5cm时可清楚分辨。
优选地,识别器采用手机加放大镜。手机在当今时代下作为普及的通讯工具,在大多数地方已经是人手一部或人手多部,放大镜价格低廉,容易获取;由手机和放大镜组合得到的识别器使得普通公众便可辨别防伪标识的真假,真正做到价格低廉的一线防伪,这也是首次获得高可靠性、低成本的一线防伪。当然,也可将放大镜用外接显微摄像头替换。
优选地,放大镜和手机之间通过粘胶层连接,粘胶层作为连接部件、价格低廉,使用时、保证了放大镜和手机之间的有效固定,使用后,便于拆除、不损伤手机。
优选地,所述放大镜包括透镜、支撑部和粘胶层,所述支撑部的一侧固定有所述透镜,所述支撑部的另一侧固定有所述粘胶层,其中,在固定有所述粘胶层侧,所述支撑部的侧面突出于所述透镜的侧面,保证支撑部粘接到手机上,避免透镜突出妨碍放大镜的粘接。
对应于本申请的随机纹理防伪方法,本申请还提供给了一种随机纹理防伪识别系统和随机纹理防伪系统,获得了同样有益的技术效果。
提供的防伪产品的目的是解决公众防伪中利用放大镜进行防伪识别成本较高的问题。在
目前的防伪领域里面,放大镜由于比较昂贵,与产品放在一起仅仅进行防伪识别,使得防伪产品的成本很高,进入不了公众防伪领域;随着科技的发展,特别是注塑放大镜的出现,使得放大镜的成本大幅降低,进而使得放大镜从二线防伪进入一线防伪,即公众防伪,使得防伪对象、放大镜和防伪标识作为一个整体产品进入公众防伪领域,成为一种可推广的可能。进一步与随机纹理防伪系统结合进入公众识别领域,给公众识别领域的防伪技术带来一次飞跃性的突破。当今社会中人们无时无刻不在使用手机,手机已经成了人体的一部分,相当于一个外部的器官存在。
图1为无编码的随机纹理防伪标识;
图2为有编码的随机纹理防伪标识;
图3为有编码的随机纹理防伪标识,识别器拍摄防伪标识纹理分布中的局部放大图像;
图4为一种手机或电脑外接显微摄像头;
图5为一种组合透镜的光学放大镜;
图6为一种带安装翼的单凸透镜;
图7为一种带安装翼的双凸透镜;
图8为一种不带安装翼的单凸透镜;
图9手机有线外接显微摄像头的示意图;
图10手机无线外接显微摄像头的示意图;
图11手机摄像头外接多透镜的光学放大镜的示意图;
图12手机摄像头外接单透镜的光学放大镜的示意图。
图13为在被防伪的产品(防伪对象)的包装上印设有防伪标识2和示出单根纹理元素1固有特征4的放大图片7的示意图。
图14为在纹理防伪标识2上印设有示出单根纹理元素1固有特征4放大图片7、编码和随机分布的纹理元素的示意图。
图15是为在被防伪的产品(防伪对象)的包装上印设有纹理防伪标识2和含有固有特征放大图片7的二维码的示意图。
图16是纹理元素1的固有特征4为立体特征和带两个不同色彩单元的色彩特征的放大图片7。
图17是纹理元素1的固有特征4为阴影特征的放大图片7。.
图18为在手机屏幕(识别器的显示器)上显示有纹理元素1固有特征4放大图片7的示意图,所述固有特征4为立体特征和带两个不同色彩单元的色彩特征。
图19为在手机屏幕(识别器的显示器)上显示有纹理元素1固有特征4放大图片7的示
意图,所述固有特征4为阴影特征。
首先对本申请的基本名称术语做出说明:
1、防伪标识的分布图像:防伪标识上随机分布的纹理元素的分布图像每张不同,其组合可达1020状态以上不重复,足够全世界所有商品使用100年不重复,所以纹理的分布图像本身就是一种不会重复的编码,在图像识别软件或数字图像处理电路支持下,对防伪标识可无需编码。
2、纹理防伪的无限使用法则:是指纹理防伪技术使用在十分众多的产品类别后不会对防伪效果产生影响,这是纹理防伪原理决定的。这是因为纹理分布的第一次随机形成为一个低成本的不可控的随机过程;而传统防伪的防伪原理是基于独有设备、独有工艺、技术秘密等手段,一旦突破便到处扩散,从而失去效果,基于此,传统防伪技术只能有效使用才能确保一定的防伪效果。
3、每个防伪标识还包括至少一个编码,其上的编码与防伪标识2一一对应,或其上的编码与多个防伪标识2相对应;编码的作用在于在后台寻址,快速调出预先存储的特征;其中编码与多个防伪标识相对应的一个重要好处在于,可以用普通印刷机制版批量印刷编码,十分高效和低成本。
4、本发明所述独立识别器和外接显微摄像头中的图像传感器,优选采用CMOS或CCD。
5、分布特征,是指随机过程中形成的纹理的空间位置分布,以及在这空间位置上纹理的随机朝向、多旋转方向时的随机旋转方向、多色彩纹理时随机纹理色彩等等,并且是所述识别器能够感知的。
6、固有特征,是指防伪标识上单根纹理元素的物理特征,包括纹理元素的立体结构、色彩、纹理上细微的色彩分布等等,与随机分布过程无关。
7、识别纹理元素的固有特征,目的是防止造假者采用低成本的可控工艺来模仿正品防伪标识的纹理分布而使识别器或人眼不能分辨;现有技术中低成本可控工艺包括各种印刷方式,各种喷墨打印,包括能打印出具有触摸手感细线的UV打印,3D立体打印、各种光刻工艺等等;为了杜绝这类低成本的造假工艺,特别的针对这些造假工艺纹理结构设计以及基于设计的放大识别方法能够做出这样的区分,即本发明所述的识别纹理固有特征。
8、为了实现纹理元素固有特征的识别,除了上述纹理的特别设计和放大识别外,针对造假者可能利用的现有技术的特点,提出一套识别标准(放大识别说明)告知判别者,特别是在识别系统中判别者能方便看到和学习到。所述识别系统包括防伪对象、防伪标识、识别器、数据库及后台等。
9、手机,本发明所述手机通常指现有的未内置显微放大摄像头的智能手机,一般手机有
两个摄像头均为普通风景人像摄影设计,基于光学镜头从光学机理上一个镜头无法兼顾显微放大和普通摄影,以及显微摄像头的公众需求尚不强烈,因此现有手机尚未见自带有显微摄像头的手机,特别是带有适合纹理防伪识别的显微放大摄像头。
实施例1
本实施例提供了一种随机纹理防伪方法,包括下列步骤:
步骤1:选择随机分布有纹理元素1的防伪标识2;如图1所示。
步骤2:获取防伪标识2上随机分布的纹理元素1的分布图像和/或分布图像的特征作为分布特征,并在识别系统的后台中存储生成存储分布特征3;获取所述纹理元素1的固有特征4,所述固有特征4是指防伪标识2的每根纹理元素1在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨,纹理元素1相对于自身尺寸需要至少被放大5-10倍才可分辨出来;比如,如图3所示的识别器拍摄防伪标识2纹理分布中的局部放大图像。
这里的获取所述纹理元素1的固有特征4,是指对于同一种的纹理元素形成的防伪标识的固有特征的首次获取可通过对其进行放大拍照进行并作为该类防伪标识的固有特征存储在后台或附着在防伪标识和/或防伪对象和/或防伪对象的包装上,即从该类纹理标识的第二个起仅需将该防伪标识与存储在后台的固有特征相关联即可或者将放大图片附着在防伪标识和/或防伪对象和/或防伪对象的包装上,以用于后续比对;
步骤3:将防伪标识2附着在防伪对象或防伪对象的包装上;如图13或图15所示。
步骤4:识别时,获取待识别防伪标识2'上随机分布的纹理元素1'的待识别分布特征3'和待识别固有特征4',将获取的待识别分布特征3'和待识别固有特征4'与识别系统后台中存储的存储分布特征3和获取的所述固有特征4分别进行比对,当其中一个比对结果为不相同时,判断待识别防伪标识2'为假,进而待识别防伪标识2'所附着的防伪对象为假;所述待识别固有特征4'是指待识别防伪标识2'上的每根纹理元素1'在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨。
本实施例所述的一种随机纹理防伪方法,包括了分布特征和固有特征的双重比对,所谓固有特征即指防伪标识2的每根纹理元素1在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨;这样造假者通过印刷图案、UV打印的凹凸图案、压纹工艺形成的图案、以及激光微雕形成的图案、类似集成电路光刻工艺形成的图案等现有技术的低成本可控复制图案则失效,因为这些手段都无法复制防伪标识的固有特征;同时对于外部偷窃制造防伪标识的纹理元素的造假者,甚至内部人员来说,在非摆放条件下根本无法得到相同的防伪标识。显然,该防伪方法,能够高度有效地保证防伪标识的可靠性,甚至在纹理元素进入共有领域,或从共有领域中选取纹理元素的情况下,仍能以相同
程度地高度有效地保证防伪标识的可靠性。
作为本实施例的优选,所述步骤4“获取待识别防伪标识2'上随机分布的纹理元素1'的待识别分布特征3'和待识别固有特征4'”是由识别器实现的;
其中所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜,如图12与图11所示,当识别器获取待识别固有特征4'时,所述识别器的放大镜安装在手机摄像头的摄取路径上;或者,
所述识别器包括手机和与手机有线或无线连接的外接显微摄像头,如图9和图10所示,通过外接显微摄像头来获取待识别固有特征4'。
识别器可采用手机加放大镜,如图12与图11所示。手机在当今时代下作为普及的通讯工具,在大多数地方已经是人手一部或人手多部,放大镜价格低廉,容易获取;由手机和放大镜组合得到的识别器使得普通公众便可辨别防伪标识的真假,真正做到价格低廉的一线防伪,这也是首次获得高可靠性、低成本的一线防伪。当然,也可将放大镜用外接显微摄像头替换,如图9和图10。
作为本实施例的优选,所述步骤4中待识别分布特征3'和存储分布特征3的比对在识别系统的后台自动进行;
所述步骤4中待识别固有特征4'和固有特征4的比对在识别系统的后台自动或人工进行。由于待识别分布特征和待识别固有特征的比对均在后台进行,对于识别者而言,毫无技术障碍,比对过程“零负担”,对于识别者来说识别非常简单方便。
实施例2
本实施例为不包含编码的情形。
与实施例1的区别在于,所述步骤4中的“获取待识别防伪标识2'上随机分布的纹理元素1'的待识别分布特征3'和待识别固有特征4'”是通过识别器一次拍摄实现的,拍摄得到待识别防伪标识2'的至少包括部分纹理元素1’的局部放大图像或全部放大图像;
其中所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜,如图12与图11所示,拍摄时,放大镜安装在手机摄像头的摄取路径上;或者,所述识别器包括手机和与手机有线或无线连接的外接显微摄像头,如图9和图10所示,拍摄时,通过所述外接显微摄像头进行拍摄;或者,所述识别器包括电脑和与电脑有线或无线连接的外接显微摄像头,拍摄时,通过外接显微摄像头进行拍摄;或者,所述识别器为独立识别器,所述独立识别器包括显微摄像头。通过识别器一次拍摄即可得到待识别防伪标识2'的放大图像,进而得到所述随机分布的纹理元素1'的待识别分布特征3'和待识别固有特征4',对于识别者来说识别过程中的拍摄行为简单,只需一次拍摄,所用识别器也均在日常生活中比较常见或者可以通过其他渠道获取。
做为优选,所述独立识别器包括至少一个光学放大部、摄像头、内置识别专用APP。
作为优选,所述识别器与识别系统的后台有线或无线相连;
所述步骤4还包括:所述识别器将放大图像发送到所述后台,所述后台接收放大图像后对其进行处理生成待识别分布特征3',接着,所述后台将待识别分布特征3'与后台存储的存储分布特征3逐一进行自动比对;
待识别分布特征3'与后台存储的存储分布特征3的后台自动比对,最终只需将比对结果综合待识别固有特征和固有特征的比对结果,即真伪告知识别者,这对于识别者来说识别中的鉴别过程是“傻瓜式”得,不用考虑太多就可获知识别结果,大大简化识别者的识别程序。
并且,所述步骤4还包括:将放大图像示出的待识别固有特征4'与所述固有特征4进行比对。
进一步的,所述“将放大图像示出的待识别固有特征4'与所有固有特征4进行比对”具体为:
(1)后台自动或人工比对:将放大图像传输到后台并与识别系统后台中根据该待识别防伪标识2'的分布特征调用的固有特征在后台进行人工或自动比对,所述固有特征是指将步骤2中获取的固有特征存储在识别系统的后台中,对于同一种纹理元素形成的一类防伪标识2在首次获取其固有特征时存入后台,从第二次起,将该类防伪标识2的存储分布特征与后台存储的该类防伪标识2的固有特征建立关联,这样,只需存储一次该类防伪标识2的固有特征,大大减少了后台存储系统的数据量;所述固有特征4通过在步骤2中获取的防伪标识的纹理元素的放大图片示出;或者
(2)识别器端人工显示器比对:将在识别器端观察到的放大图像与识别器在识别系统的后台中根据该待识别防伪标识2'的分布特征调取的固有特征在识别器端人工比对,如图18和图19所示,固有特征显示在识别器的显示器上,所述固有特征是指将步骤2中获取的固有特征存储在识别系统的后台中,对于同一种纹理元素形成的一类防伪标识2在首次获取其固有特征时存入后台,从第二次起,将该类防伪标识2的存储分布特征与后台存储的该类防伪标识2的固有特征建立关联,这样,只需存储一次该类防伪标识2的固有特征,大大减少了后台存储系统的数据量。此时,识别器端包括显示器以进行比对,所述固有特征4通过在步骤2中获取的防伪标识的纹理元素的放大图片示出;或者
(3)识别器端人工放大图片比对:将识别器端观察到的放大图像与被印刷在防伪标识2上和/或附着在防伪对象或防伪对象的包装上的放大图片人工比对,来比较待识别固有特征4'和固有特征4是否相同,所述放大图片是在步骤2中拍摄的示出固有特征4的防伪标识2的放大图片。
实施例3
本实施例为不包含编码的情形。
与实施例1的区别在于,所述步骤4中的“获取待识别防伪标识2'上随机分布的纹理元素1'的待识别分布特征3'和待识别固有特征4'”是通过识别器经过两次获取的;
其中,所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜,如图12与图11所示,当获取待识别分布特征3'时,放大镜未设置在手机摄像头的摄取路径上,通过手机摄像头直接获取待识别防伪标识2'的待识别分布特征图像,当获取待识别固有特征4'时,放大镜安装在手机摄像头的摄取路径上,通过手机摄像头和放大镜获取待识别防伪标识2'上的纹理元素1'的放大图像;或者,所述识别器包括手机和与手机有线或无线连接的外接显微摄像头,如图9和图10所示,当获取待识别分布特征3'时,通过手机摄像头直接获取待识别防伪标识2'的待识别分布特征图像,当获取待识别固有特征4'时,通过外接显微摄像头获取待识别防伪标识2'上的纹理元素1'的放大图像。
待识别分布特征3'和待识别固有特征4'”是通过识别器经过两次获取,使得识别方式更加丰富,对于造假者来说,造假难度更大。采用手机摄像头直接获取待识别分布特征图像,其视场相比于安装放大镜方式或者直接通过外接显微摄像头的视场要大,可以获取包含更多纹理元素的分布图案,以避免获取的纹理元素的分布图案中根数过低的情况。
进一步的,所述识别器与识别系统的后台有线或无线相连,所述步骤4还包括:
所述识别器将通过手机摄像头直接获取的待识别防伪标识2'的待识别分布特征图像发送到所述后台,所述后台接收待识别分布特征图像作为待识别分布特征3',所述后台将待识别分布特征3'与后台存储的存储分布特征3进行逐一自动比对;
并且,所述步骤4还包括:
将放大图像示出的待识别固有特征4'与所述固有特征4进行比对。
进一步的,所述“将放大图像示出的待识别固有特征4'与所有固有特征4进行比对”具体为:
(1)后台自动或人工比对:将放大图像传输到后台并与识别系统后台中根据该待识别防伪标识2'的分布特征调用的固有特征在后台进行人工或自动比对,所述固有特征是指将步骤2中获取的固有特征存储在识别系统的后台中,对于同一种纹理元素形成的一类防伪标识2在首次获取其固有特征时存入后台,从第二次起,将该类防伪标识2的存储分布特征与后台存储的该类防伪标识2的固有特征建立关联,这样,只需存储一次该类防伪标识2的固有特征,大大减少了后台存储系统的数据量;所述固有特征4通过在步骤2中获取的防伪标识的纹理元素的放大图片示出;或者
(2)识别器端人工显示器比对:将在识别器端观察到的放大图像与识别器在识别系统的后台中根据该待识别防伪标识2'的分布特征调取的固有特征在识别器端人工比对,所述固有特征是指将步骤2中获取的固有特征存储在识别系统的后台中,对于同一种纹理元素形成的
一类防伪标识2在首次获取其固有特征时存入后台,从第二次起,将该类防伪标识2的存储分布特征与后台存储的该类防伪标识2的固有特征建立关联,这样,只需存储一次该类防伪标识2的固有特征,大大减少了后台存储系统的数据量;如图18和图19所示,此时,识别器端包括显示器以进行比对,所述固有特征4通过在步骤2中获取的防伪标识的纹理元素的放大图片示出;或者
(3)识别器端人工放大图片比对:将识别器端观察到的放大图像与被印刷在防伪标识2上和/或附着在防伪对象或防伪对象的包装上的放大图片人工比对,来比较待识别固有特征4'和固有特征4是否相同,所述放大图片是在步骤2中拍摄的示出固有特征4的防伪标识2的放大图片。
本实施例示出了不含有编码,采用两次获取的情况。
实施例4
本实施例为包括有编码的情形:
与实施例1的区别在于,每个所述防伪标识2还包括至少一个编码5,
所述编码5与所述防伪标识2一一对应,或所述编码5与多个所述防伪标识2相对应;
相应的,每个所述待识别防伪标识2'还包括至少一个编码5';如图2、图13-15所示,
即,可以一标一码,是指每个防伪标识对应于一个唯一的编码;也可以多标一码,是指多个防伪标识采用同一个相同信息的编码,多标一码的一个重要好处在于,可以用普通印刷机制版批量印刷,十分高效和低成本。
所述步骤4中的“获取待识别防伪标识2'上随机分布的纹理元素1'的待识别分布特征3'和待识别固有特征4'”包括:
通过识别器一次拍摄待识别防伪标识2'的至少包括编码5'和部分纹理元素1'的局部放大图像或全部放大图像;
其中所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜,如图11和图12所示,拍摄时,放大镜安装在手机摄像头的摄取路径上;或者,所述识别器包括手机和与手机有线或无线连接的外接显微摄像头,如图9和图10所示,拍摄时,通过所述外接显微摄像头进行拍摄;或者,所述识别器包括电脑和与电脑有线或无线连接的外接显微摄像头,拍摄时,通过外接显微摄像头进行拍摄;或者,
所述识别器为独立识别器,所述独立识别器包括显微摄像头。
做为优选,所述独立识别器包括至少一个光学放大部、摄像头、内置识别专用APP。
优选地,所述编码的边长小于4mm和/或编码区域的面积小于16mm2;优选地,上述的待识别防伪标识2'的编码5'为二维码。即、在放大识别的条件下,允许使用小尺寸的二维码。
进一步的,所述识别器与识别系统的后台有线或无线相连,
所述步骤4还包括:(分布特征比对的第一种方案)
所述识别器将放大图像发送到所述后台,所述后台接收放大图像后对其进行处理生成待识别分布特征3',
接着,所述后台将待识别分布特征3'与后台中存储的存储分布特征3逐一进行自动比对或者后台将待识别分布特征3’与后台根据编码调取的一个或多个存储分布特征3逐一进行自动比对;
并与所述存储分布特征3进行后台自动比对,或显示到到所述识别系统的识别器端进行人工比对;
或者,(分布特征比对的第二种方案)
识别器将放大图像发送到所述后台,所述后台接收放大图像后对其进行处理生成待识别分布特征3’并发回给识别器,并所述后台根据接收到的编码5’调取一个或多个存储分布特征3发回给识别器;所述识别器的显示器显示有接收的待识别分布特征3’和存储分布特征3以供识别器端人工进行比较,其中所述编码预先与一个或多个所述防伪标识2的分布特征相关联;
并且,所述步骤4还包括:
将放大图像示出的待识别固有特征4'与所述固有特征4进行比对。
进一步的,所述“将放大图像示出的待识别固有特征4'与所有固有特征4进行比对”具体为:
(1)后台自动或人工比对:将放大图像传输到后台并与识别系统后台中根据该待识别防伪标识2'的编码调用的固有特征在后台进行人工或自动比对,所述固有特征是指将步骤2中获取的固有特征存储在识别系统的后台中,对于同一种纹理元素形成的一类防伪标识2在首次获取其固有特征时存入后台,从第二次起,通过编码将编码与该类每个防伪标识2的存储分布特征和该类防伪标识的固有特征建立联系,这样,只需存储一次该类防伪标识2的固有特征,大大减少了后台存储系统的数据量;所述固有特征4通过在步骤2中获取的防伪标识的纹理元素的放大图片示出;或者
(2)识别器端人工显示器比对:将在识别器端观察到的放大图像与识别器在识别系统的后台中根据该待识别防伪标识2'的编码调取的固有特征在识别器端人工比对,所述固有特征是指将步骤2中获取的固有特征存储在识别系统的后台中,对于同一种纹理元素形成的一类防伪标识2在首次获取其固有特征时存入后台,从第二次起,通过编码将编码与该类每个防伪标识2的存储分布特征和该类防伪标识的固有特征建立联系,这样,只需存储一次该类防伪标识2的固有特征,大大减少了后台存储系统的数据量;如图18和图19所示,此时,识别器端包括显示器以进行比对,所述固有特征4通过在步骤2中获取的防伪标识的纹理元素的放大图片示出;或者
(3)识别器端人工放大图片比对:将识别器端观察到的放大图像与被印刷在防伪标识2上和/或附着在防伪对象或防伪对象的包装上的放大图片人工比对,来比较待识别固有特征4'和固有特征4是否相同,所述放大图片是在步骤2中拍摄的示出固有特征4的防伪标识2的放大图片。
通过编码来调取存储的存储分布特征3和/或固有特征4,相当于通过编码来进行寻址,大大缩减了后台的比对时间或调出存储的存储分布特征3和/或固有特征4进行人工比对的时间。
通过识别器一次拍摄即可得到待识别防伪标识2'的放大图像,进而得到所述随机分布的纹理元素1'的待识别分布特征3'和待识别固有特征4',对于识别者来说识别过程中的拍摄行为简单,只需一次拍摄,所用识别器也均在日常生活中比较常见或者可以通过其他渠道获取。
实施例5
本实施例为包括有编码的情形:
与实施例1的区别在于,每个所述防伪标识2还包括至少一个编码5,
所述编码5与所述防伪标识2一一对应,或所述编码5与多个所述防伪标识2相对应;
相应的,每个所述待识别防伪标识2'还包括至少一个编码5';如图2、图13-15所示,
即,可以一标一码,是指每个防伪标识对应于一个唯一的编码;也可以多标一码,是指多个防伪标识采用同一个相同信息的编码,多标一码的一个重要好处在于,可以用普通印刷机制版批量印刷,十分高效和低成本。
所述步骤4中的“获取待识别防伪标识2'上随机分布的纹理元素1'的待识别分布特征3'和待识别固有特征4'”包括:
通过识别器分两次获取待识别防伪标识2'的编码5'、待识别分布特征3'和待识别固有特征4';
其中,当识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜,如图11和图12所示,当获取编码5'时,放大镜未设置在手机摄像头的摄取路径上,通过手机摄像头直接获取待识别防伪标识2'的编码5',当获取待识别分布特征3'和待识别固有特征4'时,放大镜安装在手机摄像头的摄取路径上,通过手机摄像头和放大镜获取待识别防伪标识2'上的至少包括部分纹理元素1'的局部放大图像或全部放大图像;或者,
当识别器包括手机和与手机有线或无线连接的外接显微摄像头,如图9和10所示,当获取编码5'时,手机摄像头直接获取待识别防伪标识2'的编码5',当获取待识别分布特征3'和待识别固有特征4'时,通过外接显微摄像头获取待识别防伪标识2'上的至少包括部分纹理元素1'的局部放大图像或全部放大图像。
作为优选,直接通过手机摄像头获取待识别防伪标识2'的编码5',通过对目前常用的智
能手机摄像头进行调查,所述待识别防伪标识2'的编码5'为二维码时,所述二维码的边长大于5mm。
进一步的,所述识别器与识别系统的后台有线或无线相连,
所述步骤4还包括:(分布特征比对的第一种技术方案)
所述识别器将放大图像发送到所述后台,所述后台接收放大图像后对其进行处理生成待识别分布特征3',后台将待识别分布特征3’与后台根据编码5’调取的一个或多个存储分布特征3逐一进行自动比对;
或者,(分布特征比对的第二种技术方案)
识别器将放大图像发送到所述后台,所述后台接收放大图像后对其进行处理生成待识别分布特征3’并发回给识别器,并所述后台根据接收到的编码5’调取一个或多个存储分布特征3发回给识别器;所述识别器的显示器显示有接收的待识别分布特征3’和存储分布特征3以供识别器端人工进行比较
并且,所述步骤4还包括:
将放大图像示出的待识别固有特征4'与所述固有特征4进行比对。
进一步的,所述“将放大图像示出的待识别固有特征4'与所有固有特征4进行比对”具体为:
(1)后台自动或人工比对将放大图像传输到后台并与识别系统后台中根据该待识别防伪标识2'的编码调用的固有特征在后台进行人工或自动比对,所述固有特征是指将步骤2中获取的固有特征存储在识别系统的后台中,对于同一种纹理元素形成的一类防伪标识2在首次获取其固有特征时存入后台,从第二次起,通过编码将编码与该类每个防伪标识2的存储分布特征和该类防伪标识的固有特征建立联系,这样,只需存储一次该类防伪标识2的固有特征,大大减少了后台存储系统的数据量;所述固有特征4通过在步骤2中获取的防伪标识的纹理元素的放大图片示出;或者
(2)识别器人工显示器比对将在识别器端观察到的放大图像与识别器在识别系统的后台中根据该待识别防伪标识2'的编码调取的固有特征在识别器端人工比对,所述固有特征是指将步骤2中获取的固有特征存储在识别系统的后台中,对于同一种纹理元素形成的一类防伪标识2在首次获取其固有特征时存入后台,从第二次起,将该类防伪标识2的存储分布特征与后台存储的该类防伪标识2的固有特征建立关联或者通过编码将编码与该类每个防伪标识2的存储分布特征和该类防伪标识的固有特征建立联系,这样,只需存储一次该类防伪标识2的固有特征,大大减少了后台存储系统的数据量;如图18和图19所示,此时,识别器端包括显示器以进行比对,所述固有特征4通过在步骤2中获取的防伪标识的纹理元素的放大图片示出;或者
(3)识别器人工放大图片比对将识别器端观察到的放大图像与被印刷在防伪标识2上和
/或附着在防伪对象或防伪对象的包装上的放大图片人工比对,来比较待识别固有特征4'和固有特征4是否相同,所述放大图片是在步骤2中拍摄的示出固有特征4的防伪标识2的放大图片。
通过编码来调取存储的存储分布特征3和/或固有特征4,相当于通过编码来进行寻址,大大缩减了后台的比对时间或调出存储的存储分布特征3和/或固有特征4进行人工比对的时间。
实施例6
本实施例为包括有编码的情形:
与实施例1的区别在于,每个所述防伪标识2还包括至少一个编码5,
所述编码5与所述防伪标识2一一对应,或所述编码5与多个所述防伪标识2相对应;
相应的,每个所述待识别防伪标识2'还包括至少一个编码5';如图3、图13-15所示,
即、可以一标一码,是指每个防伪标识对应于一个唯一的编码;也可以多标一码,是指多个防伪标识采用同一个相同信息的编码,多标一码的一个重要好处在于,可以用普通印刷机制版批量印刷,十分高效和低成本。
所述步骤4中的“获取待识别防伪标识2'上随机分布的纹理元素1'的待识别分布特征3'和待识别固有特征4'”包括:
通过识别器分两次获取待识别防伪标识2'的编码5'、待识别分布特征3'和待识别固有特征4';
其中,当识别器包括手机和安装在手机摄像头的摄取路径上的放大镜,如图11和图12所示,所述两次获取包括:通过手机摄像头和放大镜获取待识别防伪标识2'的编码5',和通过手机摄像头和放大镜获取待识别防伪标识2'上的至少包括部分纹理元素1'的局部放大图像或全部放大图像;或者,
当识别器包括手机和与手机有线或无线连接的外接显微摄像头,如图9和图10所示,所述两次获取包括:通过外接显微摄像头获取待识别防伪标识2'的编码5',和通过外接显微摄像头获取待识别防伪标识2'上的至少包括部分纹理元素1'的局部放大图像或全部放大图像;
当识别器包括电脑和与电脑有线或无线连接的外接显微摄像头,所述两次获取包括:通过外接显微摄像头获取待识别防伪标识2'的编码5',和通过外接显微摄像头获取待识别防伪标识2'上的至少包括部分纹理元素1'的局部放大图像或全部放大图像;
当识别器包括独立识别器,所述独立识别器包括显微摄像头,所述两次获取包括:通过独立识别器的显微摄像头获取待识别防伪标识2'的编码5',和通过独立识别器的显微摄像头获取待识别防伪标识2'上的至少包括部分纹理元素1'的局部放大图像或全部放大图像。
优选地,所述编码的边长小于4mm和/或编码区域的面积小于16mm2。作为优选,所述
待识别防伪标识2'的编码5'为二维码。即、在放大识别条件下,允许使用小尺寸的二维码。
进一步的,所述识别器与识别系统的后台有线或无线相连,
所述步骤4还包括:(分布特征比对的第一种技术方案)
所述识别器将放大图像发送到所述后台,所述后台接收放大图像后对其进行处理生成待识别分布特征3',后台将待识别分布特征3’与后台根据编码5’调取的一个或多个存储分布特征3逐一进行自动比对;
或者,(分布特征比对的第二种技术方案)
识别器将放大图像发送到所述后台,所述后台接收放大图像后对其进行处理生成待识别分布特征3’并发回给识别器,并所述后台根据接收到的编码5’调取一个或多个存储分布特征3发回给识别器;所述识别器的显示器显示有接收的待识别分布特征3’和存储分布特征3以供识别器端人工进行比较;
并且,所述步骤4还包括:
将放大图像示出的待识别固有特征4'与所述固有特征4进行比对。
进一步的,所述“将放大图像示出的待识别固有特征4'与所有固有特征4进行比对”具体为:
(1)后台自动或人工比对:将放大图像传输到后台并与识别系统后台中根据该该待识别防伪标识2'的编码调用的固有特征在后台进行人工或自动比对,所述固有特征是指将步骤2中获取的固有特征存储在识别系统的后台中,对于同一种纹理元素形成的一类防伪标识2在首次获取其固有特征时存入后台,从第二次起,通过编码将编码与该类每个防伪标识2的存储分布特征和该类防伪标识的固有特征建立联系,这样,只需存储一次该类防伪标识2的固有特征,大大减少了后台存储系统的数据量;所述固有特征4通过在步骤2中获取的防伪标识的纹理元素的放大图片示出;或者
(2)识别器人工显示器比对:将在识别器端观察到的放大图像与识别器在识别系统的后台中根据该待识别防伪标识2'的编码调取的固有特征在识别器端人工比对,所述固有特征是指将步骤2中获取的固有特征存储在识别系统的后台中,对于同一种纹理元素形成的一类防伪标识2在首次获取其固有特征时存入后台,从第二次起,通过编码将编码与该类每个防伪标识2的存储分布特征和该类防伪标识的固有特征建立联系,这样,只需存储一次该类防伪标识2的固有特征,大大减少了后台存储系统的数据量;如图18和图19所示,此时,识别器端包括显示器以进行比对,所述固有特征4通过在步骤2中获取的防伪标识的纹理元素的放大图片示出;或者
(3)识别器人工放大图片比对将识别器端观察到的放大图像与被印刷在防伪标识2上和/或附着在防伪对象或防伪对象的包装上的放大图片人工比对,来比较待识别固有特征4'和固有特征4是否相同,所述放大图片是在步骤2中拍摄的示出固有特征4的防伪标识2的放大
图片。
通过编码来调取存储的存储分布特征3和/或固有特征4,相当于通过编码来进行寻址,大大缩减了后台的比对时间或调出存储的存储分布特征3和/或固有特征4进行人工比对的时间。
作为实施例1-实施例6的优选方案,所述步骤4中“获取待识别防伪标识2'上随机分布的纹理元素1'待识别固有特征4'”具体为:
通过识别器来获取待识别防伪标识2'上随机分布的纹理元素1'待识别固有特征4',其中获取该待识别固有特征4'时的识别器的视场直径小于或等于1.5cm;在这样的条件下,固有特征能够更充分地发挥作用,即每根纹理元素1'的相同的视觉特征在人眼直接观察下无法分辨,借助识别器且视场直径小于或等于1.5cm时可清楚分辨。
优选地,识别器采用手机9加放大镜,如图11和图12所示。手机在当今时代下作为普及的通讯工具,在大多数地方已经是人手一部或人手多部;放大镜可包括单片透镜12(如图8)或多片透镜11,单片透镜12或多片透镜11为高分子材料,价格低廉,容易获取,单片透镜或多片透镜可为单面(如图8)或双面的凸透镜(如图7);由手机和放大镜组合得到的识别器使得普通公众便可辨别防伪标识的真假,真正做到价格低廉的一线防伪,这也是首次获得高可靠性、低成本的一线防伪。
进一步的,所述放大镜包括粘胶层,通过该粘胶层将所述放大镜粘附在手机上。粘胶层作为连接部件、价格低廉,使用时、保证了放大镜和手机之间的有效固定,使用后,便于拆除、不损伤手机。如图6和图7所示,所述放大镜还可包括安装翼121或安装翼131,所述粘胶层设于所述安装翼上。
进一步的,所述放大镜包括透镜、支撑部和粘胶层,所述支撑部的一侧固定有所述透镜,所述支撑部的另一侧固定有所述粘胶层。其中,在固定有所述粘胶层侧,所述支撑部的侧面突出于所述透镜的侧面,保证支撑部粘接到手机上,避免透镜突出妨碍放大镜的粘接。作为优选,所述防伪标识2上的纹理元素1为密集排列的纹理分布,所述纹理分布区域内,为了综合考虑拍摄效果和单标的人工摆放的仿制成本,纹理密度不小于100根/cm2;优选地,纹理密度不小于1000根/cm2;
优选地,纹理密度不小于10000根/cm2由于采取手机外接放大方式摄取纹理分布图案,所以单根纹理分布图案可以很小,从而单位面积的纹理根数可以更多,因此单标的人工摆放的仿制成本就更高。
作为优选,所述防伪标识2上的纹理元素1为密集排列的纹理分布,所述纹理分布区域内,平均单根纹理元素1的面积可根据所选取摄像头和/或放大镜等的不同进行设定,
优选地,平均单根纹理元素1的面积小于0.3mm2;优选地,平均单根纹理元素1的面积小于0.1mm2;
优选地,平均单根纹理元素1的面积小于0.05mm2。由于采用了放大识别,单个纹理元素可以制作的很小,只要识别器能够分辨其纹理的固有特征即可,由于采取了这样的措施,现有手机的识别纹理可以小到100um的数量级,专用识别器则可以更小,到达几个微米的数量级。
实施例7
本实施例提供了一种随机纹理防伪识别系统,所述识别系统包括识别器和后台,所述识别器与所述后台有线或无线相连;
所述后台中预先存储有防伪标识2的存储分布特征3,所述存储分布特征3是指所述防伪标识2上随机分布的纹理元素1的分布图像和/或分布图像的特征作为分布特征,并在识别系统的后台中存储生成的存储分布特征3;
所述识别系统中还包括有防伪标识2的纹理元素1的固有特征4,所述固有特征4是指防伪标识2的每根纹理元素1在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨;
所述识别器获取附着在防伪对象或防伪对象的包装上的待识别防伪标识2'上随机分布的纹理元素1'的待识别分布特征3'和待识别固有特征4',所述待识别固有特征4'是指待识别防伪标识2'上的每根纹理元素1'在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨;
识别系统将识别器获取的待识别分布特征3'和待识别固有特征4'与后台中存储的存储分布特征3和识别系统中的所述固有特征4分别进行比对,当其中一个比对结果为不相同时,判断待识别防伪标识2'为假,进而待识别防伪标识2'所附着的防伪对象为假。
本实施例所述的一种随机纹理防伪识别系统,包括了分布特征和固有特征的双重比对,所谓固有特征即指防伪标识2的每根纹理元素1在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨;这样造假者通过印刷图案、UV打印的凹凸图案、压纹工艺形成的图案、以及激光微雕形成的图案、类似集成电路光刻工艺形成的图案等现有技术的低成本可控复制图案则失效,因为这些手段都无法复制防伪标识的固有特征;同时对于外部偷窃制造防伪标识的纹理元素的造假者,甚至内部人员来说,在非摆放条件下根本无法得到相同的防伪标识,这就有效的克服了通过对纹理元素本身的结构不断的复杂化靠相对于造假者的领先技术优势来通过有效时间内保密的纹理元素来防伪。显然,该防伪识别系统,能够高度有效地保证防伪标识的可靠性,甚至在纹理元素进入共有领域,或从共有领域中选取纹理元素的情况下,仍能以相同程度地高度有效地保证防伪标识的可靠性。
作为优选,所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜,如图12
与图11所示,当识别器获取待识别固有特征4'时,所述识别器的放大镜安装在手机摄像头的摄取路径上;
或者,所述识别器包括手机和与手机有线或无线连接的外接显微摄像头,如图9和图10所示,通过外接显微摄像头来获取待识别固有特征4'。
识别器可采用手机加放大镜。手机在当今时代下作为普及的通讯工具,在大多数地方已经是人手一部或人手多部,放大镜价格低廉,容易获取;由手机和放大镜组合得到的识别器使得普通公众便可辨别防伪标识的真假,真正做到价格低廉的一线防伪,这也是首次获得高可靠性、低成本的一线防伪。当然,也可将放大镜用外接显微摄像头替换。
实施例8
本实施例为不包含编码的情形:
与实施例7的区别在于,所述识别器通过一次拍摄获取待识别防伪标识2'的至少包括部分纹理元素1’的局部放大图像或全部放大图像,
其中当所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜时,如图12与图11所示,拍摄时,放大镜安装在手机摄像头的摄取路径上,
当所述识别器包括手机和与手机有线或无线连接的外接显微摄像头时,如图9和图10所示,拍摄时,通过所述外接显微摄像头进行拍摄。
通过识别器一次拍摄即可得到待识别防伪标识2'的放大图像,进而得到所述随机分布的纹理元素1'的待识别分布特征3'和待识别固有特征4',对于识别者来说识别过程中的拍摄行为简单,只需进行一次拍摄;其所用识别器也均在日常生活中比较常见或者可以通过其他渠道获取。
进一步的,
分布特征的比对:
所述手机将放大图像发送到后台,所述后台接收放大图像后对其进行处理生成待识别分布特征3';
所述后台将待识别分布特征3'与后台存储的存储分布特征3逐一进行自动比对。
待识别分布特征3'与后台存储的存储分布特征3的后台自动比对,最终只需结合固有特征的比对结果将真伪告知识别者,这对于识别者来说识别中的鉴别过程是“傻瓜式”的,不许考虑太多就可获知识别结果,大大简化识别者的识别程序。
固有特征的比对:
(1)后台自动或人工比对:识别器将放大图像传输到后台并与识别系统后台中根据该待识别防伪标识2'的分布特征调用的固有特征在后台进行人工或自动比对,对于同一种纹理元素形成的一类防伪标识2在首次获取其固有特征时存入后台,从第二次起,将该类防伪标识
2的存储分布特征与后台存储的该类防伪标识2的固有特征建立关联,这样,只需存储一次该类防伪标识2的固有特征,大大减少了后台存储系统的数据量;所述固有特征4通过在获取的防伪标识的纹理元素的放大图片示出;这对于识别者来说识别中的鉴别过程是“傻瓜式”的,不许考虑太多就可获知识别结果,大大简化识别者的识别程序。或者
(2)识别器端人工显示器比对:将识别器在识别系统的后台中根据该待识别防伪标识2'的分布特征调取的固有特征在识别器端人工比对,如图18和图19所示,固有特征显示在识别器的显示器上,对于同一种纹理元素形成的一类防伪标识2在首次获取其固有特征时存入后台,从第二次起,将该类防伪标识2的存储分布特征与后台存储的该类防伪标识2的固有特征建立关联,这样,只需存储一次该类防伪标识2的固有特征,大大减少了后台存储系统的数据量;此时,识别器端包括显示器以进行比对,所述固有特征4通过获取的防伪标识的纹理元素的放大图片示出;在所述识别系统的显示器上进行比对,让识别者参与到鉴别过程中进行互动,更具趣味性。或者
(3)识别器端人工放大图片比对:将识别器端观察到的放大图像与被印刷在防伪标识2上和/或附着在防伪对象或防伪对象的包装上的放大图片人工比对,来比较待识别固有特征4'和固有特征4是否相同,所述放大图片是拍摄的示出固有特征4的防伪标识2的放大图片。
实施例9
本实施例为不包含编码的情形:
与实施例7的区别在于,所述识别器经过两次分别获取待识别防伪标识2'上随机分布的纹理元素1'的待识别分布特征3'和待识别固有特征4',
其中当所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜时,如图12与图11所示,当获取待识别分布特征3'时,放大镜未设置在手机摄像头的摄取路径上,通过手机摄像头直接获取待识别防伪标识2'的待识别分布特征图像,当获取待识别固有特征4'时,放大镜安装在手机摄像头的摄取路径上,通过手机摄像头和放大镜获取待识别防伪标识2'上的纹理元素1'的放大图像,
当所述识别器包括手机和与手机有线或无线连接的外接显微摄像头时,如图9和图10所示,当获取待识别分布特征3'时,通过手机摄像头直接获取待识别防伪标识2'的待识别分布特征图像,当获取待识别固有特征4'时,通过外接显微摄像头获取待识别防伪标识2'上的纹理元素1'的放大图像。
待识别分布特征3'和待识别固有特征4'”是通过识别器经过两次获取,使得识别方式更加丰富,对于造假者来说,造假难度更大。
进一步的,
分布特征的比对:
所述识别器将通过手机摄像头直接获取待识别防伪标识2'的待识别分布特征图像发送到所述后台,所述后台接收待识别分布特征图像作为待识别分布特征3',
所述后台将待识别分布特征3'与后台存储的存储分布特征3进行逐一自动比对;
进一步的,
固有特征的比对:
(1)后台自动或人工比对:识别器将放大图像传输到后台并与识别系统后台中根据该待识别防伪标识2'的分布特征调用的固有特征在后台进行人工或自动比对,对于同一种纹理元素形成的一类防伪标识2在首次获取其固有特征时存入后台,从第二次起,将该类防伪标识2的存储分布特征与后台存储的该类防伪标识2的固有特征建立关联,这样,只需存储一次该类防伪标识2的固有特征,大大减少了后台存储系统的数据量;所述固有特征4通过在获取的防伪标识的纹理元素的放大图片示出;或者
(2)识别器端人工显示器比对:将在识别器端观察到的放大图像与识别器在识别系统的后台中根据该待识别防伪标识2'的分布特征调取的固有特征在识别器端人工比对,固有特征显示在识别器的显示器上,对于同一种纹理元素形成的一类防伪标识2在首次获取其固有特征时存入后台,从第二次起,将该类防伪标识2的存储分布特征与后台存储的该类防伪标识2的固有特征建立关联,这样,只需存储一次该类防伪标识2的固有特征,大大减少了后台存储系统的数据量;如图18和图19所示,此时,识别器端包括显示器以进行比对,所述固有特征4通过在步骤2中获取的防伪标识的纹理元素的放大图片示出;或者
(3)识别器端人工放大图片比对:将识别器端观察到的放大图像与被印刷在防伪标识2上和/或附着在防伪对象或防伪对象的包装上的放大图片人工比对,来比较待识别固有特征4'和固有特征4是否相同,所述放大图片是在步骤2中拍摄的示出固有特征4的防伪标识2的放大图片。
实施例10
本实施例为包括编码的情形:
与实施例7的区别在于,每个所述防伪标识2还包括至少一个编码5,
所述编码5与所述防伪标识2一一对应,或所述编码5与多个所述防伪标识2相对应;
相应的,每个所述待识别防伪标识2'还包括至少一个编码5';如图2、图13-15所示,
即、可以一标一码,是指每个防伪标识对应于一个唯一的编码;也可以多标一码,是指多个防伪标识采用同一个相同信息的编码,多标一码的一个重要好处在于,可以用普通印刷机制版批量印刷,十分高效和低成本。
所述识别器一次拍摄待识别防伪标识2'的至少包括编码5'和部分纹理元素1'的局部放大图像或全部放大图像;
其中当所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜时,如图11和
图12所示,拍摄时,放大镜安装在手机摄像头的摄取路径上,
当所述识别器包括手机和与手机有线或无线连接的外接显微摄像头时,如图9和图10所示,拍摄时,通过所述外接显微摄像头进行拍摄。
分布特征的比对:
(1)第一种方案:所述手机将放大图像发送到后台,所述后台接收放大图像后对其进行处理生成待识别分布特征3',
后台将待识别分布特征3’与后台根据编码5’调取的一个或多个存储分布特征3逐一进行自动比对。
(2)第二种方案:
手机将放大图像发送到所述后台,所述后台接收放大图像后对其进行处理生成待识别分布特征3’并发回给手机,并所述后台根据接收到的编码5’调取一个或多个存储分布特征3发回给手机;所述手机的显示器显示有接收的待识别分布特征3’和存储分布特征3以供手机端人工进行比较。
固有特征比对:
(1)后台自动或人工比对:手机将放大图像传输到后台并与识别系统后台中根据该待识别防伪标识2'的编码调用的固有特征在后台进行人工或自动比对,对于同一种纹理元素形成的一类防伪标识2在首次获取其固有特征时存入后台,从第二次起,通过编码将编码与该类每个防伪标识2的存储分布特征和该类防伪标识的固有特征建立联系,这样,只需存储一次该类防伪标识2的固有特征,大大减少了后台存储系统的数据量;所述固有特征4通过获取的防伪标识的纹理元素的放大图片示出;或者
(2)识别器人工显示器比对:将在识别器端观察到的放大图像与识别器在识别系统的后台中根据该待识别防伪标识2'的编码调取的固有特征在识别器端人工比对,对于同一种纹理元素形成的一类防伪标识2在首次获取其固有特征时存入后台,从第二次起,通过编码将编码与该类每个防伪标识2的存储分布特征和该类防伪标识的固有特征建立联系,这样,只需存储一次该类防伪标识2的固有特征,大大减少了后台存储系统的数据量;如图18和图19所示,固有特征显示在识别器的显示器上,此时,识别器端包括显示器以进行比对,所述固有特征4通过获取的防伪标识的纹理元素的放大图片示出;或者
(3)识别器端人工放大图片比对:将识别器端观察到的放大图像与被印刷在防伪标识2上和/或附着在防伪对象或防伪对象的包装上的放大图片人工比对,来比较待识别固有特征4'和固有特征4是否相同,所述放大图片是拍摄的示出固有特征4的防伪标识2的放大图片。
通过编码来调取存储的存储分布特征3和/或固有特征4,相当于通过编码来进行寻址,大大缩减了后台的比对时间或调出存储的存储分布特征3和/或固有特征4进行人工比对的时间。
通过识别器一次拍摄即可得到待识别防伪标识2'的放大图像,进而得到所述随机分布的纹理元素1'的待识别分布特征3'和待识别固有特征4',对于识别者来说识别过程中的拍摄行为简单,只需进行一次拍摄;所用识别器也均在日常生活中比较常见或者可以通过其他渠道获取。
作为优选,本实施例中采用小编码,包括小二维码,其中小编码的边长小于4mm和/或编码区域的面积小于16mm2。
实施例11
本实施例为包含编码的情形:
与实施例7的区别在于,每个所述防伪标识2还包括至少一个编码5,
所述编码5与所述防伪标识2一一对应,或所述编码5与多个所述防伪标识2相对应;
相应的,每个所述待识别防伪标识2'还包括至少一个编码5';如图2、图13-15所示。
即、可以一标一码,是指每个防伪标识对应于一个唯一的编码;也可以多标一码,是指多个防伪标识采用同一个相同信息的编码,多标一码的一个重要好处在于,可以用普通印刷机制版批量印刷,十分高效和低成本。
所述识别器分两次获取待识别防伪标识2'的编码5'、待识别分布特征3'和待识别固有特征4';
当所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜时,如图11和图12所示,当获取编码5'时,放大镜未设置在手机摄像头的摄取路径上,通过手机摄像头直接获取待识别防伪标识2'的编码5',或者放大镜安装在手机摄像头的摄取路径上,通过手机摄像头和放大镜获取待识别防伪标识2'的编码5',当获取待识别分布特征3'和待识别固有特征4'时,放大镜安装在手机摄像头的摄取路径上,通过手机摄像头和放大镜获取待识别防伪标识2'上的至少包括部分纹理元素1'的局部放大图像或全部放大图像;
当所述识别器包括手机和与手机有线或无线连接的外接显微摄像头时,如图9和10所示,当获取编码5'时,手机摄像头直接获取待识别防伪标识2'的编码5',或者通过外接显微摄像头获取待识别防伪标识2'的编码5',当获取待识别分布特征3'和待识别固有特征4'时,通过外接显微摄像头获取待识别防伪标识2'上的至少包括部分纹理元素1'的局部放大图像或全部放大图像。
分布特征的比对:
(1)第一种技术方案:
所述手机将放大图像发送到后台,所述后台接收放大图像后对其进行处理生成待识别分布特征3',后台将待识别分布特征3’与后台根据编码5’调取的一个或多个存储分布特征3逐一进行自动比对;
(2)第二种技术方案:
所述手机将放大图像发送到所述后台,所述后台接收放大图像后对其进行处理生成待识别分布特征3’并发回给手机,并所述后台根据接收到的编码5’调取一个或多个存储分布特征3发回给手机;所述手机的显示器显示有接收的待识别分布特征3’和存储分布特征3以供识别器端人工进行比较。
固有特征的比对:
(1)后台自动或人工比对:手机将放大图像传输到后台并与识别系统后台中根据该待识别防伪标识2'的编码调用的固有特征在后台进行人工或自动比对,对于同一种纹理元素形成的一类防伪标识2在首次获取其固有特征时存入后台,从第二次起,通过编码将编码与该类每个防伪标识2的存储分布特征和该类防伪标识的固有特征建立联系,这样,只需存储一次该类防伪标识2的固有特征,大大减少了后台存储系统的数据量;所述固有特征4通过获取的防伪标识的纹理元素的放大图片示出;或者
(2)识别器人工显示器比对:将在手机端观察到的放大图像与识别器在识别系统的后台中根据该待识别防伪标识2'的编码调取的固有特征在识别器端人工比对,对于同一种纹理元素形成的一类防伪标识2在首次获取其固有特征时存入后台,从第二次起,通过编码将编码与该类每个防伪标识2的存储分布特征和该类防伪标识的固有特征建立联系,这样,只需存储一次该类防伪标识2的固有特征,大大减少了后台存储系统的数据量;如图18和图19所示,固有特征显示在识别器的显示器上,此时,识别器端包括显示器以进行比对,所述固有特征4通过获取的防伪标识的纹理元素的放大图片示出;或者
(3)识别器端人工放大图片比对:将识别器端观察到的放大图像与被印刷在防伪标识2上和/或附着在防伪对象或防伪对象的包装上的放大图片人工比对,来比较待识别固有特征4'和固有特征4是否相同,所述放大图片是拍摄的示出固有特征4的防伪标识2的放大图片。
通过编码来调取存储的存储分布特征3和/或固有特征4,相当于通过编码来进行寻址,大大缩减了后台的比对时间或调出存储的存储分布特征3和/或固有特征4进行人工比对的时间。
实施例12
本实施例为包含编码的情形:
与实施例7的区别在于,所述识别器包括电脑和与电脑有线或无线连接的外接显微摄像头,拍摄时,通过外接显微摄像头进行拍摄;或者,
所述识别器包括独立识别器,所述独立识别器包括显微摄像头。
作为优选,所述识别器通过一次拍摄获取待识别防伪标识2'的放大图像。
或者每个所述防伪标识2还包括至少一个编码5,
所述编码5与所述防伪标识2一一对应,或所述编码5与多个所述防伪标识2相对应;
相应的,每个所述待识别防伪标识2'还包括至少一个编码5';如图3、图13-15所示,
即、可以一标一码,是指每个防伪标识对应于一个唯一的编码;也可以多标一码,是指多个防伪标识采用同一个相同信息的编码,多标一码的一个重要好处在于,可以用普通印刷机制版批量印刷,十分高效和低成本。
所述识别器一次拍摄待识别防伪标识2'的至少包括编码5'和部分纹理元素1'的局部放大图像或全部放大图像;或者,
所述识别器分两次获取待识别防伪标识2'的编码5'、待识别分布特征3'和待识别固有特征4',
当所述识别器包括电脑和与电脑有线或无线连接的外接显微摄像头时,所述两次获取包括:通过外接显微摄像头获取待识别防伪标识2'的编码5',和通过外接显微摄像头获取待识别防伪标识2'上的至少包括部分纹理元素1'的局部放大图像或全部放大图像;
当所述识别器包括独立识别器时,所述独立识别器包括显微摄像头,所述两次获取包括:通过独立识别器的显微摄像头获取待识别防伪标识2'的编码5',和通过独立识别器的显微摄像头获取待识别防伪标识2'上的至少包括部分纹理元素1'的局部放大图像或全部放大图像。
分布特征的对比:
(1)第一种方案:所述识别器将放大图像发送到所述后台,所述后台接收放大图像后对其进行处理生成待识别分布特征3',后台将待识别分布特征3’与后台根据编码5’调取的一个或多个存储分布特征3逐一进行自动比对。
(2)第一种方案:
识别器将放大图像发送到所述后台,所述后台接收放大图像后对其进行处理生成待识别分布特征3’并发回给识别器,并所述后台根据接收到的编码5’调取一个或多个存储分布特征3发回给识别器;所述识别器的显示器显示有接收的待识别分布特征3’和存储分布特征3以供识别器端人工进行比较。
固有特征比对:
(1)后台自动或人工比对:,识别器将放大图像传输到后台并与识别系统后台中根据该待识别防伪标识2'的分布特征或该待识别防伪标识2'的编码调用的固有特征在后台进行人工或自动比对,对于同一种纹理元素形成的一类防伪标识2在首次获取其固有特征时存入后台,从第二次起,通过编码将编码与该类每个防伪标识2的存储分布特征和该类防伪标识的固有特征建立联系,这样,只需存储一次该类防伪标识2的固有特征,大大减少了后台存储系统的数据量;所述固有特征4通过获取的防伪标识的纹理元素的放大图片示出;或者
(2)识别器人工显示器比对:将在识别器端观察到的放大图像与识别器在识别系统的后台中根据该待识别防伪标识2'的分布特征或该待识别防伪标识2'的编码调取的固有特征在识
别器端人工比对,对于同一种纹理元素形成的一类防伪标识2在首次获取其固有特征时存入后台,从第二次起,通过编码将编码与该类每个防伪标识2的存储分布特征和该类防伪标识的固有特征建立联系,这样,只需存储一次该类防伪标识2的固有特征,大大减少了后台存储系统的数据量;如图18和图19所示,此时,识别器端包括显示器以进行比对,所述固有特征4通过获取的防伪标识的纹理元素的放大图片示出;或者
(3)识别器端人工放大图片比对:将识别器端观察到的放大图像与被印刷在防伪标识2上和/或附着在防伪对象或防伪对象的包装上的放大图片人工比对,来比较待识别固有特征4'和固有特征4是否相同,所述放大图片是在拍摄的示出固有特征4的防伪标识2的放大图片。
通过编码来调取存储的存储分布特征3和/或固有特征4,相当于通过编码来进行寻址,大大缩减了后台的比对时间或调出存储的存储分布特征3和/或固有特征4进行人工比对的时间。
作为优选,本实施例中采用小编码,包括小二维码,其中小编码的边长小于4mm和/或编码区域的面积小于16mm2。
作为实施例7-实施例12的优选方案,
当识别器获取待识别防伪标识2'上随机分布的纹理元素1'待识别固有特征4'时,识别器的视场直径小于或等于1.5cm。
在这样的条件下,固有特征能够更充分地发挥作用,即每根纹理元素1'的相同的视觉特征在人眼直接观察下无法分辨,借助识别器且视场直径小于或等于1.5cm时可清楚分辨。
优选地,识别器采用手机9加放大镜,如图11和图12所示。手机在当今时代下作为普及的通讯工具,在大多数地方已经是人手一部或人手多部;放大镜可包括单片透镜12(如图6或图8)或多片透镜11(如图5),单片透镜12或多片透镜11为高分子材料,价格低廉,容易获取,单片透镜或多片透镜可为单面凸透镜122(如图8)或双面凸透镜132(如图7);;由手机和放大镜组合得到的识别器使得普通公众便可辨别防伪标识的真假,真正做到价格低廉的一线防伪,这也是首次获得高可靠性、低成本的一线防伪。当然,也可将放大镜用外接显微摄像头替换。
进一步的,所述放大镜包括粘胶层,通过该粘胶层将所述放大镜粘附在手机上。粘胶层作为连接部件、价格低廉,使用时、保证了放大镜和手机之间的有效固定,使用后,便于拆除、不损伤手机。
如图6和图7所示,所述放大镜还可包括安装翼121或安装翼131,所述粘胶层设于所述安装翼上。
进一步的,所述放大镜包括透镜、支撑部和粘胶层,所述支撑部的一侧固定有所述透镜,所述支撑部的另一侧固定有所述粘胶层。其中,在固有所述粘胶层侧,所述支撑部的侧面突
出于所述透镜的侧面,保证支撑部粘接到手机上,避免透镜突出妨碍放大镜的粘接。
实施例13
一种随机纹理防伪系统,其特征在于:包括防伪对象、防伪标识(如图13)和随机纹理的防伪识别系统,其中,所述防伪标识附着在防伪对象或防伪对象的包装上,所述防伪标识为随机分布有纹理元素1的防伪标识2,防伪标识2上随机分布的纹理元素1的分布图像和/或分布图像的特征作为分布特征,并在后台中存储生成存储分布特征3,防伪标识2还包括固有特征4,所述固有特征是指防伪标识2的每根纹理元素1在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨;
所述随机纹理的防伪识别系统通过获取待识别防伪标识2'上随机分布的纹理元素1'的待识别分布特征3'和待识别固有特征4',将获取的待识别分布特征3'和待识别固有特征4'与后台中存储分布特征3所述固有特征4分别进行比对,当其中一个比对结果为不相同时,判断待识别防伪标识2'为假,进而待识别防伪标识2'所附着的防伪对象为假;所述待识别固有特征4'是指待识别防伪标识2'上的每根纹理元素1'在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨。
本实施例所述的一种随机纹理防伪系统,包括了分布特征和固有特征的双重比对,所谓固有特征即指防伪标识2的每根纹理元素1在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨;这样造假者通过印刷图案、UV打印的凹凸图案、压纹工艺形成的图案、以及激光微雕形成的图案、类似集成电路光刻工艺形成的图案等现有技术的低成本可控复制图案则失效,因为这些手段都无法复制防伪标识的固有特征;同时对于外部偷窃制造防伪标识的纹理元素的造假者,甚至内部人员来说,在非摆放条件下根本无法得到相同的防伪标识。显然,该防伪系统,能够高度有效地保证防伪标识的可靠性,甚至在纹理元素进入共有领域,或从共有领域中选取纹理元素的情况下,仍能以相同程度地高度有效地保证防伪标识的可靠性。
进一步的,所述随机纹理的防伪识别系统为实施例7-12中的随机纹理防伪识别系统。
做为优选,所述识别系统(或者实施例7-12中的防伪识别系统中)还包括有放大识别说明,以能为识别者所知道;所述放大识别说明印刷在防伪标识2上(如图14);和/或是放大识别说明附着在被防伪的产品及产品的包装上(如图13或图15);和/或显示在识别器的显示器上,和/或显示在后台显示器上;和/或所述防伪标识2和/或被防伪的产品和/或产品的包装上包含编码5,所述放大识别说明可包含在编码中5;和/或所述放大识别说明包含纹理元素固有特征4放大后的图像。
进一步的,所述编码5可为二维码。
作为优选,所述防伪标识2上的纹理元素1为密集排列的纹理分布,所述防伪标识2上的纹理元素1为密集排列的纹理分布,所述纹理分布区域内,为了综合考虑拍摄效果和单标
的人工摆放的仿制成本,所述纹理分布区域内,纹理密度不小于100根/cm2;优选地,纹理密度不小于1000根/cm2;优选地,纹理密度不小于10000根/cm2。由于采取手机外接放大方式摄取纹理分布图案,所以单根纹理分布图案可以很小,从而单位面积的纹理根数可以更多,因此单标的人工摆放的仿制成本就更高。
进一步的,
所述防伪标识2上的纹理元素1为密集排列的纹理分布,所述纹理分布区域内,平均单根纹理元素1的面积可根据所选取摄像头和/或放大镜等的不同进行设定,平均单根纹理元素1的面积小于0.3mm2;优选地,平均单根纹理元素1的面积小于0.1mm2;优选地,平均单根纹理元素1的面积小于0.05mm2。由于采用了放大识别,单个纹理元素可以制作的很小,只要识别器能够分辨其纹理的整体轮廓即可,由于采取了这样的措施,现有手机的识别纹理可以小到100um的数量级,专用识别器则可以更小,到达几个微米的数量级。
实施例14
作为以上所有实施例的优选,如图17和图19所示,所述固有特征4为纹理元素1被放大观察的立体结构;和/或为单个多色纹理元素1的放大多色特征,所述单个多色纹理元素1上至少含有二个不同的色彩单元,并且所述不同的色彩单元能为放大识别所区分;和/或为具有一定厚度的纹理元素1的放大阴影特征,当放大观察且用倾斜光照射时能产生阴影,放大后的阴影能被人眼所观察或者是能被识别器所测试。
所述识别器含有照明光源8,照明光源8倾斜照射纹理元素1,以观测纹理元素1的阴影效果。
所述识别器设置有两个光源,并处于不同的方位,两个光源倾斜交替照射纹理,以观测纹理阴影交替出现的效果。
作为一种技术方案:所述固有特征的放大图片置入所述二维码内,并在二维码被扫时在显示器上被显示,如图15。
进一步的,所述固有特征4为纹理元素1被放大观察的立体结构;和/或为单个多色纹理元素1,所述单个多色纹理元素1上至少含有二个不同的色彩单元,并且所述不同的色彩单元能为放大条件识别时所区分;和/或为具有一定厚度的纹理元素1,当放大观察且用倾斜光照射时能产生阴影,放大后的阴影能被人眼所观察或者是能被识别器所测试。
实施例15
与实施例13不同的是,所述识别系统包括产品的包装,包装上印刷有纹理元素1固有特征4的放大图片7。如图13所示。
或者,所述识别系统包括印刷有纹理元素1固有特征4的放大图片7的标签纸直接放入
被防伪产品的包装盒内。如图14所示。
实施例16:
与上述所有实施例不同的是,印刷有纹理元素1固有特征4的放大图片7的不干胶标签纸直接贴在被防伪的产品上。
图15是将纹理防伪标识2附着在被防伪产品的包装盒上,包装盒上还印刷有二维码,所述固有特征的放大图片置入所述二维码内,并在二维码被扫时在识别器显示器上被显示或在后台的屏幕上显示。
图16是纹理元素1的固有特征4为立体特征和带两个不同色彩单元的色彩特征的放大图片7。图17是纹理元素1的固有特征4为阴影特征的放大图片7。显示了纹理元素1不同的固有特征4的放大图片7状态。图17中具有放大功能的识别器含有照明光源8,照明光源8倾斜照射纹理元素1,就可以观测纹理元素1放大的阴影效果,即固有特征4是阴影效果,这是印刷等手段无法仿冒的。所述识别器还可设置有两个光源,并处于不同的方位,两个光源倾斜交替照射纹理,以观测纹理阴影交替出现的效果。
纹理元素1的固有特征4的放大图片7可以是放大识别说明的一部分,放大识别说明呈现在识别系统中,以能为识别者所知道;所述放大识别说明印刷在防伪标识2上;和/或是放大识别说明附着在被防伪的产品及产品的包装上;和/或显示在识别器的显示器上,和/或显示在后台显示器上;和/或所述防伪标识2和/或被防伪的产品和/或产品的包装上包含二维码5,所述放大识别说明包含在二维码5中;和/或所述放大识别说明包含纹理元素固有特征4放大后的图像。
实施例17
一种随机纹理防伪识别系统,包括识别系统,所述识别系统包括防伪标识2、被防伪的产品、被防伪的产品的包装、识别器的显示器、后台显示器的一种或多种识别器件,见图13,所述识别系统中具有可呈现的固有特征4的放大图片7,所述固有特征4为防伪标识2上随机分布的纹理元素1的固有特征,并见图14,所述固有特征4是指每个纹理元素1被放大观察时都具有相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法直接分辨;所述固有特征4的放大图片7被用于与防伪标识2的固有特征4被放大后得到的放大图像进行对比,以判断防伪标识2的真伪。
所述识别系统的识别器件上还设置有放大识别说明,所述固有特征4设置在所述放大识别说明上。所述识别器件上还设置有二维码5(见图15),所述固有特征的放大图片7置入所述二维码内,并在二维码6被扫时在显示器上被显示。
所述固有特征4为纹理元素1被放大观察的立体结构,见图16、图17的三个长方体结构;和/或为单个多色纹理元素1,所述单个多色纹理元素1上至少含有二个不同的色彩单元,见图16、17的黑白两色,并且所述不同的色彩单元能为放大条件识别时所区分;和/或为具
有一定厚度的纹理元素1,见图/17的阴影部分,当放大观察且用倾斜光照射时能产生阴影,放大后的阴影能被人眼所观察或者是能被识别器所测试。
以上所有实施例中所述的识别过程是由安装在识别器内部的专用APP进行的,其中,对编码的获取可通过专用APP或通用APP来实现。
以上所述实施例中对应该类的防伪标识的固有特征,(优选地,示出该固有特征的放大图片)可被存储入后台,可被包含在防伪标识上、可被包含在放大识别说明中,也可被附着在防伪对象或防伪对象的包装上,还可以为后台工作的工作人员通过观察后记住的固有特征,还可以为教科说、杂志等书刊上已有的固有特征。
实施例18
本发明还提供一种随机纹理防伪产品,用于上述的随机纹理防伪系统中,所述防伪产品包括防伪对象、防伪标识和放大镜,
其中,
所述防伪标识为其上随机分布有纹理元素的防伪标识,
所述防伪标识被附着在所述防伪对象或所述防伪对象的包装上,
所述放大镜可用于与手机组成识别器来识别所述防伪标识,所述放大镜作为所述识别器的可拆卸部件,当放大镜安装在手机摄像头的摄取路径上时,所述放大镜作为识别器的执行部件,当放大镜未安装在手机摄像头的摄取路径上时,所述放大镜作为识别器的非执行部件。
提供的防伪产品的目的是解决公众防伪中利用放大镜进行防伪识别成本较高的问题。在目前的防伪领域里面,放大镜由于比较昂贵,与产品放在一起仅仅进行防伪识别,使得防伪产品的成本很高,进入不了公众防伪领域;随着科技的发展,特别是注塑放大镜的出现,使得放大镜的成本大幅降低,进而使得放大镜从二线防伪进入一线防伪,即公众防伪,使得防伪对象、放大镜和防伪标识作为一个整体产品进入公众防伪领域,成为一种可推广的可能。进一步与随机纹理防伪系统结合进入公众识别领域,给公众识别领域的防伪技术带来一次飞跃性的突破。当今社会中人们无时无刻不在使用手机,手机已经成了人体的一部分,相当于一个外部的器官存在。
优选地,
所述防伪标识具有分布特征和固有特征,所述分布特征为该防伪标识上随机分布的纹理元素的分布图像和/或分布图像的特征;所述固有特征是指所述防伪标识上随机分布的纹理元素在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨;
放大镜作为执行部件和/或非执行部件时的识别器可获取待识别防伪标识的待识别分布特征和待识别固有特征并用于分别与所述分布特征和固有特征进行比对来判断防伪对象的真
假,当有一个比对结果为不相同时,判断待识别防伪标识为假,进而待识别防伪标识所附着的防伪对象为假,所述待识别固有特征是指待识别防伪标识上的每根纹理元素在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨;
其中获取待识别防伪标识的待识别固有特征时,所述放大镜作为执行部件。
Claims (40)
- 一种随机纹理防伪方法,包括下列步骤:步骤1:选择随机分布有纹理元素(1)的防伪标识(2);步骤2:获取所述防伪标识(2)上随机分布的纹理元素(1)的分布图像和/或分布图像的特征作为分布特征,并在识别系统的后台中存储生成存储分布特征(3);获取所述纹理元素(1)的固有特征(4),所述固有特征(4)是指防伪标识(2)的每根纹理元素(1)在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨;步骤3:将防伪标识(2)附着在防伪对象或防伪对象的包装上;步骤4:识别时,获取待识别防伪标识(2')上随机分布的纹理元素(1')的待识别分布特征3'和待识别固有特征(4'),将获取的待识别分布特征(3')和待识别固有特征(4')与识别系统后台中存储的存储分布特征(3)和获取的所述固有特征(4)分别进行比对,当其中一个比对结果为不相同时,判断待识别防伪标识(2')为假,进而待识别防伪标识(2')所附着的防伪对象为假;所述待识别固有特征(4')是指待识别防伪标识(2')上的每根纹理元素(1')在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨。
- 根据权利要求1所述的随机纹理防伪方法,其特征在于:所述步骤4中“获取待识别防伪标识(2')上随机分布的纹理元素(1')待识别固有特征(4')”具体为:通过识别器来获取待识别防伪标识(2')上随机分布的纹理元素(1')待识别固有特征(4'),其中获取该待识别固有特征(4')时的识别器的视场直径小于或等于1.5cm。
- 根据权利要求1所述的随机纹理防伪方法,其特征在于:所述步骤4“获取待识别防伪标识(2')上随机分布的纹理元素(1')的待识别分布特征(3')和待识别固有特征(4')”是由识别器实现的;其中所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜,当识别器获取待识别固有特征(4')时,所述识别器的放大镜安装在手机摄像头的摄取路径上;或者,所述识别器包括手机和与手机有线或无线连接的外接显微摄像头,通过外接显微摄像头来获取待识别固有特征(4')。
- 根据权利要求3所述的随机纹理防伪方法,其特征在于:所述放大镜包括粘胶层,通过该粘胶层将所述放大镜粘附在手机上。
- 根据权利要求4所述的随机纹理防伪方法,其特征在于:所述放大镜包括透镜、支撑部和粘胶层,所述支撑部的一侧固定有所述透镜,所述支撑部的另一侧固定有所述粘胶层。
- 根据权利要求5所述的随机纹理防伪方法,其特征在于:在固定有所述粘胶层侧,所述支撑部的侧面突出于所述透镜的侧面。
- 根据权利要求1所述的随机纹理防伪方法,其特征在于:所述步骤4中待识别分布特征(3')和存储分布特征(3)的比对在识别系统的后台自动进行;所述步骤4中待识别固有特征(4')和固有特征(4)的比对在识别系统的后台自动或人工进行。
- 根据权利要求1所述的随机纹理防伪方法,其特征在于:所述步骤4中的“获取待识别防伪标识(2')上随机分布的纹理元素(1')的待识别分布特征(3')和待识别固有特征(4')”是通过识别器一次拍摄实现的,拍摄得到待识别防伪标识(2')的至少包括部分纹理元素(1')的局部放大图像或全部放大图像;其中所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜,拍摄时,放大镜安装在手机摄像头的摄取路径上;或者,所述识别器包括手机和与手机有线或无线连接的外接显微摄像头,拍摄时,通过所述外接显微摄像头进行拍摄;或者,所述识别器包括电脑和与电脑有线或无线连接的外接显微摄像头,拍摄时,通过外接显微摄像头进行拍摄;或者,所述识别器为独立识别器,所述独立识别器包括显微摄像头。
- 根据权利要求1所述的随机纹理防伪方法,其特征在于:所述步骤4中的“获取待识别防伪标识(2')上随机分布的纹理元素(1')的待识别分布特征(3')和待识别固有特征(4')”是通过识别器经过两次获取的;其中,所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜,当获取待识别分布特征(3')时,放大镜未设置在手机摄像头的摄取路径上,通过手机摄像头直接获取待识别防伪标识(2')的待识别分布特征图像,当获取待识别固有特征(4')时,放大镜安装在手机摄像头的摄取路径上,通过手机摄像头和放大镜获取待识别防伪标识(2')上的纹理元素(1')的放大图像;或者,所述识别器包括手机和与手机有线或无线连接的外接显微摄像头,当获取待识别分布特征(3')时,通过手机摄像头直接获取待识别防伪标识(2')的待识别分布特征图像,当获取待识别固有特征(4')时,通过外接显微摄像头获取待识别防伪标识(2')上的纹理元素(1')的放大图像。
- 根据权利要求1所述的随机纹理防伪方法,其特征在于:每个所述防伪标识(2)还包括至少一个编码(5),所述编码(5)与所述防伪标识(2)一一对应,或所述编码(5)与多个所述防伪标识(2)相对应;相应的,每个所述待识别防伪标识(2')也包括至少一个编码(5');所述步骤4中的“获取待识别防伪标识(2')上随机分布的纹理元素(1')的待识别分布特征(3')和待识别固有特征(4')”包括:通过识别器一次拍摄待识别防伪标识(2')的至少包括编码(5')和部分纹理元素(1')的局部放大图像或全部放大图像;其中所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜,拍摄时,放大镜安装在手机摄像头的摄取路径上;或者,所述识别器包括手机和与手机有线或无线连接的外接显微摄像头,拍摄时,通过所述外接显微摄像头进行拍摄;或者,所述识别器包括电脑和与电脑有线或无线连接的外接显微摄像头,拍摄时,通过外接显微摄像头进行拍摄;或者,所述识别器为独立识别器,所述独立识别器包括显微摄像头。
- 根据权利要求10所述的随机纹理防伪方法,其特征在于:所述待识别防伪标识(2')的编码(5')的边长小于4mm和/或编码区域的面积小于16mm2;优选地,所述编码为二维码。
- 根据权利要求1所述的随机纹理防伪方法,其特征在于:每个所述防伪标识(2)还包括至少一个编码(5),所述编码(5)与所述防伪标识(2)一一对应,或所述编码(5)与多个所述防伪标识(2)相对应;相应的,每个所述待识别防伪标识(2')也包括至少一个编码(5');所述步骤4中的“获取待识别防伪标识(2')上随机分布的纹理元素(1')的待识别分布特征(3')和待识别固有特征(4')”包括:通过识别器分两次获取待识别防伪标识(2')的编码(5')、待识别分布特征(3')和待识别固有特征(4');其中,所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜,当获取编码(5')时,放大镜未设置在手机摄像头的摄取路径上,通过手机摄像头直接获取待识别防伪标识(2')的编码(5'),当获取待识别分布特征(3')和待识别固有特征(4')时,放大镜安装在手机摄像头的摄取路径上,通过手机摄像头和放大镜获取待识别防伪标识(2')上的至少包括部分纹理元素(1')的局部放大图像或全部放大图像;或者,所述识别器包括手机和与手机有线或无线连接的外接显微摄像头,当获取编码(5')时,手机摄像头直接获取待识别防伪标识(2')的编码(5'),当获取待识别分布特征(3')和待识别固有特征(4')时,通过外接显微摄像头获取待识别防伪标识(2')上的至少包括部分纹理元素(1')的局部放大图像或全部放大图像。
- 根据权利要求12所述的随机纹理防伪方法,其特征在于:所述待识别防伪标识(2')的编码(5')为二维码,所述二维码的边长大于5mm。
- 根据权利要求1所述的随机纹理防伪方法,其特征在于:每个所述防伪标识(2)还包括至少一个编码(5),所述编码(5)与所述防伪标识(2)一一对应,或所述编码(5)与多个所述防伪标识(2)相对应;相应的,每个所述待识别防伪标识(2')也包括至少一个编码(5');所述步骤4中的“获取待识别防伪标识(2')上随机分布的纹理元素(1')的待识别分布特征(3')和待识别固有特征(4')”包括:通过识别器分两次获取待识别防伪标识(2')的编码(5')、待识别分布特征(3')和待识别固有特征(4');其中,所述识别器包括手机安装在手机摄像头的摄取路径上的放大镜,所述两次获取包括:通过手机摄像头和放大镜获取待识别防伪标识(2')的编码(5'),和通过手机摄像头和放大镜获取待识别防伪标识(2')上的至少包括部分纹理元素(1')的局部放大图像或全部放大图像以获取待识别分布特征(3')和待识别固有特征(4');或者,所述识别器包括手机和与手机有线或无线连接的外接显微摄像头,所述两次获取包括:通过外接显微摄像头获取待识别防伪标识(2')的编码(5'),和通过外接显微摄像头获取待识别防伪标识(2')上的至少包括部分纹理元素(1')的局部放大图像或全部放大图像以获取待识别分布特征(3')和待识别固有特征(4');所述识别器包括电脑和与电脑有线或无线连接的外接显微摄像头,所述两次获取包括:通过外接显微摄像头获取待识别防伪标识(2')的编码(5'),和通过外接显微摄像头获取待识别防伪标识(2')上的至少包括部分纹理元素(1')的局部放大图像或全部放大图像以获取待识别分布特征(3')和待识别固有特征(4');所述识别器为独立识别器,所述独立识别器包括显微摄像头,所述两次获取包括:通过独立识别器的显微摄像头获取待识别防伪标识(2')的编码(5'),和通过独立识别器的显微摄像头获取待识别防伪标识(2')上的至少包括部分纹理元素(1')的局部放大图像或全部放大图像以获取待识别分布特征(3')和待识别固有特征(4')。
- 根据权利要求14所述的随机纹理防伪方法,其特征在于:所述待识别防伪标识(2')的编码(5')的边长小于4mm和/或编码区域的面积小于16mm2;优选地,所述编码为二维码。
- 根据权利要求7-15之一所述的随机纹理防伪方法,其特征在于:所述识别器与识别系统的后台有线或无线相连,所述步骤4还包括:所述识别器将放大图像发送到所述后台,所述后台接收放大图像后对其进行处理生成待识别分布特征(3'),或者所述识别器将通过手机摄像头直接获取待识别防伪标识(2')的待识别分布特征图像发送到所述后台,所述后台接收待识别分布特征图像作为待识别分布特征(3'),接着,所述后台将待识别分布特征(3')与后台中存储的存储分布特征(3)逐一进行自动比对或者后台将待识别分布特征(3')与后台根据编码(5')调取的一个或多个存储分布特征(3)逐一进行自动比对,其中所述编码预先与一个或多个所述防伪标识(2)的分布特征相关联;或者,所述识别器将放大图像发送到所述后台,所述后台接收放大图像后对其进行 处理生成待识别分布特征(3')并发回给识别器,并所述后台根据接收到的编码(5')调取一个或多个存储分布特征(3)发回给识别器;所述识别器的显示器显示有接收的待识别分布特征(3')和存储分布特征(3)以供识别器端人工进行比较,其中所述编码预先与一个或多个所述防伪标识(2)的分布特征相关联;并且,所述步骤4还包括:将放大图像示出的待识别固有特征(4')与所述固有特征(4)进行比对。
- 根据权利要求16所述的随机纹理防伪方法,其特征在于:所述“将放大图像示出的待识别固有特征(4')与所有固有特征(4)进行比对”具体为:将放大图像传输到后台并与识别系统后台中根据该待识别防伪标识(2')的分布特征或该待识别防伪标识(2')的编码调用的固有特征在后台进行人工或自动比对,所述固有特征是指将步骤2中获取的固有特征存储在识别系统的后台中,对于同一种纹理元素形成的一类防伪标识(2)在首次获取其固有特征时存入后台,从第二次起,将该类防伪标识(2)的存储分布特征与后台存储的该类防伪标识(2)的固有特征建立关联或者通过编码将编码与对应的防伪标识(2)的存储分布特征和该类防伪标识的固有特征建立联系,所述固有特征(4)通过在步骤2中获取的防伪标识的纹理元素的放大图片示出;或者将在识别器端观察到的放大图像与识别器在识别系统的后台中根据该待识别防伪标识(2')的分布特征或该待识别防伪标识(2')的编码调取的固有特征在识别器端人工比对,所述固有特征是指将步骤2中获取的固有特征存储在识别系统的后台中,对于同一种纹理元素形成的一类防伪标识(2)在首次获取其固有特征时存入后台,从第二次起,将该类防伪标识(2)的存储分布特征与后台存储的该类防伪标识(2)的固有特征建立关联或者通过编码将编码与对应的防伪标识(2)的存储分布特征和该类防伪标识的固有特征建立联系,此时,识别器端包括显示器以进行比对,所述固有特征(4)通过在步骤2中获取的防伪标识的纹理元素的放大图片示出;或者将识别器端观察到的放大图像与被印刷在防伪标识(2)上和/或附着在防伪对象或防伪对象的包装上的放大图片人工比对,来比较待识别固有特征(4')和固有特征(4)是否相同,所述放大图片是在步骤2中拍摄的示出固有特征(4)的防伪标识(2)的放大图片。
- 根据权利要求1-17之一所述的随机纹理防伪方法,其特征在于:所述防伪标识(2)上的纹理元素(1)为密集排列的纹理分布,所述纹理分布区域内,纹理密度不小于100根/cm2;优选地,纹理密度不小于1000根/cm2;优选地,纹理密度不小于10000根/cm2。
- 根据权利要求1-17之一所述的随机纹理防伪方法,其特征在于:所述防伪标识(2)上的纹理元素(1)为密集排列的纹理分布,所述纹理分布区域内,平均单根纹理元素(1)的面积小于0.3mm2;优选地,平均单根纹理元素(1)的面积小于0.1mm2;优选 地,平均单根纹理元素(1)的面积小于0.05mm2。
- 一种随机纹理防伪识别系统,其特征在于:所述识别系统包括识别器和后台,所述识别器与所述后台有线或无线相连;所述后台中预先存储有防伪标识(2)的存储分布特征(3),所述存储分布特征(3)是指所述防伪标识(2)上随机分布的纹理元素(1)的分布图像和/或分布图像的特征作为分布特征,并在识别系统的后台中存储生成的存储分布特征(3);所述识别系统中还包括有防伪标识(2)的纹理元素(1)的固有特征(4),所述固有特征(4)是指防伪标识(2)的每根纹理元素(1)在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨;所述识别器获取附着在防伪对象或防伪对象的包装上的待识别防伪标识(2')上随机分布的纹理元素(1')的待识别分布特征(3')和待识别固有特征(4'),所述待识别固有特征(4')是指待识别防伪标识(2')上的每根纹理元素(1')在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨;识别系统将识别器获取的待识别分布特征(3')和待识别固有特征(4')与后台中存储的存储分布特征(3)和识别系统中的所述固有特征(4)分别进行比对,当其中一个比对结果为不相同时,判断待识别防伪标识(2')为假,进而待识别防伪标识(2')所附着的防伪对象为假。
- 根据权利要求20所述的随机纹理防伪识别系统,其特征在于:当识别器获取待识别防伪标识(2')上随机分布的纹理元素(1')待识别固有特征(4')时,识别器的视场直径小于或等于1.5cm。
- 根据权利要求20所述的随机纹理防伪识别系统,其特征在于:所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜,当识别器获取待识别固有特征(4')时,所述识别器的放大镜安装在手机摄像头的摄取路径上;或者,所述识别器包括手机和与手机有线或无线连接的外接显微摄像头,通过外接显微摄像头来获取待识别固有特征(4')。
- 根据权利要求22所述的随机纹理防伪识别系统,其特征在于:所述放大镜包括粘胶层,通过该粘胶层将所述放大镜粘附在手机上。
- 根据权利要求23所述的随机纹理防伪识别系统,其特征在于:所述放大镜包括透镜、支撑部和粘胶层,所述支撑部的一侧固定有所述透镜,所述支撑部的另一侧固定有所述粘胶层。
- 根据权利要求24所述的随机纹理防伪识别系统,其特征在于:在固定有所述粘胶层侧,所述支撑部的侧面突出于所述透镜的侧面。
- 根据权利要求22所述的随机纹理防伪识别系统,其特征在于:所述识别器通过一次拍摄获取待识别防伪标识(2')的放大图像,其中当所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜时,拍摄时,放大镜安装在手机摄像头的摄取路径上,当所述识别器包括手机和与手机有线或无线连接的外接显微摄像头时,拍摄时,通过所述外接显微摄像头进行拍摄。
- 根据权利要求22所述的随机纹理防伪识别系统,其特征在于:所述识别器经过两次分别获取待识别防伪标识(2')上随机分布的纹理元素(1')的待识别分布特征(3')和待识别固有特征(4'),其中当所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜时,当获取待识别分布特征(3')时,放大镜未设置在手机摄像头的摄取路径上,通过手机摄像头直接获取待识别防伪标识(2')的待识别分布特征图像,当获取待识别固有特征(4')时,放大镜安装在手机摄像头的摄取路径上,通过手机摄像头和放大镜获取待识别防伪标识(2')上的纹理元素(1')的放大图像,当所述识别器包括手机和与手机有线或无线连接的外接显微摄像头时,当获取待识别分布特征(3')时,通过手机摄像头直接获取待识别防伪标识(2')的待识别分布特征图像,当获取待识别固有特征(4')时,通过外接显微摄像头获取待识别防伪标识(2')上的纹理元素(1')的放大图像。
- 根据权利要求22所述的随机纹理防伪识别系统,其特征在于:每个所述防伪标识(2)还包括至少一个编码(5),所述编码(5)与所述防伪标识(2)一一对应,或所述编码(5)与多个所述防伪标识(2)相对应;相应的,每个所述待识别防伪标识(2')也包括至少一个编码(5');所述识别器一次拍摄待识别防伪标识(2')的至少包括编码(5')和部分纹理元素(1')的局部放大图像或全部放大图像;其中当所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜时,拍摄时,放大镜安装在手机摄像头的摄取路径上,当所述识别器包括手机和与手机有线或无线连接的外接显微摄像头时,拍摄时,通过所述外接显微摄像头进行拍摄。
- 根据权利要求22所述的随机纹理防伪识别系统,其特征在于:每个所述防伪标识(2)还包括至少一个编码(5),所述编码(5)与所述防伪标识(2)一一对应,或所述编码(5)与多个所述防伪标识(2)相对应;相应的,每个所述待识别防伪标识(2')也包括至少一个编码(5');所述识别器分两次获取待识别防伪标识(2')的编码(5')、待识别分布特征(3')和待识别固有特征(4');当所述识别器包括手机和可设置在手机摄像头的摄取路径上的放大镜时,当获取编码(5') 时,放大镜未设置在手机摄像头的摄取路径上,通过手机摄像头直接获取待识别防伪标识(2')的编码(5'),或者放大镜安装在手机摄像头的摄取路径上,通过手机摄像头和放大镜获取待识别防伪标识(2')的编码(5'),当获取待识别分布特征(3')和待识别固有特征(4')时,放大镜安装在手机摄像头的摄取路径上,通过手机摄像头和放大镜获取待识别防伪标识(2')上的至少包括部分纹理元素(1')的局部放大图像或全部放大图像;当所述识别器包括手机和与手机有线或无线连接的外接显微摄像头时,当获取编码(5')时,手机摄像头直接获取待识别防伪标识(2')的编码(5'),或者通过外接显微摄像头获取待识别防伪标识(2')的编码(5'),当获取待识别分布特征(3')和待识别固有特征(4')时,通过外接显微摄像头获取待识别防伪标识(2')上的至少包括部分纹理元素(1')的局部放大图像或全部放大图像。
- 根据权利要求20所述的随机纹理防伪识别系统,其特征在于:所述识别器包括电脑和与电脑有线或无线连接的外接显微摄像头,拍摄时,通过外接显微摄像头进行拍摄;或者,所述识别器为独立识别器,所述独立识别器包括显微摄像头。
- 根据权利要求30所述的随机纹理防伪识别系统,其特征在于:所述识别器通过一次拍摄获取待识别防伪标识(2')的放大图像。
- 根据权利要求30所述的随机纹理防伪识别系统,其特征在于:每个所述防伪标识(2)还包括至少一个编码(5),所述编码(5)与所述防伪标识(2)一一对应,或所述编码(5)与多个所述防伪标识(2)相对应;相应的,每个所述待识别防伪标识(2')也包括至少一个编码(5');所述识别器一次拍摄待识别防伪标识(2')的至少包括编码(5')和部分纹理元素(1')的局部放大图像或全部放大图像;或者,所述识别器分两次获取待识别防伪标识(2')的编码(5')、待识别分布特征(3')和待识别固有特征(4'),当所述识别器包括电脑和与电脑有线或无线连接的外接显微摄像头时,所述两次获取包括:通过外接显微摄像头获取待识别防伪标识(2')的编码(5'),和通过外接显微摄像头获取待识别防伪标识(2')上的至少包括部分纹理元素(1')的局部放大图像或全部放大图像;当所述识别器为独立识别器时,所述独立识别器包括显微摄像头,所述两次获取包括:通过独立识别器的显微摄像头获取待识别防伪标识(2')的编码(5'),和通过独立识别器的显微摄像头获取待识别防伪标识(2')上的至少包括部分纹理元素(1')的局部放大图像或全部放大图像。
- 根据权利要求26-32之一所述的随机纹理防伪识别系统,其特征在于:所述识别器将放大图像发送到后台,所述后台接收放大图像后对其进行处理生成待识别 分布特征(3'),或者所述识别器将通过手机摄像头直接获取待识别防伪标识(2')的待识别分布特征图像发送到所述后台,所述后台接收待识别分布特征图像作为待识别分布特征(3'),接着,所述后台将待识别分布特征(3')与后台中存储的存储分布特征(3)逐一进行自动比对或者后台将待识别分布特征(3')与后台根据编码(5')调取的一个或多个存储分布特征(3)逐一进行自动比对,其中所述编码预先与一个或多个所述防伪标识(2)的分布特征相关联;或者,所述识别器将放大图像发送到所述后台,所述后台接收放大图像后对其进行处理生成待识别分布特征(3')并发回给识别器,并所述后台根据接收到的编码(5')调取一个或多个存储分布特征(3)发回给识别器;所述识别器的显示器显示有接收的待识别分布特征(3')和存储分布特征(3)以供识别器端人工进行比较,其中所述编码预先与一个或多个所述防伪标识(2)的分布特征相关联。
- 根据权利要求26-32之一所述的随机纹理防伪识别系统,其特征在于:识别器将放大图像传输到后台并与识别系统后台中根据该待识别防伪标识(2')的分布特征或该待识别防伪标识(2')的编码调用的固有特征在后台进行人工或自动比对,对于同一种纹理元素形成的一类防伪标识(2)在首次获取其固有特征时存入后台,从第二次起,将该类防伪标识(2)的存储分布特征与后台存储的该类防伪标识(2)的固有特征建立关联或者通过编码将编码与对应的防伪标识(2)的存储分布特征和该类防伪标识的固有特征建立联系,所述固有特征(4)通过获取的防伪标识的纹理元素的放大图片示出;或者将在识别器端观察到的放大图像与识别器在识别系统的后台中根据该待识别防伪标识(2')的分布特征或该待识别防伪标识(2')的编码调取的固有特征在识别器端人工比对,对于同一种纹理元素形成的一类防伪标识(2)在首次获取其固有特征时存入后台,从第二次起,将该类防伪标识(2)的存储分布特征与后台存储的该类防伪标识(2)的固有特征建立关联或者通过编码将编码与对应的防伪标识(2)的存储分布特征和该类防伪标识的固有特征建立联系,此时,识别器端包括显示器以进行比对,所述固有特征(4)通过获取的防伪标识的纹理元素的放大图片示出;或者将识别器端观察到的放大图像与被印刷在防伪标识(2)上和/或附着在防伪对象或防伪对象的包装上的放大图片人工比对,来比较待识别固有特征(4')和固有特征(4)是否相同,所述放大图片是拍摄的示出固有特征(4)的防伪标识(2)的放大图片。
- 一种随机纹理防伪系统,其特征在于:包括防伪对象、防伪标识和随机纹理的防伪识别系统,其中,所述防伪标识附着在防伪对象或防伪对象的包装上,所述防伪标识为随机分布有纹理元素(1)的防伪标识(2),防伪标识(2)上随机分布的纹理元素(1)的分布图像和/或分布图像的特征作为分布特征,并在后台中存储生成存储分布特征(3),防伪标识(2)还包括固有特征(4),所述固有特征是指防伪标识(2)的每根纹理元素(1)在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨;所述随机纹理的防伪识别系统通过获取待识别防伪标识(2')上随机分布的纹理元素(1')的待识别分布特征(3')和待识别固有特征(4'),将获取的待识别分布特征(3')和待识别固有特征(4')与后台中存储分布特征(3)所述固有特征(4)分别进行比对,当其中一个比对结果为不相同时,判断待识别防伪标识(2')为假,进而待识别防伪标识(2')所附着的防伪对象为假;所述待识别固有特征(4')是指待识别防伪标识(2')上的每根纹理元素(1')在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨。
- 根据权利要求35所述的随机纹理防伪系统,其特征在于:所述随机纹理的防伪识别系统为如权利要求20-34之一所述的随机纹理防伪识别系统。
- 根据权利要求35或36所述的随机纹理防伪系统,其特征在于:所述防伪标识(2)上的纹理元素(1)为密集排列的纹理分布,所述纹理分布区域内,纹理密度不小于100根/cm2;优选地,纹理密度不小于1000根/cm2;优选地,纹理密度不小于10000根/cm2。
- 根据权利要求35或36所述的随机纹理防伪系统,其特征在于:所述防伪标识(2)上的纹理元素(1)为密集排列的纹理分布,所述纹理分布区域内,平均单根纹理元素(1)的面积小于0.3mm2;优选地,平均单根纹理元素(1)的面积小于0.1mm2;优选地,平均单根纹理元素(1)的面积小于0.05mm2。
- 一种随机纹理防伪产品,用于权利要求33-38之一所述的随机纹理防伪系统中,其特征在于:所述防伪产品包括防伪对象、防伪标识和放大镜,其中,所述防伪标识为其上随机分布有纹理元素的防伪标识,所述防伪标识被附着在所述防伪对象或所述防伪对象的包装上,所述放大镜可用于与手机组成识别器来识别所述防伪标识,所述放大镜作为所述识别器的可拆卸部件,当放大镜安装在手机摄像头的摄取路径上时,所述放大镜作为识别器的执行部件,当放大镜未安装在手机摄像头的摄取路径上时,所述放大镜作为识别器的非执行部件。
- 根据权利要求39所述的随机纹理防伪产品,其特征在于:所述防伪标识具有分布特征和固有特征,所述分布特征为该防伪标识上随机分布的纹理元素的分布图像和/或分布图像的特征;所述固有特征是指所述防伪标识上随机分布的纹理元素在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨;放大镜作为执行部件和/或非执行部件时的识别器可获取待识别防伪标识的待识别分布特征和待识别固有特征并用于分别与所述分布特征和固有特征进行比对来判断防伪对象的真假,当有一个比对结果为不相同时,判断待识别防伪标识为假,进而待识别防伪标识所附着 的防伪对象为假,所述待识别固有特征是指待识别防伪标识上的每根纹理元素在被放大条件下被观察时具有的相同的视觉特征的纹理元素特征,而在无放大条件下人眼无法分辨;其中获取待识别防伪标识的待识别固有特征时,所述放大镜作为执行部件。
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610114805 | 2016-03-02 | ||
CN201610114804.3 | 2016-03-02 | ||
CN201610114805.8 | 2016-03-02 | ||
CN201610114804 | 2016-03-02 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017148420A1 true WO2017148420A1 (zh) | 2017-09-08 |
Family
ID=59742530
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/075468 WO2017148420A1 (zh) | 2016-03-02 | 2017-03-02 | 一种随机纹理防伪方法、防伪识别系统、防伪系统和防伪产品 |
PCT/CN2017/075469 WO2017148421A1 (zh) | 2016-03-02 | 2017-03-02 | 一种随机纹理防伪产品、随机纹理防伪系统和随机纹理防伪方法 |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/075469 WO2017148421A1 (zh) | 2016-03-02 | 2017-03-02 | 一种随机纹理防伪产品、随机纹理防伪系统和随机纹理防伪方法 |
Country Status (2)
Country | Link |
---|---|
CN (4) | CN107153964A (zh) |
WO (2) | WO2017148420A1 (zh) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109754261A (zh) * | 2017-11-01 | 2019-05-14 | 杭州沃朴物联科技有限公司 | 一种基于nfc和多纹理图像识别的防伪系统 |
CN109785734A (zh) * | 2017-11-14 | 2019-05-21 | 北京柯斯元科技有限公司 | 随机纹理防伪标识结构及制造方法 |
CN109785733A (zh) * | 2017-11-14 | 2019-05-21 | 北京柯斯元科技有限公司 | 随机纹理防伪标识结构及制造方法 |
CN110781789A (zh) * | 2019-10-18 | 2020-02-11 | 云南程秀科技有限公司 | 建立物品特征影像关联识别码进行识别验真防伪的方法 |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109767234B (zh) * | 2017-11-01 | 2024-03-29 | 杭州沃朴物联科技有限公司 | 一种基于纹理图像特征和随机金葱粉的防伪系统 |
CN109767232A (zh) * | 2017-11-01 | 2019-05-17 | 杭州沃朴物联科技有限公司 | 一种适用于木质包装箱的防伪系统及方法 |
CN107705139A (zh) * | 2017-11-03 | 2018-02-16 | 葛徽 | 一种新型物品防伪认证方法 |
CN108263112B (zh) * | 2018-02-09 | 2021-11-02 | 荆门格林绿色电子科技有限公司 | 一种纸模纹路识别防伪工艺 |
CN110503887A (zh) * | 2018-05-16 | 2019-11-26 | 北京柯斯元科技有限公司 | 内嵌式随机纹理防伪标识结构及制造方法 |
CN110544424A (zh) * | 2018-05-28 | 2019-12-06 | 北京柯斯元科技有限公司 | 具有检测标识的随机纹理防伪标识结构 |
CN108596312A (zh) * | 2018-07-09 | 2018-09-28 | 北京德隐艺术品投资管理有限公司 | 一种标识贴及其采用该标识贴实现锁孔识别的方法 |
CN109064188A (zh) * | 2018-07-12 | 2018-12-21 | 南京中印防伪科技有限公司 | 基于标识的防伪系统及其防伪方法 |
CN109409475A (zh) * | 2018-10-10 | 2019-03-01 | 熊建民 | 基于容错率机制的防伪二维码、标签及应用系统 |
CN111292096A (zh) * | 2018-11-21 | 2020-06-16 | 北京柯斯元科技有限公司 | 一种放大识别的纹理防伪方法和防伪标识 |
CN111292095A (zh) * | 2018-11-21 | 2020-06-16 | 北京柯斯元科技有限公司 | 一种含有图案层的纹理防伪标识 |
CN111204501A (zh) * | 2018-11-21 | 2020-05-29 | 北京柯斯元科技有限公司 | 一种防伪标识卷标结构及其附标方法 |
CN110060567A (zh) * | 2019-03-11 | 2019-07-26 | 王娅雯 | 一种随机结构纹理防伪方法 |
CN110070159A (zh) * | 2019-04-19 | 2019-07-30 | 宁波高新区意融科技有限公司 | 一种基于实物和实物图像对比的防伪标签及其鉴别方法 |
CN111626747A (zh) * | 2020-05-11 | 2020-09-04 | 魏乃绪 | 一种软包装手提扣图像结构防伪识别方法 |
CN111798740B (zh) * | 2020-07-29 | 2022-11-25 | 云南易见纹语科技有限公司 | 防伪标记、系统、生成方法以及防伪标记识别方法和装置 |
CN113128406A (zh) * | 2021-04-15 | 2021-07-16 | 上海躲猫猫信息技术有限公司 | 一种随机纤维丝纹理防伪标识识别方法及系统 |
CN113978152B (zh) * | 2021-10-11 | 2023-10-20 | 南通真秦科技有限公司 | 防伪标识的制作方法、系统与验证方法、系统 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1564148A (zh) * | 2004-04-09 | 2005-01-12 | 寇建国 | 物体表面微观图像防伪方法 |
CN2715245Y (zh) * | 2003-09-22 | 2005-08-03 | 兆日科技(深圳)有限公司 | 一种纹理密码标签 |
EP1947592A1 (en) * | 2007-01-19 | 2008-07-23 | Multitel ASBL | Authentication method and device for protecting manufactured goods |
CN102073865A (zh) * | 2010-12-24 | 2011-05-25 | 兆日科技(深圳)有限公司 | 一种利用纸张自身纤维纹理的防伪方法和系统 |
CN103745247A (zh) * | 2014-01-21 | 2014-04-23 | 陈中英 | 一种标识及防伪鉴别的方法 |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH08194791A (ja) * | 1995-01-18 | 1996-07-30 | Apo Syst Kk | 2次元コードカードシステム |
CN2344323Y (zh) * | 1998-05-12 | 1999-10-20 | 石狮市狮王瓶盖包装有限公司 | 可显示徽标识的防伪瓶盖 |
CN2629155Y (zh) * | 2003-02-24 | 2004-07-28 | 陈妙芳 | 一种放微形防伪标识的装置 |
CN101221712A (zh) * | 2008-01-18 | 2008-07-16 | 王庆中 | 一种指纹印记防伪及放大识别方法 |
CN101577069A (zh) * | 2008-05-09 | 2009-11-11 | 北京中科诚通科技发展有限公司 | 随机纹理防伪产品、防伪方法及手机鉴真方法 |
CN101872576A (zh) * | 2009-04-23 | 2010-10-27 | 孙显林 | 结构纹理的防伪方法 |
EA028408B9 (ru) * | 2009-09-28 | 2018-02-28 | Шанхай Кос Секьюрити Пэйпэ Текнолоджи Ко., Лтд. | Способ создания и распознавания антиконтрафактного идентификатора случайной текстуры и его устройство распознавания |
CN202652317U (zh) * | 2012-05-25 | 2013-01-02 | 沈阳安创信息科技有限公司 | 一种手机摄像头的放大镜装置 |
CN104574464B (zh) * | 2015-01-08 | 2017-07-14 | 北京东港安全印刷有限公司 | 一种随机矩阵莫尔条纹防伪纹样及其制作方法 |
CN204480262U (zh) * | 2015-02-10 | 2015-07-15 | 四川省英联国泰科技有限公司 | 智能手机超微码读取辅助装置 |
CN104809622A (zh) * | 2015-05-01 | 2015-07-29 | 海南亚元防伪技术研究所 | 超限纹理防伪方法 |
CN105224976A (zh) * | 2015-08-31 | 2016-01-06 | 杨骏 | 一种防伪标识的制作和识别方法、装置及系统 |
CN105303223B (zh) * | 2015-11-18 | 2018-06-29 | 广东正迪科技股份有限公司 | 一种随机图像防伪标识制备方法、标识及识别方法 |
-
2017
- 2017-03-02 CN CN201710121595.XA patent/CN107153964A/zh active Pending
- 2017-03-02 CN CN201720198532.XU patent/CN206805623U/zh active Active
- 2017-03-02 CN CN201720197807.8U patent/CN206805622U/zh active Active
- 2017-03-02 WO PCT/CN2017/075468 patent/WO2017148420A1/zh active Application Filing
- 2017-03-02 CN CN201710121189.3A patent/CN107153963A/zh active Pending
- 2017-03-02 WO PCT/CN2017/075469 patent/WO2017148421A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2715245Y (zh) * | 2003-09-22 | 2005-08-03 | 兆日科技(深圳)有限公司 | 一种纹理密码标签 |
CN1564148A (zh) * | 2004-04-09 | 2005-01-12 | 寇建国 | 物体表面微观图像防伪方法 |
EP1947592A1 (en) * | 2007-01-19 | 2008-07-23 | Multitel ASBL | Authentication method and device for protecting manufactured goods |
CN102073865A (zh) * | 2010-12-24 | 2011-05-25 | 兆日科技(深圳)有限公司 | 一种利用纸张自身纤维纹理的防伪方法和系统 |
CN103745247A (zh) * | 2014-01-21 | 2014-04-23 | 陈中英 | 一种标识及防伪鉴别的方法 |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109754261A (zh) * | 2017-11-01 | 2019-05-14 | 杭州沃朴物联科技有限公司 | 一种基于nfc和多纹理图像识别的防伪系统 |
CN109754261B (zh) * | 2017-11-01 | 2024-03-05 | 杭州沃朴物联科技有限公司 | 一种基于nfc和多纹理图像识别的防伪系统 |
CN109785734A (zh) * | 2017-11-14 | 2019-05-21 | 北京柯斯元科技有限公司 | 随机纹理防伪标识结构及制造方法 |
CN109785733A (zh) * | 2017-11-14 | 2019-05-21 | 北京柯斯元科技有限公司 | 随机纹理防伪标识结构及制造方法 |
CN110781789A (zh) * | 2019-10-18 | 2020-02-11 | 云南程秀科技有限公司 | 建立物品特征影像关联识别码进行识别验真防伪的方法 |
Also Published As
Publication number | Publication date |
---|---|
CN107153963A (zh) | 2017-09-12 |
CN107153964A (zh) | 2017-09-12 |
WO2017148421A1 (zh) | 2017-09-08 |
CN206805622U (zh) | 2017-12-26 |
CN206805623U (zh) | 2017-12-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2017148420A1 (zh) | 一种随机纹理防伪方法、防伪识别系统、防伪系统和防伪产品 | |
JP3892407B2 (ja) | 撮影装置 | |
AU2006234758B2 (en) | Identity document and method for the manufacture thereof | |
CN106529512B (zh) | 活体人脸验证方法及装置 | |
US20080267514A1 (en) | Object Authentication Using a Portable Digital Image Acquisition Device | |
US20080116276A1 (en) | Counterfeit-proof labels having an optically concealed, invisible universal product code and an online verification system using a mobile phone | |
KR102081314B1 (ko) | 식별 장치, 식별 방법, 및 식별 프로그램을 포함하는 컴퓨터 판독 가능 기록 매체 | |
WO2005077002A3 (en) | Pocket-pen ultra-high resolution mems projection display in combination with on-axis ccd image capture system including means for permitting 3-d imaging | |
CN104809622A (zh) | 超限纹理防伪方法 | |
CN108292456A (zh) | 识别方法以及识别介质 | |
CN207491128U (zh) | 一种rgb+ir图像采集设备 | |
KR101457378B1 (ko) | 식별마크를 이용한 정보제공 시스템 | |
TW201037356A (en) | 3d image display device, method for manufacturing same, and 3d image display method | |
CN108280919A (zh) | 人证核验快速通关闸机及其控制方法 | |
CN108292457A (zh) | 识别装置、识别方法、识别程序及包含识别程序的计算机可读介质 | |
US7729509B2 (en) | Illuminated lens device for use in object authentication | |
CN105723285B (zh) | 全息照相设备、利用全息照相实现对准的方法及系统 | |
JP2019535555A (ja) | 陽画認証傾斜画像及び陰画認証傾斜画像を有するセキュリティ文書 | |
JP2021047448A (ja) | 撮影システム、撮影方法及びプログラム | |
CN109792387B (zh) | 光通信装置防伪方法及系统 | |
CN101482988B (zh) | 一种票据防伪方法、装置及系统 | |
WO2019153970A1 (zh) | 头戴显示装置 | |
CN107423733A (zh) | 基于标记点身份识别的动作捕捉系统 | |
CN210142346U (zh) | 一种防伪二维码标签及其生成系统 | |
CN100510954C (zh) | 给照片嵌入可机读水印的方法和装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17759271 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 25/01/2019) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17759271 Country of ref document: EP Kind code of ref document: A1 |