WO2018076409A1 - Method for realizing two dimensional code copy prevention and realization system thereof - Google Patents
Method for realizing two dimensional code copy prevention and realization system thereof Download PDFInfo
- Publication number
- WO2018076409A1 WO2018076409A1 PCT/CN2016/105867 CN2016105867W WO2018076409A1 WO 2018076409 A1 WO2018076409 A1 WO 2018076409A1 CN 2016105867 W CN2016105867 W CN 2016105867W WO 2018076409 A1 WO2018076409 A1 WO 2018076409A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- dimensional code
- image
- dot matrix
- halftone dot
- module
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
Definitions
- the present invention relates to the field of information security technologies, and in particular, to a method and an implementation system for preventing copying of a two-dimensional code.
- special printing materials or processes that control the generation and reproduction of two-dimensional codes.
- the special printed material in the printing process such as holographic materials and polymeric liquid crystal materials having unique optical characteristics, can be used to print the two-dimensional code to prevent it from being copied.
- Special printing inks can also be applied to the printing of two-dimensional codes. For example, ultraviolet fluorescent inks make the printed two-dimensional code invisible under visible light to prevent it from being copied.
- Special production processes can also be used to enhance the security of QR codes.
- special halftone printing technology can generate two-dimensional codes hidden under visible light.
- an asymmetric key encryption algorithm for example, RSA algorithm
- a PKI public key encryption system can be used to control the generation of the two-dimensional code and verify the authenticity of the information.
- Such a system with encryption protection is also applied to the construction of the anti-counterfeiting platform.
- the Chaotic Equation can be used to generate the QR code identity number to ensure its uniqueness and the random string cannot be copied in batches, thus effectively controlling the generation of the QR code.
- the ECDSA digital signature algorithm is applied within the AuthPaper system to prevent document counterfeiters from tampering with the content.
- the researchers also proposed some security protocols based on the communication architecture to enhance the security of the displayed two-dimensional code.
- the researcher proposed a communication protocol called "all or nothing" based on the duplex communication system of the mobile device front camera device and the display screen. Only when the receiver can acquire the transmitted and received signals at the same time can the information of the two-dimensional code in the channel be decoded, thereby enhancing the confidentiality of the information.
- the digital watermarking technique can embed information related to the two-dimensional code in the two-dimensional code image. For example, directly using DCT and DFT to decompose the image frequency information of the two-dimensional code, it is possible to embed watermark information that is not easily perceptible to the naked eye. After the two-dimensional code image is taken, it can be decoded and the authenticity of the digital watermark information can be evaluated at the same time. Similarly, digital watermarking It can also be stored in the DWT domain.
- one way to ensure that the watermark information is more robust is to use the information redundancy of the two-dimensional code to modify the overall brightness of some of the modules to store the digital signature of the two-dimensional code content.
- the distortion tolerance of each module in the two-dimensional code decoding process can be utilized to modify the module's style to store the watermark information.
- pattern patterns or physical unclonable features with copy detection features in the prior art to control the generation and copying of two-dimensional codes.
- the conventional two-dimensional code is composed of a large black and white block unit.
- Some pattern patterns with more detail features can be used in the design of two-dimensional codes to resist the most direct scan-print form reproduction.
- a graphic composed of high-density black-and-white cells is used for copy detection, and a log-normal distribution is used as a key model of the print-scan channel during the detection process.
- grayscale images can also be used in copy detection patterns.
- the decision of the copy detection may be based on a variation feature of the grayscale image in the print-scan channel, and mainly includes high frequency features of the image, such as sharpness.
- the color pattern contains information on four channels of CMYK. After copying, the characteristics of the colors (color mean, variance, entropy, etc. within the module) will make a significant difference.
- the physical unclonable function in the printed document is also used to identify illegal copying of the printed document.
- the Physical Unclonable Function is a random change produced by printing equipment and paper. Its features are easy to extract and analyze but are not easily copied and forged. For example, printing random variations in toner and paper, microscopic roughness of the paper.
- QR codes 1) Reduce the advantages of QR codes in versatility. Making a two-dimensional code with a special printing material or process can strengthen the control of the generation process to resist the illegal copying of the two-dimensional code, but inevitably reduces the versatility of the two-dimensional code (adding the two-dimensional code Production costs and dependence on special equipment). Compared with similar technologies (such as RFID and smart sensors), the main advantages of QR codes are their extremely low cost and flexibility that does not depend on special hardware. Therefore, such methods based on special printed materials or processes will greatly reduce the competitiveness of two-dimensional codes for large-scale applications in the Internet of Things.
- the complexity is mainly reflected in the following two aspects: First, the generation and control of the two-dimensional code is performed by using the asymmetric encryption algorithm and the digital signature technology. In the process, a Public Key Infrastructure (PKI) needs to be deployed. The security of each user's private key must be guaranteed and the corresponding public key distributed through a secure communication channel. Secondly, in the process of using the information, the steps of decrypting or extracting the two-dimensional code are additionally added.
- PKI Public Key Infrastructure
- the above security algorithm only guarantees the reliability of the information in the two-dimensional code in terms of information encryption, and cannot change the visibility of the information in the two-dimensional code, it is also difficult to effectively resist illegal copying.
- the copy detection pattern usually determines the authenticity of the image based on the attenuation of the high frequency information
- the copying device high-precision scanner, copying machine, etc.
- the reservation is more complete. Therefore, it is difficult to prevent the counterfeiter from copying it while ensuring the general type of the verification device.
- an object of the present invention is to provide a method and an implementation system for preventing copying of a two-dimensional code, which aims to solve the problem of improving the security of the two-dimensional code in the prior art, and the versatility is low. Increase the complexity of use, and can not effectively solve the contradiction of resisting the contradiction between illegal copying and universal applicability.
- a method for implementing copy prevention of a two-dimensional code comprising the following steps:
- A obtaining user input information, converting the input information into image gray value and adding the finder image to obtain a two-dimensional code
- step A specifically includes:
- A1 Acquire user input information, and convert user information into a bit stream by using source and channel coding
- bit stream is modulated, converted into image gray value, and then the image gray value is converted into a corresponding halftone dot matrix
- G(p) is the spectrum of the halftone dot matrix
- G w (p) is the spectrum of the halftone dot matrix of the white point black matrix
- G b (p) is the black dot white background
- C w represents the area of the entire module occupied by the white halftone dot matrix
- C b represents the area of the entire module occupied by the black halftone dot matrix
- a 1 and a 2 are the image sensor pixels of the photographing device.
- the constructed grid vectors, b 1 and b 2 are grid vectors of halftone lattices in the two-dimensional code generation process.
- ⁇ 1 , ⁇ 2 and ⁇ 1 , ⁇ 2 can be normalized vectors obtained by normalizing a 1 , a 2 and b 1 , b 2 .
- step B specifically includes:
- step C specifically includes:
- a copy prevention implementation system for a two-dimensional code comprising:
- a two-dimensional code generating module configured to obtain input information of the user, convert the input information into an image gray value, and increase the finder image to obtain a two-dimensional code
- a two-dimensional code decoding module configured to perform image recovery, demodulation, and decoding in sequence when acquiring the two-dimensional code by photographing, to obtain encoded information
- the two-dimensional code verification module is configured to perform spectrum analysis according to the two-dimensional code after image restoration, and determine whether the extreme point obtained by the spectrum analysis conforms to the expected distribution, and prompts the two-dimensional code to be copied when the expected distribution is not met. operating.
- the anti-copy implementation system of the two-dimensional code wherein the two-dimensional code generation module specifically includes:
- a source and channel coding unit configured to acquire user input information, and convert user information into a bit stream by using source and channel coding
- a modulating unit configured to modulate the bit stream, convert it into an image gradation value, and convert the image gradation value into a corresponding halftone dot matrix
- An image adding unit is configured to add a finder pattern to the two-dimensional code module composed of the halftone dot matrix to generate a two-dimensional code.
- G(p) is the spectrum of the halftone dot matrix
- G w (p) is the spectrum of the halftone dot matrix of the white point black matrix
- G b (p) is the black dot white background
- C w represents the area of the entire module occupied by the white halftone dot matrix
- C b represents the area of the entire module occupied by the black halftone dot matrix
- a 1 and a 2 are the image sensor pixels of the photographing device.
- the constructed grid vectors, b 1 and b 2 are grid vectors of halftone lattices in the two-dimensional code generation process.
- ⁇ 1 , ⁇ 2 and ⁇ 1 , ⁇ 2 can be normalized vectors obtained by normalizing a 1 , a 2 and b 1 , b 2 .
- the anti-copy implementation system of the two-dimensional code wherein the two-dimensional code decoding module specifically includes:
- An image restoration unit configured to acquire a two-dimensional code image when the two-dimensional code is read by the mobile imaging device, and perform image restoration on the two-dimensional code image to restore shape distortion of the two-dimensional code image in the communication channel , obtaining the restored two-dimensional code;
- a demodulation unit configured to extract a two-dimensional code module according to the restored two-dimensional code, perform demodulation corresponding to the modulation on each two-dimensional code module, to obtain a bit stream;
- the source and channel decoding unit is configured to perform bit source and channel decoding on the bit stream to obtain coded information.
- the anti-copy implementation system of the two-dimensional code wherein the two-dimensional code verification module specifically includes:
- a module extracting unit configured to extract a two-dimensional code module according to the two-dimensional code after performing image restoration
- a spectrum analysis unit configured to perform spectrum analysis on the two-dimensional code module to obtain a periodic feature of the signal
- the determining unit is configured to determine whether the distance between the extreme point in the spectrum analysis and the calculated extreme point meets the expected distribution, and when the expected distribution is not met, the two-dimensional code is prompted to perform the copy operation.
- the method and implementation system for preventing copying of a two-dimensional code comprises: obtaining input information of a user, converting the input information into an image gray value, and adding a finder image to obtain a two-dimensional code; In the two-dimensional code, image restoration, demodulation and decoding are sequentially performed to obtain encoded information; spectrum analysis is performed according to the two-dimensional code after image restoration, and whether the extreme point obtained by the spectrum analysis conforms to the expected distribution is determined. If the expected distribution is not met, the QR code is prompted to be copied.
- the invention combines the communication channel model and the physical device features of the two-dimensional code in the scanning-printing process, and analyzes the spectral characteristics of the image signal in the scanning-printing operation to ensure the reading of the two-dimensional code by the low-resolution mobile imaging device.
- the method of using the aliasing features of image signals and the features of strong correlation noise is proposed to obtain effective evidence for the scanning and printing attacks of two-dimensional codes.
- FIG. 1 is a flow chart of a preferred embodiment of a method for implementing copy prevention of a two-dimensional code according to the present invention.
- FIG. 2 is a two-dimensional code including a halftone dot matrix in a method for implementing copy prevention of a two-dimensional code according to the present invention
- Figure 3a is a schematic diagram of a two-dimensional code after one print-shot.
- Figure 3b is a schematic diagram of a two-dimensional code after one print-scan-print-shoot.
- Figure 4a is a spectrogram of a two-dimensional code that has been printed-shot.
- Figure 4b is a spectrogram of a two-dimensional code after one print-scan-print-shoot.
- Fig. 5 is a schematic diagram showing the spectrum structure of a halftone dot matrix.
- FIG. 6 is a functional block diagram of a preferred embodiment of a copy prevention implementation system for a two-dimensional code according to the present invention.
- the present invention provides a method and an implementation system for preventing copying of a two-dimensional code.
- the present invention will be further described in detail below. It is understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
- FIG. 1 is a flowchart of a preferred embodiment of a method for implementing copy prevention of a two-dimensional code according to the present invention, the method comprising the following steps:
- Step S100 Obtain input information of the user, convert the input information into an image gray value, and increase the finder image to obtain a two-dimensional code;
- Step S200 When the two-dimensional code is acquired by shooting, image restoration, demodulation, and decoding are sequentially performed to obtain encoded information.
- Step S300 Perform spectrum analysis according to the two-dimensional code after the image restoration, and determine whether the extreme point obtained by the spectrum analysis conforms to the expected distribution. When the expected distribution is not met, the two-dimensional code is prompted to perform the copy operation.
- the input information of the user includes a character string, a web address, etc.
- the input information is converted into an image gray value, and the image gray value is converted into a corresponding halftone point.
- Array and increase the finder image to get the QR code.
- the existing two-dimensional code is composed of a black and white block (low frequency square wave) structure, and the frequency thereof is far from the sampling frequency of the scanning-printing device, and the signal aliasing phenomenon after resampling is not obvious.
- a halftone dot matrix similar to the sampling frequency of the scanning-printing device which is prone to significant signal aliasing can be used to form a two-dimensional code module, as shown in FIG.
- the average brightness of the halftone dot matrix in the region can be used to represent information, for example, the two-dimensional code module in FIG. 2 has 16 different gray values, each of which can carry 4 bits of information. In the example, each gray value occupies a space of 4 x 4 modules.
- the gray value of each module in the two-dimensional code can be modulated according to the encoded information.
- the step S100 specifically includes:
- Step S101 Acquire user input information, and convert user information into a bit stream by using source and channel coding
- the characters of the text message can be converted into another format defined by the character encoding library.
- Different languages have their own coding schemes/standards.
- ASCII American Standard Code for Information Interchange
- UTF-8 Wide Text Markup Language
- Other languages also have their own standards.
- the characters of a text message can be converted to any other format defined by the character encoding library.
- a character encoding library a single character within a text message can be encoded into a binary data codeword having a particular number of bits (eg, 8 bits).
- the header can be placed at the front end of the encoded message.
- the header may indicate the length of the character in the message and the encoding scheme employed in the decoding process (described later) of the image two-dimensional code.
- the channel coding algorithm in the source and channel coding modules may use an error correction code to protect the data. Any error correction code that can detect and correct the error can be used.
- the error correction code of the present embodiment may employ a Reed-Solomon code.
- Error correcting codes can detect and correct multiple character anomalies, including erasures and errors. Among them, erasure refers to an error symbol at a known location. An error is an error symbol at an unknown location.
- Step S102 modulating the bit stream, converting it into an image gray value, and converting the image gray value into a corresponding halftone dot matrix
- the modulation algorithm in this embodiment may be a group of 3 bits.
- the bit groups can be mapped to different gray values depending on the value of the bit group.
- the bit groups 000, 001, 010, 011, 100, 101, 110, 111 can be mapped to image gray values 30, 60, 90, 120, 150, 180, 210, 240, respectively.
- the halftone dot matrix conversion method in the present embodiment may be based on the difference in the gray value of each image region. According to the principle of keeping the average gray value in the image region unchanged, it is converted into a circular lattice with different sizes and densities.
- This halftone dot matrix conversion algorithm is identical to the corresponding algorithm built into the printer.
- Step S103 adding a finder pattern to the two-dimensional code module composed of the halftone dot matrix to generate a two-dimensional code.
- the imaginary pattern may be any pattern that helps locate the two-dimensional code position and measure its size during the two-dimensional code detection process as long as it has a mark on the boundary of the two-dimensional code.
- the imaginary pattern is a rectangular frame (for example, a square) composed of a solid line portion and a broken line (dotted line) portion.
- the positioning mark can be used to distinguish the two-dimensional code from the background.
- the dotted line portion can be used to locate the coordinates of the block in the two-dimensional code and determine the physical size of the two-dimensional code.
- the spectrum structure of the halftone dot matrix is:
- G(p) is the spectrum of the halftone dot matrix
- G w (p) is the spectrum of the halftone dot matrix of the white point black matrix
- G b (p) is the black dot white background
- C w represents the area of the entire module occupied by the white halftone dot matrix
- C b represents the area of the entire module occupied by the black halftone dot matrix
- a 1 and a 2 are the image sensor pixels of the photographing device.
- the constructed grid vectors, b 1 and b 2 are grid vectors of halftone lattices in the two-dimensional code generation process.
- ⁇ 1 , ⁇ 2 and ⁇ 1 , ⁇ 2 can be normalized vectors obtained by normalizing a 1 , a 2 and b 1 , b 2 .
- the normalized vector is defined as follows:
- step S200 specifically includes:
- Step S201 When the two-dimensional code is read by the mobile imaging device, the two-dimensional code image is acquired, and the image is restored by the two-dimensional code image, and the shape distortion of the two-dimensional code image in the communication channel is restored, and the image is restored. After the two-dimensional code;
- the two-dimensional code is first binarized, and the two-dimensional code is separated from the bright background by a dark area detection algorithm based on the difference in brightness between the background and the two-dimensional code. Specifically, it is only necessary to detect the four corner points in the finder pattern of the two-dimensional code to separate it from the background.
- the shape of the acquired two-dimensional code image region may be an arbitrary quadrilateral. Since the original two-dimensional code image is square, it can be reduced to a square to eliminate shape distortion.
- Step S202 extracting a two-dimensional code module according to the restored two-dimensional code, performing demodulation corresponding to the modulation on each two-dimensional code module, to obtain a bit stream;
- the module of the two-dimensional code can be extracted according to the dashed point in the imaginary pattern.
- the black and white pixel conversion point in the dotted line portion of the imaginary pattern edge may be used as a reference point.
- the solid line portion of the imaginary pattern is as long as 7 modules. Therefore, the solid line portion of the finder pattern can be divided into seven equal parts to obtain corresponding reference points.
- the upper and lower reference points are connected in a straight line, and the left and right reference points are also connected. In this way, the middle area of the two-dimensional code is divided into a single module by a straight line.
- the demodulation algorithm in this embodiment maps it to a corresponding set of bits according to different image gray values.
- image gray values 30, 60, 90, 120, 150, 180, 210, 240 may be mapped to bit groups 000, 001, 010, 011, 100, 101, 110, 111, respectively.
- the gray value of the image needs to be classified according to its distance from the preset gray value, that is, 30, 60, 90, 120, 150, 180, 210, 240, and the gray scale after classification. The value will be set to 30, 60, 90, 120, 150, 180, 210, 240.
- Step S203 Perform bit source and channel decoding on the bit stream to obtain coded information.
- the step S300 specifically includes:
- Step S301 Extract a two-dimensional code module according to the two-dimensional code after performing image restoration
- Step S302 performing spectrum analysis on the two-dimensional code module to obtain a periodic feature of the signal
- the method of spectrum analysis may be a two-dimensional Fourier transform, a two-dimensional discrete cosine transform (DCT), a two-dimensional discrete wavelet transform (DWT), and the like.
- the input of the spectrum analysis is a QR code image.
- the output is the two-dimensional spectrum of the image signal.
- Step S303 determining whether the distance between the extreme point in the spectrum analysis and the calculated extreme point meets the expected distribution, and when the expected distribution is not met, prompting the two-dimensional code to perform the copy operation.
- the measure of distance can be a European distance.
- the threshold can be obtained by analyzing the original of a large number of two-dimensional codes and copying samples.
- the signal aliasing feature vector model is one of the key theoretical foundations of this two-dimensional code copy prevention. This model is built to help analyze signal aliasing and identify two-dimensional code images containing multiple sets of aliased signals that are subject to scan-print attacks. Using the Fourier transform (or other frequency domain transform) to analyze the obtained spectrum, the two-dimensional code subjected to the scan-print attack can be effectively identified. As shown in Figures 3a, 3b, 4a, 4b and 5, the coordinates of the four extreme points ⁇ P 1 , P 2 , P 3 , P 4 ⁇ near the origin of the spectrum can be determined by the parameters of the physical device (print resolution, The halftone dot matrix density, the pixel size of the image sensor) is calculated. By observing whether the number and position of extreme points in the image region surrounded by the four extreme points conform to the expected distribution, it can be distinguished whether the two-dimensional code has undergone a copy operation.
- the two-dimensional code is directly designed in the form of a halftone dot matrix, instead of the brightness conversion to the halftone dot matrix by the printer during the two-dimensional code printing process, so that a more stable detection effect can be achieved.
- the two-dimensional code subjected to the above operation is identified.
- the present invention also provides a copy prevention implementation system for a two-dimensional code.
- the anti-copy implementation system of the two-dimensional code includes:
- the two-dimensional code generating module 100 is configured to acquire input information of the user, convert the input information into an image gray value, and increase the finder image to obtain a two-dimensional code;
- the two-dimensional code decoding module 200 is configured to perform image recovery, demodulation, and decoding in sequence when the two-dimensional code is acquired by photographing, to obtain encoded information;
- the two-dimensional code verification module 300 is configured to perform spectrum analysis according to the two-dimensional code after performing image restoration, and determine whether the extreme point obtained by the spectrum analysis conforms to the expected distribution, and prompts the two-dimensional code to be performed when the expected distribution is not met. Copy operation.
- the two-dimensional code generation module 100 specifically includes:
- a source and channel coding unit configured to acquire user input information, and convert user information into a bit stream by using source and channel coding
- a modulating unit configured to modulate the bit stream, convert it into an image gradation value, and convert the image gradation value into a corresponding halftone dot matrix
- An image adding unit is configured to add a finder pattern to the two-dimensional code module composed of the halftone dot matrix to generate a two-dimensional code.
- the spectrum structure of the halftone dot matrix is:
- G(p) is the spectrum of the halftone dot matrix
- G w (p) is the spectrum of the halftone dot matrix of the white point black matrix
- G b (p) is the black dot white background
- C w represents the area of the entire module occupied by the white halftone dot matrix
- C b represents the area of the entire module occupied by the black halftone dot matrix
- a 1 and a 2 are the image sensor pixels of the photographing device.
- the constructed grid vectors, b 1 and b 2 are grid vectors of halftone lattices in the two-dimensional code generation process.
- ⁇ 1 , ⁇ 2 and ⁇ 1 , ⁇ 2 can be normalized vectors obtained by normalizing a 1 , a 2 and b 1 , b 2 .
- the two-dimensional code decoding module 200 specifically includes:
- An image restoration unit configured to acquire a two-dimensional code image when the two-dimensional code is read by the mobile imaging device, and perform image restoration on the two-dimensional code image to restore shape distortion of the two-dimensional code image in the communication channel , obtaining the restored two-dimensional code;
- a demodulation unit configured to extract a two-dimensional code module according to the restored two-dimensional code, perform demodulation corresponding to the modulation on each two-dimensional code module, to obtain a bit stream;
- the source and channel decoding unit is configured to perform bit source and channel decoding on the bit stream to obtain coded information.
- the two-dimensional code verification module 300 is specific include:
- a module extracting unit configured to extract a two-dimensional code module according to the two-dimensional code after performing image restoration
- a spectrum analysis unit configured to perform spectrum analysis on the two-dimensional code module to obtain a periodic feature of the signal
- the determining unit is configured to determine whether the distance between the extreme point in the spectrum analysis and the calculated extreme point meets the expected distribution, and when the expected distribution is not met, the two-dimensional code is prompted to perform the copy operation.
- the method and implementation system for preventing copying of a two-dimensional code includes: obtaining input information of a user, converting the input information into an image gray value, and adding a finder image to obtain a two-dimensional code
- image restoration, demodulation, and decoding are sequentially performed to obtain encoded information
- spectrum analysis is performed according to the two-dimensional code after image restoration, and whether the extreme point obtained by the spectrum analysis is determined is It conforms to the expected distribution, and when it does not meet the expected distribution, it prompts the QR code to be copied.
- the invention combines the communication channel model and the physical device features of the two-dimensional code in the scanning-printing process, and analyzes the spectral characteristics of the image signal in the scanning-printing operation to ensure the reading of the two-dimensional code by the low-resolution mobile imaging device.
- the method of using the aliasing features of image signals and the features of strong correlation noise is proposed to obtain effective evidence for the scanning and printing attacks of two-dimensional codes.
Landscapes
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Electromagnetism (AREA)
- Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
- Facsimile Image Signal Circuits (AREA)
Abstract
Provided are a method for realizing two dimensional code copy prevention and a realization system thereof. The method comprises: acquiring input information of a user, and converting the input information into an image gray value, and then adding a finder pattern to obtain a two dimensional code (S100); when the two-dimensional code is obtained through photographing, sequentially recovering, demodulating and decoding the image to obtain encoded information (S200); and performing spectrum analysis according to the two dimensional code after image recovering, and determining whether extreme points obtained through the spectrum analysis meet an expected distribution, and when the expected distribution is not met, prompting the two dimensional code has been copied (S300). By combining a communication channel model of the two dimensional code with physical device characteristics, the method analyzes resample spectral characteristics of the image signal, and on the basis of ensuring a robustness of a low-resolution mobile camera device reading the two dimensional code, by utilizing an aliasing feature and a strong correlation noise feature of the image signal, the method obtains a valid evidence of a scanning-printing attack of the two dimensional code.
Description
本发明涉及信息安全技术领域,尤其涉及的是一种二维码的防拷贝实现方法及实现系统。The present invention relates to the field of information security technologies, and in particular, to a method and an implementation system for preventing copying of a two-dimensional code.
目前,存在使用特殊的打印材料或工艺,控制二维码的生成与复制。通过在打印过程的特殊打印材料,例如全息(holographic)材料与具有独特光学特征的聚合液晶材料可被用于印制二维码以防止其被复制。特殊的打印墨水也可以被应用于二维码的印制上,例如紫外荧光油墨使所印制的二维码在可见光下不可见,以防止其被复制。特殊的生产工艺亦可用于加强二维码的安全性,例如特殊的半色调打印技术可生成在可见光下隐藏的二维码。Currently, there are special printing materials or processes that control the generation and reproduction of two-dimensional codes. The special printed material in the printing process, such as holographic materials and polymeric liquid crystal materials having unique optical characteristics, can be used to print the two-dimensional code to prevent it from being copied. Special printing inks can also be applied to the printing of two-dimensional codes. For example, ultraviolet fluorescent inks make the printed two-dimensional code invisible under visible light to prevent it from being copied. Special production processes can also be used to enhance the security of QR codes. For example, special halftone printing technology can generate two-dimensional codes hidden under visible light.
现有技术中还存在使用加密算法与安全协议,控制二维码的生成与读取。非对称密钥的加密算法(例如,RSA算法)与PKI公钥加密体系可用于控制二维码生成并验证其信息的真伪,此类具有加密保护的系统也被应用于防伪平台的构建。混沌方程(Chaotic Equation)可被用于二维码身份编号的生成过程,以保证其唯一性且随机字符串无法被批量复制,从而最终有效控制二维码的生成。类似地,AuthPaper系统内应用了ECDSA数字签名算法,以防止文档伪造者对其中内容进行篡改。除了加密算法外,研究者也提出了一些基于通信架构的安全协议增强所显示二维码的安全性。例如,研究者基于移动设备前置摄像设备与显示屏的双工通信系统,提出了一种称为“all or nothing”的通信协议。只有当接收者可同时获取所传输及接收的信号时,才能对信道中二维码的信息进行解码,进而增强了信息的保密性。In the prior art, there are also encryption algorithms and security protocols for controlling the generation and reading of two-dimensional codes. An asymmetric key encryption algorithm (for example, RSA algorithm) and a PKI public key encryption system can be used to control the generation of the two-dimensional code and verify the authenticity of the information. Such a system with encryption protection is also applied to the construction of the anti-counterfeiting platform. The Chaotic Equation can be used to generate the QR code identity number to ensure its uniqueness and the random string cannot be copied in batches, thus effectively controlling the generation of the QR code. Similarly, the ECDSA digital signature algorithm is applied within the AuthPaper system to prevent document counterfeiters from tampering with the content. In addition to the encryption algorithm, the researchers also proposed some security protocols based on the communication architecture to enhance the security of the displayed two-dimensional code. For example, the researcher proposed a communication protocol called "all or nothing" based on the duplex communication system of the mobile device front camera device and the display screen. Only when the receiver can acquire the transmitted and received signals at the same time can the information of the two-dimensional code in the channel be decoded, thereby enhancing the confidentiality of the information.
现有技术中还存在使用数字水印技术,控制二维码的生成。数字水印技术可将与二维码相关的信息嵌入在二维码图像中。例如,直接利用DCT和DFT分解二维码的图像频率信息,可在当中嵌入肉眼不易察觉的水印信息。在拍摄二维码图像后,可对其进行解码并同时评估数字水印信息的真实性。类似地,数字水印
也可储存于DWT域内。然而,一种保证水印信息更鲁棒的方法是利用二维码的信息冗余度,修改部分模块的整体亮度以储存二维码内容的数字签名。综合考虑所水印信息的鲁棒程度及容量,则可利用二维码解码过程中对每个模块的失真容忍度,修改模块的样式以储存水印信息。There is also a digital watermarking technique used in the prior art to control the generation of a two-dimensional code. The digital watermarking technique can embed information related to the two-dimensional code in the two-dimensional code image. For example, directly using DCT and DFT to decompose the image frequency information of the two-dimensional code, it is possible to embed watermark information that is not easily perceptible to the naked eye. After the two-dimensional code image is taken, it can be decoded and the authenticity of the digital watermark information can be evaluated at the same time. Similarly, digital watermarking
It can also be stored in the DWT domain. However, one way to ensure that the watermark information is more robust is to use the information redundancy of the two-dimensional code to modify the overall brightness of some of the modules to store the digital signature of the two-dimensional code content. Considering the robustness and capacity of the watermark information, the distortion tolerance of each module in the two-dimensional code decoding process can be utilized to modify the module's style to store the watermark information.
现有技术中还存在使用具有拷贝检测特征的图案样式或物理不可克隆特征,控制二维码的生成与复制。出于对解码稳定性的考虑,传统二维码由足够大的黑白块状单元组成。然而,这种设计易于被拷贝。一些具有更多细节特征图案样式可被用于二维码的设计中,以抵抗最直接的扫描-打印形式复制。由高密度的黑白单元组成图形的图形被用于拷贝检测,并在检测过程运用对数正态分布作为打印-扫描信道的关键模型。除了黑白二值图像,灰度图像也可被用于拷贝检测图案中。其中,拷贝检测的决策可基于灰度图像在打印-扫描信道中的变化特征,主要包括图像的高频特征,如锐利度。与灰度图像相比,彩色图案包含了CMYK四个通道的信息。经过拷贝后,其中的颜色的特征(模块内的颜色均值,方差,熵等)会产生明显的区别。除了上述细节图案特征外,在打印文档中的物理不可克隆函数也被运用于识别对打印文档的非法复制。其中的物理不可克隆函数(Physical Unclonable Function,PUF)是由打印设备和纸张所产生的随机变化,其特征易于提取及分析但却不容易被复制伪造。例如,打印碳粉和纸张的随机变化,纸张的微观粗糙程度。There are also pattern patterns or physical unclonable features with copy detection features in the prior art to control the generation and copying of two-dimensional codes. For the sake of decoding stability, the conventional two-dimensional code is composed of a large black and white block unit. However, this design is easy to copy. Some pattern patterns with more detail features can be used in the design of two-dimensional codes to resist the most direct scan-print form reproduction. A graphic composed of high-density black-and-white cells is used for copy detection, and a log-normal distribution is used as a key model of the print-scan channel during the detection process. In addition to black and white binary images, grayscale images can also be used in copy detection patterns. The decision of the copy detection may be based on a variation feature of the grayscale image in the print-scan channel, and mainly includes high frequency features of the image, such as sharpness. Compared to grayscale images, the color pattern contains information on four channels of CMYK. After copying, the characteristics of the colors (color mean, variance, entropy, etc. within the module) will make a significant difference. In addition to the above detailed pattern features, the physical unclonable function in the printed document is also used to identify illegal copying of the printed document. The Physical Unclonable Function (PUF) is a random change produced by printing equipment and paper. Its features are easy to extract and analyze but are not easily copied and forged. For example, printing random variations in toner and paper, microscopic roughness of the paper.
上述几类方法,能不同程度地增强二维码安全性,但是也带来了一些问题:The above types of methods can enhance the security of the QR code to varying degrees, but it also brings some problems:
1)降低二维码在通用性上的优势。以特殊的打印材料或工艺制作二维码,可加强对生成过程的控制以抵御对二维码的非法复制,但却无可避免地降低了二维码的通用性(增加了二维码的生产成本以及对特殊设备的依赖性)。与同类技术(如,RFID与智能传感器)相比,二维码的主要优势在于其极低的成本以及不依赖于特殊硬件的灵活性。因此,这类基于特殊的打印材料或工艺的方法将大大地降低二维码在物联网中大规模应用的竞争力。1) Reduce the advantages of QR codes in versatility. Making a two-dimensional code with a special printing material or process can strengthen the control of the generation process to resist the illegal copying of the two-dimensional code, but inevitably reduces the versatility of the two-dimensional code (adding the two-dimensional code Production costs and dependence on special equipment). Compared with similar technologies (such as RFID and smart sensors), the main advantages of QR codes are their extremely low cost and flexibility that does not depend on special hardware. Therefore, such methods based on special printed materials or processes will greatly reduce the competitiveness of two-dimensional codes for large-scale applications in the Internet of Things.
2)增加使用复杂度。与传统二维码相比,引入基于加密与数字水印等算法或安全协议的方案可控制二维码未经授权的生成以及对当中数据的非法篡改,但却增加了系统的复杂度。以加密与水印算法为例,其复杂度主要体现在以下两个方面:首先,在利用非对称加密算法以及数字签名技术对二维码进行生成控制的
过程中,需要布置公钥基础设施(Public Key Infrastructure,PKI)。须保证每个用户私钥的安全性,及通过安全的通信渠道分发相应的公钥。其次,在信息使用的过程中,额外增加了对二维码的解密或信息提取步骤。2) Increase the complexity of use. Compared with the traditional two-dimensional code, the introduction of algorithms based on encryption and digital watermarking or security protocols can control the unauthorized generation of the two-dimensional code and the illegal tampering of the data, but it increases the complexity of the system. Taking the encryption and watermarking algorithms as an example, the complexity is mainly reflected in the following two aspects: First, the generation and control of the two-dimensional code is performed by using the asymmetric encryption algorithm and the digital signature technology.
In the process, a Public Key Infrastructure (PKI) needs to be deployed. The security of each user's private key must be guaranteed and the corresponding public key distributed through a secure communication channel. Secondly, in the process of using the information, the steps of decrypting or extracting the two-dimensional code are additionally added.
3)无法有效解决抵御非法复制与普遍适用性的矛盾。最重要的是,即使二维码应用了拷贝检测图案与物理不可克隆函数,或者是上述安全(加密与数字水印)算法,也难以在物联网的系统框架下防止伪造者复制该二维码。基于物理不可克隆函数所提取的图像特征涉及打印输出图像中的细节。为了准确抓取此类特征,需对二维码的验证环境有一定的限制,这不符合物联网的普遍适用性主旨。例如,将所验证的文档置于相对固定的距离与光照环境中。另一方面,由于上述的安全算法只在信息加密方面保证了二维码当中信息的可靠性,无法改变二维码中信息的可视性,因此也难以有效抵抗非法复制。此外,由于拷贝检测图案通常基于高频信息的衰减来判断该图像的真伪,而攻击者所使用的复制设备(高精度扫描仪、复印机等)往往具有更高的分辨率且对高频信息的保留更完整。因此,难以在保证验证设备通用型的前提下防止伪造者对其进行复制。3) It is impossible to effectively resolve the contradiction between resisting illegal copying and universal applicability. Most importantly, even if the two-dimensional code applies a copy detection pattern and a physical unclonable function, or the above-mentioned security (encryption and digital watermark) algorithm, it is difficult to prevent the counterfeiter from copying the two-dimensional code under the system framework of the Internet of Things. Image features extracted based on physical unclonable functions relate to details in the printed output image. In order to accurately capture such features, there is a certain limit to the verification environment of the two-dimensional code, which does not meet the general applicability of the Internet of Things. For example, placing the verified document in a relatively fixed distance and lighting environment. On the other hand, since the above security algorithm only guarantees the reliability of the information in the two-dimensional code in terms of information encryption, and cannot change the visibility of the information in the two-dimensional code, it is also difficult to effectively resist illegal copying. In addition, since the copy detection pattern usually determines the authenticity of the image based on the attenuation of the high frequency information, the copying device (high-precision scanner, copying machine, etc.) used by the attacker tends to have higher resolution and high-frequency information. The reservation is more complete. Therefore, it is difficult to prevent the counterfeiter from copying it while ensuring the general type of the verification device.
可见,近年来人们已经意识到二维码在生成以及复制控制方面问题,并提出了一些解决方案,且对生成控制方面带来了有效的控制。然而这些方法在保证二维码的唯一性,即抵御非法复制方面的综合表现仍有待进一步提高。It can be seen that in recent years, people have realized the problems of QR code generation and copy control, and proposed some solutions, and brought effective control to the generation control. However, the comprehensive performance of these methods in ensuring the uniqueness of the two-dimensional code, that is, resisting illegal copying, needs to be further improved.
因此,现有技术还有待于改进和发展。Therefore, the prior art has yet to be improved and developed.
发明内容Summary of the invention
鉴于上述现有技术的不足,本发明的目的在于提供一种二维码的防拷贝实现方法及实现系统,旨在解决现有技术中增强二维码安全性的同时,带来的通用性低,增加使用复杂度,且无法有效解决抵御非法复制与普遍适用性的矛盾的缺陷。In view of the above-mentioned deficiencies of the prior art, an object of the present invention is to provide a method and an implementation system for preventing copying of a two-dimensional code, which aims to solve the problem of improving the security of the two-dimensional code in the prior art, and the versatility is low. Increase the complexity of use, and can not effectively solve the contradiction of resisting the contradiction between illegal copying and universal applicability.
本发明的技术方案如下:The technical solution of the present invention is as follows:
一种二维码的防拷贝实现方法,其中,所述方法包括以下步骤:A method for implementing copy prevention of a two-dimensional code, wherein the method comprises the following steps:
A、获取用户的输入信息,将输入信息转化为图像灰度值后并增加寻像图像得到二维码;A, obtaining user input information, converting the input information into image gray value and adding the finder image to obtain a two-dimensional code;
B、当经拍摄获取所述二维码时,则依次进行图像恢复、解调及解码,得到编码信息;
B. When the two-dimensional code is acquired by shooting, image restoration, demodulation, and decoding are sequentially performed to obtain encoded information;
C、根据进行图像恢复后的二维码进行频谱分析,并判断频谱分析得到的极值点是否符合预期分布,当不符合预期分布时则提示该二维码进行过复制操作。C. Perform spectrum analysis according to the two-dimensional code after image restoration, and determine whether the extreme point obtained by the spectrum analysis conforms to the expected distribution. When the expected distribution is not met, the two-dimensional code is prompted to perform the copy operation.
所述二维码的防拷贝实现方法,其中,所述步骤A具体包括:The anti-copy implementation method of the two-dimensional code, wherein the step A specifically includes:
A1、获取用户的输入信息,通过信源与信道编码将用户信息转化为比特流;A1. Acquire user input information, and convert user information into a bit stream by using source and channel coding;
A2、将比特流进行调制,转化为图像灰度值,再将图像灰度值转化为对应的半色调点阵;A2, the bit stream is modulated, converted into image gray value, and then the image gray value is converted into a corresponding halftone dot matrix;
A3、在半色调点阵组成的二维码模块旁加上寻像图案,生成二维码。A3. Add a finder pattern to the two-dimensional code module composed of the halftone dot matrix to generate a two-dimensional code.
所述二维码的防拷贝实现方法,其中,所述半色调点阵的频谱结构为:The anti-copy implementation method of the two-dimensional code, wherein the spectrum structure of the halftone dot matrix is:
其中,p为频谱的二维坐标,G(p)为半色调点阵的频谱,Gw(p)为白点黑底的半色调点阵的频谱,Gb(p)分别黑点白底的半色调点阵的频谱,Cw表示白色半色调点阵所占整个模块的面积,Cb表示黑色半色调点阵所占整个模块的面积,a1和a2为拍摄设备的图像传感器像素所构成的网格向量,b1和b2为二维码生成过程中的半色调点阵所构成的网格向量。α1、α2与β1、β2可将a1、a2与b1、b2归一化后获得的归一化向量。Where p is the two-dimensional coordinate of the spectrum, G(p) is the spectrum of the halftone dot matrix, G w (p) is the spectrum of the halftone dot matrix of the white point black matrix, and G b (p) is the black dot white background The spectrum of the halftone dot matrix, C w represents the area of the entire module occupied by the white halftone dot matrix, C b represents the area of the entire module occupied by the black halftone dot matrix, and a 1 and a 2 are the image sensor pixels of the photographing device. The constructed grid vectors, b 1 and b 2 , are grid vectors of halftone lattices in the two-dimensional code generation process. α 1 , α 2 and β 1 , β 2 can be normalized vectors obtained by normalizing a 1 , a 2 and b 1 , b 2 .
所述二维码的防拷贝实现方法,其中,所述步骤B具体包括:The anti-copying implementation method of the two-dimensional code, wherein the step B specifically includes:
B1、当通过移动摄像设备读取了所述二维码时,则获取二维码图像,并对二维码图像进行图像恢复,还原二维码图像在通信信道中的形状畸变,得到还原后的二维码;B1, when the two-dimensional code is read by the mobile imaging device, the two-dimensional code image is acquired, and the image is restored by the two-dimensional code image, and the shape distortion of the two-dimensional code image in the communication channel is restored, and the restored shape is obtained. QR code;
B2、根据还原后的二维码,提取二维码模块,对每个二维码模块进行与调制相对应的解调,得到比特流;B2: extracting a two-dimensional code module according to the restored two-dimensional code, and performing demodulation corresponding to the modulation on each two-dimensional code module to obtain a bit stream;
B3、将比特流进行信源与信道解码,得到编码信息。B3. Perform bit source and channel decoding on the bit stream to obtain coded information.
所述二维码的防拷贝实现方法,其中,所述步骤C具体包括:
The anti-copying implementation method of the two-dimensional code, wherein the step C specifically includes:
C1、根据进行图像恢复后的二维码,提取二维码模块;C1, extracting a two-dimensional code module according to the two-dimensional code after performing image restoration;
C2、对所述二维码模块进行频谱分析,得到信号周期性特征;C2, performing spectrum analysis on the two-dimensional code module to obtain a periodic feature of the signal;
C3、判断频谱分析中的极值点与计算的极值点之间的距离是否符合预期分布,当不符合预期分布时则提示该二维码进行过复制操作。C3. Determine whether the distance between the extreme point in the spectrum analysis and the calculated extreme point meets the expected distribution. When the expected distribution is not met, the two-dimensional code is prompted to perform the copy operation.
一种二维码的防拷贝实现系统,其中,包括:A copy prevention implementation system for a two-dimensional code, comprising:
二维码生成模块,用于获取用户的输入信息,将输入信息转化为图像灰度值后并增加寻像图像得到二维码;a two-dimensional code generating module, configured to obtain input information of the user, convert the input information into an image gray value, and increase the finder image to obtain a two-dimensional code;
二维码解码模块,用于当经拍摄获取所述二维码时,则依次进行图像恢复、解调及解码,得到编码信息;a two-dimensional code decoding module, configured to perform image recovery, demodulation, and decoding in sequence when acquiring the two-dimensional code by photographing, to obtain encoded information;
二维码验证模块,用于根据进行图像恢复后的二维码进行频谱分析,并判断频谱分析得到的极值点是否符合预期分布,当不符合预期分布时则提示该二维码进行过复制操作。The two-dimensional code verification module is configured to perform spectrum analysis according to the two-dimensional code after image restoration, and determine whether the extreme point obtained by the spectrum analysis conforms to the expected distribution, and prompts the two-dimensional code to be copied when the expected distribution is not met. operating.
所述二维码的防拷贝实现系统,其中,所述二维码生成模块具体包括:The anti-copy implementation system of the two-dimensional code, wherein the two-dimensional code generation module specifically includes:
信源与信道编码单元,用于获取用户的输入信息,通过信源与信道编码将用户信息转化为比特流;a source and channel coding unit, configured to acquire user input information, and convert user information into a bit stream by using source and channel coding;
调制单元,用于将比特流进行调制,转化为图像灰度值,再将图像灰度值转化为对应的半色调点阵;a modulating unit configured to modulate the bit stream, convert it into an image gradation value, and convert the image gradation value into a corresponding halftone dot matrix;
图像添加单元,用于在半色调点阵组成的二维码模块旁加上寻像图案,生成二维码。An image adding unit is configured to add a finder pattern to the two-dimensional code module composed of the halftone dot matrix to generate a two-dimensional code.
所述二维码的防拷贝实现系统,其中,所述半色调点阵的频谱结构为:The anti-copy implementation system of the two-dimensional code, wherein the spectral structure of the halftone dot matrix is:
其中,p为频谱的二维坐标,G(p)为半色调点阵的频谱,Gw(p)为白点黑底的半色调点阵的频谱,Gb(p)分别黑点白底的半色调点阵的频谱,Cw表示白色半色
调点阵所占整个模块的面积,Cb表示黑色半色调点阵所占整个模块的面积,a1和a2为拍摄设备的图像传感器像素所构成的网格向量,b1和b2为二维码生成过程中的半色调点阵所构成的网格向量。α1、α2与β1、β2可将a1、a2与b1、b2归一化后获得的归一化向量。Where p is the two-dimensional coordinate of the spectrum, G(p) is the spectrum of the halftone dot matrix, G w (p) is the spectrum of the halftone dot matrix of the white point black matrix, and G b (p) is the black dot white background The spectrum of the halftone dot matrix, C w represents the area of the entire module occupied by the white halftone dot matrix, C b represents the area of the entire module occupied by the black halftone dot matrix, and a 1 and a 2 are the image sensor pixels of the photographing device. The constructed grid vectors, b 1 and b 2 , are grid vectors of halftone lattices in the two-dimensional code generation process. α 1 , α 2 and β 1 , β 2 can be normalized vectors obtained by normalizing a 1 , a 2 and b 1 , b 2 .
所述二维码的防拷贝实现系统,其中,所述二维码解码模块具体包括:The anti-copy implementation system of the two-dimensional code, wherein the two-dimensional code decoding module specifically includes:
图像恢复单元,用于当通过移动摄像设备读取了所述二维码时,则获取二维码图像,并对二维码图像进行图像恢复,还原二维码图像在通信信道中的形状畸变,得到还原后的二维码;An image restoration unit, configured to acquire a two-dimensional code image when the two-dimensional code is read by the mobile imaging device, and perform image restoration on the two-dimensional code image to restore shape distortion of the two-dimensional code image in the communication channel , obtaining the restored two-dimensional code;
解调单元,用于根据还原后的二维码,提取二维码模块,对每个二维码模块进行与调制相对应的解调,得到比特流;a demodulation unit, configured to extract a two-dimensional code module according to the restored two-dimensional code, perform demodulation corresponding to the modulation on each two-dimensional code module, to obtain a bit stream;
信源与信道解码单元,用于将比特流进行信源与信道解码,得到编码信息。The source and channel decoding unit is configured to perform bit source and channel decoding on the bit stream to obtain coded information.
所述二维码的防拷贝实现系统,其中,所述二维码验证模块具体包括:The anti-copy implementation system of the two-dimensional code, wherein the two-dimensional code verification module specifically includes:
模块提取单元,用于根据进行图像恢复后的二维码,提取二维码模块;a module extracting unit, configured to extract a two-dimensional code module according to the two-dimensional code after performing image restoration;
频谱分析单元,用于对所述二维码模块进行频谱分析,得到信号周期性特征;a spectrum analysis unit, configured to perform spectrum analysis on the two-dimensional code module to obtain a periodic feature of the signal;
判断单元,用于判断频谱分析中的极值点与计算的极值点之间的距离是否符合预期分布,当不符合预期分布时则提示该二维码进行过复制操作。The determining unit is configured to determine whether the distance between the extreme point in the spectrum analysis and the calculated extreme point meets the expected distribution, and when the expected distribution is not met, the two-dimensional code is prompted to perform the copy operation.
本发明所提供的二维码的防拷贝实现方法及实现系统,方法包括:获取用户的输入信息,将输入信息转化为图像灰度值后并增加寻像图像得到二维码;当经拍摄获取所述二维码时,则依次进行图像恢复、解调及解码,得到编码信息;根据进行图像恢复后的二维码进行频谱分析,并判断频谱分析得到的极值点是否符合预期分布,当不符合预期分布时则提示该二维码进行过复制操作。本发明结合在扫描-打印过程中二维码的通信信道模型和物理设备特征,通过分析扫描-打印操作中的图像信号重采样频谱特征,在保证低分辨率移动摄像设备对二维码读取鲁棒性的基础上,提出利用图像信号的混叠特征及强相关性噪声特征的方法,取得对二维码扫描-打印攻击的有效取证。The method and implementation system for preventing copying of a two-dimensional code provided by the present invention comprises: obtaining input information of a user, converting the input information into an image gray value, and adding a finder image to obtain a two-dimensional code; In the two-dimensional code, image restoration, demodulation and decoding are sequentially performed to obtain encoded information; spectrum analysis is performed according to the two-dimensional code after image restoration, and whether the extreme point obtained by the spectrum analysis conforms to the expected distribution is determined. If the expected distribution is not met, the QR code is prompted to be copied. The invention combines the communication channel model and the physical device features of the two-dimensional code in the scanning-printing process, and analyzes the spectral characteristics of the image signal in the scanning-printing operation to ensure the reading of the two-dimensional code by the low-resolution mobile imaging device. On the basis of robustness, the method of using the aliasing features of image signals and the features of strong correlation noise is proposed to obtain effective evidence for the scanning and printing attacks of two-dimensional codes.
图1为本发明所述二维码的防拷贝实现方法较佳实施例的流程图。1 is a flow chart of a preferred embodiment of a method for implementing copy prevention of a two-dimensional code according to the present invention.
图2为本发明所述二维码的防拷贝实现方法中包括半色调点阵的二维码的
示意图。2 is a two-dimensional code including a halftone dot matrix in a method for implementing copy prevention of a two-dimensional code according to the present invention;
schematic diagram.
图3a为二维码经过一次打印-拍摄的示意图。Figure 3a is a schematic diagram of a two-dimensional code after one print-shot.
图3b为二维码经过一次打印-扫描-打印-拍摄的示意图。Figure 3b is a schematic diagram of a two-dimensional code after one print-scan-print-shoot.
图4a为经过一次打印-拍摄的二维码的频谱图。Figure 4a is a spectrogram of a two-dimensional code that has been printed-shot.
图4b为经过一次打印-扫描-打印-拍摄的二维码的频谱图。Figure 4b is a spectrogram of a two-dimensional code after one print-scan-print-shoot.
图5为半色调点阵的频谱结构示意图。Fig. 5 is a schematic diagram showing the spectrum structure of a halftone dot matrix.
图6为本发明所述二维码的防拷贝实现系统较佳实施例的功能结构框图。FIG. 6 is a functional block diagram of a preferred embodiment of a copy prevention implementation system for a two-dimensional code according to the present invention.
本发明提供一种二维码的防拷贝实现方法及实现系统,为使本发明的目的、技术方案及效果更加清楚、明确,以下对本发明进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。The present invention provides a method and an implementation system for preventing copying of a two-dimensional code. In order to make the objects, technical solutions and effects of the present invention more clear and clear, the present invention will be further described in detail below. It is understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
如图1所示,为本发明所述二维码的防拷贝实现方法较佳实施例的流程图,所述方法包括以下步骤:FIG. 1 is a flowchart of a preferred embodiment of a method for implementing copy prevention of a two-dimensional code according to the present invention, the method comprising the following steps:
步骤S100、获取用户的输入信息,将输入信息转化为图像灰度值后并增加寻像图像得到二维码;Step S100: Obtain input information of the user, convert the input information into an image gray value, and increase the finder image to obtain a two-dimensional code;
步骤S200、当经拍摄获取所述二维码时,则依次进行图像恢复、解调及解码,得到编码信息;Step S200: When the two-dimensional code is acquired by shooting, image restoration, demodulation, and decoding are sequentially performed to obtain encoded information.
步骤S300、根据进行图像恢复后的二维码进行频谱分析,并判断频谱分析得到的极值点是否符合预期分布,当不符合预期分布时则提示该二维码进行过复制操作。Step S300: Perform spectrum analysis according to the two-dimensional code after the image restoration, and determine whether the extreme point obtained by the spectrum analysis conforms to the expected distribution. When the expected distribution is not met, the two-dimensional code is prompted to perform the copy operation.
本发明的实施例中,用户的输入信息包括字符串、网址等,在获取了用户的输入信息后,将输入信息转化为图像灰度值,并将图像灰度值转化为对应的半色调点阵,并增加寻像图像得到二维码。In the embodiment of the present invention, the input information of the user includes a character string, a web address, etc., after the user input information is acquired, the input information is converted into an image gray value, and the image gray value is converted into a corresponding halftone point. Array, and increase the finder image to get the QR code.
具体地,现有的二维码由黑白块状(低频方波)结构组成,其频率与扫描-打印设备的采样频率相差甚远,重采样后所产生的信号混叠现象不明显。为了使此特征更明显,易产生明显信号混叠现象的与扫描-打印设备采样频率相近的半色调点阵可用于组成二维码模块,如图2所示。在图2中,所述二维码中,半色调点阵在区域中的平均亮度可以用来表示信息,例如,在图2中的二维码模块有
16个不同的灰度值,每个灰度值可携带4个比特的信息。在示例中每个灰度值占了4×4个模块的空间。在实际使用中,可根据所编码的信息,来调制二维码中每个模块的灰度值。Specifically, the existing two-dimensional code is composed of a black and white block (low frequency square wave) structure, and the frequency thereof is far from the sampling frequency of the scanning-printing device, and the signal aliasing phenomenon after resampling is not obvious. In order to make this feature more obvious, a halftone dot matrix similar to the sampling frequency of the scanning-printing device which is prone to significant signal aliasing can be used to form a two-dimensional code module, as shown in FIG. In FIG. 2, in the two-dimensional code, the average brightness of the halftone dot matrix in the region can be used to represent information, for example, the two-dimensional code module in FIG. 2 has
16 different gray values, each of which can carry 4 bits of information. In the example, each gray value occupies a space of 4 x 4 modules. In actual use, the gray value of each module in the two-dimensional code can be modulated according to the encoded information.
优选的,所述步骤S100具体包括:Preferably, the step S100 specifically includes:
步骤S101、获取用户的输入信息,通过信源与信道编码将用户信息转化为比特流;Step S101: Acquire user input information, and convert user information into a bit stream by using source and channel coding;
在本发明中,文本消息的字符可以转换成由字符编码库所定义的另一种格式。不同的语言有自己的编码方案/标准。例如,对于英文字符,常用的标准是ASCII(美国信息交换标准码)。对于汉字,常用的标准是UTF-8(万国码)。其他语言也有自己的标准。文本消息的字符可以转换成由字符编码库所定义的任何其他格式。利用字符编码库,可以将文本消息内的单个字符编码成具有特定位数(例如,8位)的二进制数据码字。在文本消息被编码之后,可以将报头置于编码后的消息的前端。这里,报头可以指示图像二维码的解码过程(稍后描述)中消息中的字符长度和所采用的编码方案。In the present invention, the characters of the text message can be converted into another format defined by the character encoding library. Different languages have their own coding schemes/standards. For example, for English characters, the commonly used standard is ASCII (American Standard Code for Information Interchange). For Chinese characters, the commonly used standard is UTF-8 (Wanguo code). Other languages also have their own standards. The characters of a text message can be converted to any other format defined by the character encoding library. With a character encoding library, a single character within a text message can be encoded into a binary data codeword having a particular number of bits (eg, 8 bits). After the text message is encoded, the header can be placed at the front end of the encoded message. Here, the header may indicate the length of the character in the message and the encoding scheme employed in the decoding process (described later) of the image two-dimensional code.
此外,可以预见,在二维码传输过程中可能会引入错误(例如由于环境或信道的原因),这将损坏数据并最终有可能导致对消息的解码30失败。因此,在本实施方式中,信源与信道编码模块中的信道编码算法可以采用纠错码以保护数据。任何可以检测并纠正错误的纠错码都可以采用。In addition, it is foreseeable that errors may be introduced during the transmission of the two-dimensional code (for example due to environmental or channel reasons), which will corrupt the data and may eventually result in failure of the decoding of the message 30. Therefore, in the present embodiment, the channel coding algorithm in the source and channel coding modules may use an error correction code to protect the data. Any error correction code that can detect and correct the error can be used.
作为一个示例,本实施方式的纠错码可以采用里德-所罗门(Reed-Solomon)码。纠错码可以检测和纠正多个字符的异常,包括擦除和错误。其中,擦除指的是在已知位置的错误符号。错误则是指在未知位置的错误符号。As an example, the error correction code of the present embodiment may employ a Reed-Solomon code. Error correcting codes can detect and correct multiple character anomalies, including erasures and errors. Among them, erasure refers to an error symbol at a known location. An error is an error symbol at an unknown location.
步骤S102、将比特流进行调制,转化为图像灰度值,再将图像灰度值转化为对应的半色调点阵;Step S102, modulating the bit stream, converting it into an image gray value, and converting the image gray value into a corresponding halftone dot matrix;
作为一个示例,本实施中的调制算法可以是以3个比特为一组。根据比特组的取值,可将比特组映射到不同的灰度值。例如,可将比特组000,001,010,011,100,101,110,111分别映射到图像灰度值30,60,90,120,150,180,210,240。As an example, the modulation algorithm in this embodiment may be a group of 3 bits. The bit groups can be mapped to different gray values depending on the value of the bit group. For example, the bit groups 000, 001, 010, 011, 100, 101, 110, 111 can be mapped to image gray values 30, 60, 90, 120, 150, 180, 210, 240, respectively.
此外,本实施中的半色调点阵转换方法可以根据每个图像区域灰度值的不同,
依据保持图像区域内平均灰度值不变的原则,将其转换成具有不同大小、密度的圆形点阵。此半色调点阵转换算法与打印机内置的对应算法原理是一样的。In addition, the halftone dot matrix conversion method in the present embodiment may be based on the difference in the gray value of each image region.
According to the principle of keeping the average gray value in the image region unchanged, it is converted into a circular lattice with different sizes and densities. This halftone dot matrix conversion algorithm is identical to the corresponding algorithm built into the printer.
步骤S103、在半色调点阵组成的二维码模块旁加上寻像图案,生成二维码。Step S103: adding a finder pattern to the two-dimensional code module composed of the halftone dot matrix to generate a two-dimensional code.
寻像图案可以是有助于定位二维码位置和在二维码检测过程中测量其尺寸的任何图案,只要其在二维码的边界上具有标记即可。在本实施方式中,寻像图案是由实线部分和虚线(点线)部分组成的矩形框(例如方框)。在后述的图像二维码的读取中,定位标识可以用于将二维码与背景区分开。在定位标识中,虚线部分可以用于定位二维码中的块的坐标和判断二维码的物理尺寸。The imaginary pattern may be any pattern that helps locate the two-dimensional code position and measure its size during the two-dimensional code detection process as long as it has a mark on the boundary of the two-dimensional code. In the present embodiment, the imaginary pattern is a rectangular frame (for example, a square) composed of a solid line portion and a broken line (dotted line) portion. In the reading of the image two-dimensional code described later, the positioning mark can be used to distinguish the two-dimensional code from the background. In the positioning identifier, the dotted line portion can be used to locate the coordinates of the block in the two-dimensional code and determine the physical size of the two-dimensional code.
具体的,所述半色调点阵的频谱结构为:Specifically, the spectrum structure of the halftone dot matrix is:
其中,p为频谱的二维坐标,G(p)为半色调点阵的频谱,Gw(p)为白点黑底的半色调点阵的频谱,Gb(p)分别黑点白底的半色调点阵的频谱,Cw表示白色半色调点阵所占整个模块的面积,Cb表示黑色半色调点阵所占整个模块的面积,a1和a2为拍摄设备的图像传感器像素所构成的网格向量,b1和b2为二维码生成过程中的半色调点阵所构成的网格向量。α1、α2与β1、β2可将a1、a2与b1、b2归一化后获得的归一化向量。Where p is the two-dimensional coordinate of the spectrum, G(p) is the spectrum of the halftone dot matrix, G w (p) is the spectrum of the halftone dot matrix of the white point black matrix, and G b (p) is the black dot white background The spectrum of the halftone dot matrix, C w represents the area of the entire module occupied by the white halftone dot matrix, C b represents the area of the entire module occupied by the black halftone dot matrix, and a 1 and a 2 are the image sensor pixels of the photographing device. The constructed grid vectors, b 1 and b 2 , are grid vectors of halftone lattices in the two-dimensional code generation process. α 1 , α 2 and β 1 , β 2 can be normalized vectors obtained by normalizing a 1 , a 2 and b 1 , b 2 .
以α1、α2为例,归一化向量的定义如下:Taking α 1 and α 2 as examples, the normalized vector is defined as follows:
其中,|·|为向量的范数。另外,k1、k2及l1、l2表示向量的长度,δ(·)为冲击函数,SPOT(·)为成像设备的二维采样函数,APER(·)为成像设备模糊函数的频谱,HDOT(·)为半色调点函数的频谱。
Where ||| is the norm of the vector. In addition, k 1 , k 2 and l 1 , l 2 represent the length of the vector, δ(·) is the impact function, SPOT(·) is the two-dimensional sampling function of the imaging device, and APER(·) is the spectrum of the fuzzy function of the imaging device. , HDOT (·) is the spectrum of the halftone point function.
所述二维码的防拷贝实现方法,其中,所述步骤S200具体包括:The anti-copying implementation method of the two-dimensional code, wherein the step S200 specifically includes:
步骤S201、当通过移动摄像设备读取了所述二维码时,则获取二维码图像,并对二维码图像进行图像恢复,还原二维码图像在通信信道中的形状畸变,得到还原后的二维码;Step S201: When the two-dimensional code is read by the mobile imaging device, the two-dimensional code image is acquired, and the image is restored by the two-dimensional code image, and the shape distortion of the two-dimensional code image in the communication channel is restored, and the image is restored. After the two-dimensional code;
作为一个示例,本实施中先将二维码进行二值化处理,基于背景与二维码的亮度差异,利用暗区域检测算法,将二维码与亮色背景分离。具体而言,只需检测二维码的寻像图案中的四个角点,即可将其与背景分开。As an example, in the present embodiment, the two-dimensional code is first binarized, and the two-dimensional code is separated from the bright background by a dark area detection algorithm based on the difference in brightness between the background and the two-dimensional code. Specifically, it is only necessary to detect the four corner points in the finder pattern of the two-dimensional code to separate it from the background.
由于二维码图像在拍摄过程中的畸变,所获取二维码图像区域的形状可以是任意的四边形。由于原始二维码图像是正方形,可将其还原成正方形以消除形状畸变。Due to the distortion of the two-dimensional code image during shooting, the shape of the acquired two-dimensional code image region may be an arbitrary quadrilateral. Since the original two-dimensional code image is square, it can be reduced to a square to eliminate shape distortion.
步骤S202、根据还原后的二维码,提取二维码模块,对每个二维码模块进行与调制相对应的解调,得到比特流;Step S202, extracting a two-dimensional code module according to the restored two-dimensional code, performing demodulation corresponding to the modulation on each two-dimensional code module, to obtain a bit stream;
作为一个示例,可根据寻像图案中的虚线点对二维码的模块进行提取。具体地,可将寻像图案边缘虚线部分中的黑白像素转换点作为参考点。此外,由于寻像图案的实线部分长为7个模块。因此,可将寻像图案的实线部份分成七等份,从而获取相应的参考点。以直线将上、下两组参考点连接起来,同样将左、右两组参考点连接起来。这样,二维码中间区域就被直线分割成一个个独立的模块。As an example, the module of the two-dimensional code can be extracted according to the dashed point in the imaginary pattern. Specifically, the black and white pixel conversion point in the dotted line portion of the imaginary pattern edge may be used as a reference point. In addition, since the solid line portion of the imaginary pattern is as long as 7 modules. Therefore, the solid line portion of the finder pattern can be divided into seven equal parts to obtain corresponding reference points. The upper and lower reference points are connected in a straight line, and the left and right reference points are also connected. In this way, the middle area of the two-dimensional code is divided into a single module by a straight line.
作为一个示例,本实施中的解调算法根据不同的图像灰度值,将其映射到相应的比特组。例如,可将图像灰度值30,60,90,120,150,180,210,240分别映射到比特组000,001,010,011,100,101,110,111。在实际情况中,需要先对图像灰度值根据其与预设的灰度值,即30,60,90,120,150,180,210,240的距离进行归类,归类后的灰度值将设置为30,60,90,120,150,180,210,240。As an example, the demodulation algorithm in this embodiment maps it to a corresponding set of bits according to different image gray values. For example, image gray values 30, 60, 90, 120, 150, 180, 210, 240 may be mapped to bit groups 000, 001, 010, 011, 100, 101, 110, 111, respectively. In the actual situation, the gray value of the image needs to be classified according to its distance from the preset gray value, that is, 30, 60, 90, 120, 150, 180, 210, 240, and the gray scale after classification. The value will be set to 30, 60, 90, 120, 150, 180, 210, 240.
步骤S203、将比特流进行信源与信道解码,得到编码信息。Step S203: Perform bit source and channel decoding on the bit stream to obtain coded information.
优选的,所述步骤S300具体包括:Preferably, the step S300 specifically includes:
步骤S301、根据进行图像恢复后的二维码,提取二维码模块;Step S301: Extract a two-dimensional code module according to the two-dimensional code after performing image restoration;
步骤S302、对所述二维码模块进行频谱分析,得到信号周期性特征;Step S302, performing spectrum analysis on the two-dimensional code module to obtain a periodic feature of the signal;
作为一个示例,频谱分析的方法可以是运用二维傅里叶变换,二维离散余弦变换(DCT),二维离散小波变换(DWT),等。频谱分析的输入为二维码图像
模块,输出为图像信号的二维频谱。As an example, the method of spectrum analysis may be a two-dimensional Fourier transform, a two-dimensional discrete cosine transform (DCT), a two-dimensional discrete wavelet transform (DWT), and the like. The input of the spectrum analysis is a QR code image.
Module, the output is the two-dimensional spectrum of the image signal.
步骤S303、判断频谱分析中的极值点与计算的极值点之间的距离是否符合预期分布,当不符合预期分布时则提示该二维码进行过复制操作。Step S303, determining whether the distance between the extreme point in the spectrum analysis and the calculated extreme point meets the expected distribution, and when the expected distribution is not met, prompting the two-dimensional code to perform the copy operation.
作为一个示例,距离的度量可以是欧式距离。通过比对频谱分析中的极值点与计算的极值点之间的距离,并与预设的阈值进行比较,可得知此二维码图像是否经过了复制操作。其中,阈值可通过分析大量二维码的正本与复制样本来获取。As an example, the measure of distance can be a European distance. By comparing the distance between the extreme point in the spectrum analysis and the calculated extreme point, and comparing with the preset threshold, it can be known whether the two-dimensional code image has undergone the copying operation. Among them, the threshold can be obtained by analyzing the original of a large number of two-dimensional codes and copying samples.
信号混叠特征向量模型是本二维码防拷贝的关键理论基础之一。建立此模型有助于分析信号混叠现象,并识别受到扫描-打印攻击的包含多组混叠信号的二维码图像。利用傅里叶变换(或其它频域变换),分析所获得的频谱,可有效识别受到扫描-打印攻击的二维码。如图3a、3b、4a、4b及图5所示,靠近频谱原点的四个极值点{P1,P2,P3,P4}的坐标可以由物理设备的参数(打印分辨率,半色调点阵密度,图像传感器的像素大小)计算得出。通过观测四个极值点所包围的图像区域中的极值点的数量及位置是否符合预期的分布,可区分该二维码是否经过了复制操作。The signal aliasing feature vector model is one of the key theoretical foundations of this two-dimensional code copy prevention. This model is built to help analyze signal aliasing and identify two-dimensional code images containing multiple sets of aliased signals that are subject to scan-print attacks. Using the Fourier transform (or other frequency domain transform) to analyze the obtained spectrum, the two-dimensional code subjected to the scan-print attack can be effectively identified. As shown in Figures 3a, 3b, 4a, 4b and 5, the coordinates of the four extreme points {P 1 , P 2 , P 3 , P 4 } near the origin of the spectrum can be determined by the parameters of the physical device (print resolution, The halftone dot matrix density, the pixel size of the image sensor) is calculated. By observing whether the number and position of extreme points in the image region surrounded by the four extreme points conform to the expected distribution, it can be distinguished whether the two-dimensional code has undergone a copy operation.
可见,本发明中直接以半色调点阵的形式设计二维码,而不是在二维码打印过程中由打印机进行亮度到半色调点阵的转换,这样可以达到更稳定的检测效果。It can be seen that in the present invention, the two-dimensional code is directly designed in the form of a halftone dot matrix, instead of the brightness conversion to the halftone dot matrix by the printer during the two-dimensional code printing process, so that a more stable detection effect can be achieved.
而且基于半色调点阵,及其在打印-扫描-打印-拍摄过程中显示的信号重采样(周期性)特征,识别经过上述操作的二维码。Further, based on the halftone dot matrix and its signal resampling (periodic) characteristics displayed during the print-scan-print-shooting process, the two-dimensional code subjected to the above operation is identified.
基于上述方法实施例,本发明还提供一种二维码的防拷贝实现系统。如图6所示,所述二维码的防拷贝实现系统包括:Based on the foregoing method embodiments, the present invention also provides a copy prevention implementation system for a two-dimensional code. As shown in FIG. 6, the anti-copy implementation system of the two-dimensional code includes:
二维码生成模块100,用于获取用户的输入信息,将输入信息转化为图像灰度值后并增加寻像图像得到二维码;The two-dimensional code generating module 100 is configured to acquire input information of the user, convert the input information into an image gray value, and increase the finder image to obtain a two-dimensional code;
二维码解码模块200,用于当经拍摄获取所述二维码时,则依次进行图像恢复、解调及解码,得到编码信息;The two-dimensional code decoding module 200 is configured to perform image recovery, demodulation, and decoding in sequence when the two-dimensional code is acquired by photographing, to obtain encoded information;
二维码验证模块300,用于根据进行图像恢复后的二维码进行频谱分析,并判断频谱分析得到的极值点是否符合预期分布,当不符合预期分布时则提示该二维码进行过复制操作。The two-dimensional code verification module 300 is configured to perform spectrum analysis according to the two-dimensional code after performing image restoration, and determine whether the extreme point obtained by the spectrum analysis conforms to the expected distribution, and prompts the two-dimensional code to be performed when the expected distribution is not met. Copy operation.
优选的,在所述二维码的防拷贝实现系统中,所述二维码生成模块100具体包括:
Preferably, in the anti-copy implementation system of the two-dimensional code, the two-dimensional code generation module 100 specifically includes:
信源与信道编码单元,用于获取用户的输入信息,通过信源与信道编码将用户信息转化为比特流;a source and channel coding unit, configured to acquire user input information, and convert user information into a bit stream by using source and channel coding;
调制单元,用于将比特流进行调制,转化为图像灰度值,再将图像灰度值转化为对应的半色调点阵;a modulating unit configured to modulate the bit stream, convert it into an image gradation value, and convert the image gradation value into a corresponding halftone dot matrix;
图像添加单元,用于在半色调点阵组成的二维码模块旁加上寻像图案,生成二维码。An image adding unit is configured to add a finder pattern to the two-dimensional code module composed of the halftone dot matrix to generate a two-dimensional code.
优选的,在所述二维码的防拷贝实现系统中,所述半色调点阵的频谱结构为:Preferably, in the anti-copy implementation system of the two-dimensional code, the spectrum structure of the halftone dot matrix is:
其中,p为频谱的二维坐标,G(p)为半色调点阵的频谱,Gw(p)为白点黑底的半色调点阵的频谱,Gb(p)分别黑点白底的半色调点阵的频谱,Cw表示白色半色调点阵所占整个模块的面积,Cb表示黑色半色调点阵所占整个模块的面积,a1和a2为拍摄设备的图像传感器像素所构成的网格向量,b1和b2为二维码生成过程中的半色调点阵所构成的网格向量。α1、α2与β1、β2可将a1、a2与b1、b2归一化后获得的归一化向量。Where p is the two-dimensional coordinate of the spectrum, G(p) is the spectrum of the halftone dot matrix, G w (p) is the spectrum of the halftone dot matrix of the white point black matrix, and G b (p) is the black dot white background The spectrum of the halftone dot matrix, C w represents the area of the entire module occupied by the white halftone dot matrix, C b represents the area of the entire module occupied by the black halftone dot matrix, and a 1 and a 2 are the image sensor pixels of the photographing device. The constructed grid vectors, b 1 and b 2 , are grid vectors of halftone lattices in the two-dimensional code generation process. α 1 , α 2 and β 1 , β 2 can be normalized vectors obtained by normalizing a 1 , a 2 and b 1 , b 2 .
优选的,在所述二维码的防拷贝实现系统中,所述二维码解码模块200具体包括:Preferably, in the anti-copy implementation system of the two-dimensional code, the two-dimensional code decoding module 200 specifically includes:
图像恢复单元,用于当通过移动摄像设备读取了所述二维码时,则获取二维码图像,并对二维码图像进行图像恢复,还原二维码图像在通信信道中的形状畸变,得到还原后的二维码;An image restoration unit, configured to acquire a two-dimensional code image when the two-dimensional code is read by the mobile imaging device, and perform image restoration on the two-dimensional code image to restore shape distortion of the two-dimensional code image in the communication channel , obtaining the restored two-dimensional code;
解调单元,用于根据还原后的二维码,提取二维码模块,对每个二维码模块进行与调制相对应的解调,得到比特流;a demodulation unit, configured to extract a two-dimensional code module according to the restored two-dimensional code, perform demodulation corresponding to the modulation on each two-dimensional code module, to obtain a bit stream;
信源与信道解码单元,用于将比特流进行信源与信道解码,得到编码信息。The source and channel decoding unit is configured to perform bit source and channel decoding on the bit stream to obtain coded information.
优选的,在所述二维码的防拷贝实现系统中,所述二维码验证模块300具体
包括:Preferably, in the anti-copy implementation system of the two-dimensional code, the two-dimensional code verification module 300 is specific
include:
模块提取单元,用于根据进行图像恢复后的二维码,提取二维码模块;a module extracting unit, configured to extract a two-dimensional code module according to the two-dimensional code after performing image restoration;
频谱分析单元,用于对所述二维码模块进行频谱分析,得到信号周期性特征;a spectrum analysis unit, configured to perform spectrum analysis on the two-dimensional code module to obtain a periodic feature of the signal;
判断单元,用于判断频谱分析中的极值点与计算的极值点之间的距离是否符合预期分布,当不符合预期分布时则提示该二维码进行过复制操作。The determining unit is configured to determine whether the distance between the extreme point in the spectrum analysis and the calculated extreme point meets the expected distribution, and when the expected distribution is not met, the two-dimensional code is prompted to perform the copy operation.
综上所述,本发明所提供的二维码的防拷贝实现方法及实现系统,方法包括:获取用户的输入信息,将输入信息转化为图像灰度值后并增加寻像图像得到二维码;当经拍摄获取所述二维码时,则依次进行图像恢复、解调及解码,得到编码信息;根据进行图像恢复后的二维码进行频谱分析,并判断频谱分析得到的极值点是否符合预期分布,当不符合预期分布时则提示该二维码进行过复制操作。本发明结合在扫描-打印过程中二维码的通信信道模型和物理设备特征,通过分析扫描-打印操作中的图像信号重采样频谱特征,在保证低分辨率移动摄像设备对二维码读取鲁棒性的基础上,提出利用图像信号的混叠特征及强相关性噪声特征的方法,取得对二维码扫描-打印攻击的有效取证。In summary, the method and implementation system for preventing copying of a two-dimensional code provided by the present invention includes: obtaining input information of a user, converting the input information into an image gray value, and adding a finder image to obtain a two-dimensional code When the two-dimensional code is acquired by shooting, image restoration, demodulation, and decoding are sequentially performed to obtain encoded information; spectrum analysis is performed according to the two-dimensional code after image restoration, and whether the extreme point obtained by the spectrum analysis is determined is It conforms to the expected distribution, and when it does not meet the expected distribution, it prompts the QR code to be copied. The invention combines the communication channel model and the physical device features of the two-dimensional code in the scanning-printing process, and analyzes the spectral characteristics of the image signal in the scanning-printing operation to ensure the reading of the two-dimensional code by the low-resolution mobile imaging device. On the basis of robustness, the method of using the aliasing features of image signals and the features of strong correlation noise is proposed to obtain effective evidence for the scanning and printing attacks of two-dimensional codes.
应当理解的是,本发明的应用不限于上述的举例,对本领域普通技术人员来说,可以根据上述说明加以改进或变换,所有这些改进和变换都应属于本发明所附权利要求的保护范围。
It is to be understood that the application of the present invention is not limited to the above-described examples, and those skilled in the art can make modifications and changes in accordance with the above description, all of which are within the scope of the appended claims.
Claims (10)
- 一种二维码的防拷贝实现方法,其特征在于,所述方法包括以下步骤:A method for implementing copy prevention of a two-dimensional code, characterized in that the method comprises the following steps:A、获取用户的输入信息,将输入信息转化为图像灰度值后并增加寻像图像得到二维码;A, obtaining user input information, converting the input information into image gray value and adding the finder image to obtain a two-dimensional code;B、当经拍摄获取所述二维码时,则依次进行图像恢复、解调及解码,得到编码信息;B. When the two-dimensional code is acquired by shooting, image restoration, demodulation, and decoding are sequentially performed to obtain encoded information;C、根据进行图像恢复后的二维码进行频谱分析,并判断频谱分析得到的极值点是否符合预期分布,当不符合预期分布时则提示该二维码进行过复制操作。C. Perform spectrum analysis according to the two-dimensional code after image restoration, and determine whether the extreme point obtained by the spectrum analysis conforms to the expected distribution. When the expected distribution is not met, the two-dimensional code is prompted to perform the copy operation.
- 根据权利要求1所述二维码的防拷贝实现方法,其特征在于,所述步骤A具体包括:The anti-copying implementation method of the two-dimensional code according to claim 1, wherein the step A specifically includes:A1、获取用户的输入信息,通过信源与信道编码将用户信息转化为比特流;A1. Acquire user input information, and convert user information into a bit stream by using source and channel coding;A2、将比特流进行调制,转化为图像灰度值,再将图像灰度值转化为对应的半色调点阵;A2, the bit stream is modulated, converted into image gray value, and then the image gray value is converted into a corresponding halftone dot matrix;A3、在半色调点阵组成的二维码模块旁加上寻像图案,生成二维码。A3. Add a finder pattern to the two-dimensional code module composed of the halftone dot matrix to generate a two-dimensional code.
- 根据权利要求2所述二维码的防拷贝实现方法,其特征在于,所述半色调点阵的频谱结构为:The anti-copy implementation method of the two-dimensional code according to claim 2, wherein the spectral structure of the halftone dot matrix is:其中,p为频谱的二维坐标,G(p)为半色调点阵的频谱,Gw(p)为白点黑底的半色调点阵的频谱,Gb(p)分别黑点白底的半色调点阵的频谱,Cw表示白色半色调点阵所占整个模块的面积,Cb表示黑色半色调点阵所占整个模块的面积,a1和a2为拍摄设备的图像传感器像素所构成的网格向量,b1和b2为二维码生成过程中的半色调点阵所构成的网格向量,α1、α2与β1、β2可将a1、a2与b1、b2归一化后获得的归一化向量。 Where p is the two-dimensional coordinate of the spectrum, G(p) is the spectrum of the halftone dot matrix, G w (p) is the spectrum of the halftone dot matrix of the white point black matrix, and G b (p) is the black dot white background The spectrum of the halftone dot matrix, C w represents the area of the entire module occupied by the white halftone dot matrix, C b represents the area of the entire module occupied by the black halftone dot matrix, and a 1 and a 2 are the image sensor pixels of the photographing device. The constructed grid vector, b 1 and b 2 are the grid vectors formed by the halftone lattice in the process of generating the two-dimensional code, and α 1 , α 2 and β 1 , β 2 can be a 1 and a 2 The normalized vector obtained after b 1 and b 2 are normalized.
- 根据权利要求3所述二维码的防拷贝实现方法,其特征在于,所述步骤B具体包括:The anti-copying implementation method of the two-dimensional code according to claim 3, wherein the step B specifically includes:B1、当通过移动摄像设备读取了所述二维码时,则获取二维码图像,并对二维码图像进行图像恢复,还原二维码图像在通信信道中的形状畸变,得到还原后的二维码;B1, when the two-dimensional code is read by the mobile imaging device, the two-dimensional code image is acquired, and the image is restored by the two-dimensional code image, and the shape distortion of the two-dimensional code image in the communication channel is restored, and the restored shape is obtained. QR code;B2、根据还原后的二维码,提取二维码模块,对每个二维码模块进行与调制相对应的解调,得到比特流;B2: extracting a two-dimensional code module according to the restored two-dimensional code, and performing demodulation corresponding to the modulation on each two-dimensional code module to obtain a bit stream;B3、将比特流进行信源与信道解码,得到编码信息。B3. Perform bit source and channel decoding on the bit stream to obtain coded information.
- 根据权利要求4所述二维码的防拷贝实现方法,其特征在于,所述步骤C具体包括:The anti-copying implementation method of the two-dimensional code according to claim 4, wherein the step C specifically includes:C1、根据进行图像恢复后的二维码,提取二维码模块;C1, extracting a two-dimensional code module according to the two-dimensional code after performing image restoration;C2、对所述二维码模块进行频谱分析,得到信号周期性特征;C2, performing spectrum analysis on the two-dimensional code module to obtain a periodic feature of the signal;C3、判断频谱分析中的极值点与计算的极值点之间的距离是否符合预期分布,当不符合预期分布时则提示该二维码进行过复制操作。C3. Determine whether the distance between the extreme point in the spectrum analysis and the calculated extreme point meets the expected distribution. When the expected distribution is not met, the two-dimensional code is prompted to perform the copy operation.
- 一种二维码的防拷贝实现系统,其特征在于,包括:A anti-copy implementation system for a two-dimensional code, comprising:二维码生成模块,用于获取用户的输入信息,将输入信息转化为图像灰度值后并增加寻像图像得到二维码;a two-dimensional code generating module, configured to obtain input information of the user, convert the input information into an image gray value, and increase the finder image to obtain a two-dimensional code;二维码解码模块,用于当经拍摄获取所述二维码时,则依次进行图像恢复、解调及解码,得到编码信息;a two-dimensional code decoding module, configured to perform image recovery, demodulation, and decoding in sequence when acquiring the two-dimensional code by photographing, to obtain encoded information;二维码验证模块,用于根据进行图像恢复后的二维码进行频谱分析,并判断频谱分析得到的极值点是否符合预期分布,当不符合预期分布时则提示该二维码进行过复制操作。The two-dimensional code verification module is configured to perform spectrum analysis according to the two-dimensional code after image restoration, and determine whether the extreme point obtained by the spectrum analysis conforms to the expected distribution, and prompts the two-dimensional code to be copied when the expected distribution is not met. operating.
- 根据权利要求6所述二维码的防拷贝实现系统,其特征在于,所述二维码生成模块具体包括:The anti-copy implementation system of the two-dimensional code according to claim 6, wherein the two-dimensional code generating module specifically includes:信源与信道编码单元,用于获取用户的输入信息,通过信源与信道编码将用户信息转化为比特流;a source and channel coding unit, configured to acquire user input information, and convert user information into a bit stream by using source and channel coding;调制单元,用于将比特流进行调制,转化为图像灰度值,再将图像灰度值转化为对应的半色调点阵;a modulating unit configured to modulate the bit stream, convert it into an image gradation value, and convert the image gradation value into a corresponding halftone dot matrix;图像添加单元,用于在半色调点阵组成的二维码模块旁加上寻像图案,生成 二维码。An image adding unit for adding a finder pattern to a two-dimensional code module composed of a halftone dot matrix to generate QR code.
- 根据权利要求7所述二维码的防拷贝实现系统,其特征在于,所述半色调点阵的频谱结构为:The anti-copy implementation system for a two-dimensional code according to claim 7, wherein the spectral structure of the halftone dot matrix is:其中,p为频谱的二维坐标,G(p)为半色调点阵的频谱,Gw(p)为白点黑底的半色调点阵的频谱,Gb(p)分别黑点白底的半色调点阵的频谱,Cw表示白色半色调点阵所占整个模块的面积,Cb表示黑色半色调点阵所占整个模块的面积,a1和a2为拍摄设备的图像传感器像素所构成的网格向量,b1和b2为二维码生成过程中的半色调点阵所构成的网格向量,α1、α2与β1、β2可将a1、a2与b1、b2归一化后获得的归一化向量。Where p is the two-dimensional coordinate of the spectrum, G(p) is the spectrum of the halftone dot matrix, G w (p) is the spectrum of the halftone dot matrix of the white point black matrix, and G b (p) is the black dot white background The spectrum of the halftone dot matrix, C w represents the area of the entire module occupied by the white halftone dot matrix, C b represents the area of the entire module occupied by the black halftone dot matrix, and a 1 and a 2 are the image sensor pixels of the photographing device. The constructed grid vector, b 1 and b 2 are the grid vectors formed by the halftone lattice in the process of generating the two-dimensional code, and α 1 , α 2 and β 1 , β 2 can be a 1 and a 2 The normalized vector obtained after b 1 and b 2 are normalized.
- 根据权利要求8所述二维码的防拷贝实现系统,其特征在于,所述二维码解码模块具体包括:The anti-copy implementation system of the two-dimensional code according to claim 8, wherein the two-dimensional code decoding module specifically includes:图像恢复单元,用于当通过移动摄像设备读取了所述二维码时,则获取二维码图像,并对二维码图像进行图像恢复,还原二维码图像在通信信道中的形状畸变、颜色/亮度失真,得到还原后的二维码;An image restoration unit, configured to acquire a two-dimensional code image when the two-dimensional code is read by the mobile imaging device, and perform image restoration on the two-dimensional code image to restore shape distortion of the two-dimensional code image in the communication channel , color / brightness distortion, get the restored two-dimensional code;解调单元,用于将还原后的二维码进行与调制相对应的解调,得到比特流;a demodulation unit, configured to perform demodulation corresponding to the modulation of the restored two-dimensional code to obtain a bit stream;信源与信道解码单元,用于将比特流进行信源与信道解码,得到编码信息。The source and channel decoding unit is configured to perform bit source and channel decoding on the bit stream to obtain coded information.
- 根据权利要求9所述二维码的防拷贝实现系统,其特征在于,所述二维码验证模块具体包括:The anti-copy implementation system of the two-dimensional code according to claim 9, wherein the two-dimensional code verification module specifically includes:模块提取单元,用于根据进行图像恢复后的二维码,提取二维码模块;a module extracting unit, configured to extract a two-dimensional code module according to the two-dimensional code after performing image restoration;频谱分析单元,用于对所述二维码模块进行频谱分析,得到信号周期性特征;a spectrum analysis unit, configured to perform spectrum analysis on the two-dimensional code module to obtain a periodic feature of the signal;判断单元,用于判断频谱分析中的极值点与计算的极值点之间的距离是否符合预期分布,当不符合预期分布时则提示该二维码进行过复制操作。 The determining unit is configured to determine whether the distance between the extreme point in the spectrum analysis and the calculated extreme point meets the expected distribution, and when the expected distribution is not met, the two-dimensional code is prompted to perform the copy operation.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2016109563006 | 2016-10-28 | ||
CN201610956300.6A CN106529637B (en) | 2016-10-28 | 2016-10-28 | A kind of the anti-copy implementation method and realization system of two dimensional code |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018076409A1 true WO2018076409A1 (en) | 2018-05-03 |
Family
ID=58325667
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2016/105867 WO2018076409A1 (en) | 2016-10-28 | 2016-11-15 | Method for realizing two dimensional code copy prevention and realization system thereof |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106529637B (en) |
WO (1) | WO2018076409A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109829844A (en) * | 2019-01-16 | 2019-05-31 | 王诗会 | A kind of information concealing method based on two dimensional code, device and electronic equipment |
CN110335189A (en) * | 2019-05-31 | 2019-10-15 | 平安科技(深圳)有限公司 | Fill method, apparatus, computer equipment and the storage medium of anti-counterfeiting information |
CN113242107A (en) * | 2020-12-27 | 2021-08-10 | 南京飞搏数据技术有限公司 | Two-dimensional code transmission protocol |
CN113792600A (en) * | 2021-08-10 | 2021-12-14 | 武汉光庭信息技术股份有限公司 | Video frame extraction method and system based on deep learning |
CN114820827A (en) * | 2022-05-06 | 2022-07-29 | 翼存(上海)智能科技有限公司 | Data decoding method of rectangular gray scale dot matrix image for data storage |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107180216B (en) * | 2017-06-07 | 2020-06-30 | 福州觉感视觉软件科技有限公司 | Two-dimensional code generation and identification method |
CN107835332B (en) * | 2017-11-15 | 2019-07-05 | 深圳大学 | It is superimposed the two-dimensional code generation method and device of man made noise's information |
CN107766771B (en) * | 2017-11-15 | 2021-01-19 | 深圳大学 | Two-dimensional code detection method and terminal |
WO2019095172A1 (en) * | 2017-11-15 | 2019-05-23 | 深圳大学 | Qr code generating and decoding method and apparatus in qr code copying process |
WO2019095173A1 (en) * | 2017-11-15 | 2019-05-23 | 深圳大学 | Method and device for generating two-dimensional code superimposed with artificial noise information |
CN107918791B (en) * | 2017-11-15 | 2020-10-09 | 深圳大学 | Two-dimensional code generating and decoding method and device in two-dimensional code copying process |
CN108122020A (en) * | 2017-12-08 | 2018-06-05 | 北京小米移动软件有限公司 | Two-dimensional code generation method and device and two-dimensional code identification method and device |
CN109711513B (en) * | 2018-12-21 | 2023-06-27 | 北京印刷学院 | Triple anti-counterfeiting two-dimensional code with double-code of digital fluorescent image overprinting bright and dark |
CN109861815A (en) * | 2019-01-18 | 2019-06-07 | 深圳大学 | The bootlegging channel modeling method and system of two dimensional code |
CN110033067B (en) * | 2019-03-31 | 2020-06-02 | 深圳大学 | Anti-copy two-dimensional code and anti-counterfeiting authentication method of two-dimensional code |
CN111160063B (en) * | 2020-04-03 | 2020-09-04 | 杭州涂鸦信息技术有限公司 | Internet of things IPC two-dimensional code distribution network image enhancement method and system |
CN112847349B (en) * | 2020-12-30 | 2022-05-06 | 深兰科技(上海)有限公司 | Robot walking control method and device |
CN115035533B (en) * | 2022-08-10 | 2022-10-21 | 新立讯科技股份有限公司 | Data authentication processing method and device, computer equipment and storage medium |
CN116776909B (en) * | 2023-08-28 | 2023-11-03 | 四川星点网络技术有限公司 | Bottle lid two-dimensional code system of tracing to source |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103870863A (en) * | 2014-03-14 | 2014-06-18 | 华中科技大学 | Method for preparing hidden two-dimensional image holographic anti-counterfeit label and identification device thereof |
CN103886545A (en) * | 2014-04-17 | 2014-06-25 | 上海理工大学 | Transformation domain printing-scanning resistant digital watermarking method based on computer-generated holography |
CN105718981A (en) * | 2016-01-26 | 2016-06-29 | 南京风力舰信息技术有限公司 | Processing method for preparing novel 2D code image holographic anti-counterfeiting label |
US9396376B1 (en) * | 2015-04-30 | 2016-07-19 | International Business Machines Corporation | Enhanced quick response codes |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120327450A1 (en) * | 2006-07-19 | 2012-12-27 | Advanced Track & Trace | Methods and devices for securing and authenticating documents |
JP2010246027A (en) * | 2009-04-09 | 2010-10-28 | Canon Inc | Image forming apparatus, image forming method, and computer program |
CN201927049U (en) * | 2010-12-27 | 2011-08-10 | 陆宝武 | Anti-counterfeiting detection device |
CN103377442B (en) * | 2012-04-25 | 2017-08-22 | 阿里巴巴集团控股有限公司 | A kind of data processing method and system |
CN103745151B (en) * | 2014-01-08 | 2017-01-25 | 杭州晟元数据安全技术股份有限公司 | Method for authenticating identity through combination of two-dimension codes and dynamic passwords |
CN205015906U (en) * | 2015-07-24 | 2016-02-03 | 熊小军 | Anti -fake verification system of electron certificate |
CN105758381B (en) * | 2016-05-09 | 2018-05-22 | 深圳大学 | A kind of camera module method for detecting its tilt based on spectrum analysis |
-
2016
- 2016-10-28 CN CN201610956300.6A patent/CN106529637B/en active Active
- 2016-11-15 WO PCT/CN2016/105867 patent/WO2018076409A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103870863A (en) * | 2014-03-14 | 2014-06-18 | 华中科技大学 | Method for preparing hidden two-dimensional image holographic anti-counterfeit label and identification device thereof |
CN103886545A (en) * | 2014-04-17 | 2014-06-25 | 上海理工大学 | Transformation domain printing-scanning resistant digital watermarking method based on computer-generated holography |
US9396376B1 (en) * | 2015-04-30 | 2016-07-19 | International Business Machines Corporation | Enhanced quick response codes |
CN105718981A (en) * | 2016-01-26 | 2016-06-29 | 南京风力舰信息技术有限公司 | Processing method for preparing novel 2D code image holographic anti-counterfeiting label |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109829844A (en) * | 2019-01-16 | 2019-05-31 | 王诗会 | A kind of information concealing method based on two dimensional code, device and electronic equipment |
CN109829844B (en) * | 2019-01-16 | 2024-01-12 | 王诗会 | Information hiding method and device based on two-dimension code and electronic equipment |
CN110335189A (en) * | 2019-05-31 | 2019-10-15 | 平安科技(深圳)有限公司 | Fill method, apparatus, computer equipment and the storage medium of anti-counterfeiting information |
CN110335189B (en) * | 2019-05-31 | 2024-01-16 | 平安科技(深圳)有限公司 | Method, device, computer equipment and storage medium for filling anti-counterfeiting information |
CN113242107A (en) * | 2020-12-27 | 2021-08-10 | 南京飞搏数据技术有限公司 | Two-dimensional code transmission protocol |
CN113792600A (en) * | 2021-08-10 | 2021-12-14 | 武汉光庭信息技术股份有限公司 | Video frame extraction method and system based on deep learning |
CN113792600B (en) * | 2021-08-10 | 2023-07-18 | 武汉光庭信息技术股份有限公司 | Video frame extraction method and system based on deep learning |
CN114820827A (en) * | 2022-05-06 | 2022-07-29 | 翼存(上海)智能科技有限公司 | Data decoding method of rectangular gray scale dot matrix image for data storage |
Also Published As
Publication number | Publication date |
---|---|
CN106529637A (en) | 2017-03-22 |
CN106529637B (en) | 2019-06-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018076409A1 (en) | Method for realizing two dimensional code copy prevention and realization system thereof | |
JP4137084B2 (en) | Method for processing documents with fraud revealing function and method for validating documents with fraud revealing function | |
CN107918791B (en) | Two-dimensional code generating and decoding method and device in two-dimensional code copying process | |
JP4218920B2 (en) | Image processing apparatus, image processing method, and storage medium | |
US7246239B2 (en) | Digital watermarks for checking authenticity of printed objects | |
JP5253352B2 (en) | Method for embedding a message in a document and method for embedding a message in a document using a distance field | |
JP4187749B2 (en) | Halftone watermarking and related applications | |
US20130028466A1 (en) | Embedding and Detecting Hidden Information | |
CN101950407B (en) | Method for realizing color image digital watermark for certificate anti-counterfeiting | |
WO2007062554A1 (en) | A method and device for embedding digital watermark into a text document and detecting it | |
US6831990B2 (en) | System and method for image tamper detection via thumbnail hiding | |
Huo et al. | Alterable-capacity fragile watermarking scheme with restoration capability | |
US20100142756A1 (en) | Document security method | |
CN103886545A (en) | Transformation domain printing-scanning resistant digital watermarking method based on computer-generated holography | |
CN101122995A (en) | Binary image digit water mark embedding, extraction method and device | |
JP4595014B2 (en) | Digital watermark embedding device and detection device | |
JP4143441B2 (en) | Information processing method and apparatus, computer program, and computer-readable storage medium | |
CN111738898A (en) | Text digital watermark embedding \ extracting method and device | |
He et al. | Self-recovery fragile watermarking using block-neighborhood tampering characterization | |
Smith et al. | Developments in steganography | |
JP4426617B2 (en) | Document falsification detection method using encoded dots | |
Cu et al. | A robust data hiding scheme using generated content for securing genuine documents | |
Borges et al. | Document image processing for paper side communications | |
CN110648271A (en) | Method for embedding digital watermark in halftone image by using special dots | |
WO2019095172A1 (en) | Qr code generating and decoding method and apparatus in qr code copying process |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16920432 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 27/08/2019) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 16920432 Country of ref document: EP Kind code of ref document: A1 |