WO2019085710A1 - 二维码信息读取、生成方法和装置 - Google Patents
二维码信息读取、生成方法和装置 Download PDFInfo
- Publication number
- WO2019085710A1 WO2019085710A1 PCT/CN2018/109303 CN2018109303W WO2019085710A1 WO 2019085710 A1 WO2019085710 A1 WO 2019085710A1 CN 2018109303 W CN2018109303 W CN 2018109303W WO 2019085710 A1 WO2019085710 A1 WO 2019085710A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- dimensional code
- hidden
- user
- image
- layer
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
Definitions
- the present disclosure relates to the field of intelligent terminal technologies, and in particular, to a method and device for reading and generating two-dimensional code information.
- QR codes are widely in people's daily lives.
- QR codes can be seen everywhere in application scenarios such as shared bicycles, social networks, mobile payment, food safety traceability, and express delivery. It is well known that the area of a two-dimensional code is generally small, and how to use the limited land to store more information in a two-dimensional code image is a problem worth considering.
- the expansion scheme of the relevant two-dimensional code mainly includes the following:
- Three-dimensional code that is, using a color information or other information (such as a shape, etc.) to change a point from a binary information to a multi-ary number, thereby expanding the capacity of the two-dimensional code.
- the QR code points to an Internet link that accesses more content on the server via a link.
- One purpose of the present disclosure is to enable different users to scan the same two-dimensional code to obtain different information and improve the information capacity of the two-dimensional code.
- a method for reading a two-dimensional code information including: acquiring two-dimensional code image information and user identity information scanned by a user; and acquiring a hidden image in the two-dimensional code image according to the user identity information.
- a two-dimensional code image ; acquiring data information associated with the hidden two-dimensional code image.
- one or more layers of hidden two-dimensional code images are hidden in the two-dimensional code image.
- acquiring the hidden two-dimensional code image in the two-dimensional code image comprises: determining a layer number of the hidden two-dimensional code image that is allowed to be parsed according to the user identity; and acquiring the hidden layer of the next layer from the two-dimensional code image layer by layer QR code image until the number of layers is reached.
- the method for hiding the two-dimensional code image includes one or more of an image hiding algorithm based on discrete wavelet transform, an image hiding algorithm based on chaos, and an image watermarking algorithm.
- scanning the same two-dimensional code image with different user identities can parse different hidden two-dimensional code images, thereby obtaining data information associated with the corresponding hidden two-dimensional code images, thereby preparing for different users.
- the data information is concentrated into the same two-dimensional code, which improves the information capacity of the two-dimensional code and improves the adaptive ability of the two-dimensional code information analysis.
- a method for generating a two-dimensional code including: determining a number of user types; generating a two-dimensional code equal to the number of user types, each two-dimensional code and one type The data that the user is allowed to view is associated; the generated two-dimensional code is hidden layer by layer until a single two-dimensional code image is generated.
- hiding the generated two-dimensional code layer by layer includes: hiding the first two-dimensional code into the second two-dimensional code to generate a layer of the embedded two-dimensional code; hiding a layer of the embedded two-dimensional code Into the third two-dimensional code, generate a two-layer nested two-dimensional code; and so on, until the completion of the nesting of all the two-dimensional code.
- the method for hiding the two-dimensional code image includes one or more of an image hiding algorithm based on discrete wavelet transform, an image hiding algorithm based on chaos, and an image watermarking algorithm.
- hiding the generated two-dimensional code layer by layer includes: hiding the two-dimensional code in descending order according to the user's privacy level, so as to associate the data that the user with higher privacy level is allowed to view the data. The deeper the dimension is hidden.
- hiding the generated two-dimensional code layer by layer includes: hiding the two-dimensional code in a descending order according to the number of users in the user type, so that the user type allowed to view is less in the user type with fewer users. The deeper the data associated with the QR code is hidden.
- a two-dimensional code can be separately generated for data provided to different users, and the two-dimensional code can be collected into one two-dimensional code, and the same two-dimensional code image can be scanned by different users to resolve different hidden two.
- the dimension code image further obtains the data information associated with the corresponding hidden two-dimensional code image, thereby improving the information capacity of the two-dimensional code and improving the adaptive ability of the two-dimensional code information analysis.
- a two-dimensional code information reading apparatus including: a scan information acquiring unit configured to acquire two-dimensional code image information and user identity information scanned by a user; and hidden image analysis And a unit configured to acquire the hidden two-dimensional code image in the two-dimensional code image according to the user identity information; and the data acquiring unit configured to acquire the data information associated with the hidden two-dimensional code image.
- the hidden image parsing unit is configured to: determine a number of layers of the hidden two-dimensional code image that is allowed to be parsed according to the user identity; and acquire the hidden two-dimensional code image of the next layer layer by layer from the two-dimensional code image until Reach the number of layers.
- a two-dimensional code information reading apparatus comprising: a memory; and a processor coupled to the memory, the processor being configured to perform any one of the above based on an instruction stored in the memory QR code information reading method.
- Such a two-dimensional code information reading device can parse different hidden two-dimensional code images when scanning the same two-dimensional code image with different user identities, thereby obtaining data information associated with the corresponding hidden two-dimensional code image, thereby The data information prepared for the user is concentrated into the same two-dimensional code, which improves the information capacity of the two-dimensional code and improves the adaptive ability of the two-dimensional code information analysis.
- a two-dimensional code generating apparatus including: a user type quantity determining unit configured to determine a user type quantity; and a multi-layer two-dimensional code generating unit configured to generate and
- the user type has an equal number of two-dimensional codes, each two-dimensional code is associated with one type of data that the user is allowed to view; the two-dimensional code synthesis unit is configured to hide the generated two-dimensional code layer by layer until a single is generated QR code image.
- the two-dimensional code synthesis unit is configured to: hide the first two-dimensional code into the second two-dimensional code to generate a layer of the embedded two-dimensional code; hide a layer of the embedded two-dimensional code into the first In the three-dimensional code, a two-layer nested two-dimensional code is generated; and so on, until the completion of the nesting of all the two-dimensional codes.
- the two-dimensional code synthesis unit is configured to hide the two-dimensional code in descending order of the user's privacy level to hide the two-dimensional code associated with the data that the user with the higher privacy level is allowed to view. The deeper the layer.
- the two-dimensional code synthesis unit is configured to hide the two-dimensional code in a descending order according to the number of users in the user type to associate the data that the user is allowed to view among the user types having a smaller number of users. The deeper the QR code is hidden.
- a two-dimensional code generating apparatus comprising: a memory; and a processor coupled to the memory, the processor being configured to perform any of the above based on the instructions stored in the memory A two-dimensional code generation method.
- Such a two-dimensional code generating device can separately generate a two-dimensional code for data provided to different users, and concentrate the two-dimensional code into one two-dimensional code, thereby improving the information capacity of the two-dimensional code and improving the two-dimensional code information.
- Analytical adaptive capabilities can separately generate a two-dimensional code for data provided to different users, and concentrate the two-dimensional code into one two-dimensional code, thereby improving the information capacity of the two-dimensional code and improving the two-dimensional code information.
- a computer readable storage medium having stored thereon computer program instructions, which are executed by a processor to implement any one of the above two-dimensional code information reading methods Or the steps of the two-dimensional code generation method.
- Such a computer readable storage medium is capable of concentrating a plurality of two-dimensional codes into one two-dimensional code by executing an instruction thereon, and scanning the same two-dimensional code image with different user IDs in the process of reading the two-dimensional code
- the different hidden two-dimensional code images are parsed, and the data information associated with the corresponding hidden two-dimensional code images is obtained, thereby improving the information capacity of the two-dimensional code and improving the adaptive ability of the two-dimensional code information analysis.
- FIG. 1 is a flow chart of some embodiments of a method for reading two-dimensional code information according to the present disclosure.
- FIG. 2 is a flow chart of still another embodiment of a method for reading two-dimensional code information of the present disclosure.
- FIG. 3 is a schematic diagram of some embodiments of a method for reading two-dimensional code information according to the present disclosure.
- FIG. 4 is a flow chart of some embodiments of a two-dimensional code generation method of the present disclosure.
- FIG. 5 is a flowchart of still another embodiment of a two-dimensional code generating method of the present disclosure.
- FIG. 6 is a schematic diagram of some embodiments of a two-dimensional code generation method of the present disclosure.
- FIG. 7 is a schematic diagram of some embodiments of a two-dimensional code information reading apparatus of the present disclosure.
- FIG. 8 is a schematic diagram of some embodiments of a two-dimensional code generating apparatus of the present disclosure.
- FIG. 9 is a schematic diagram of some embodiments of a two-dimensional code information reading device or a two-dimensional code generating device of the present disclosure.
- FIG. 10 is a schematic diagram of still another embodiment of the two-dimensional code information reading device or the two-dimensional code generating device of the present disclosure.
- FIG. 1 A flowchart of some embodiments of the two-dimensional code information reading method of the present disclosure is shown in FIG.
- the two-dimensional code image information scanned by the user and the user identity information are acquired.
- the user identity information may be rating information of the user terminal, or rating information of the user logging in to the user terminal, or other identity information, such as a normal user, an advanced user, a member, or an administrator.
- the hidden two-dimensional code image in the two-dimensional code image is acquired according to the user identity information.
- the method for hiding the two-dimensional code image may include one or more of an image hiding algorithm based on discrete wavelet transform, a chaotic-based image hiding algorithm, and an image watermarking algorithm, and the algorithm may be determined according to a prior protocol. Then obtain a hidden two-dimensional code image.
- the user identity information may be checked. If the user identity meets the requirements, the hidden two-dimensional code is parsed. Otherwise, the hidden image resolution is not performed, and the data information associated with the scanned two-dimensional code image is directly acquired.
- step 103 data information associated with the hidden two-dimensional code image is acquired.
- scanning the same two-dimensional code image with different user identities can parse different hidden two-dimensional code images, thereby obtaining data information associated with the corresponding hidden two-dimensional code images, thereby preparing for different users.
- the data information is concentrated into the same two-dimensional code, which improves the information capacity of the two-dimensional code and improves the adaptive ability of the two-dimensional code information analysis.
- the hidden two-dimensional code image in the two-dimensional code image may include one or more layers, and each layer of the two-dimensional code image may be associated with different data, thereby increasing the capacity of the two-dimensional code.
- the two-dimensional code of each layer may also be parsed, and the data information of the two-dimensional code images of different layers may be spliced in order to obtain complete data.
- Such a method can increase the data capacity of the two-dimensional code, and only use the two-dimensional code image for data transmission, achieve data analysis without the network state, and reduce the dependence of the two-dimensional code data on the network.
- the number of layers may be included in the two-dimensional code image so that the terminal determines the number of times the hidden two-dimensional code is parsed to prevent incomplete or over-resolved data parsing.
- data associated with different layer two-dimensional code images is prepared for different types of users, and different types of users are able to obtain corresponding data.
- a flowchart of still other embodiments of the two-dimensional code information reading method of the present disclosure is shown in FIG. 2.
- step 201 the two-dimensional code image information scanned by the user and the user identity information are acquired.
- the number of layers of the hidden two-dimensional code image that is allowed to be parsed is determined based on the identity of the user.
- the two-dimensional code image includes five two-dimensional codes, and the user sees the fifth-layer two-dimensional code image, and four layers of images are hidden in the image.
- the hidden next layer of the two-dimensional code is changed into the surface two-dimensional code, such as one time based on the two-dimensional code image information, and the obtained image includes one to four layers of two-dimensional code.
- the code image has the same reading result as the associated data of the hidden layer 2 code.
- the hidden image cannot be parsed, and only the associated data of the surface layer 5D code image can be read; if the user is a normal user, the hidden 4th layer hidden 2D code image can be parsed. If the user is an advanced user, it can parse the hidden layer 3 hidden QR code image; if the user is a member, it can parse the hidden layer 2 hidden QR code image; if the user is an administrator, it can resolve the hidden The first layer hides the two-dimensional code image.
- step 203 the hidden two-dimensional code image of the next layer is obtained layer by layer from the two-dimensional code image until the number of layers is reached. For example, if the user is a member, the two-dimensional code image information is analyzed layer by layer, and the third layer is analyzed to obtain a second layer two-dimensional code image.
- step 204 data information associated with the obtained hidden two-dimensional code image is acquired.
- the user type can be automatically recognized, different content is displayed for different types of users, and on the one hand, multiple two-dimensional codes are hidden into one two-dimensional code, which reduces the display area and avoids the user actively selecting to scan.
- the QR code improves user friendliness; on the other hand, it avoids the user's viewing of information prepared for other types of users, improving the security of the information.
- the information that can be viewed by the same type of user can be associated with multiple two-dimensional codes, and the associated data of each two-dimensional code image is parsed separately, and the data is spliced to obtain data information displayed to the user.
- the problem that the capacity of a single two-dimensional code is limited can be solved, and the capacity of the two-dimensional code can be improved.
- the two-dimensional code number information hidden or fused in the image may be included in the two-dimensional code to facilitate the parsing and data splicing of the hidden two-dimensional code.
- FIG. 1 A flowchart of some embodiments of the two-dimensional code generation method of the present disclosure is shown in FIG.
- step 401 the number of user types is determined, including five types of tourists, general users, advanced users, members, and administrators.
- step 402 a number of two-dimensional codes equal to the number of user types are generated, each two-dimensional code being associated with one type of data that the user is allowed to view.
- the generated two-dimensional code is hidden layer by layer until a single two-dimensional code image is generated.
- the method of two-dimensional code image hiding may include one or more of an image hiding algorithm based on discrete wavelet transform, a chaotic-based image hiding algorithm, and an image watermarking algorithm.
- a two-dimensional code can be separately generated for data provided to different users, and the two-dimensional code can be collected into one two-dimensional code, and the same two-dimensional code image can be scanned by different users to resolve different hidden two.
- the dimension code image further obtains the data information associated with the corresponding hidden two-dimensional code image, thereby improving the information capacity of the two-dimensional code and improving the adaptive ability of the two-dimensional code information analysis.
- FIG. 1 A flow chart of further embodiments of the two-dimensional code generation method of the present disclosure is shown in FIG.
- step 502 the i-layer nested two-dimensional code is hidden into the i+2 two-dimensional code to generate an i+1 layer nested two-dimensional code. If, according to step 501, a layer is nested two-dimensionally. The code is hidden into the third two-dimensional code to generate a two-layer nested two-dimensional code.
- the two-layer nested two-dimensional code includes three two-dimensional codes.
- step 503 it is determined whether or not the nesting of all the two-dimensional codes is completed. If yes, go to step 505; if nesting is not completed, go to step 504.
- the first two-dimensional code is nested into the second two-dimensional code to generate a nested two-dimensional code, and the displayed image is the same as the second two-dimensional code;
- the code is nested into the third two-dimensional code to generate a two-layer nested two-dimensional code, the image displayed is the same as the third two-dimensional code, and so on, until the four-layer nested two-dimensional code shown in the figure is generated.
- the first to fifth two-dimensional code images are hidden in the four-layer nested two-dimensional code, and the displayed image is the same as the fifth two-dimensional code.
- step 505 an i-level nested two-dimensional code embedding the entire two-dimensional code is shown.
- the two-dimensional code can be sequentially nested and hidden, and finally displayed in a state of a two-dimensional code, so that the next layer of the two-dimensional code is successively obtained in the parsing process.
- the two-dimensional code can be hidden in descending order of the user's privacy level, such that the two-dimensional code associated with the data that the user with the higher privacy level is allowed to view is hidden deeper.
- the number of users in each user type may be estimated or determined first, and then the two-dimensional code is hidden in as little as possible in order of the number of users.
- Such a method can reduce the number of hidden two-dimensional code parsing, improve the efficiency of displaying associated data for most users, and reduce the burden on the system.
- the information that can be viewed by the same type of user can be associated with multiple two-dimensional codes, and the associated data of each two-dimensional code image is parsed separately in the data parsing process, and the data is spliced to obtain a display to the user. Data information.
- the problem that the capacity of a single two-dimensional code is limited can be solved, and the capacity of the two-dimensional code can be improved.
- the information of the fused or hidden two-dimensional code number may be provided on the final two-dimensional code to facilitate data extraction during scanning.
- the scan information acquisition unit 701 can acquire the two-dimensional code image information and the user identity information scanned by the user.
- the user identity information may be rating information of the user terminal, or rating information of the user logging in to the user terminal, or other identity information, such as a normal user, an advanced user, a member, or an administrator.
- the hidden image parsing unit 702 is capable of acquiring a hidden two-dimensional code image in the two-dimensional code image based on the user identity information.
- the method for hiding the two-dimensional code image may include one or more of an image hiding algorithm based on discrete wavelet transform, a chaotic-based image hiding algorithm, and an image watermarking algorithm, and the algorithm may be determined according to a prior protocol. The algorithm used can also be read from the two-dimensional code image to obtain the hidden two-dimensional code image.
- the user identity information may be checked. If the user identity meets the requirements, the hidden two-dimensional code is parsed. Otherwise, the hidden image resolution is not performed, and the data information associated with the scanned two-dimensional code image is directly acquired.
- the data acquisition unit 703 is capable of acquiring data information associated with the hidden two-dimensional code image.
- Such a two-dimensional code information reading device can parse different hidden two-dimensional code images when scanning the same two-dimensional code image with different user identities, thereby obtaining data information associated with the corresponding hidden two-dimensional code image, thereby The data information prepared for the user is concentrated into the same two-dimensional code, which improves the information capacity of the two-dimensional code and improves the adaptive ability of the two-dimensional code information analysis.
- the hidden image parsing unit is capable of determining the number of layers of the hidden two-dimensional code image that is allowed to be parsed according to the user identity, and acquiring the hidden two-dimensional code image of the next layer layer by layer from the two-dimensional code image until the number of layers is reached. And acquiring data information associated with the obtained hidden two-dimensional code image.
- Such a two-dimensional code information reading device can automatically identify the user type, display different content for different types of users, and hide multiple two-dimensional codes into one two-dimensional code on the one hand, thereby reducing the display area and avoiding user initiative. Selecting the QR code to be scanned improves user friendliness; on the other hand, it avoids the user's viewing of information prepared for other types of users, and improves the security of the information.
- the user type number determining unit 801 can determine the number of user types, including five types of tourists, general users, advanced users, members, and administrators.
- the multi-layer two-dimensional code generation unit 802 is capable of generating a number of two-dimensional codes equal to the number of user types, each two-dimensional code being associated with one type of data that the user is allowed to view.
- the two-dimensional code synthesis unit 803 can hide the generated two-dimensional code layer by layer until a single two-dimensional code image is generated.
- the method of two-dimensional code image hiding may include one or more of an image hiding algorithm based on discrete wavelet transform, a chaotic-based image hiding algorithm, and an image watermarking algorithm.
- Such a two-dimensional code generating device can separately generate a two-dimensional code for data provided to different users, and concentrate the two-dimensional code into one two-dimensional code, thereby improving the information capacity of the two-dimensional code and improving the two-dimensional code information.
- Analytical adaptive capabilities can separately generate a two-dimensional code for data provided to different users, and concentrate the two-dimensional code into one two-dimensional code, thereby improving the information capacity of the two-dimensional code and improving the two-dimensional code information.
- the two-dimensional code synthesizing unit 803 can implement the two-dimensional code nesting by using the steps shown in FIG. 5, and the two-dimensional code can be sequentially nested and hidden, and finally displayed in a state of a two-dimensional code, so as to be The next layer of the two-dimensional code is successively obtained in the parsing process.
- the two-dimensional code synthesizing unit 803 can hide the two-dimensional code in descending order of the user's privacy level, so that the two-dimensional code associated with the data allowed by the user with higher privacy level is hidden. The deeper the layer.
- Such a two-dimensional code generating device can prevent the two-dimensional code associated with a high-level user from being frequently parsed, reduces the possibility that the hidden two-dimensional code is leaked, and improves data security.
- the two-dimensional code synthesis unit 803 may first estimate or determine the number of users in each user type, and then hide the two-dimensional code in as little as possible in order of the number of users.
- Such a two-dimensional code generating device can reduce the number of times of hiding the two-dimensional code analysis, improve the efficiency of displaying associated data for most users, and reduce the burden on the system.
- the two-dimensional code information reading device includes a memory 910 and a processor 920.
- the memory 910 can be a magnetic disk, a flash memory, or any other non-volatile storage medium.
- the memory is for storing instructions in the corresponding embodiment of the above two-dimensional code information reading method.
- the processor 920 is coupled to the memory 910 and can be implemented as one or more integrated circuits, such as a microprocessor or a microcontroller.
- the processor 920 is configured to execute the instructions stored in the memory, and can integrate the data information prepared for the user into the same two-dimensional code, improve the information capacity of the two-dimensional code, and improve the analysis of the two-dimensional code information. Adaptive ability.
- the two-dimensional code information reading apparatus 1000 includes a memory 1010 and a processor 1020.
- Processor 1020 is coupled to memory 1010 via BUS bus 1030.
- the two-dimensional code information reading device 1000 can also be connected to the external storage device 1050 through the storage interface 1040 to invoke external data, and can also be connected to the network or another computer system (not shown) through the network interface 1060. It will not be described in detail here.
- the two-dimensional code generating device includes a memory 910 and a processor 920.
- the memory 910 can be a magnetic disk, a flash memory, or any other non-volatile storage medium.
- the memory is for storing instructions in the corresponding embodiment of the two-dimensional code generation method above.
- the processor 920 is coupled to the memory 910 and can be implemented as one or more integrated circuits, such as a microprocessor or a microcontroller.
- the processor 920 is configured to execute instructions stored in the memory, and can improve the information capacity of the two-dimensional code and improve the adaptive capability of the two-dimensional code information analysis.
- the two-dimensional code generating apparatus 1000 includes a memory 1010 and a processor 1020.
- Processor 1020 is coupled to memory 1010 via BUS bus 1030.
- the two-dimensional code generating device 1000 can also be connected to the external storage device 1050 through the storage interface 1040 to invoke external data, and can also be connected to the network or another computer system (not shown) through the network interface 1060. It will not be described in detail here.
- the information capacity of the two-dimensional code can be improved, and the adaptive ability of the two-dimensional code information analysis can also be improved.
- a computer readable storage medium having stored thereon computer program instructions, the instructions being executed by a processor to implement a two-dimensional code information reading method or a two-dimensional code generating method in accordance with a method in an embodiment A step of.
- a processor to implement a two-dimensional code information reading method or a two-dimensional code generating method in accordance with a method in an embodiment A step of.
- the present disclosure may be provided as a method, apparatus, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware aspects. Moreover, the present disclosure may take the form of a computer program product embodied on one or more computer-usable non-transitory storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer usable program code. .
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
- the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
- These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
- the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
- the methods and apparatus of the present disclosure may be implemented in a number of ways.
- the methods and apparatus of the present disclosure may be implemented in software, hardware, firmware or any combination of software, hardware, firmware.
- the above-described sequence of steps for the method is for illustrative purposes only, and the steps of the method of the present disclosure are not limited to the order specifically described above unless otherwise specifically stated.
- the present disclosure may also be embodied as programs recorded in a recording medium, the programs including machine readable instructions for implementing a method in accordance with the present disclosure.
- the present disclosure also covers a recording medium storing a program for executing the method according to the present disclosure.
Landscapes
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Electromagnetism (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Image Processing (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
本公开提出一种二维码信息读取、生成方法和装置,涉及智能终端技术领域。本公开的一种二维码信息读取方法包括:获取用户扫描的二维码图像信息和用户身份信息;根据用户身份信息获取二维码图像中的隐藏二维码图像;获取与隐藏二维码图像相关联的数据信息。通过这样的方法,以不同用户身份扫描相同的二维码图像能够解析出不同的隐藏二维码图像,进而得到与对应的隐藏二维码图像相关联的数据信息,从而将为不同给用户准备的数据信息集中至同一个二维码中,提高二维码的信息容量,也提高了二维码信息解析的自适应能力。
Description
相关申请的交叉引用
本申请是以CN申请号为201711042241.2,申请日为2017年10月31日的申请为基础,并主张其优先权,该CN申请的公开内容在此作为整体引入本申请中。
本公开涉及智能终端技术领域,特别是一种二维码信息读取、生成方法和装置。
随着互联网及智能移动设备的逐渐普及,二维码正广泛的深入人们的日常生活中,现在二维码在共享单车、社交网络、移动支付、食品安全追溯、快递等应用场景中随处可见。众所周知二维码的面积一般比较小,如何利用这有限之地使二维码图像存储更多信息是一个值得思考的问题。
相关二维码的扩充的方案主要包括以下几种:
1、三维码,即利用颜色信息或其他信息(比如形状等)将一个点由二进制信息变成多进制,从而扩充二维码的容量。
2、增加二维码的面积和单位面积内点的个数。
3、二维码指向一个互联网链接,通过链接访问服务器上的更多内容。
发明内容
发明人发现,相关的二维码扩充方案中,三维码颜色信息太多种,若要做到统一标准很难,另外如果将一个点的信息从二进制扩充到多进制,编码规则相应的也需要变化,原有的扫描设备需要做很多修改才能使用;增加二维码的面积和单位面积内点的个数会导致二维码占用空间增大或点的密度增大,不容易识别;通过互联网链接访问网页的方式不够便捷,且会在断网的情况下失效。
本公开的一个目的在于实现不同用户扫描相同二维码获取不同信息,提高二维码的信息容量。
根据本公开的一些实施例的一个方面,提出一种二维码信息读取方法,包括:获取用户扫描的二维码图像信息和用户身份信息;根据用户身份信息获取二维码图像中 的隐藏二维码图像;获取与隐藏二维码图像相关联的数据信息。
在一些实施例中,二维码图像中隐藏有一层或多层隐藏二维码图像。
在一些实施例中,获取二维码图像中的隐藏二维码图像包括:根据用户身份确定允许解析的隐藏二维码图像的层数;从二维码图像中逐层获取下一层的隐藏二维码图像,直至达到层数。
在一些实施例中,二维码图像隐藏的方法包括:基于离散小波变换的图像隐藏算法、基于混沌的图像隐藏算法、图像水印算法中的一种或多种。
通过这样的方法,以不同用户身份扫描相同的二维码图像能够解析出不同的隐藏二维码图像,进而得到与对应的隐藏二维码图像相关联的数据信息,从而将为不同给用户准备的数据信息集中至同一个二维码中,提高二维码的信息容量,也提高了二维码信息解析的自适应能力。
根据本公开的另一些实施例的一个方面,提出一种二维码生成方法,包括:确定用户类型数量;生成与用户类型数量相等数量的二维码,每个二维码与一种类型的用户允许查看的数据相关联;将生成的二维码逐层隐藏,直至生成单个二维码图像。
在一些实施例中,将生成的二维码逐层隐藏包括:将第一二维码隐藏入第二二维码中,生成一层嵌套二维码;将一层嵌套二维码隐藏入第三二维码中,生成二层嵌套二维码;依次类推,直至完成全部二维码的嵌套。
在一些实施例中,二维码图像隐藏的方法包括:基于离散小波变换的图像隐藏算法、基于混沌的图像隐藏算法、图像水印算法中的一种或多种。
在一些实施例中,将生成的二维码逐层隐藏包括:按照用户的私密等级由高到低的顺序隐藏二维码,以使与私密等级越高的用户允许查看的数据相关联的二维码隐藏的越深层。
在一些实施例中,将生成的二维码逐层隐藏包括:按照用户类型中用户的数量由少到多的顺序隐藏二维码,以使与用户数量越少的用户类型中用户允许查看的数据相关联的二维码隐藏的越深。
通过这样的方法,能够为提供给不同用户的数据分别生成二维码,并将二维码集中至一个二维码中,以不同用户身份扫描相同的二维码图像能够解析出不同的隐藏二维码图像,进而得到与对应的隐藏二维码图像相关联的数据信息,从而提高二维码的信息容量,也提高了二维码信息解析的自适应能力。
根据本公开的又一些实施例的一个方面,提出一种二维码信息读取装置,包括: 扫描信息获取单元,被配置为获取用户扫描的二维码图像信息和用户身份信息;隐藏图像解析单元,被配置为根据用户身份信息获取二维码图像中的隐藏二维码图像;数据获取单元,被配置为获取与隐藏二维码图像相关联的数据信息。
在一些实施例中,隐藏图像解析单元被配置为:根据用户身份确定允许解析的隐藏二维码图像的层数;从二维码图像中逐层获取下一层的隐藏二维码图像,直至达到层数。
根据本公开的再一些实施例,提出一种二维码信息读取装置,包括:存储器;以及耦接至存储器的处理器,处理器被配置为基于存储在存储器的指令执行上文中任意一种二维码信息读取方法。
这样的二维码信息读取装置在以不同用户身份扫描相同的二维码图像时能够解析出不同的隐藏二维码图像,进而得到与对应的隐藏二维码图像相关联的数据信息,从而将为不同给用户准备的数据信息集中至同一个二维码中,提高二维码的信息容量,也提高了二维码信息解析的自适应能力。
根据本公开的另外一些实施例的一个方面,提出一种二维码生成装置,包括:用户类型数量确定单元,被配置为确定用户类型数量;多层二维码生成单元,被配置为生成与用户类型数量相等数量的二维码,每个二维码与一种类型的用户允许查看的数据相关联;二维码合成单元,被配置为将生成的二维码逐层隐藏,直至生成单个二维码图像。
在一些实施例中,二维码合成单元被配置为:将第一二维码隐藏入第二二维码中,生成一层嵌套二维码;将一层嵌套二维码隐藏入第三二维码中,生成二层嵌套二维码;依次类推,直至完成全部二维码的嵌套。
在一些实施例中,二维码合成单元被配置为按照用户的私密等级由高到低的顺序隐藏二维码,以使与私密等级越高的用户允许查看的数据相关联的二维码隐藏的越深层。
在一些实施例中,二维码合成单元被配置为按照用户类型中用户的数量由少到多的顺序隐藏二维码,以使与用户数量越少的用户类型中用户允许查看的数据相关联的二维码隐藏的越深。
根据本公开的其中一些实施例的一个方面,提出一种二维码生成装置,包括:存储器;以及耦接至存储器的处理器,处理器被配置为基于存储在存储器的指令执行上文中任意一种二维码生成方法。
这样的二维码生成装置能够为提供给不同用户的数据分别生成二维码,并将二维码集中至一个二维码中,提高了二维码的信息容量,也提高了二维码信息解析的自适应能力。
另外,根据本公开的一些实施例的一个方面,提出一种计算机可读存储介质,其上存储有计算机程序指令,该指令被处理器执行时实现上文中任意一种二维码信息读取方法或二维码生成方法的步骤。
这样的计算机可读存储介质通过执行其上的指令,能够将多个二维码集中至一个二维码中,在读取二维码的过程中以不同用户身份扫描相同的二维码图像能够解析出不同的隐藏二维码图像,进而得到与对应的隐藏二维码图像相关联的数据信息,从而提高二维码的信息容量,也提高了二维码信息解析的自适应能力。
此处所说明的附图用来提供对本公开的进一步理解,构成本公开的一部分,本公开的示意性实施例及其说明用于解释本公开,并不构成对本公开的不当限定。在附图中:
图1为本公开的二维码信息读取方法的一些实施例的流程图。
图2为本公开的二维码信息读取方法的另一些实施例的流程图。
图3为本公开的二维码信息读取方法的一些实施例的示意图。
图4为本公开的二维码生成方法的一些实施例的流程图。
图5为本公开的二维码生成方法的另一些实施例的流程图。
图6为本公开的二维码生成方法的一些实施例的示意图。
图7为本公开的二维码信息读取装置的一些实施例的示意图。
图8为本公开的二维码生成装置的一些实施例的示意图。
图9为本公开的二维码信息读取装置或二维码生成装置的一些实施例的示意图。
图10为本公开的二维码信息读取装置或二维码生成装置的另一些实施例的示意图。
下面通过附图和实施例,对本公开的技术方案做进一步的详细描述。
本公开的二维码信息读取方法的一些实施例的流程图如图1所示。
在步骤101中,获取用户扫描的二维码图像信息和用户身份信息。在一些实施例中,用户身份信息可以是用户终端的等级信息,或者登陆用户终端的用户的等级信息,或者其他身份信息,如普通用户、高级用户、会员或者管理员等。
在步骤102中,根据用户身份信息获取二维码图像中的隐藏二维码图像。在一些实施例中,二维码图像隐藏的方法可以包括基于离散小波变换的图像隐藏算法、基于混沌的图像隐藏算法、图像水印算法中的一种或多种,可以根据预先的协议确定算法,进而获取隐藏二维码图像。
在一些实施例中,可以对用户身份信息进行核查,若用户身份满足要求,则解析隐藏二维码,否则不执行隐藏图像解析,直接获取与扫描到的二维码图像相关联的数据信息。
在步骤103中,获取与隐藏二维码图像相关联的数据信息。
通过这样的方法,以不同用户身份扫描相同的二维码图像能够解析出不同的隐藏二维码图像,进而得到与对应的隐藏二维码图像相关联的数据信息,从而将为不同给用户准备的数据信息集中至同一个二维码中,提高二维码的信息容量,也提高了二维码信息解析的自适应能力。
在一些实施例中,二维码图像中的隐藏二维码图像可能包括一层或多层,每一层二维码图像可以与不同的数据相关联,从而提高二维码的容量。
在一些实施例中,还可以解析出每层的二维码,将不同层的二维码图像的数据信息按照次序拼接,得到完整的数据。这样的方法能够增加二维码的数据容量,仅使用二维码图像进行数据传递,达到无网络状态下的数据解析,减少二维码数据查看对网络的依赖。在一些实施例中,二维码图像中可以包括层数信息,以便终端确定解析隐藏二维码的次数,防止数据解析不完整或过度解析的情况出现。
在一些实施例中,与不同层二维码图像的相关的数据是为不同类型的用户准备的,不同类型的用户能够得到对应的数据。本公开的二维码信息读取方法的另一些实施例的流程图如图2所示。
在步骤201中,获取用户扫描的二维码图像信息和用户身份信息。
在步骤202中,根据用户身份确定允许解析的隐藏二维码图像的层数。如图3所示,二维码图像包括了5个二维码,用户看到的是第5层二维码图像,图像中隐藏了4层图像。每一次解析隐藏二维码会将隐藏的下一层二维码变为表面的二维码,如在二维码图像信息的基础上解析1次,得到的图像中包括1~4层二维码图像,其读取结 果与读取第4层隐藏二维码的关联数据相同。
例如,若用户为未注册用户,则不能解析隐藏图像,只能读取表面的第5层二维码图像的关联数据;若用户为普通用户,能够解析隐藏的第4层隐藏二维码图像;若用户为高级用户,能够解析隐藏的第3层隐藏二维码图像;若用户为会员,能够解析隐藏的第2层隐藏二维码图像;若用户为管理员身份,则能够解析隐藏的第1层隐藏二维码图像。
在步骤203中,从二维码图像中逐层获取下一层的隐藏二维码图像,直至达到层数。如,用户为会员,则在二维码图像信息的基础上逐层解析,解析3层,得到第2层二维码图像。
在步骤204中,获取与得到的隐藏二维码图像相关联的数据信息。
通过这样的方法,能够自动识别用户类型,为不同类型的用户展示不同内容,一方面将多个二维码隐藏至一个二维码中,减少了展示面积,也避免了用户主动去选择要扫描的二维码,提高了用户友好度;另一方面,避免了用户查看为别的类型的用户准备的信息,提高了信息的安全性。
在一些实施例中,同一个类型的用户能够查看的信息可以与多个二维码相关联,分别解析出各个二维码图像的关联数据后将数据拼接,得到向用户展示的数据信息。通过这样的方法,能够解决单个二维码容量有限的问题,提高二维码的容量。在一些实施例中,二维码中可以包括图像中隐藏或融合的二维码个数信息,方便进行隐藏二维码的解析和数据拼接。
本公开的二维码生成方法的一些实施例的流程图如图4所示。
在步骤401中,确定用户类型数量,如包括游客、普通用户、高级用户、会员以及管理员5种。
在步骤402中,生成与用户类型数量相等数量的二维码,每个二维码与一种类型的用户允许查看的数据相关联。
在步骤403中,将生成的二维码逐层隐藏,直至生成单个二维码图像。在一些实施例中,二维码图像隐藏的方法可以包括基于离散小波变换的图像隐藏算法、基于混沌的图像隐藏算法、图像水印算法中的一种或多种。
通过这样的方法,能够为提供给不同用户的数据分别生成二维码,并将二维码集中至一个二维码中,以不同用户身份扫描相同的二维码图像能够解析出不同的隐藏二维码图像,进而得到与对应的隐藏二维码图像相关联的数据信息,从而提高二维码的 信息容量,也提高了二维码信息解析的自适应能力。
本公开的二维码生成方法的另一些实施例的流程图如图5所示。
在步骤501中,将第一二维码隐藏入第二二维码中,生成一层嵌套二维码,设定计数器i=1。
在步骤502中,将i层嵌套二维码隐藏入第i+2二维码中,生成i+1层嵌套二维码,如在步骤501的基础上,将一层嵌套二维码隐藏入第三二维码中,生成二层嵌套二维码中。二层嵌套二维码中包括三个二维码。
在步骤503中,判断是否完成全部二维码的嵌套。若已完成,则执行步骤505;若未完成嵌套,则执行步骤504。
在步骤504中,设置i=i+1,执行步骤502,继续进行下一层嵌套。
如图6所示,将第一二维码嵌套入第二二维码中,生成一层嵌套二维码,其展示的图像与第二二维码相同;将一层嵌套二维码嵌套入第三二维码中,生成二层嵌套二维码,其展示的图像与第三二维码相同,以此类推,直至生成图中所示的四层嵌套二维码,四层嵌套二维码中隐藏有第一至第五二维码图像,其展示的图像与第五二维码相同。
在步骤505中,展示嵌入全部二维码的i层嵌套二维码。
通过这样的方法,能够将二维码依次嵌套隐藏,最终以一个二维码的状态展示,以便在解析过程中逐次得到下一层二维码。
在一些实施例中,可以按照用户的私密等级由高到低的顺序隐藏二维码,以使与私密等级越高的用户允许查看的数据相关联的二维码隐藏的越深层。通过这样的方法,能够避免与高等级用户相关联的二维码被频繁解析,降低了隐藏二维码被泄露的可能性,提高了数据安全性。
在一些实施例中,可以先估计或确定每个用户类型中的用户数量,然后按照用户数量由少到多的顺序隐藏二维码。这样的方法能够减少隐藏二维码解析的次数,提高为多数用户展示关联数据的效率,也降低了系统的负担。
在一些实施例中,同一个类型的用户能够查看的信息可以与多个二维码相关联,在数据解析过程中分别解析出各个二维码图像的关联数据后将数据拼接,得到向用户展示的数据信息。通过这样的方法,能够解决单个二维码容量有限的问题,提高二维码的容量。在一些实施例中,可以在最终的二维码上提供融合的或隐藏的二维码个数的信息,从而方便扫描过程中的数据提取。
本公开的二维码信息读取装置的一些实施例的示意图如图7所示。扫描信息获取单元701能够获取用户扫描的二维码图像信息和用户身份信息。在一些实施例中,用户身份信息可以是用户终端的等级信息,或者登陆用户终端的用户的等级信息,或者其他身份信息,如普通用户、高级用户、会员或者管理员等。
隐藏图像解析单元702能够根据用户身份信息获取二维码图像中的隐藏二维码图像。在一些实施例中,二维码图像隐藏的方法可以包括基于离散小波变换的图像隐藏算法、基于混沌的图像隐藏算法、图像水印算法中的一种或多种,可以根据预先的协议确定算法,还可以从二维码图像中读取采用的算法,进而获取隐藏二维码图像。在一些实施例中,可以对用户身份信息进行核查,若用户身份满足要求,则解析隐藏二维码,否则不执行隐藏图像解析,直接获取与扫描到的二维码图像相关联的数据信息。
数据获取单元703能够获取与隐藏二维码图像相关联的数据信息。
这样的二维码信息读取装置在以不同用户身份扫描相同的二维码图像时能够解析出不同的隐藏二维码图像,进而得到与对应的隐藏二维码图像相关联的数据信息,从而将为不同给用户准备的数据信息集中至同一个二维码中,提高二维码的信息容量,也提高了二维码信息解析的自适应能力。
在一些实施例中,隐藏图像解析单元能够根据用户身份确定允许解析的隐藏二维码图像的层数,从二维码图像中逐层获取下一层的隐藏二维码图像,直至达到层数,获取与得到的隐藏二维码图像相关联的数据信息。
这样的二维码信息读取装置能够自动识别用户类型,为不同类型的用户展示不同内容,一方面将多个二维码隐藏至一个二维码中,减少了展示面积,也避免了用户主动去选择要扫描的二维码,提高了用户友好性;另一方面,避免了用户查看为别的类型的用户准备的信息,提高了信息的安全性。
本公开的二维码生成装置的一些实施例的示意图如图8所示。用户类型数量确定单元801能够确定用户类型数量,如包括游客、普通用户、高级用户、会员以及管理员5种。多层二维码生成单元802能够生成与用户类型数量相等数量的二维码,每个二维码与一种类型的用户允许查看的数据相关联。二维码合成单元803能够将生成的二维码逐层隐藏,直至生成单个二维码图像。在一些实施例中,二维码图像隐藏的方法可以包括基于离散小波变换的图像隐藏算法、基于混沌的图像隐藏算法、图像水印算法中的一种或多种。
这样的二维码生成装置能够为提供给不同用户的数据分别生成二维码,并将二维码集中至一个二维码中,提高了二维码的信息容量,也提高了二维码信息解析的自适应能力。
在一些实施例中,二维码合成单元803能够采用如图5所示的步骤实现二维码嵌套,能够将二维码依次嵌套隐藏,最终以一个二维码的状态展示,以便在解析过程中逐次得到下一层二维码。
在一些实施例中,二维码合成单元803可以按照用户的私密等级由高到低的顺序隐藏二维码,以使与私密等级越高的用户允许查看的数据相关联的二维码隐藏的越深层。这样的二维码生成装置能够避免与高等级用户相关联的二维码被频繁解析,降低了隐藏二维码被泄露的可能性,提高了数据安全性。
在一些实施例中,二维码合成单元803可以先估计或确定每个用户类型中的用户数量,然后按照用户数量由少到多的顺序隐藏二维码。这样的二维码生成装置能够减少隐藏二维码解析的次数,提高为多数用户展示关联数据的效率,也降低了系统的负担。
本公开二维码信息读取装置的一些实施例的结构示意图如图9所示。二维码信息读取装置包括存储器910和处理器920。其中:存储器910可以是磁盘、闪存或其它任何非易失性存储介质。存储器用于存储上文中二维码信息读取方法的对应实施例中的指令。处理器920耦接至存储器910,可以作为一个或多个集成电路来实施,例如微处理器或微控制器。该处理器920用于执行存储器中存储的指令,能够实现将为不同给用户准备的数据信息集中至同一个二维码中,提高二维码的信息容量,也提高了二维码信息解析的自适应能力。
在一些实施例中,还可以如图10所示,二维码信息读取装置1000包括存储器1010和处理器1020。处理器1020通过BUS总线1030耦合至存储器1010。该二维码信息读取装置1000还可以通过存储接口1040连接至外部存储装置1050以便调用外部数据,还可以通过网络接口1060连接至网络或者另外一台计算机系统(未标出)。此处不再进行详细介绍。
在该实施例中,通过存储器存储数据指令,再通过处理器处理上述指令,能够实现将为不同给用户准备的数据信息集中至同一个二维码中,提高二维码的信息容量,也提高了二维码信息解析的自适应能力。
本公开二维码生成装置的一些实施例的结构示意图如图9所示。二维码生成装置 包括存储器910和处理器920。其中:存储器910可以是磁盘、闪存或其它任何非易失性存储介质。存储器用于存储上文中二维码生成方法的对应实施例中的指令。处理器920耦接至存储器910,可以作为一个或多个集成电路来实施,例如微处理器或微控制器。该处理器920用于执行存储器中存储的指令,能够实现提高二维码的信息容量,也提高了二维码信息解析的自适应能力。
在一些实施例中,还可以如图10所示,二维码生成装置1000包括存储器1010和处理器1020。处理器1020通过BUS总线1030耦合至存储器1010。该二维码生成装置1000还可以通过存储接口1040连接至外部存储装置1050以便调用外部数据,还可以通过网络接口1060连接至网络或者另外一台计算机系统(未标出)。此处不再进行详细介绍。
在该实施例中,通过存储器存储数据指令,再通过处理器处理上述指令,能够实现提高二维码的信息容量,也提高了二维码信息解析的自适应能力。
在另一些实施例中,一种计算机可读存储介质,其上存储有计算机程序指令,该指令被处理器执行时实现二维码信息读取方法或二维码生成方法对应实施例中的方法的步骤。本领域内的技术人员应明白,本公开的实施例可提供为方法、装置、或计算机程序产品。因此,本公开可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本公开可采用在一个或多个其中包含有计算机可用程序代码的计算机可用非瞬时性存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本公开是参照根据本公开实施例的方法、设备(系统)和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一 个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
至此,已经详细描述了本公开。为了避免遮蔽本公开的构思,没有描述本领域所公知的一些细节。本领域技术人员根据上面的描述,完全可以明白如何实施这里公开的技术方案。
可能以许多方式来实现本公开的方法以及装置。例如,可通过软件、硬件、固件或者软件、硬件、固件的任何组合来实现本公开的方法以及装置。用于所述方法的步骤的上述顺序仅是为了进行说明,本公开的方法的步骤不限于以上具体描述的顺序,除非以其它方式特别说明。此外,在一些实施例中,还可将本公开实施为记录在记录介质中的程序,这些程序包括用于实现根据本公开的方法的机器可读指令。因而,本公开还覆盖存储用于执行根据本公开的方法的程序的记录介质。
最后应当说明的是:以上实施例仅用以说明本公开的技术方案而非对其限制;尽管参照较佳实施例对本公开进行了详细的说明,所属领域的普通技术人员应当理解:依然可以对本公开的具体实施方式进行修改或者对部分技术特征进行等同替换;而不脱离本公开技术方案的精神,其均应涵盖在本公开请求保护的技术方案范围当中。
Claims (16)
- 一种二维码信息读取方法,包括:获取用户扫描的二维码图像信息和用户身份信息;根据用户身份信息获取二维码图像中的隐藏二维码图像;获取与所述隐藏二维码图像相关联的数据信息。
- 根据权利要求1所述的方法,其中,所述二维码图像中隐藏有一层或多层所述隐藏二维码图像。
- 根据权利要求2中所述的方法,其中,所述获取二维码图像中的隐藏二维码图像包括:根据用户身份确定允许解析的隐藏二维码图像的层数;从所述二维码图像中逐层获取下一层的隐藏二维码图像,直至达到所述层数。
- 根据权利要求2或3所述的方法,其中,二维码图像隐藏的方法包括:基于离散小波变换的图像隐藏算法、基于混沌的图像隐藏算法、图像水印算法中的一种或多种。
- 一种二维码生成方法,包括:确定用户类型数量;生成与所述用户类型数量相等数量的二维码,每个二维码与一种类型的用户允许查看的数据相关联;将生成的二维码逐层隐藏,直至生成单个二维码图像。
- 根据权利要求5所述的方法,其中,所述将生成的二维码逐层隐藏包括:将第一二维码隐藏入第二二维码中,生成一层嵌套二维码;将所述一层嵌套二维码隐藏入第三二维码中,生成二层嵌套二维码;依次类推,直至完成全部二维码的嵌套。
- 根据权利要求5或6所述的方法,其中,二维码图像隐藏的方法包括:基于离散小波变换的图像隐藏算法、基于混沌的图像隐藏算法、图像水印算法中的一种或多种。
- 根据权利要求5或6所述的方法,其中,将生成的二维码逐层隐藏包括以下的任意一种:按照用户的私密等级由高到低的顺序隐藏二维码,以使与私密等级越高的用户允许查看的数据相关联的二维码隐藏的越深层;或,按照用户类型中用户的数量由少到多的顺序隐藏二维码,以使与用户数量越少的用户类型中用户允许查看的数据相关联的二维码隐藏的越深。
- 一种二维码信息读取装置,包括:扫描信息获取单元,被配置为获取用户扫描的二维码图像信息和用户身份信息;隐藏图像解析单元,被配置为根据用户身份信息获取二维码图像中的隐藏二维码图像;数据获取单元,被配置为获取与所述隐藏二维码图像相关联的数据信息。
- 根据权利要求9中所述的装置,其中,所述隐藏图像解析单元被配置为:根据用户身份确定允许解析的隐藏二维码图像的层数;从所述二维码图像中逐层获取下一层的隐藏二维码图像,直至达到所述层数。
- 一种二维码信息读取装置,包括:存储器;以及耦接至所述存储器的处理器,所述处理器被配置为基于存储在所述存储器的指令执行如权利要求1至4任一项所述的方法。
- 一种二维码生成装置,包括:用户类型数量确定单元,被配置为确定用户类型数量;多层二维码生成单元,被配置为生成与所述用户类型数量相等数量的二维码,每个二维码与一种类型的用户允许查看的数据相关联;二维码合成单元,被配置为将生成的二维码逐层隐藏,直至生成单个二维码图像。
- 根据权利要求13所述的装置,所述二维码合成单元被配置为:将第一二维码隐藏入第二二维码中,生成一层嵌套二维码;将所述一层嵌套二维码隐藏入第三二维码中,生成二层嵌套二维码;依次类推,直至完成全部二维码的嵌套。
- 根据权利要求12或13所述的装置,其中,二维码合成单元被配置为执行以下任意一项:按照用户的私密等级由高到低的顺序隐藏二维码,以使与私密等级越高的用户允 许查看的数据相关联的二维码隐藏的越深层;或按照用户类型中用户的数量由少到多的顺序隐藏二维码,以使与用户数量越少的用户类型中用户允许查看的数据相关联的二维码隐藏的越深。
- 一种二维码生成装置,包括:存储器;以及耦接至所述存储器的处理器,所述处理器被配置为基于存储在所述存储器的指令执行如权利要求5至8任一项所述的方法。
- 一种计算机可读存储介质,其上存储有计算机程序指令,该指令被处理器执行时实现权利要求1至8任意一项所述的方法的步骤。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711042241.2 | 2017-10-31 | ||
CN201711042241.2A CN109726786B (zh) | 2017-10-31 | 2017-10-31 | 二维码信息读取、生成方法和装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019085710A1 true WO2019085710A1 (zh) | 2019-05-09 |
Family
ID=66293001
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/109303 WO2019085710A1 (zh) | 2017-10-31 | 2018-10-08 | 二维码信息读取、生成方法和装置 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109726786B (zh) |
WO (1) | WO2019085710A1 (zh) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110263895B (zh) * | 2019-06-25 | 2023-02-17 | 北京慧眼智行科技有限公司 | 一种码图生成方法及系统 |
CN113111676A (zh) * | 2021-04-29 | 2021-07-13 | 北京红山信息科技研究院有限公司 | 一种二维码办公方法、装置、移动终端及存储介质 |
CN117201603B (zh) * | 2023-11-06 | 2024-02-06 | 苔花科迈(西安)信息技术有限公司 | 基于二维码的煤矿井下数据交接方法及系统 |
CN117574348B (zh) * | 2024-01-15 | 2024-05-10 | 浙江口碑网络技术有限公司 | 图形标识码的管理方法 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1738235A (zh) * | 2005-09-12 | 2006-02-22 | 西安交通大学 | 基于混沌特性的图像防伪方法 |
CN104951827A (zh) * | 2015-06-08 | 2015-09-30 | 上海理工大学 | 一种复合二维码及其识别系统 |
CN105894071A (zh) * | 2016-03-31 | 2016-08-24 | 郝迎喜 | 二维码混合生成方法 |
CN106022196A (zh) * | 2016-06-30 | 2016-10-12 | 维沃移动通信有限公司 | 一种信息分享的方法和智能终端 |
JP2017035796A (ja) * | 2015-08-07 | 2017-02-16 | 凸版印刷株式会社 | 情報印刷物および読取方法ならびに認証方法 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106529633B (zh) * | 2015-09-10 | 2019-11-15 | 阿里巴巴集团控股有限公司 | 二维码的生成方法、解码方法以及装置 |
CN105825257B (zh) * | 2016-03-09 | 2018-05-29 | 东北大学 | 基于二维条码的信息隐藏与隐藏信息提取方法及系统 |
CN106650869B (zh) * | 2016-10-18 | 2020-02-07 | 重庆文理学院 | 一种基于二维码的信息隐藏方法 |
CN107169395A (zh) * | 2017-06-20 | 2017-09-15 | 重庆大学 | 一种更加安全的qr码生成及读取方法 |
-
2017
- 2017-10-31 CN CN201711042241.2A patent/CN109726786B/zh active Active
-
2018
- 2018-10-08 WO PCT/CN2018/109303 patent/WO2019085710A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1738235A (zh) * | 2005-09-12 | 2006-02-22 | 西安交通大学 | 基于混沌特性的图像防伪方法 |
CN104951827A (zh) * | 2015-06-08 | 2015-09-30 | 上海理工大学 | 一种复合二维码及其识别系统 |
JP2017035796A (ja) * | 2015-08-07 | 2017-02-16 | 凸版印刷株式会社 | 情報印刷物および読取方法ならびに認証方法 |
CN105894071A (zh) * | 2016-03-31 | 2016-08-24 | 郝迎喜 | 二维码混合生成方法 |
CN106022196A (zh) * | 2016-06-30 | 2016-10-12 | 维沃移动通信有限公司 | 一种信息分享的方法和智能终端 |
Also Published As
Publication number | Publication date |
---|---|
CN109726786B (zh) | 2023-09-26 |
CN109726786A (zh) | 2019-05-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019085710A1 (zh) | 二维码信息读取、生成方法和装置 | |
CN111127304B (zh) | 跨域图像转换 | |
Wu et al. | Steganography using reversible texture synthesis | |
KR102010221B1 (ko) | 스마트폰 기반 방법들 및 시스템들 | |
US11288354B2 (en) | Verification code-based verification processing | |
JP2020515931A5 (zh) | ||
US20170300707A1 (en) | Method and Device for Accessing and Processing Image | |
US20160241592A1 (en) | Identification of trusted websites | |
CN103678600B (zh) | 网页数据的处理方法及设备 | |
CN110148100A (zh) | 一种图像变换方法、装置、存储介质及计算机设备 | |
CN107509080B (zh) | 一种编码图像显示方法、装置和电子设备 | |
Heller et al. | 3D reconstruction from photographs by CMP SfM web service | |
Deng et al. | Deepfake Video Detection Based on EfficientNet‐V2 Network | |
Tsai | An adaptive steganographic algorithm for 3D polygonal models using vertex decimation | |
CN110213458B (zh) | 一种图像数据处理方法、装置及存储介质 | |
Spina et al. | Point cloud segmentation for cultural heritage sites | |
CN104376291B (zh) | 数据处理的方法及装置 | |
Bertini et al. | Are social networks watermarking us or are we (unawarely) watermarking ourself? | |
Chen et al. | Cross-Modal Graph Semantic Communication Assisted by Generative AI in the Metaverse for 6G | |
Itier et al. | Joint synchronization and high capacity data hiding for 3D meshes | |
CN115016688A (zh) | 虚拟信息显示方法、装置和电子设备 | |
Zhang et al. | Spatiotemporal Inconsistency Learning and Interactive Fusion for Deepfake Video Detection | |
CN106599307B (zh) | 图像匹配方法及装置 | |
US9542714B2 (en) | Concealing data within images | |
US20160019932A1 (en) | Systems and methods for generating video |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18874062 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18874062 Country of ref document: EP Kind code of ref document: A1 |