CN103106437A - Single parameter variable transmutation polytomized variable anti-counterfeiting information storage trademark - Google Patents

Single parameter variable transmutation polytomized variable anti-counterfeiting information storage trademark Download PDF

Info

Publication number
CN103106437A
CN103106437A CN2013100223927A CN201310022392A CN103106437A CN 103106437 A CN103106437 A CN 103106437A CN 2013100223927 A CN2013100223927 A CN 2013100223927A CN 201310022392 A CN201310022392 A CN 201310022392A CN 103106437 A CN103106437 A CN 103106437A
Authority
CN
China
Prior art keywords
binary
counterfeiting information
trade mark
group
operator control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013100223927A
Other languages
Chinese (zh)
Other versions
CN103106437B (en
Inventor
张明鸣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN201310022392.7A priority Critical patent/CN103106437B/en
Publication of CN103106437A publication Critical patent/CN103106437A/en
Application granted granted Critical
Publication of CN103106437B publication Critical patent/CN103106437B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

A single parameter variable transmutation polytomized variable anti-counterfeiting information storage trademark can enable binary anti-counterfeiting information to be generated into binary modulation signals, and enable the anti-counterfeiting information to be embedded into a whole trademark page through a circulation table look-up method modulation mode. The anti-counterfeiting information can be identified from any fragment during trademark identification, and the single parameter variable transmutation polytomized variable anti-counterfeiting information storage trademark can be applied to all kinds of anti-counterfeiting trademarks.

Description

The polynary encryption anti-counterfeiting information storage of one-parameter variable alternation trade mark
affiliated technical field:
The present invention relates to a kind of anti-false trademark, particularly the polynary encryption anti-counterfeiting information of a kind of one-parameter variable alternation is stored trade mark, this trade mark can be kept at binary add tight defense fake information on the trade mark page and realize the false proof of trade mark, and what this trade mark can be for extensive stock is false proof.
background technology:
Anti-false trademark, claim again antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, is a kind of proof label of discerning the false from the genuine, preventing personation, be in the commodity process of circulation people for distinguishing true and false, the sign of distinguishing the commercial quality quality of merchandise resources.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and client's interests.The trade mark of China has carried out innovation audaciously; adopted laser anti-counterfeit, the core micropore is false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but the false proof struggle with fraud is high-tech trial of strength; advanced anti-counterfeiting technology has certain ageing again; so; must constantly promote trade mark anti-fake technique; could false proof with fake in forever maintain the leading position, this is also that protection businessman and client's interests are maintained the commodity safe basic assurance that circulates.
summary of the invention:
For reliability and the security that improves trademark anti-counterfeit, the deficiency that the present invention is directed to existing trademark anti-counterfeit existence is improved existing trade mark anti-fake technique, a kind of anti-counterfeiting information storage trade mark has been proposed, this trade mark is by the change to amplitude electric conductivity in brand printing, encryption anti-counterfeiting information is embedded on the whole trade mark page with scale-of-two coded signal form, can identify encryption anti-counterfeiting information when brand recognition from any one fragment, therefore there is very strong disguise and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, image and word on trade mark page paper consist of amplitude,
Binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, and the horizontal scanning line on trade mark page paper and column scan line are printed and formed by electrically conducting transparent printing ink
The horizontal scanning line be printed on trade mark page paper has the N bar, the column scan line be printed on trade mark page paper has the M bar, the amplitude be printed on trade mark page paper is divided into the capable M row of N on the trade mark paper, amplitude neatly is matrix and arranges on trade mark page paper paper, allow i get 1 to N, allow j get 1 to M, j bar column scan line on trade mark page paper is electrically connected to the basal surface of each amplitude of the row of the j on trade mark page paper, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper is capable with i on trade mark page paper is electrically connected to
In the time the binary message of trade mark page stores need to being read, be set to successively high level to N bar horizontal scanning line by the 1st on trade mark page paper,
When the 1st horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported from the 1st column scan line to M bar column scan line with 0,1 code form, the 1st row on trade mark page paper is printed the amplitude output binary message 1 formed by electrically conductive ink, the 1st row on trade mark page paper is printed the amplitude output binary message 0 formed by dielectric ink, can repeat above-mentioned readout to other row on trade mark page paper
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 949764DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H ii is greater than 0 positive integer, the eight-digit binary number encryption parameter is denoted as C, the binary system positive integer that encryption parameter C is 0<=C<=256, the eight-digit binary number encryption variables is denoted as respectively q, j, d, e, f, g, h, r and p, the binary system positive integer that encryption variables q, j, d, e, f, g, h, r and p are 0 to 256, and the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 929222DEST_PATH_IMAGE002
Figure 272741DEST_PATH_IMAGE003
Figure 730267DEST_PATH_IMAGE004
Figure 606956DEST_PATH_IMAGE005
Figure 491735DEST_PATH_IMAGE006
Figure 322550DEST_PATH_IMAGE007
Figure 583767DEST_PATH_IMAGE008
Figure 377280DEST_PATH_IMAGE009
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 677036DEST_PATH_IMAGE003
Figure 476365DEST_PATH_IMAGE004
Figure 359635DEST_PATH_IMAGE007
Figure 759393DEST_PATH_IMAGE008
Figure 402864DEST_PATH_IMAGE009
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 93050DEST_PATH_IMAGE003
Figure 234182DEST_PATH_IMAGE004
Figure 794476DEST_PATH_IMAGE005
Figure 87682DEST_PATH_IMAGE008
Figure 502483DEST_PATH_IMAGE009
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 507348DEST_PATH_IMAGE002
Figure 509064DEST_PATH_IMAGE003
Figure 991998DEST_PATH_IMAGE004
Figure 526885DEST_PATH_IMAGE005
Figure 702651DEST_PATH_IMAGE006
Figure 191664DEST_PATH_IMAGE007
Figure 478289DEST_PATH_IMAGE008
Figure 602102DEST_PATH_IMAGE009
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 77711DEST_PATH_IMAGE004
Figure 321611DEST_PATH_IMAGE005
Figure 511284DEST_PATH_IMAGE006
Figure 974888DEST_PATH_IMAGE007
Figure 603316DEST_PATH_IMAGE008
Figure 29618DEST_PATH_IMAGE009
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 965693DEST_PATH_IMAGE002
Figure 847247DEST_PATH_IMAGE004
Figure 800159DEST_PATH_IMAGE005
Figure 769832DEST_PATH_IMAGE007
Figure 5641DEST_PATH_IMAGE008
Figure 78639DEST_PATH_IMAGE009
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 108912DEST_PATH_IMAGE002
Figure 768826DEST_PATH_IMAGE003
Figure 542747DEST_PATH_IMAGE004
Figure 532568DEST_PATH_IMAGE005
Figure 671426DEST_PATH_IMAGE006
Figure 818636DEST_PATH_IMAGE007
Figure 240575DEST_PATH_IMAGE009
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 114116DEST_PATH_IMAGE002
Figure 309474DEST_PATH_IMAGE003
Figure 891076DEST_PATH_IMAGE005
Figure 788811DEST_PATH_IMAGE007
Figure 966294DEST_PATH_IMAGE009
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 680172DEST_PATH_IMAGE002
Figure 787805DEST_PATH_IMAGE003
Figure 871430DEST_PATH_IMAGE004
Figure 482540DEST_PATH_IMAGE005
Figure 122644DEST_PATH_IMAGE006
Figure 451994DEST_PATH_IMAGE007
Figure 713212DEST_PATH_IMAGE008
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, polynary cryptographic calculation is defined as H i=
Figure 63870DEST_PATH_IMAGE010
Figure 880516DEST_PATH_IMAGE002
Figure 679845DEST_PATH_IMAGE011
Figure 829328DEST_PATH_IMAGE003
Figure 321490DEST_PATH_IMAGE010
Figure 359853DEST_PATH_IMAGE004
Figure 464337DEST_PATH_IMAGE011
Figure 170125DEST_PATH_IMAGE005
Figure 567608DEST_PATH_IMAGE010
Figure 1443DEST_PATH_IMAGE011
Figure 374787DEST_PATH_IMAGE007
Figure 943171DEST_PATH_IMAGE010
Figure 785488DEST_PATH_IMAGE008
Figure 730310DEST_PATH_IMAGE011
Figure 708893DEST_PATH_IMAGE009
, during binary operator control variables k=1, polynary cryptographic calculation is defined as H i=
Figure 214009DEST_PATH_IMAGE012
Figure 869647DEST_PATH_IMAGE013
Figure 779834DEST_PATH_IMAGE003
Figure 268847DEST_PATH_IMAGE012
Figure 944864DEST_PATH_IMAGE013
Figure 291532DEST_PATH_IMAGE005
Figure 267841DEST_PATH_IMAGE012
Figure 92577DEST_PATH_IMAGE006
Figure 336477DEST_PATH_IMAGE013
Figure 854046DEST_PATH_IMAGE007
Figure 317650DEST_PATH_IMAGE012
Figure 670582DEST_PATH_IMAGE013
Figure 359053DEST_PATH_IMAGE009
Figure 808489DEST_PATH_IMAGE012
, during binary operator control variables k=2, polynary cryptographic calculation is defined as H i=
Figure 694984DEST_PATH_IMAGE002
Figure 554356DEST_PATH_IMAGE015
Figure 225509DEST_PATH_IMAGE003
Figure 461318DEST_PATH_IMAGE014
Figure 35781DEST_PATH_IMAGE004
Figure 66054DEST_PATH_IMAGE015
Figure 224503DEST_PATH_IMAGE005
Figure 732845DEST_PATH_IMAGE014
Figure 427393DEST_PATH_IMAGE006
Figure 628568DEST_PATH_IMAGE015
Figure 586345DEST_PATH_IMAGE014
Figure 691115DEST_PATH_IMAGE009
Figure 308304DEST_PATH_IMAGE014
, during binary operator control variables k=3, polynary cryptographic calculation is defined as H i=
Figure 210401DEST_PATH_IMAGE016
Figure 753377DEST_PATH_IMAGE002
Figure 108135DEST_PATH_IMAGE017
Figure 529015DEST_PATH_IMAGE003
Figure 347935DEST_PATH_IMAGE016
Figure 999496DEST_PATH_IMAGE004
Figure 107129DEST_PATH_IMAGE017
Figure 66120DEST_PATH_IMAGE005
Figure 739547DEST_PATH_IMAGE016
Figure 889906DEST_PATH_IMAGE006
Figure 720721DEST_PATH_IMAGE017
Figure 716359DEST_PATH_IMAGE007
Figure 509871DEST_PATH_IMAGE016
Figure 332596DEST_PATH_IMAGE008
Figure 883663DEST_PATH_IMAGE017
Figure 948571DEST_PATH_IMAGE009
Figure 534273DEST_PATH_IMAGE016
, during binary operator control variables k=4, polynary cryptographic calculation is defined as H i=
Figure 262320DEST_PATH_IMAGE018
Figure 566262DEST_PATH_IMAGE002
Figure 169282DEST_PATH_IMAGE019
Figure 609491DEST_PATH_IMAGE003
Figure 774018DEST_PATH_IMAGE018
Figure 706388DEST_PATH_IMAGE019
Figure 266682DEST_PATH_IMAGE005
Figure 348250DEST_PATH_IMAGE018
Figure 689102DEST_PATH_IMAGE006
Figure 633924DEST_PATH_IMAGE019
Figure 550190DEST_PATH_IMAGE007
Figure 789727DEST_PATH_IMAGE008
Figure 538240DEST_PATH_IMAGE019
Figure 309012DEST_PATH_IMAGE009
Figure 484779DEST_PATH_IMAGE018
, during binary operator control variables k=5, polynary cryptographic calculation is defined as H i=
Figure 472326DEST_PATH_IMAGE020
Figure 758951DEST_PATH_IMAGE002
Figure 712126DEST_PATH_IMAGE021
Figure 58794DEST_PATH_IMAGE003
Figure 268058DEST_PATH_IMAGE020
Figure 859839DEST_PATH_IMAGE004
Figure 103738DEST_PATH_IMAGE021
Figure 621307DEST_PATH_IMAGE005
Figure 583447DEST_PATH_IMAGE020
Figure 874062DEST_PATH_IMAGE021
Figure 247854DEST_PATH_IMAGE020
Figure 679972DEST_PATH_IMAGE008
Figure 898464DEST_PATH_IMAGE021
Figure 757836DEST_PATH_IMAGE009
Figure 930453DEST_PATH_IMAGE020
, during binary operator control variables k=6, polynary cryptographic calculation is defined as H i=
Figure 973682DEST_PATH_IMAGE002
Figure 3955DEST_PATH_IMAGE023
Figure 714466DEST_PATH_IMAGE003
Figure 488387DEST_PATH_IMAGE022
Figure 681471DEST_PATH_IMAGE004
Figure 826593DEST_PATH_IMAGE005
Figure 404205DEST_PATH_IMAGE022
Figure 15577DEST_PATH_IMAGE006
Figure 387653DEST_PATH_IMAGE023
Figure 255114DEST_PATH_IMAGE007
Figure 872303DEST_PATH_IMAGE022
Figure 774400DEST_PATH_IMAGE008
Figure 317376DEST_PATH_IMAGE023
Figure 937714DEST_PATH_IMAGE009
Figure 93014DEST_PATH_IMAGE022
, during binary operator control variables k=7, polynary cryptographic calculation is defined as H i=
Figure 129845DEST_PATH_IMAGE024
Figure 843723DEST_PATH_IMAGE002
Figure 707085DEST_PATH_IMAGE003
Figure 583774DEST_PATH_IMAGE024
Figure 468553DEST_PATH_IMAGE004
Figure 299368DEST_PATH_IMAGE025
Figure 560585DEST_PATH_IMAGE005
Figure 347462DEST_PATH_IMAGE006
Figure 665573DEST_PATH_IMAGE025
Figure 730481DEST_PATH_IMAGE007
Figure 410489DEST_PATH_IMAGE025
Figure 453717DEST_PATH_IMAGE024
, the initial value of setting encryption parameter C, the initial value of setting encryption variables q, j, d, e, f, g, h, r and p, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 618245DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right
Figure 143904DEST_PATH_IMAGE026
Carry out H 1=
Figure 550615DEST_PATH_IMAGE027
Figure 409111DEST_PATH_IMAGE002
Figure 243075DEST_PATH_IMAGE011
Figure 256031DEST_PATH_IMAGE003
Figure 200853DEST_PATH_IMAGE027
Figure 117119DEST_PATH_IMAGE004
Figure 121984DEST_PATH_IMAGE011
Figure 622235DEST_PATH_IMAGE005
Figure 922811DEST_PATH_IMAGE027
Figure 192119DEST_PATH_IMAGE006
Figure 367885DEST_PATH_IMAGE011
Figure 355433DEST_PATH_IMAGE007
Figure 143522DEST_PATH_IMAGE027
Figure 532915DEST_PATH_IMAGE008
Figure 614004DEST_PATH_IMAGE011
Figure 88847DEST_PATH_IMAGE009
Figure 116846DEST_PATH_IMAGE027
Polynary cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right
Figure 862211DEST_PATH_IMAGE026
Carry out H 1=
Figure 379780DEST_PATH_IMAGE027
Figure 704768DEST_PATH_IMAGE011
Figure 570218DEST_PATH_IMAGE003
Figure 258688DEST_PATH_IMAGE027
Figure 442545DEST_PATH_IMAGE004
Figure 874663DEST_PATH_IMAGE011
Figure 921768DEST_PATH_IMAGE005
Figure 455222DEST_PATH_IMAGE006
Figure 425452DEST_PATH_IMAGE011
Figure 937598DEST_PATH_IMAGE007
Figure 565468DEST_PATH_IMAGE008
Figure 521596DEST_PATH_IMAGE027
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing in the time of polynary cryptographic calculation, make next polynary cryptographic calculation point to H 2=
Figure 229658DEST_PATH_IMAGE028
Figure 807270DEST_PATH_IMAGE002
Figure 90746DEST_PATH_IMAGE013
Figure 462821DEST_PATH_IMAGE003
Figure 595862DEST_PATH_IMAGE028
Figure 711586DEST_PATH_IMAGE004
Figure 278462DEST_PATH_IMAGE028
Figure 932297DEST_PATH_IMAGE006
Figure 754147DEST_PATH_IMAGE013
Figure 733604DEST_PATH_IMAGE007
Figure 575658DEST_PATH_IMAGE028
Figure 546368DEST_PATH_IMAGE008
Figure 547691DEST_PATH_IMAGE013
Figure 933935DEST_PATH_IMAGE009
Figure 263285DEST_PATH_IMAGE028
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure 524502DEST_PATH_IMAGE029
Carry out H 2=
Figure 6430DEST_PATH_IMAGE028
Figure 563576DEST_PATH_IMAGE002
Figure 380222DEST_PATH_IMAGE013
Figure 391352DEST_PATH_IMAGE028
Figure 883513DEST_PATH_IMAGE004
Figure 187455DEST_PATH_IMAGE013
Figure 26361DEST_PATH_IMAGE005
Figure 129632DEST_PATH_IMAGE006
Figure 563466DEST_PATH_IMAGE007
Figure 874493DEST_PATH_IMAGE028
Figure 708457DEST_PATH_IMAGE008
Figure 659095DEST_PATH_IMAGE013
Figure 603918DEST_PATH_IMAGE009
Figure 570781DEST_PATH_IMAGE028
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing in the time of polynary cryptographic calculation, make next polynary cryptographic calculation point to H 3=
Figure 13581DEST_PATH_IMAGE002
Figure 496515DEST_PATH_IMAGE015
Figure 532866DEST_PATH_IMAGE003
Figure 696180DEST_PATH_IMAGE004
Figure 982805DEST_PATH_IMAGE015
Figure 608084DEST_PATH_IMAGE005
Figure 954752DEST_PATH_IMAGE030
Figure 519911DEST_PATH_IMAGE015
Figure 265275DEST_PATH_IMAGE007
Figure 454948DEST_PATH_IMAGE030
Figure 417088DEST_PATH_IMAGE008
Figure 45516DEST_PATH_IMAGE015
Figure 409501DEST_PATH_IMAGE009
Figure 396174DEST_PATH_IMAGE030
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this polynary cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 845609DEST_PATH_IMAGE001
carry out polynary cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, can provide valid certificates for true trade mark, there is stronger anti-forgery ability simultaneously.
For solving above-mentioned technical matters, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, each 8 one group of scale-of-two anti-counterfeiting information in scale-of-two anti-counterfeiting information table are expanded to 32 one group of scale-of-two anti-counterfeiting information, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, each 32 scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table are carried out to polynary cryptographic calculation, generate the binary add tight defense fake information table of 32 group, utilize 32 binary add tight defense fake informations process chnnel codings in binary add tight defense fake information table, generation has the binary modulated signal of 32 group of error detecting and error correcting function, chnnel coding can adopt loop coding, convolutional encoding or Turbo coding various ways, trade mark page original continuous is changed the line map, and image signal is processed (RIP) through rasterizing and hybrid screening is exported shadow tone hybrid screening picture signal, comprising amplitude and FM screened image signal, utilize 32 one group of binary modulated signals that generate to adopt the electric conductivity of amplitude in circulation look-up table modulation system modulation hybrid screening picture signal, the electric conductivity that makes amplitude is according to the dielectric ink amplitude and the electrically conductive ink amplitude is regular changes, make adjacent 32 amplitudes in the hybrid screening picture signal carry 32 scale-of-two anti-counterfeiting information by the change of electric conductivity, thereby be created on the hybrid screening picture signal that embeds anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, at first gather trade mark page site electric conductivity signal, identification through the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generate scale-of-two deciphering anti-counterfeiting information table after channel-decoding, 32 binary messages of i group that scale-of-two is deciphered in the anti-counterfeiting information table are denoted as M i.
Binary system is deciphered to 32 binary message M in the anti-counterfeiting information table iThe initial value design of Position Control variable i be i=1, the initial value when initial value of setting encryption parameter C is encryption, the initial value when initial value of setting encryption variables q, j, d, e, f, g, h, r and p is encryption, the initial value design of binary operator control variables k is k=0, known by polynary ciphering process, during binary operator control variables k=0, decrypt operation is M i=
Figure 277728DEST_PATH_IMAGE010
Figure 732105DEST_PATH_IMAGE002
Figure 591477DEST_PATH_IMAGE011
Figure 262630DEST_PATH_IMAGE003
Figure 509120DEST_PATH_IMAGE004
Figure 40858DEST_PATH_IMAGE011
Figure 199307DEST_PATH_IMAGE005
Figure 973228DEST_PATH_IMAGE010
Figure 900732DEST_PATH_IMAGE006
Figure 603372DEST_PATH_IMAGE011
Figure 249116DEST_PATH_IMAGE007
Figure 561149DEST_PATH_IMAGE010
Figure 608740DEST_PATH_IMAGE008
Figure 689357DEST_PATH_IMAGE009
Figure 805080DEST_PATH_IMAGE010
, during binary operator control variables k=1, decrypt operation is M i=
Figure 270959DEST_PATH_IMAGE012
Figure 813936DEST_PATH_IMAGE002
Figure 168694DEST_PATH_IMAGE013
Figure 105371DEST_PATH_IMAGE013
Figure 562897DEST_PATH_IMAGE005
Figure 675472DEST_PATH_IMAGE012
Figure 155181DEST_PATH_IMAGE013
Figure 416398DEST_PATH_IMAGE007
Figure 445796DEST_PATH_IMAGE012
Figure 767056DEST_PATH_IMAGE008
Figure 884495DEST_PATH_IMAGE009
Figure 470198DEST_PATH_IMAGE012
, during binary operator control variables k=2, decrypt operation is M i=
Figure 962359DEST_PATH_IMAGE014
Figure 722DEST_PATH_IMAGE002
Figure 105206DEST_PATH_IMAGE015
Figure 748677DEST_PATH_IMAGE003
Figure 146161DEST_PATH_IMAGE014
Figure 78531DEST_PATH_IMAGE015
Figure 140290DEST_PATH_IMAGE005
Figure 708674DEST_PATH_IMAGE014
Figure 987209DEST_PATH_IMAGE006
Figure 836578DEST_PATH_IMAGE007
Figure 824629DEST_PATH_IMAGE015
Figure 860980DEST_PATH_IMAGE009
Figure 771167DEST_PATH_IMAGE014
, during binary operator control variables k=3, decrypt operation is M i=
Figure 758715DEST_PATH_IMAGE016
Figure 45340DEST_PATH_IMAGE002
Figure 936197DEST_PATH_IMAGE017
Figure 282865DEST_PATH_IMAGE003
Figure 757709DEST_PATH_IMAGE016
Figure 845379DEST_PATH_IMAGE005
Figure 745202DEST_PATH_IMAGE016
Figure 373629DEST_PATH_IMAGE006
Figure 472035DEST_PATH_IMAGE017
Figure 724287DEST_PATH_IMAGE007
Figure 340262DEST_PATH_IMAGE008
Figure 60219DEST_PATH_IMAGE017
Figure 981907DEST_PATH_IMAGE009
Figure 653060DEST_PATH_IMAGE016
, during binary operator control variables k=4, decrypt operation is M i=
Figure 463332DEST_PATH_IMAGE002
Figure 493605DEST_PATH_IMAGE019
Figure 361995DEST_PATH_IMAGE018
Figure 257718DEST_PATH_IMAGE019
Figure 200769DEST_PATH_IMAGE006
Figure 136626DEST_PATH_IMAGE019
Figure 269667DEST_PATH_IMAGE007
Figure 269613DEST_PATH_IMAGE019
Figure 624371DEST_PATH_IMAGE009
Figure 543785DEST_PATH_IMAGE018
, during binary operator control variables k=5, decrypt operation is M i=
Figure 300389DEST_PATH_IMAGE020
Figure 515731DEST_PATH_IMAGE002
Figure 685682DEST_PATH_IMAGE021
Figure 692001DEST_PATH_IMAGE020
Figure 343824DEST_PATH_IMAGE004
Figure 673174DEST_PATH_IMAGE021
Figure 668812DEST_PATH_IMAGE005
Figure 400008DEST_PATH_IMAGE020
Figure 222733DEST_PATH_IMAGE006
Figure 773800DEST_PATH_IMAGE021
Figure 838708DEST_PATH_IMAGE007
Figure 424410DEST_PATH_IMAGE020
Figure 140738DEST_PATH_IMAGE008
Figure 444680DEST_PATH_IMAGE021
Figure 47700DEST_PATH_IMAGE009
, during binary operator control variables k=6, decrypt operation is M i=
Figure 652436DEST_PATH_IMAGE022
Figure 178095DEST_PATH_IMAGE002
Figure 82783DEST_PATH_IMAGE003
Figure 651168DEST_PATH_IMAGE022
Figure 431167DEST_PATH_IMAGE004
Figure 375989DEST_PATH_IMAGE023
Figure 790790DEST_PATH_IMAGE005
Figure 530076DEST_PATH_IMAGE022
Figure 531792DEST_PATH_IMAGE006
Figure 280306DEST_PATH_IMAGE023
Figure 549613DEST_PATH_IMAGE007
Figure 725379DEST_PATH_IMAGE022
Figure 214392DEST_PATH_IMAGE008
Figure 501017DEST_PATH_IMAGE023
Figure 890410DEST_PATH_IMAGE009
Figure 489275DEST_PATH_IMAGE022
, during binary operator control variables k=7, decrypt operation is M i=
Figure 211723DEST_PATH_IMAGE024
Figure 302038DEST_PATH_IMAGE002
Figure 63507DEST_PATH_IMAGE003
Figure 155539DEST_PATH_IMAGE004
Figure 253945DEST_PATH_IMAGE025
Figure 997538DEST_PATH_IMAGE006
Figure 216030DEST_PATH_IMAGE025
Figure 75402DEST_PATH_IMAGE007
Figure 746554DEST_PATH_IMAGE024
Figure 218249DEST_PATH_IMAGE008
Figure 291248DEST_PATH_IMAGE025
Figure 321520DEST_PATH_IMAGE009
Figure 479969DEST_PATH_IMAGE024
, first M from binary system deciphering anti-counterfeiting information table 1Start, to each 32 the binary message M in binary system deciphering anti-counterfeiting information table iCarry out corresponding decrypt operation, solve the binary system anti-counterfeiting information
Figure 755355DEST_PATH_IMAGE001
, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, removes highly 24, recovers to generate the binary system anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.
The accompanying drawing explanation
Below in conjunction with accompanying drawing, the present invention is further described.
Fig. 1 is one-piece construction figure of the present invention.
Fig. 2 is A of the present invention-A cut-open view.
Fig. 3 loads the anti-counterfeiting information process flow diagram.
Fig. 4 extracts the anti-counterfeiting information process flow diagram.
Embodiment
In Fig. 1 and Fig. 2, encryption anti-counterfeiting information storage trade mark, by trade mark page paper 7-1, be printed on amplitude 6-1 on trade mark page paper 7-1 to 6-150, be printed on horizontal scanning line 1-1 on trade mark page paper 7-1 and form to 2-10 to 1-15, the column scan line 2-1 that is printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 consist of to 6-150 amplitude 6-1
According to storage binary add tight defense fake information, a part of amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper 7-1 is printed and is formed by dielectric ink, horizontal scanning line 1-1 on trade mark page paper 7-1 is printed and is formed by electrically conducting transparent printing ink to 2-10 to 1-15 and column scan line 2-1
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is printed and is formed by electrically conductive ink, and the light amplitude on trade mark page paper 7-1 is printed and formed by dielectric ink,
The amplitude be printed on trade mark page paper 7-1 is divided into 15 row 10 row on the trade mark paper, amplitude 6-1 neatly is matrix and arranges on trade mark page paper 7-1 to 6-150, allow i get 1 to 15, allow j get 1 to 10, j bar column scan line on trade mark page paper 7-1 is electrically connected to the basal surface of each amplitude of j on trade mark page paper 7-1 row, the upper surface of each amplitude that the i bar horizontal scanning line on trade mark page paper 7-1 is capable with i on trade mark page paper 7-1 is electrically connected to
In the time the binary add tight defense fake information of trade mark page stores need to being read, 15 horizontal scanning lines of the 1st horizontal scanning line to the on trade mark page paper 7-1 are set to high level successively,
When the 1st horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary add tight defense fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is from 10 column scan line outputs of the 1st column scan line to the, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 1 by electrically conductive ink, the 1st row on trade mark page paper 7-1 is printed and is formed amplitude output binary message 0 by dielectric ink, therefore the binary add tight defense fake information 1100001000 that the 1st row is read, can repeat above-mentioned readout to other row on trade mark page paper 7-1.
In loading anti-counterfeiting information process flow diagram 3, original anti-counterfeiting information (image, word) is through digitized processing, generate the scale-of-two anti-counterfeiting information table of 8 group, 8 one group of binary messages in scale-of-two anti-counterfeiting information table are expanded to 32 one group of binary messages, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, and 32 binary messages of i group in 32 one group scale-of-two anti-counterfeiting information table are denoted as
Figure 948439DEST_PATH_IMAGE001
, i is greater than 0 positive integer, 32 binary add tight defense fake informations of first from 32 one group scale-of-two anti-counterfeiting information table
Figure 149613DEST_PATH_IMAGE026
start, to each 32 the scale-of-two anti-counterfeiting information in 32 one group scale-of-two anti-counterfeiting information table carry out polynary cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that scale-of-two anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize the trademark anti-counterfeit printing, by non-obvious the extractible anti-counterfeiting information that embeds in the trade mark page, realize trademark anti-counterfeit.
In extracting anti-counterfeiting information process flow diagram 4, when extracting anti-counterfeiting information, at first gather the electric conductivity signal of trade mark page halftone dot image, through the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, the electric conductivity information of demodulation trade mark page amplitude, export the binary modulated signal of 32 group, the binary modulated signal of 32 one group to demodulation output carries out channel-decoding, generates scale-of-two deciphering anti-counterfeiting information table after channel-decoding.
By 32 binary message M in the scale-of-two deciphering anti-counterfeiting information table generated after decoding ithe initial value design of position control variable i be i=1, the initial value when initial value of setting encryption parameter is encryption, the initial value when initial value of setting encryption variables is encryption, the initial value design of binary operator control variable k is k=0, first M from the scale-of-two deciphering anti-counterfeiting information table generated 1start, to each 32 the binary message M in scale-of-two deciphering anti-counterfeiting information table ibe decrypted computing, solve the scale-of-two anti-counterfeiting information
Figure 608856DEST_PATH_IMAGE001
, generating high 24 is 0 32 one group scale-of-two anti-counterfeiting information table entirely, removes highly 24, recovers to generate the scale-of-two anti-counterfeiting information table of 8 group, recovers anti-counterfeiting signal and also exports anti-counterfeiting information.

Claims (1)

1. one kind generates the binary modulated signal by anti-counterfeiting information by cryptographic calculation and chnnel coding, and by the circulation modulation system of tabling look-up, anti-counterfeiting information is embedded in to the polynary encryption anti-counterfeiting information storage of the one-parameter variable alternation trade mark in full page, it is characterized in that:anti-counterfeiting information storage trade mark, by trade mark page paper, be printed on amplitude on trade mark page paper, be printed on the horizontal scanning line on trade mark page paper, the column scan line be printed on trade mark page paper forms, binary add tight defense fake information according to storage, a part of amplitude on trade mark page paper is printed and is formed by electrically conductive ink, another part amplitude on trade mark page paper is printed and is formed by dielectric ink, horizontal scanning line on trade mark page paper and column scan line are printed and are formed by electrically conducting transparent printing ink
In order to realize the encryption storage of trademark anti-counterfeit information, at first image false-proof information and character anti-counterfeiting information are carried out to digitized processing, utilize the binary system anti-counterfeiting information table of 8 one group of image false-proof information and character anti-counterfeiting Information generation, for preventing from ciphering process producing information spillover, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded to 32 one group of binary system anti-counterfeiting information, generating high 24 is 0 32 one group binary system anti-counterfeiting information table entirely, 32 binary system anti-counterfeiting information of i in 32 one group binary system anti-counterfeiting information table group are denoted as
Figure 523144DEST_PATH_IMAGE001
, 32 binary add tight defense fake informations of the group of the i in 32 one group binary add tight defense fake information table are denoted as to H ii is greater than 0 positive integer, the eight-digit binary number encryption parameter is denoted as C, the binary system positive integer that encryption parameter C is 0<=C<=256, the eight-digit binary number encryption variables is denoted as respectively q, j, d, e, f, g, h, r and p, the binary system positive integer that encryption variables q, j, d, e, f, g, h, r and p are 0 to 256, and the binary operator control variables is denoted as k, the binary system positive integer that binary operator control variables k is 0<=k<=7, operator
Figure 303646DEST_PATH_IMAGE004
Figure 180335DEST_PATH_IMAGE005
Figure 394465DEST_PATH_IMAGE007
Figure 157147DEST_PATH_IMAGE008
Figure 888343DEST_PATH_IMAGE009
Adopt+,-, *, four kinds of operators, during binary operator control variables k=0
Figure 944023DEST_PATH_IMAGE002
Figure 760670DEST_PATH_IMAGE003
Figure 61463DEST_PATH_IMAGE004
Figure 647165DEST_PATH_IMAGE005
Figure 139326DEST_PATH_IMAGE006
Figure 443269DEST_PATH_IMAGE007
Figure 282174DEST_PATH_IMAGE008
Figure 987962DEST_PATH_IMAGE009
Be defined as respectively-,+, * ,+, * ,-, * ,+, during binary operator control variables k=1
Figure 323128DEST_PATH_IMAGE002
Figure 255498DEST_PATH_IMAGE004
Figure 317257DEST_PATH_IMAGE005
Figure 213538DEST_PATH_IMAGE006
Figure 790275DEST_PATH_IMAGE007
Figure 149898DEST_PATH_IMAGE009
Be defined as respectively+, * ,+,+,-, * ,+, *, during binary operator control variables k=2
Figure 154763DEST_PATH_IMAGE002
Figure 651132DEST_PATH_IMAGE004
Figure 186019DEST_PATH_IMAGE005
Figure 361785DEST_PATH_IMAGE006
Figure 850798DEST_PATH_IMAGE007
Figure 137423DEST_PATH_IMAGE008
Be defined as respectively-, * ,+,+, * ,-,+,-, during binary operator control variables k=3
Figure 545587DEST_PATH_IMAGE002
Figure 20431DEST_PATH_IMAGE003
Figure 108101DEST_PATH_IMAGE006
Figure 70241DEST_PATH_IMAGE007
Figure 200133DEST_PATH_IMAGE008
Figure 564118DEST_PATH_IMAGE009
Be defined as respectively-, * ,+,-, * ,-,+, *, during binary operator control variables k=4
Figure 436445DEST_PATH_IMAGE003
Figure 370028DEST_PATH_IMAGE004
Figure 322941DEST_PATH_IMAGE005
Figure 182312DEST_PATH_IMAGE006
Figure 853465DEST_PATH_IMAGE007
Figure 590739DEST_PATH_IMAGE008
Figure 663737DEST_PATH_IMAGE009
Be defined as respectively+, * ,-, * ,+,-,+, *, during binary operator control variables k=5
Figure 694010DEST_PATH_IMAGE002
Figure 852459DEST_PATH_IMAGE003
Figure 127845DEST_PATH_IMAGE004
Figure 55350DEST_PATH_IMAGE005
Figure 256524DEST_PATH_IMAGE006
Figure 466051DEST_PATH_IMAGE007
Figure 778083DEST_PATH_IMAGE008
Figure 825674DEST_PATH_IMAGE009
Be defined as respectively * ,+, * ,-,+,+,-, *, during binary operator control variables k=6
Figure 197749DEST_PATH_IMAGE002
Figure 936260DEST_PATH_IMAGE004
Figure 838357DEST_PATH_IMAGE005
Figure 319017DEST_PATH_IMAGE006
Figure 673775DEST_PATH_IMAGE007
Figure 94654DEST_PATH_IMAGE008
Be defined as respectively * ,+,+,-, * ,+,+, *, during binary operator control variables k=7
Figure 565136DEST_PATH_IMAGE002
Figure 672769DEST_PATH_IMAGE003
Figure 631760DEST_PATH_IMAGE004
Figure 393228DEST_PATH_IMAGE006
Figure 722579DEST_PATH_IMAGE007
Figure 950877DEST_PATH_IMAGE009
Be defined as respectively+, *, * ,-,+,-,-, *, during binary operator control variables k=0, polynary cryptographic calculation is defined as H i=
Figure 272137DEST_PATH_IMAGE010
Figure 88783DEST_PATH_IMAGE002
Figure 389577DEST_PATH_IMAGE011
Figure 975279DEST_PATH_IMAGE003
Figure 467440DEST_PATH_IMAGE010
Figure 69585DEST_PATH_IMAGE004
Figure 672605DEST_PATH_IMAGE011
Figure 378392DEST_PATH_IMAGE005
Figure 775876DEST_PATH_IMAGE010
Figure 209710DEST_PATH_IMAGE011
Figure 770005DEST_PATH_IMAGE007
Figure 276072DEST_PATH_IMAGE010
Figure 451211DEST_PATH_IMAGE011
Figure 866012DEST_PATH_IMAGE009
Figure 372342DEST_PATH_IMAGE010
, during binary operator control variables k=1, polynary cryptographic calculation is defined as H i=
Figure 355528DEST_PATH_IMAGE002
Figure 890414DEST_PATH_IMAGE013
Figure 302066DEST_PATH_IMAGE003
Figure 289614DEST_PATH_IMAGE012
Figure 576239DEST_PATH_IMAGE004
Figure 965632DEST_PATH_IMAGE013
Figure 813764DEST_PATH_IMAGE005
Figure 113344DEST_PATH_IMAGE006
Figure 357244DEST_PATH_IMAGE013
Figure 65251DEST_PATH_IMAGE013
Figure 255186DEST_PATH_IMAGE009
Figure 704622DEST_PATH_IMAGE012
, during binary operator control variables k=2, polynary cryptographic calculation is defined as H i=
Figure 871161DEST_PATH_IMAGE014
Figure 450489DEST_PATH_IMAGE015
Figure 59325DEST_PATH_IMAGE003
Figure 295135DEST_PATH_IMAGE014
Figure 368133DEST_PATH_IMAGE004
Figure 398406DEST_PATH_IMAGE015
Figure 108918DEST_PATH_IMAGE005
Figure 617259DEST_PATH_IMAGE014
Figure 810343DEST_PATH_IMAGE006
Figure 512982DEST_PATH_IMAGE015
Figure 158727DEST_PATH_IMAGE007
Figure 470760DEST_PATH_IMAGE014
Figure 518350DEST_PATH_IMAGE008
Figure 391891DEST_PATH_IMAGE015
Figure 524932DEST_PATH_IMAGE009
, during binary operator control variables k=3, polynary cryptographic calculation is defined as H i=
Figure 542752DEST_PATH_IMAGE016
Figure 587194DEST_PATH_IMAGE002
Figure 4269DEST_PATH_IMAGE003
Figure 923683DEST_PATH_IMAGE016
Figure 617970DEST_PATH_IMAGE004
Figure 833313DEST_PATH_IMAGE017
Figure 940946DEST_PATH_IMAGE005
Figure 661405DEST_PATH_IMAGE017
Figure 990756DEST_PATH_IMAGE007
Figure 986393DEST_PATH_IMAGE016
Figure 717589DEST_PATH_IMAGE008
Figure 540314DEST_PATH_IMAGE017
Figure 91381DEST_PATH_IMAGE009
Figure 156289DEST_PATH_IMAGE016
, during binary operator control variables k=4, polynary cryptographic calculation is defined as H i=
Figure 2013100223927100001DEST_PATH_IMAGE018
Figure 818956DEST_PATH_IMAGE002
Figure 2013100223927100001DEST_PATH_IMAGE019
Figure 45538DEST_PATH_IMAGE003
Figure 952500DEST_PATH_IMAGE004
Figure 956491DEST_PATH_IMAGE019
Figure 619553DEST_PATH_IMAGE005
Figure 53388DEST_PATH_IMAGE006
Figure 613682DEST_PATH_IMAGE019
Figure 182067DEST_PATH_IMAGE007
Figure 460601DEST_PATH_IMAGE018
Figure 906888DEST_PATH_IMAGE008
Figure 321689DEST_PATH_IMAGE019
Figure 60975DEST_PATH_IMAGE009
Figure 561227DEST_PATH_IMAGE018
, during binary operator control variables k=5, polynary cryptographic calculation is defined as H i=
Figure 2013100223927100001DEST_PATH_IMAGE020
Figure 811205DEST_PATH_IMAGE002
Figure 2013100223927100001DEST_PATH_IMAGE021
Figure 142829DEST_PATH_IMAGE003
Figure 318595DEST_PATH_IMAGE020
Figure 94233DEST_PATH_IMAGE021
Figure 483626DEST_PATH_IMAGE005
Figure 603339DEST_PATH_IMAGE006
Figure 693655DEST_PATH_IMAGE021
Figure 937555DEST_PATH_IMAGE007
Figure 223853DEST_PATH_IMAGE021
Figure 322259DEST_PATH_IMAGE009
Figure 10729DEST_PATH_IMAGE020
, during binary operator control variables k=6, polynary cryptographic calculation is defined as H i=
Figure 2013100223927100001DEST_PATH_IMAGE022
Figure 758367DEST_PATH_IMAGE002
Figure 2013100223927100001DEST_PATH_IMAGE023
Figure 190486DEST_PATH_IMAGE003
Figure 408977DEST_PATH_IMAGE022
Figure 769814DEST_PATH_IMAGE004
Figure 440967DEST_PATH_IMAGE023
Figure 411197DEST_PATH_IMAGE005
Figure 484195DEST_PATH_IMAGE022
Figure 15933DEST_PATH_IMAGE006
Figure 174382DEST_PATH_IMAGE023
Figure 10619DEST_PATH_IMAGE007
Figure 705168DEST_PATH_IMAGE022
Figure 906342DEST_PATH_IMAGE008
Figure 286508DEST_PATH_IMAGE023
Figure 864120DEST_PATH_IMAGE009
Figure 413175DEST_PATH_IMAGE022
, during binary operator control variables k=7, polynary cryptographic calculation is defined as H i=
Figure 785251DEST_PATH_IMAGE024
Figure 652713DEST_PATH_IMAGE002
Figure 156986DEST_PATH_IMAGE025
Figure 723862DEST_PATH_IMAGE004
Figure 440014DEST_PATH_IMAGE025
Figure 399880DEST_PATH_IMAGE005
Figure 113758DEST_PATH_IMAGE024
Figure 457277DEST_PATH_IMAGE006
Figure 791492DEST_PATH_IMAGE007
Figure 676271DEST_PATH_IMAGE024
Figure 499499DEST_PATH_IMAGE009
Figure 555180DEST_PATH_IMAGE024
, the initial value of setting encryption parameter C, the initial value of setting encryption variables q, j, d, e, f, g, h, r and p, the initial value of setting binary operator control variables k is k=0, sets 32 binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 873291DEST_PATH_IMAGE001
Position Control variable i=1, set 32 binary add tight defense fake information H in 32 one group binary add tight defense fake information table iPosition Control variable i=1, right
Figure 938199DEST_PATH_IMAGE026
Carry out H 1=
Figure 750483DEST_PATH_IMAGE002
Figure 992108DEST_PATH_IMAGE011
Figure 96593DEST_PATH_IMAGE003
Figure 536802DEST_PATH_IMAGE027
Figure 199864DEST_PATH_IMAGE004
Figure 725523DEST_PATH_IMAGE011
Figure 633699DEST_PATH_IMAGE005
Figure 762378DEST_PATH_IMAGE006
Figure 775333DEST_PATH_IMAGE011
Figure 221620DEST_PATH_IMAGE007
Figure 641286DEST_PATH_IMAGE008
Figure 379797DEST_PATH_IMAGE009
Polynary cryptographic calculation (wherein k=0), generate first binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 1, right Carry out H 1=
Figure 750101DEST_PATH_IMAGE027
Figure 8672DEST_PATH_IMAGE003
Figure 573832DEST_PATH_IMAGE004
Figure 319196DEST_PATH_IMAGE011
Figure 836765DEST_PATH_IMAGE005
Figure 161753DEST_PATH_IMAGE006
Figure 715674DEST_PATH_IMAGE007
Figure 899530DEST_PATH_IMAGE027
Figure 51605DEST_PATH_IMAGE011
Figure 519813DEST_PATH_IMAGE027
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing in the time of polynary cryptographic calculation, make next polynary cryptographic calculation point to H 2=
Figure 552360DEST_PATH_IMAGE028
Figure 126823DEST_PATH_IMAGE002
Figure 157096DEST_PATH_IMAGE013
Figure 315544DEST_PATH_IMAGE003
Figure 89465DEST_PATH_IMAGE028
Figure 954653DEST_PATH_IMAGE004
Figure 657292DEST_PATH_IMAGE013
Figure 303037DEST_PATH_IMAGE005
Figure 113527DEST_PATH_IMAGE006
Figure 485602DEST_PATH_IMAGE013
Figure 120108DEST_PATH_IMAGE007
Figure 298149DEST_PATH_IMAGE028
Figure 200246DEST_PATH_IMAGE008
Figure 244687DEST_PATH_IMAGE013
Figure 865025DEST_PATH_IMAGE009
(wherein k=1), generate second binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 2, right
Figure 275463DEST_PATH_IMAGE029
Carry out H 2=
Figure 192604DEST_PATH_IMAGE028
Figure 993649DEST_PATH_IMAGE013
Figure 870338DEST_PATH_IMAGE003
Figure 755117DEST_PATH_IMAGE028
Figure 585932DEST_PATH_IMAGE004
Figure 847149DEST_PATH_IMAGE013
Figure 578345DEST_PATH_IMAGE005
Figure 634026DEST_PATH_IMAGE028
Figure 952137DEST_PATH_IMAGE006
Figure 751466DEST_PATH_IMAGE013
Figure 337168DEST_PATH_IMAGE007
Figure 767012DEST_PATH_IMAGE028
Figure 70954DEST_PATH_IMAGE008
Figure 677964DEST_PATH_IMAGE009
Figure 75448DEST_PATH_IMAGE028
Carry out i+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing in the time of polynary cryptographic calculation, make next polynary cryptographic calculation point to H 3=
Figure 509282DEST_PATH_IMAGE002
Figure 69577DEST_PATH_IMAGE015
Figure 903540DEST_PATH_IMAGE003
Figure 406242DEST_PATH_IMAGE030
Figure 765865DEST_PATH_IMAGE015
Figure 708413DEST_PATH_IMAGE005
Figure 193063DEST_PATH_IMAGE006
Figure 727950DEST_PATH_IMAGE015
Figure 903716DEST_PATH_IMAGE007
Figure 891264DEST_PATH_IMAGE030
Figure 865484DEST_PATH_IMAGE015
Figure 212152DEST_PATH_IMAGE009
Figure 624679DEST_PATH_IMAGE030
(wherein k=2), generate the 3rd binary add tight defense fake information H in the binary add tight defense fake information table of 32 group 3, this polynary cryptographic calculation goes on always until 32 binary system anti-counterfeiting information of last in binary system anti-counterfeiting information table, by each 32 the binary system anti-counterfeiting information in 32 one group binary system anti-counterfeiting information table
Figure 216460DEST_PATH_IMAGE001
carry out polynary cryptographic calculation, generate and 32 one group 32 the one group binary add tight defense fake information table that binary system anti-counterfeiting information table is corresponding, amplitude in label printing is carried out to digitized processing, amplitude is set to two kinds, wherein by dielectric ink, print the amplitude formed and be defined as numeral 0, print by electrically conductive ink the amplitude formed and be defined as numeral 1, in the label printing process, utilize the binary add tight defense fake information of 32 group generated by the printing process of the amplitude on the circulation look-up table modulation trade mark page, by selecting dielectric ink and electrically conductive ink to print amplitude, the regular electric conductivity according to above-mentioned two kinds of amplitudes of amplitude on the trade mark page is changed, on the rear trade mark page of modulation, adjacent 32 amplitudes form one group of 32 binary message, make on the trade mark page and carry anti-counterfeiting information by the variation of amplitude electric conductivity, and this anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN201310022392.7A 2013-01-22 2013-01-22 One-parameter variation transmutation multivariable anti-fake information storage trademark Expired - Fee Related CN103106437B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310022392.7A CN103106437B (en) 2013-01-22 2013-01-22 One-parameter variation transmutation multivariable anti-fake information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310022392.7A CN103106437B (en) 2013-01-22 2013-01-22 One-parameter variation transmutation multivariable anti-fake information storage trademark

Publications (2)

Publication Number Publication Date
CN103106437A true CN103106437A (en) 2013-05-15
CN103106437B CN103106437B (en) 2015-08-19

Family

ID=48314283

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310022392.7A Expired - Fee Related CN103106437B (en) 2013-01-22 2013-01-22 One-parameter variation transmutation multivariable anti-fake information storage trademark

Country Status (1)

Country Link
CN (1) CN103106437B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100060942A1 (en) * 2008-09-10 2010-03-11 Xerox Corporation Encoding message data in a cover contone image via halftone dot orientation
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100060942A1 (en) * 2008-09-10 2010-03-11 Xerox Corporation Encoding message data in a cover contone image via halftone dot orientation
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal
CN102402696A (en) * 2011-04-25 2012-04-04 北京印刷学院 Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘连浩: "基于身份的十进制加密技术研究", 《计算机工程与应用》 *
姚旭罡等: "一种多重加密的算法及其实现方案", 《通信技术》 *

Also Published As

Publication number Publication date
CN103106437B (en) 2015-08-19

Similar Documents

Publication Publication Date Title
CN103106427A (en) Single parameter multiple-encryption anti-counterfeiting information storage trademark
CN103116800A (en) Multi-parameter univariable gradient multivariate encryption anti-fake information storage trademark
CN103106430A (en) One-parameter double-variant multi-variant encryption anti-fake information storage brand
CN103106437A (en) Single parameter variable transmutation polytomized variable anti-counterfeiting information storage trademark
CN103106471A (en) Single parameter variable transmutation ternary encryption anti-counterfeiting information storage trademark
CN103106467A (en) Single parameter variable transmutation binary circulation encryption anti-counterfeiting information storage trademark
CN103106466A (en) Single parameter variable transmutation binary variable circulation encryption anti-counterfeiting information storage trademark
CN103106463A (en) Single parameter variable transmutation polytomized variable circulation encryption anti-counterfeiting information storage trademark
CN103106491A (en) Single parameter variable transmutation ternary encryption anti-counterfeiting information storage trademark
CN103106468A (en) Parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106487A (en) Single parameter variable transmutation unitary circulation encryption anti-counterfeiting information storage trademark
CN103106525A (en) Multiparameter multielement encryption anti-fake information storage trademark
CN103106501A (en) Multiparameter transmutation multivariable multielement encryption anti-fake information storage trademark
CN103106489A (en) Single parameter ternary encryption anti-counterfeiting information storage trademark
CN103106464A (en) Single parameter variable transmutation ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103106456A (en) Single parameter polymtized variable circulation encryption anti-counterfeiting information storage trademark
CN103106444A (en) Single variable parameter transmutation ternary encryption anti-fake information storage trademark
CN103106504A (en) Single variable parameter transmutation binary encryption anti-fake information storage trademark
CN103136566A (en) Parametric variable gradient polynary encryption anti-fake information storage trademark
CN103123693A (en) One-parameter binary-encryption anti-counterfeiting information storage trademark
CN103116779A (en) One-parameter variation transmutation multivariable circulation encryption anti-fake information storage trademark
CN103106445A (en) Single parameter multivariable binary encryption anti-counterfeiting information storage trademark
CN103106469A (en) Single parameter multivariable unitary encryption anti-counterfeiting information storage trademark
CN103106526A (en) Multiparameter multivariable ternary cycle encryption anti-fake information storage trademark
CN103116783A (en) Parameter transmutation binary variable circulation encryption anti-fake information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150819

Termination date: 20160122

EXPY Termination of patent right or utility model