CN103106438A - Parameter-gradient multivariable multi-encryption anti-fake information storage trademark - Google Patents

Parameter-gradient multivariable multi-encryption anti-fake information storage trademark Download PDF

Info

Publication number
CN103106438A
CN103106438A CN2013100223946A CN201310022394A CN103106438A CN 103106438 A CN103106438 A CN 103106438A CN 2013100223946 A CN2013100223946 A CN 2013100223946A CN 201310022394 A CN201310022394 A CN 201310022394A CN 103106438 A CN103106438 A CN 103106438A
Authority
CN
China
Prior art keywords
binary
binary system
group
trade mark
counterfeiting information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013100223946A
Other languages
Chinese (zh)
Other versions
CN103106438B (en
Inventor
王明飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN201310022394.6A priority Critical patent/CN103106438B/en
Publication of CN103106438A publication Critical patent/CN103106438A/en
Application granted granted Critical
Publication of CN103106438B publication Critical patent/CN103106438B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Printing Methods (AREA)

Abstract

Provided is a parameter-gradient multivariable multi-encryption anti-fake information storage trademark. According to the trademark, a binary system modulating signal can be generated from binary system anti-fake information through multi-encryption and channel coding, the anti-fake information is embedded in a whole trademark page through orderly changes of amplitude modulation website conductive performance in a circulating look-up table modulation mode, the anti-fake information can be identified from any fragment in trademark identification, and the trademark can be used for achieving anti-fake purposes of various trademarks.

Description

Parameter-gradient multivariable multi-encryption anti-fake information storage trademark
Art:
The present invention relates to a kind of anti-false trademark, particularly a kind of Parameter-gradient multivariable multi-encryption anti-fake information storage trademark, binary system encryption anti-fake information can be stored on the trade mark page and realize the false proof of trade mark by the trade mark, the trade mark can be used for extensive stock it is false proof in.
Background technology:
Anti-false trademark, also known as antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, are a kind of proof labels discerned the false from the genuine, prevent personation, are mark true and false, that distinguish marketing quality quality of the people for distinguishing merchandise resources during commodity circulation.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and the interests of client.The trade mark of China is audaciously innovated; employ laser anti-counterfeit, core micropore are false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but false proof is high-tech trial of strength with struggle that is faking; advanced anti-counterfeiting technology has certain ageing again; so; trade mark anti-fake technique must constantly be lifted; could be false proof with being maintained the leading position forever in faking, this is also the basic assurance for protecting the interests of businessman and client to maintain commodity circulation safety.
The content of the invention:
In order to improve the reliability and security of trademark anti-counterfeit, the present invention is improved existing trade mark anti-fake technique for the deficiency that existing trademark anti-counterfeit is present, propose a kind of anti-counterfeiting information storage trade mark, the trade mark passes through the change to amplitude electric conductivity in brand printing, encryption anti-fake information is embedded on the whole trade mark page in binary system coded signal form, encryption anti-fake information can be recognized in any one fragment in brand recognition, therefore with very strong disguised and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information stores trade mark, is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, the image and word on trade mark page paper are made up of amplitude,
According to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, and the horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
The horizontal scanning line being printed on trade mark page paper has N bars, the column scan line being printed on trade mark page paper has M bars, the amplitude being printed on trade mark page paper is divided into N rows M row on trade mark paper, amplitude is neat arranged in arrays on trade mark page paper paper, i is allowed to take 1 to arrive N, j is allowed to take 1 to arrive M, j-th strip column scan line on trade mark page paper is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper, i-th horizontal scanning line on trade mark page paper is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper
When the binary message for needing to store the trade mark page is read, the 1st article on trade mark page paper is set to high level successively to the N articles horizontal scanning line,
When the 1st article of horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported with 0,1 code form from the 1st bar of column scan line to the M bars column scan line, the amplitude that the 1st row on trade mark page paper is printed by electrically conductive ink exports binary message 1, the amplitude that the 1st row on trade mark page paper is printed by dielectric ink exports binary message 0, above-mentioned readout is repeated to other rows on trade mark page paper
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 2013100223946100002DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as respectively
Figure 2013100223946100002DEST_PATH_IMAGE002
Figure 2013100223946100002DEST_PATH_IMAGE003
Figure 2013100223946100002DEST_PATH_IMAGE005
Figure 2013100223946100002DEST_PATH_IMAGE006
Figure 2013100223946100002DEST_PATH_IMAGE008
With
Figure 2013100223946100002DEST_PATH_IMAGE009
Encryption parameter is 0 to 256 binary system positive integer, eight-digit binary number encryption variables are denoted as q, j, d, e, f, g, h and r respectively, encryption variables q, j, d, e, f, g, h and r are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 2013100223946100002DEST_PATH_IMAGE010
Figure 2013100223946100002DEST_PATH_IMAGE011
Figure 2013100223946100002DEST_PATH_IMAGE012
Figure 2013100223946100002DEST_PATH_IMAGE013
Figure 2013100223946100002DEST_PATH_IMAGE014
Figure 2013100223946100002DEST_PATH_IMAGE015
Figure 2013100223946100002DEST_PATH_IMAGE016
Figure 2013100223946100002DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 39334DEST_PATH_IMAGE010
Figure 894157DEST_PATH_IMAGE011
Figure 696525DEST_PATH_IMAGE014
Figure 456671DEST_PATH_IMAGE015
Figure 536753DEST_PATH_IMAGE016
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 18912DEST_PATH_IMAGE010
Figure 949959DEST_PATH_IMAGE011
Figure 891239DEST_PATH_IMAGE012
Figure 565934DEST_PATH_IMAGE013
Figure 332213DEST_PATH_IMAGE015
Figure 511521DEST_PATH_IMAGE016
Figure 475060DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 56215DEST_PATH_IMAGE010
Figure 578332DEST_PATH_IMAGE011
Figure 244936DEST_PATH_IMAGE012
Figure 12166DEST_PATH_IMAGE013
Figure 447827DEST_PATH_IMAGE014
Figure 344108DEST_PATH_IMAGE015
Figure 920845DEST_PATH_IMAGE016
Figure 990301DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 280468DEST_PATH_IMAGE010
Figure 911431DEST_PATH_IMAGE011
Figure 287049DEST_PATH_IMAGE012
Figure 894617DEST_PATH_IMAGE013
Figure 304870DEST_PATH_IMAGE014
Figure 106735DEST_PATH_IMAGE015
Figure 969648DEST_PATH_IMAGE016
Figure 380907DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 380087DEST_PATH_IMAGE010
Figure 352853DEST_PATH_IMAGE011
Figure 703063DEST_PATH_IMAGE012
Figure 855696DEST_PATH_IMAGE013
Figure 737413DEST_PATH_IMAGE014
Figure 864769DEST_PATH_IMAGE015
Figure 951542DEST_PATH_IMAGE016
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 445420DEST_PATH_IMAGE010
Figure 743677DEST_PATH_IMAGE011
Figure 625232DEST_PATH_IMAGE013
Figure 141926DEST_PATH_IMAGE014
Figure 125931DEST_PATH_IMAGE015
Figure 672450DEST_PATH_IMAGE016
Figure 534358DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 482722DEST_PATH_IMAGE010
Figure 575312DEST_PATH_IMAGE011
Figure 9147DEST_PATH_IMAGE013
Figure 61285DEST_PATH_IMAGE014
Figure 137826DEST_PATH_IMAGE015
Figure 409669DEST_PATH_IMAGE016
Figure 597068DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 769293DEST_PATH_IMAGE010
Figure 16734DEST_PATH_IMAGE011
Figure 953914DEST_PATH_IMAGE013
Figure 357476DEST_PATH_IMAGE014
Figure 931908DEST_PATH_IMAGE016
Figure 726688DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, polynary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 545609DEST_PATH_IMAGE010
Figure 885585DEST_PATH_IMAGE002
Figure 868585DEST_PATH_IMAGE011
Figure 450745DEST_PATH_IMAGE018
Figure 105345DEST_PATH_IMAGE013
Figure 241929DEST_PATH_IMAGE018
Figure 333644DEST_PATH_IMAGE014
Figure 530270DEST_PATH_IMAGE002
Figure 471550DEST_PATH_IMAGE015
Figure 834660DEST_PATH_IMAGE018
Figure 295729DEST_PATH_IMAGE016
Figure 912524DEST_PATH_IMAGE002
Figure 55371DEST_PATH_IMAGE018
, polynary cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 2013100223946100002DEST_PATH_IMAGE019
Figure 823476DEST_PATH_IMAGE010
Figure 96326DEST_PATH_IMAGE003
Figure 513663DEST_PATH_IMAGE011
Figure 530160DEST_PATH_IMAGE019
Figure 152771DEST_PATH_IMAGE012
Figure 347255DEST_PATH_IMAGE003
Figure 501155DEST_PATH_IMAGE013
Figure 570611DEST_PATH_IMAGE019
Figure 860779DEST_PATH_IMAGE014
Figure 503461DEST_PATH_IMAGE003
Figure 879079DEST_PATH_IMAGE015
Figure 486646DEST_PATH_IMAGE019
Figure 296099DEST_PATH_IMAGE017
Figure 707357DEST_PATH_IMAGE019
, polynary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 2013100223946100002DEST_PATH_IMAGE020
Figure 598215DEST_PATH_IMAGE010
Figure 69517DEST_PATH_IMAGE004
Figure 419727DEST_PATH_IMAGE011
Figure 870562DEST_PATH_IMAGE020
Figure 989828DEST_PATH_IMAGE012
Figure 632030DEST_PATH_IMAGE004
Figure 469536DEST_PATH_IMAGE013
Figure 884785DEST_PATH_IMAGE014
Figure 448622DEST_PATH_IMAGE004
Figure 524156DEST_PATH_IMAGE015
Figure 566062DEST_PATH_IMAGE020
Figure 643925DEST_PATH_IMAGE004
Figure 941176DEST_PATH_IMAGE017
Figure 52352DEST_PATH_IMAGE020
, polynary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 2013100223946100002DEST_PATH_IMAGE021
Figure 781722DEST_PATH_IMAGE005
Figure 803818DEST_PATH_IMAGE011
Figure 187526DEST_PATH_IMAGE021
Figure 6709DEST_PATH_IMAGE012
Figure 83249DEST_PATH_IMAGE005
Figure 853628DEST_PATH_IMAGE013
Figure 41027DEST_PATH_IMAGE021
Figure 652399DEST_PATH_IMAGE014
Figure 157515DEST_PATH_IMAGE015
Figure 899338DEST_PATH_IMAGE021
Figure 574535DEST_PATH_IMAGE017
, polynary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 2013100223946100002DEST_PATH_IMAGE022
Figure 938969DEST_PATH_IMAGE010
Figure 199628DEST_PATH_IMAGE011
Figure 781788DEST_PATH_IMAGE022
Figure 268264DEST_PATH_IMAGE012
Figure 44721DEST_PATH_IMAGE006
Figure 249438DEST_PATH_IMAGE013
Figure 369709DEST_PATH_IMAGE022
Figure 976271DEST_PATH_IMAGE014
Figure 923630DEST_PATH_IMAGE006
Figure 537014DEST_PATH_IMAGE015
Figure 802756DEST_PATH_IMAGE006
Figure 231332DEST_PATH_IMAGE017
Figure 709718DEST_PATH_IMAGE022
, polynary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 713708DEST_PATH_IMAGE010
Figure 590845DEST_PATH_IMAGE011
Figure 872922DEST_PATH_IMAGE023
Figure 557850DEST_PATH_IMAGE012
Figure 1601DEST_PATH_IMAGE007
Figure 726423DEST_PATH_IMAGE023
Figure 265857DEST_PATH_IMAGE014
Figure 6860DEST_PATH_IMAGE015
Figure 630739DEST_PATH_IMAGE023
Figure 24680DEST_PATH_IMAGE016
Figure 75813DEST_PATH_IMAGE007
Figure 689459DEST_PATH_IMAGE017
Figure 851450DEST_PATH_IMAGE023
, polynary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 2013100223946100002DEST_PATH_IMAGE024
Figure 991575DEST_PATH_IMAGE010
Figure 547508DEST_PATH_IMAGE011
Figure 130499DEST_PATH_IMAGE024
Figure 499032DEST_PATH_IMAGE012
Figure 891968DEST_PATH_IMAGE008
Figure 480206DEST_PATH_IMAGE013
Figure 984000DEST_PATH_IMAGE024
Figure 207040DEST_PATH_IMAGE014
Figure 770876DEST_PATH_IMAGE008
Figure 580831DEST_PATH_IMAGE015
Figure 654595DEST_PATH_IMAGE008
Figure 201114DEST_PATH_IMAGE017
Figure 295978DEST_PATH_IMAGE024
, polynary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 932758DEST_PATH_IMAGE010
Figure 838397DEST_PATH_IMAGE009
Figure 59162DEST_PATH_IMAGE011
Figure 470901DEST_PATH_IMAGE025
Figure 539351DEST_PATH_IMAGE012
Figure 865159DEST_PATH_IMAGE009
Figure 120691DEST_PATH_IMAGE013
Figure 324401DEST_PATH_IMAGE025
Figure 434309DEST_PATH_IMAGE014
Figure 681750DEST_PATH_IMAGE009
Figure 175311DEST_PATH_IMAGE015
Figure 166401DEST_PATH_IMAGE025
Figure 193131DEST_PATH_IMAGE016
Figure 795593DEST_PATH_IMAGE017
, set encryption parameter
Figure 471611DEST_PATH_IMAGE002
Figure 811588DEST_PATH_IMAGE003
Figure 529008DEST_PATH_IMAGE004
Figure 111168DEST_PATH_IMAGE005
Figure 551639DEST_PATH_IMAGE006
Figure 311785DEST_PATH_IMAGE007
Figure 765769DEST_PATH_IMAGE008
With
Figure 902352DEST_PATH_IMAGE009
Initial value, setting encryption variables q, j, d, e, f, g, h and r initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 259646DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 2013100223946100002DEST_PATH_IMAGE026
Carry out H1=
Figure 2013100223946100002DEST_PATH_IMAGE027
Figure 244221DEST_PATH_IMAGE010
Figure 936233DEST_PATH_IMAGE002
Figure 275259DEST_PATH_IMAGE027
Figure 377207DEST_PATH_IMAGE012
Figure 743466DEST_PATH_IMAGE002
Figure 972585DEST_PATH_IMAGE013
Figure 475110DEST_PATH_IMAGE027
Figure 13539DEST_PATH_IMAGE014
Figure 165297DEST_PATH_IMAGE002
Figure 181237DEST_PATH_IMAGE027
Figure 139834DEST_PATH_IMAGE016
Figure 28156DEST_PATH_IMAGE002
Figure 112260DEST_PATH_IMAGE017
Figure 402427DEST_PATH_IMAGE027
Polynary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 469609DEST_PATH_IMAGE026
Carry out H1=
Figure 595959DEST_PATH_IMAGE027
Figure 282156DEST_PATH_IMAGE010
Figure 613780DEST_PATH_IMAGE002
Figure 278559DEST_PATH_IMAGE027
Figure 627501DEST_PATH_IMAGE012
Figure 892260DEST_PATH_IMAGE002
Figure 599447DEST_PATH_IMAGE013
Figure 11974DEST_PATH_IMAGE027
Figure 972288DEST_PATH_IMAGE002
Figure 365223DEST_PATH_IMAGE015
Figure 124100DEST_PATH_IMAGE027
Figure 316309DEST_PATH_IMAGE016
Figure 742612DEST_PATH_IMAGE002
Figure 42368DEST_PATH_IMAGE027
I+1, k+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1 and r+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H2=
Figure 2013100223946100002DEST_PATH_IMAGE028
Figure 228148DEST_PATH_IMAGE010
Figure 478629DEST_PATH_IMAGE028
Figure 324225DEST_PATH_IMAGE012
Figure 35041DEST_PATH_IMAGE003
Figure 940680DEST_PATH_IMAGE013
Figure 686099DEST_PATH_IMAGE014
Figure 177386DEST_PATH_IMAGE003
Figure 253926DEST_PATH_IMAGE015
Figure 24305DEST_PATH_IMAGE028
Figure 477283DEST_PATH_IMAGE016
Figure 885393DEST_PATH_IMAGE003
Figure 132835DEST_PATH_IMAGE017
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 2013100223946100002DEST_PATH_IMAGE029
Carry out H2=
Figure 70015DEST_PATH_IMAGE028
Figure 847478DEST_PATH_IMAGE010
Figure 515088DEST_PATH_IMAGE003
Figure 10792DEST_PATH_IMAGE011
Figure 228409DEST_PATH_IMAGE028
Figure 109646DEST_PATH_IMAGE012
Figure 964470DEST_PATH_IMAGE003
Figure 432622DEST_PATH_IMAGE013
Figure 765515DEST_PATH_IMAGE028
Figure 766838DEST_PATH_IMAGE014
Figure 482432DEST_PATH_IMAGE015
Figure 619015DEST_PATH_IMAGE028
Figure 474845DEST_PATH_IMAGE016
Figure 405892DEST_PATH_IMAGE003
Figure 511613DEST_PATH_IMAGE028
I+1, k+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1 and r+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H3=
Figure 159632DEST_PATH_IMAGE010
Figure 277892DEST_PATH_IMAGE004
Figure 457200DEST_PATH_IMAGE011
Figure 919274DEST_PATH_IMAGE030
Figure 188844DEST_PATH_IMAGE012
Figure 461693DEST_PATH_IMAGE004
Figure 377566DEST_PATH_IMAGE013
Figure 394063DEST_PATH_IMAGE030
Figure 580456DEST_PATH_IMAGE014
Figure 247564DEST_PATH_IMAGE030
Figure 288463DEST_PATH_IMAGE016
Figure 168695DEST_PATH_IMAGE004
Figure 793580DEST_PATH_IMAGE017
Figure 151880DEST_PATH_IMAGE030
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this polynary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 312865DEST_PATH_IMAGE001
Carry out polynary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, valid certificates can be provided for true trade mark, there is stronger anti-forgery ability simultaneously.
To solve above-mentioned technical problem, processing is digitized to image false-proof information and character anti-counterfeiting information first, the binary system anti-counterfeiting information table of 8 one group of generation, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, polynary cryptographic calculation is carried out to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables, the binary system encryption anti-fake information table of 32 one group of generation, pass through channel coding using 32 binary system encryption anti-fake informations in binary system encryption anti-fake information table, 32 one group of binary modulated signal of the generation with error detecting and error correcting function, channel coding can use loop coding, convolutional encoding or Turbo coding diversified forms, picture signal is adjusted to be handled by rasterizing trade mark page original continuous(RIP)Halftoning hybrid screening picture signal is exported with hybrid screening, including amplitude and FM screened image signal, the electric conductivity of amplitude in hybrid screening picture signal is modulated using circulation look-up table modulation system using 32 one group of binary modulated signals of generation, make the electric conductivity of amplitude according to dielectric ink amplitude and electrically conductive ink amplitude is regular changes, adjacent 32 amplitudes in hybrid screening picture signal are made to carry 32 binary system anti-counterfeiting information by the change of electric conductivity, so as to generate the hybrid screening picture signal of the embedded anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, trade mark page site electric conductivity signal is gathered first, by the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding, decrypts i-th group of 32 binary message in anti-counterfeiting information table by binary system and is denoted as Mi
Binary system is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, set encryption parameter
Figure 638170DEST_PATH_IMAGE004
Figure 388083DEST_PATH_IMAGE005
Figure 672433DEST_PATH_IMAGE006
Figure 22643DEST_PATH_IMAGE007
Figure 237593DEST_PATH_IMAGE008
With
Figure 356859DEST_PATH_IMAGE009
Initial value for encryption when initial value, initial value when setting encryption variables q, j, d, e, f, g, h and r initial value as encryption, it is k=0 that binary operator, which controls variable k initial value design, by polynary ciphering process, and it is M that binary operator, which controls decryption computing during variable k=0,i=
Figure 234947DEST_PATH_IMAGE018
Figure 72453DEST_PATH_IMAGE010
Figure 825514DEST_PATH_IMAGE002
Figure 64866DEST_PATH_IMAGE011
Figure 637327DEST_PATH_IMAGE012
Figure 944812DEST_PATH_IMAGE002
Figure 258561DEST_PATH_IMAGE018
Figure 54347DEST_PATH_IMAGE014
Figure 165523DEST_PATH_IMAGE002
Figure 864619DEST_PATH_IMAGE015
Figure 770259DEST_PATH_IMAGE018
Figure 53341DEST_PATH_IMAGE016
Figure 256232DEST_PATH_IMAGE017
Figure 332772DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=1,i=
Figure 103151DEST_PATH_IMAGE019
Figure 290550DEST_PATH_IMAGE010
Figure 964239DEST_PATH_IMAGE003
Figure 211681DEST_PATH_IMAGE011
Figure 148861DEST_PATH_IMAGE012
Figure 926324DEST_PATH_IMAGE003
Figure 406984DEST_PATH_IMAGE013
Figure 886375DEST_PATH_IMAGE019
Figure 681156DEST_PATH_IMAGE014
Figure 63858DEST_PATH_IMAGE003
Figure 840053DEST_PATH_IMAGE015
Figure 1214DEST_PATH_IMAGE019
Figure 334107DEST_PATH_IMAGE016
Figure 69850DEST_PATH_IMAGE003
Figure 95575DEST_PATH_IMAGE017
Figure 51024DEST_PATH_IMAGE019
, it is M that binary operator, which controls decryption computing during variable k=2,i=
Figure 36801DEST_PATH_IMAGE004
Figure 417229DEST_PATH_IMAGE011
Figure 91923DEST_PATH_IMAGE020
Figure 802259DEST_PATH_IMAGE012
Figure 232104DEST_PATH_IMAGE004
Figure 145833DEST_PATH_IMAGE013
Figure 374951DEST_PATH_IMAGE020
Figure 956105DEST_PATH_IMAGE014
Figure 478222DEST_PATH_IMAGE004
Figure 144827DEST_PATH_IMAGE015
Figure 912057DEST_PATH_IMAGE020
Figure 534668DEST_PATH_IMAGE016
Figure 978419DEST_PATH_IMAGE004
Figure 883052DEST_PATH_IMAGE017
Figure 703241DEST_PATH_IMAGE020
, it is M that binary operator, which controls decryption computing during variable k=3,i=
Figure 242675DEST_PATH_IMAGE021
Figure 122907DEST_PATH_IMAGE010
Figure 249257DEST_PATH_IMAGE005
Figure 607557DEST_PATH_IMAGE011
Figure 204760DEST_PATH_IMAGE021
Figure 388548DEST_PATH_IMAGE014
Figure 189593DEST_PATH_IMAGE015
Figure 558126DEST_PATH_IMAGE021
Figure 951061DEST_PATH_IMAGE016
Figure 414666DEST_PATH_IMAGE005
Figure 918459DEST_PATH_IMAGE017
, it is M that binary operator, which controls decryption computing during variable k=4,i=
Figure 206801DEST_PATH_IMAGE022
Figure 822776DEST_PATH_IMAGE006
Figure 667366DEST_PATH_IMAGE011
Figure 589054DEST_PATH_IMAGE022
Figure 135573DEST_PATH_IMAGE012
Figure 997481DEST_PATH_IMAGE006
Figure 945846DEST_PATH_IMAGE013
Figure 206691DEST_PATH_IMAGE006
Figure 524409DEST_PATH_IMAGE015
Figure 663266DEST_PATH_IMAGE022
Figure 923391DEST_PATH_IMAGE016
Figure 861522DEST_PATH_IMAGE006
Figure 784479DEST_PATH_IMAGE017
Figure 281188DEST_PATH_IMAGE022
, it is M that binary operator, which controls decryption computing during variable k=5,i=
Figure 31418DEST_PATH_IMAGE010
Figure 808881DEST_PATH_IMAGE007
Figure 476491DEST_PATH_IMAGE011
Figure 706616DEST_PATH_IMAGE023
Figure 252129DEST_PATH_IMAGE012
Figure 884098DEST_PATH_IMAGE007
Figure 722610DEST_PATH_IMAGE013
Figure 705610DEST_PATH_IMAGE023
Figure 275711DEST_PATH_IMAGE007
Figure 550703DEST_PATH_IMAGE015
Figure 755419DEST_PATH_IMAGE023
Figure 377156DEST_PATH_IMAGE016
Figure 983718DEST_PATH_IMAGE007
Figure 429611DEST_PATH_IMAGE017
Figure 856045DEST_PATH_IMAGE023
, it is M that binary operator, which controls decryption computing during variable k=6,i=
Figure 547051DEST_PATH_IMAGE024
Figure 8120DEST_PATH_IMAGE010
Figure 923117DEST_PATH_IMAGE008
Figure 830079DEST_PATH_IMAGE024
Figure 908105DEST_PATH_IMAGE012
Figure 633484DEST_PATH_IMAGE008
Figure 34510DEST_PATH_IMAGE013
Figure 129636DEST_PATH_IMAGE024
Figure 316029DEST_PATH_IMAGE014
Figure 759780DEST_PATH_IMAGE008
Figure 162948DEST_PATH_IMAGE015
Figure 983137DEST_PATH_IMAGE024
Figure 24036DEST_PATH_IMAGE016
Figure 638688DEST_PATH_IMAGE008
Figure 263573DEST_PATH_IMAGE017
Figure 887453DEST_PATH_IMAGE024
, it is M that binary operator, which controls decryption computing during variable k=7,i=
Figure 782859DEST_PATH_IMAGE025
Figure 108164DEST_PATH_IMAGE011
Figure 532640DEST_PATH_IMAGE012
Figure 617271DEST_PATH_IMAGE009
Figure 333685DEST_PATH_IMAGE013
Figure 95154DEST_PATH_IMAGE014
Figure 932660DEST_PATH_IMAGE009
Figure 187186DEST_PATH_IMAGE015
Figure 160958DEST_PATH_IMAGE025
Figure 974062DEST_PATH_IMAGE016
Figure 79783DEST_PATH_IMAGE017
Figure 173641DEST_PATH_IMAGE025
, first M from binary system decryption anti-counterfeiting information table1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiCorresponding decryption computing is carried out, binary system anti-counterfeiting information is solved, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 is the overall structure figure of the present invention.
Fig. 2 is A-A sectional views of the present invention.
Fig. 3 loads anti-counterfeiting information flow chart.
Fig. 4 extracts anti-counterfeiting information flow chart.
Embodiment
As in Fig. 1 and Fig. 2, anti-fake information storage trademark, it is made up of trade mark page paper 7-1, amplitude 6-1 to the 6-150 being printed on trade mark page paper 7-1, horizontal scanning line 1-1 to the 1-15 being printed on trade mark page paper 7-1, column scan line 2-1 to the 2-10 being printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 are made up of amplitude 6-1 to 6-150
According to storage binary system encryption anti-fake information, a part of amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, another part amplitude on trade mark page paper 7-1 is formed by dielectric ink printing, horizontal scanning line 1-1 to 1-15 and column scan line 2-1 to 2-10 on trade mark page paper 7-1 are formed by the printing of electrically conducting transparent ink
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, and the light amplitude on trade mark page paper 7-1 is formed by dielectric ink printing,
The amplitude being printed on trade mark page paper 7-1 is divided into 15 rows 10 on trade mark paper and arranged, amplitude 6-1 to 6-150 is neat arranged in arrays on trade mark page paper 7-1, i is allowed to take 1 to 15, j is allowed to take 1 to 10, j-th strip column scan line on trade mark page paper 7-1 is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper 7-1, i-th horizontal scanning line on trade mark page paper 7-1 is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper 7-1
When the binary system encryption anti-fake information for needing to store the trade mark page is read, the 1st article of horizontal scanning line on trade mark page paper 7-1 is set to high level successively to the 15th article of horizontal scanning line,
When the 1st article of horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary system encryption anti-fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is exported from the 1st bar of column scan line to the 10th bar of column scan line, the 1st row on trade mark page paper 7-1 exports binary message 1 by electrically conductive ink printing into amplitude, the 1st row on trade mark page paper 7-1 exports binary message 0 by dielectric ink printing into amplitude, therefore the binary system encryption anti-fake information 1100001000 that the 1st row is read, above-mentioned readout is repeated to other rows on trade mark page paper 7-1.
In loading anti-counterfeiting information flow chart 3, original anti-counterfeiting information(Image, word)It is digitized into processing, the binary system anti-counterfeiting information table of 8 one group of generation, 8 one group of binary messages in binary system anti-counterfeiting information table are expanded into 32 one group of binary messages, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary message in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 704166DEST_PATH_IMAGE001
, i is the positive integer more than 0, from first 32 binary system encryption anti-fake information in 32 one group of binary system anti-counterfeiting information tables
Figure 300494DEST_PATH_IMAGE026
Start, to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 248859DEST_PATH_IMAGE001
Carry out polynary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize that trademark anti-counterfeit prints, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, realize trademark anti-counterfeit.
In anti-counterfeiting information flow chart 4 is extracted, when extracting anti-counterfeiting information, the electric conductivity signal of trade mark page halftone dot image is gathered first, by the electric conductivity identification to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding.
The binary system generated after decoding is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting the initial value of encryption parameter as encryption, initial value when setting the initial value of encryption variables as encryption, it is k=0 that binary operator, which controls variable k initial value design, first M from the binary system decryption anti-counterfeiting information table of generation1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiComputing is decrypted, binary system anti-counterfeiting information is solved
Figure 216815DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.

Claims (1)

1. a kind of generate binary modulated signal by anti-counterfeiting information by cryptographic calculation and channel coding, and by circulating the Parameter-gradient multivariable multi-encryption anti-fake information storage trademark that anti-counterfeiting information is embedded in full page by tabling look-up modulation mode,It is characterized in that:Anti-counterfeiting information stores trade mark, it is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, according to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and eight-digit binary number encryption parameter is denoted as respectively
Figure 2013100223946100001DEST_PATH_IMAGE002
Figure 2013100223946100001DEST_PATH_IMAGE005
Figure 2013100223946100001DEST_PATH_IMAGE006
Figure 2013100223946100001DEST_PATH_IMAGE007
Figure 2013100223946100001DEST_PATH_IMAGE008
With
Figure 2013100223946100001DEST_PATH_IMAGE009
Encryption parameter is 0 to 256 binary system positive integer, eight-digit binary number encryption variables are denoted as q, j, d, e, f, g, h and r respectively, encryption variables q, j, d, e, f, g, h and r are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 2013100223946100001DEST_PATH_IMAGE010
Figure 2013100223946100001DEST_PATH_IMAGE011
Figure 2013100223946100001DEST_PATH_IMAGE012
Figure 2013100223946100001DEST_PATH_IMAGE013
Figure 2013100223946100001DEST_PATH_IMAGE014
Figure 2013100223946100001DEST_PATH_IMAGE016
Figure 2013100223946100001DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 650418DEST_PATH_IMAGE010
Figure 973394DEST_PATH_IMAGE012
Figure 306286DEST_PATH_IMAGE013
Figure 245292DEST_PATH_IMAGE014
Figure 756170DEST_PATH_IMAGE015
Figure 960887DEST_PATH_IMAGE016
Figure 346737DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 953299DEST_PATH_IMAGE010
Figure 635079DEST_PATH_IMAGE011
Figure 327091DEST_PATH_IMAGE012
Figure 251054DEST_PATH_IMAGE013
Figure 400537DEST_PATH_IMAGE014
Figure 196641DEST_PATH_IMAGE016
Figure 409448DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 741334DEST_PATH_IMAGE010
Figure 138817DEST_PATH_IMAGE011
Figure 544436DEST_PATH_IMAGE012
Figure 560933DEST_PATH_IMAGE013
Figure 245861DEST_PATH_IMAGE014
Figure 955191DEST_PATH_IMAGE015
Figure 594245DEST_PATH_IMAGE016
Figure 414434DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 953869DEST_PATH_IMAGE010
Figure 834100DEST_PATH_IMAGE011
Figure 505701DEST_PATH_IMAGE013
Figure 915954DEST_PATH_IMAGE014
Figure 717819DEST_PATH_IMAGE015
Figure 991991DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 991171DEST_PATH_IMAGE010
Figure 963937DEST_PATH_IMAGE011
Figure 529097DEST_PATH_IMAGE013
Figure 274461DEST_PATH_IMAGE014
Figure 651085DEST_PATH_IMAGE015
Figure 488591DEST_PATH_IMAGE016
Figure 743117DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 529993DEST_PATH_IMAGE011
Figure 854795DEST_PATH_IMAGE012
Figure 913012DEST_PATH_IMAGE013
Figure 784450DEST_PATH_IMAGE016
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 93257DEST_PATH_IMAGE010
Figure 783444DEST_PATH_IMAGE012
Figure 422553DEST_PATH_IMAGE014
Figure 249825DEST_PATH_IMAGE015
Figure 207603DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 130560DEST_PATH_IMAGE010
Figure 128734DEST_PATH_IMAGE011
Figure 137141DEST_PATH_IMAGE012
Figure 261720DEST_PATH_IMAGE015
Figure 741112DEST_PATH_IMAGE016
Figure 535892DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, polynary cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 677789DEST_PATH_IMAGE011
Figure 761414DEST_PATH_IMAGE018
Figure 247890DEST_PATH_IMAGE012
Figure 460565DEST_PATH_IMAGE002
Figure 416014DEST_PATH_IMAGE013
Figure 142848DEST_PATH_IMAGE014
Figure 339474DEST_PATH_IMAGE002
Figure 770500DEST_PATH_IMAGE015
Figure 320561DEST_PATH_IMAGE018
Figure 532362DEST_PATH_IMAGE016
Figure 899889DEST_PATH_IMAGE002
Figure 62886DEST_PATH_IMAGE017
, polynary cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 2013100223946100001DEST_PATH_IMAGE019
Figure 997792DEST_PATH_IMAGE010
Figure 270642DEST_PATH_IMAGE003
Figure 687979DEST_PATH_IMAGE011
Figure 704477DEST_PATH_IMAGE019
Figure 389405DEST_PATH_IMAGE012
Figure 833156DEST_PATH_IMAGE003
Figure 737789DEST_PATH_IMAGE013
Figure 557977DEST_PATH_IMAGE019
Figure 97412DEST_PATH_IMAGE014
Figure 977643DEST_PATH_IMAGE003
Figure 41676DEST_PATH_IMAGE015
Figure 649244DEST_PATH_IMAGE019
Figure 59497DEST_PATH_IMAGE016
Figure 595783DEST_PATH_IMAGE003
Figure 458696DEST_PATH_IMAGE017
Figure 869955DEST_PATH_IMAGE019
, polynary cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 2013100223946100001DEST_PATH_IMAGE020
Figure 56883DEST_PATH_IMAGE004
Figure 656360DEST_PATH_IMAGE011
Figure 226461DEST_PATH_IMAGE012
Figure 619396DEST_PATH_IMAGE004
Figure 706170DEST_PATH_IMAGE013
Figure 209963DEST_PATH_IMAGE020
Figure 934468DEST_PATH_IMAGE014
Figure 498304DEST_PATH_IMAGE004
Figure 72374DEST_PATH_IMAGE015
Figure 114280DEST_PATH_IMAGE020
Figure 958870DEST_PATH_IMAGE016
Figure 693608DEST_PATH_IMAGE004
Figure 489394DEST_PATH_IMAGE017
Figure 600570DEST_PATH_IMAGE020
, polynary cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 2013100223946100001DEST_PATH_IMAGE021
Figure 237350DEST_PATH_IMAGE010
Figure 392256DEST_PATH_IMAGE005
Figure 426071DEST_PATH_IMAGE011
Figure 628962DEST_PATH_IMAGE012
Figure 954770DEST_PATH_IMAGE005
Figure 475881DEST_PATH_IMAGE013
Figure 414012DEST_PATH_IMAGE021
Figure 336969DEST_PATH_IMAGE014
Figure 842086DEST_PATH_IMAGE015
Figure 583908DEST_PATH_IMAGE021
Figure 28982DEST_PATH_IMAGE005
Figure 259106DEST_PATH_IMAGE017
Figure 116203DEST_PATH_IMAGE021
, polynary cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 2013100223946100001DEST_PATH_IMAGE022
Figure 424870DEST_PATH_IMAGE010
Figure 263382DEST_PATH_IMAGE006
Figure 246381DEST_PATH_IMAGE011
Figure 80738DEST_PATH_IMAGE022
Figure 567214DEST_PATH_IMAGE012
Figure 468305DEST_PATH_IMAGE006
Figure 735339DEST_PATH_IMAGE013
Figure 606343DEST_PATH_IMAGE022
Figure 462172DEST_PATH_IMAGE014
Figure 658798DEST_PATH_IMAGE006
Figure 835964DEST_PATH_IMAGE015
Figure 486574DEST_PATH_IMAGE016
Figure 588522DEST_PATH_IMAGE006
Figure 518563DEST_PATH_IMAGE017
Figure 996949DEST_PATH_IMAGE022
, polynary cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 2013100223946100001DEST_PATH_IMAGE023
Figure 788636DEST_PATH_IMAGE007
Figure 721006DEST_PATH_IMAGE023
Figure 156666DEST_PATH_IMAGE012
Figure 351149DEST_PATH_IMAGE007
Figure 505050DEST_PATH_IMAGE013
Figure 574506DEST_PATH_IMAGE023
Figure 864673DEST_PATH_IMAGE014
Figure 241777DEST_PATH_IMAGE007
Figure 617394DEST_PATH_IMAGE015
Figure 490541DEST_PATH_IMAGE023
Figure 437080DEST_PATH_IMAGE007
Figure 299994DEST_PATH_IMAGE017
Figure 711252DEST_PATH_IMAGE023
, polynary cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 2013100223946100001DEST_PATH_IMAGE024
Figure 664427DEST_PATH_IMAGE010
Figure 220359DEST_PATH_IMAGE011
Figure 186041DEST_PATH_IMAGE024
Figure 56039DEST_PATH_IMAGE012
Figure 635925DEST_PATH_IMAGE008
Figure 473431DEST_PATH_IMAGE013
Figure 39542DEST_PATH_IMAGE024
Figure 764046DEST_PATH_IMAGE014
Figure 327883DEST_PATH_IMAGE008
Figure 943858DEST_PATH_IMAGE024
Figure 788448DEST_PATH_IMAGE016
Figure 523186DEST_PATH_IMAGE008
Figure 318973DEST_PATH_IMAGE017
, polynary cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure DEST_PATH_IMAGE025
Figure 801349DEST_PATH_IMAGE010
Figure 956256DEST_PATH_IMAGE009
Figure 390090DEST_PATH_IMAGE025
Figure 722031DEST_PATH_IMAGE009
Figure 716577DEST_PATH_IMAGE013
Figure 169555DEST_PATH_IMAGE025
Figure 651538DEST_PATH_IMAGE009
Figure 394366DEST_PATH_IMAGE015
Figure 136188DEST_PATH_IMAGE025
Figure 913651DEST_PATH_IMAGE016
Figure 581262DEST_PATH_IMAGE009
Figure 76965DEST_PATH_IMAGE017
Figure 356899DEST_PATH_IMAGE025
, set encryption parameter
Figure 254448DEST_PATH_IMAGE002
Figure 92960DEST_PATH_IMAGE003
Figure 894005DEST_PATH_IMAGE005
Figure 646060DEST_PATH_IMAGE006
Figure 655474DEST_PATH_IMAGE007
Figure 860190DEST_PATH_IMAGE008
With
Figure 747506DEST_PATH_IMAGE009
Initial value, setting encryption variables q, j, d, e, f, g, h and r initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 354068DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 2013100223946100001DEST_PATH_IMAGE026
Carry out H1=
Figure DEST_PATH_IMAGE027
Figure 160481DEST_PATH_IMAGE010
Figure 852493DEST_PATH_IMAGE002
Figure 42035DEST_PATH_IMAGE011
Figure 503103DEST_PATH_IMAGE027
Figure 597409DEST_PATH_IMAGE002
Figure 75795DEST_PATH_IMAGE013
Figure 640638DEST_PATH_IMAGE027
Figure 179066DEST_PATH_IMAGE014
Figure 268507DEST_PATH_IMAGE002
Figure 612901DEST_PATH_IMAGE015
Figure 32250DEST_PATH_IMAGE027
Figure 741580DEST_PATH_IMAGE016
Figure 392353DEST_PATH_IMAGE002
Figure 212541DEST_PATH_IMAGE017
Figure 751976DEST_PATH_IMAGE027
Polynary cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 632207DEST_PATH_IMAGE026
Carry out H1=
Figure 758557DEST_PATH_IMAGE027
Figure 776378DEST_PATH_IMAGE002
Figure 827510DEST_PATH_IMAGE011
Figure 441156DEST_PATH_IMAGE027
Figure 603148DEST_PATH_IMAGE012
Figure 117174DEST_PATH_IMAGE002
Figure 73629DEST_PATH_IMAGE013
Figure 174571DEST_PATH_IMAGE027
Figure 140253DEST_PATH_IMAGE014
Figure 508787DEST_PATH_IMAGE002
Figure 901722DEST_PATH_IMAGE015
Figure 224381DEST_PATH_IMAGE027
Figure 842947DEST_PATH_IMAGE017
Figure 902170DEST_PATH_IMAGE027
I+1, k+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1 and r+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H2=
Figure 2013100223946100001DEST_PATH_IMAGE028
Figure 898070DEST_PATH_IMAGE010
Figure 241196DEST_PATH_IMAGE003
Figure 975933DEST_PATH_IMAGE011
Figure 273185DEST_PATH_IMAGE028
Figure 118781DEST_PATH_IMAGE012
Figure 222052DEST_PATH_IMAGE013
Figure 655887DEST_PATH_IMAGE014
Figure 708025DEST_PATH_IMAGE003
Figure 336629DEST_PATH_IMAGE015
Figure 920057DEST_PATH_IMAGE028
Figure 373035DEST_PATH_IMAGE016
Figure 781145DEST_PATH_IMAGE003
Figure 28587DEST_PATH_IMAGE017
Figure 286261DEST_PATH_IMAGE028
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure DEST_PATH_IMAGE029
Carry out H2=
Figure 965767DEST_PATH_IMAGE028
Figure 743230DEST_PATH_IMAGE010
Figure 410840DEST_PATH_IMAGE003
Figure 906544DEST_PATH_IMAGE011
Figure 186478DEST_PATH_IMAGE028
Figure 5398DEST_PATH_IMAGE012
Figure 328374DEST_PATH_IMAGE013
Figure 662589DEST_PATH_IMAGE014
Figure 422735DEST_PATH_IMAGE003
Figure 689768DEST_PATH_IMAGE015
Figure 577084DEST_PATH_IMAGE028
Figure 183646DEST_PATH_IMAGE016
Figure 55973DEST_PATH_IMAGE017
I+1, k+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1 and r+1 computing are carried out while polynary cryptographic calculation, next polynary cryptographic calculation is pointed to H3=
Figure 129419DEST_PATH_IMAGE010
Figure 496947DEST_PATH_IMAGE004
Figure 438706DEST_PATH_IMAGE011
Figure 651513DEST_PATH_IMAGE030
Figure 481935DEST_PATH_IMAGE012
Figure 754784DEST_PATH_IMAGE004
Figure 172121DEST_PATH_IMAGE013
Figure 188619DEST_PATH_IMAGE030
Figure 873547DEST_PATH_IMAGE014
Figure 582877DEST_PATH_IMAGE004
Figure 221931DEST_PATH_IMAGE015
Figure 42120DEST_PATH_IMAGE030
Figure 581554DEST_PATH_IMAGE016
Figure 588136DEST_PATH_IMAGE017
Figure 946436DEST_PATH_IMAGE030
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this polynary cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 419005DEST_PATH_IMAGE001
Carry out polynary cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN201310022394.6A 2013-01-22 2013-01-22 Parameter-gradient multivariable multi-encryption anti-fake information storage trademark Expired - Fee Related CN103106438B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310022394.6A CN103106438B (en) 2013-01-22 2013-01-22 Parameter-gradient multivariable multi-encryption anti-fake information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310022394.6A CN103106438B (en) 2013-01-22 2013-01-22 Parameter-gradient multivariable multi-encryption anti-fake information storage trademark

Publications (2)

Publication Number Publication Date
CN103106438A true CN103106438A (en) 2013-05-15
CN103106438B CN103106438B (en) 2015-10-28

Family

ID=48314284

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310022394.6A Expired - Fee Related CN103106438B (en) 2013-01-22 2013-01-22 Parameter-gradient multivariable multi-encryption anti-fake information storage trademark

Country Status (1)

Country Link
CN (1) CN103106438B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5425103A (en) * 1994-03-14 1995-06-13 Shaw; William Y. Variable-key cryptography system
CN1928916A (en) * 2006-08-21 2007-03-14 顾泽苍 Printing medium certificate documents and false proof handling method of copy thereof
CN101699845A (en) * 2009-10-20 2010-04-28 北京印刷学院 Encryption counterfeit printing technology of frequency modulated halftone dot space position for pseudo random signal modulation printed matter
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5425103A (en) * 1994-03-14 1995-06-13 Shaw; William Y. Variable-key cryptography system
CN1928916A (en) * 2006-08-21 2007-03-14 顾泽苍 Printing medium certificate documents and false proof handling method of copy thereof
CN101699845A (en) * 2009-10-20 2010-04-28 北京印刷学院 Encryption counterfeit printing technology of frequency modulated halftone dot space position for pseudo random signal modulation printed matter
CN102184428A (en) * 2011-04-14 2011-09-14 北京印刷学院 Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal

Also Published As

Publication number Publication date
CN103106438B (en) 2015-10-28

Similar Documents

Publication Publication Date Title
CN103106442A (en) Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106460A (en) Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark
CN103106513A (en) Multi-parameter univariate poly encryption anti-fake information storage trademark
CN103106438A (en) Parameter-gradient multivariable multi-encryption anti-fake information storage trademark
CN103106512A (en) Multiparameter multivariable ternary encryption anti-fake information storage trademark
CN103106439A (en) Multiparameter multivariable binary encryption anti-fake information storage trademark
CN103106449A (en) Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103116796A (en) One-parameter variation transmutation unary encryption anti-fake information storage trademark
CN103106441A (en) Multi-variable-parameter gradient multi-variant encryption anti-fake information storage brand
CN103106450A (en) Single parameter multivariable unitary circulation encryption anti-counterfeiting information storage trademark
CN103106451A (en) Multi-variable-parameter gradient ternary-variant circulating encryption anti-fake information storage brand
CN103116797A (en) Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark
CN103106447A (en) Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark
CN103106517A (en) Parameter transmutation ternary encryption anti-fake information storage trademark
CN103106457A (en) Single parameter ternary circulation encryption anti-counterfeiting information storage trademark
CN103106440A (en) Multi-parameter unitary encryption anti-fake information storage brand
CN103116790A (en) Parameter transmutation binary encryption anti-fake information storage trademark
CN103106459A (en) Multiparameter transmutation multivariable cycle multielement encryption anti-fake information storage trademark
CN103106448A (en) Single variable parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103116788A (en) Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark
CN103106503A (en) Multivariate multi-parameter gradient polynary encryption anti-fake information storage trademark
CN103106429A (en) Single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark
CN103106519A (en) Multi-parametric-variable double-layer gradient polynary encryption anti-fake information storage trademark
CN103106518A (en) Parameter transmutation one-element encryption anti-fake information storage trademark
CN103136567A (en) One-parameter variable gradient binary encryption anti-fake information storage brand

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20151028

Termination date: 20160122

EXPY Termination of patent right or utility model