CN103106449A - Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark - Google Patents

Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark Download PDF

Info

Publication number
CN103106449A
CN103106449A CN2013100231815A CN201310023181A CN103106449A CN 103106449 A CN103106449 A CN 103106449A CN 2013100231815 A CN2013100231815 A CN 2013100231815A CN 201310023181 A CN201310023181 A CN 201310023181A CN 103106449 A CN103106449 A CN 103106449A
Authority
CN
China
Prior art keywords
binary system
binary
counterfeiting information
group
trade mark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013100231815A
Other languages
Chinese (zh)
Other versions
CN103106449B (en
Inventor
王明飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN201310023181.5A priority Critical patent/CN103106449B/en
Publication of CN103106449A publication Critical patent/CN103106449A/en
Application granted granted Critical
Publication of CN103106449B publication Critical patent/CN103106449B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Printing Methods (AREA)

Abstract

A single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark can enable binary anti-counterfeiting information to be generated into binary modulation signals through ternary variable circulation encryption and channel coding, and enable the anti-counterfeiting information to be embedded into a whole trademark page through ordered changing of conductivity of amplitude modulation dots. The anti-counterfeiting information can be identified from any fragment during trademark identification, and the single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark can be applied to all kinds of anti-counterfeiting trademarks.

Description

Single parameter multivariable ternary variable circulation anti-fake information storage trademark
Art:
The present invention relates to a kind of anti-false trademark, particularly a kind of single parameter multivariable ternary variable circulation anti-fake information storage trademark, binary system encryption anti-fake information can be stored on the trade mark page and realize the false proof of trade mark by the trade mark, the trade mark can be used for extensive stock it is false proof in.
Background technology:
Anti-false trademark, also known as antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, are a kind of proof labels discerned the false from the genuine, prevent personation, are mark true and false, that distinguish marketing quality quality of the people for distinguishing merchandise resources during commodity circulation.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and the interests of client.The trade mark of China is audaciously innovated; employ laser anti-counterfeit, core micropore are false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but false proof is high-tech trial of strength with struggle that is faking; advanced anti-counterfeiting technology has certain ageing again; so; trade mark anti-fake technique must constantly be lifted; could be false proof with being maintained the leading position forever in faking, this is also the basic assurance for protecting the interests of businessman and client to maintain commodity circulation safety.
The content of the invention:
In order to improve the reliability and security of trademark anti-counterfeit, the present invention is improved existing trade mark anti-fake technique for the deficiency that existing trademark anti-counterfeit is present, propose a kind of anti-counterfeiting information storage trade mark, the trade mark passes through the change to amplitude electric conductivity in brand printing, encryption anti-fake information is embedded on the whole trade mark page in binary system coded signal form, encryption anti-fake information can be recognized in any one fragment in brand recognition, therefore with very strong disguised and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information stores trade mark, is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, the image and word on trade mark page paper are made up of amplitude,
According to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, and the horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
The horizontal scanning line being printed on trade mark page paper has N bars, the column scan line being printed on trade mark page paper has M bars, the amplitude being printed on trade mark page paper is divided into N rows M row on trade mark paper, amplitude is neat arranged in arrays on trade mark page paper paper, i is allowed to take 1 to arrive N, j is allowed to take 1 to arrive M, j-th strip column scan line on trade mark page paper is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper, i-th horizontal scanning line on trade mark page paper is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper
When the binary message for needing to store the trade mark page is read, the 1st article on trade mark page paper is set to high level successively to the N articles horizontal scanning line,
When the 1st article of horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported with 0,1 code form from the 1st bar of column scan line to the M bars column scan line, the amplitude that the 1st row on trade mark page paper is printed by electrically conductive ink exports binary message 1, the amplitude that the 1st row on trade mark page paper is printed by dielectric ink exports binary message 0, above-mentioned readout is repeated to other rows on trade mark page paper
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as HiI is the positive integer more than 0, binary system encryption parameter is denoted as C, encryption parameter C is the binary system positive integer of 0≤C≤256, binary system encryption variables are denoted as q, j, d, e, f, g, h, r and p respectively, and encryption variables q, j, d, e, f, g, h, r and p are 0 to 256 binary system positive integer, and binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 819358DEST_PATH_IMAGE002
Figure 412145DEST_PATH_IMAGE003
Figure 869671DEST_PATH_IMAGE004
Figure 494163DEST_PATH_IMAGE005
Figure 378942DEST_PATH_IMAGE006
Figure 459025DEST_PATH_IMAGE007
Figure 657925DEST_PATH_IMAGE008
Figure 389121DEST_PATH_IMAGE009
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 195534DEST_PATH_IMAGE002
Figure 562241DEST_PATH_IMAGE004
Figure 147943DEST_PATH_IMAGE005
Figure 467802DEST_PATH_IMAGE006
Figure 522477DEST_PATH_IMAGE007
Figure 859918DEST_PATH_IMAGE008
Figure 316438DEST_PATH_IMAGE009
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 713921DEST_PATH_IMAGE002
Figure 255892DEST_PATH_IMAGE003
Figure 397023DEST_PATH_IMAGE004
Figure 705121DEST_PATH_IMAGE005
Figure 539084DEST_PATH_IMAGE006
Figure 302772DEST_PATH_IMAGE007
Figure 247594DEST_PATH_IMAGE008
Figure 413128DEST_PATH_IMAGE009
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 417993DEST_PATH_IMAGE002
Figure 89594DEST_PATH_IMAGE004
Figure 624480DEST_PATH_IMAGE005
Figure 541456DEST_PATH_IMAGE007
Figure 578814DEST_PATH_IMAGE008
Figure 702627DEST_PATH_IMAGE009
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 800027DEST_PATH_IMAGE002
Figure 274871DEST_PATH_IMAGE003
Figure 115919DEST_PATH_IMAGE004
Figure 359819DEST_PATH_IMAGE005
Figure 359611DEST_PATH_IMAGE006
Figure 321751DEST_PATH_IMAGE007
Figure 700911DEST_PATH_IMAGE008
Figure 64896DEST_PATH_IMAGE009
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 238520DEST_PATH_IMAGE002
Figure 687956DEST_PATH_IMAGE003
Figure 870806DEST_PATH_IMAGE004
Figure 823719DEST_PATH_IMAGE005
Figure 425034DEST_PATH_IMAGE006
Figure 909236DEST_PATH_IMAGE007
Figure 145045DEST_PATH_IMAGE008
Figure 968776DEST_PATH_IMAGE009
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 999049DEST_PATH_IMAGE002
Figure 908230DEST_PATH_IMAGE003
Figure 682151DEST_PATH_IMAGE004
Figure 558633DEST_PATH_IMAGE006
Figure 142061DEST_PATH_IMAGE007
Figure 204826DEST_PATH_IMAGE008
Figure 252416DEST_PATH_IMAGE009
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 375224DEST_PATH_IMAGE002
Figure 508265DEST_PATH_IMAGE003
Figure 374721DEST_PATH_IMAGE004
Figure 276818DEST_PATH_IMAGE005
Figure 573457DEST_PATH_IMAGE006
Figure 928215DEST_PATH_IMAGE007
Figure 598362DEST_PATH_IMAGE008
Figure 354965DEST_PATH_IMAGE009
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 927209DEST_PATH_IMAGE003
Figure 135468DEST_PATH_IMAGE004
Figure 644739DEST_PATH_IMAGE006
Figure 986039DEST_PATH_IMAGE008
Figure 451655DEST_PATH_IMAGE009
Be respectively defined as+, ×, × ,-,+,-,-, ×, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 523647DEST_PATH_IMAGE010
Figure 340294DEST_PATH_IMAGE002
Figure 476057DEST_PATH_IMAGE003
Figure 733599DEST_PATH_IMAGE012
Figure 771962DEST_PATH_IMAGE004
Figure 125714DEST_PATH_IMAGE013
Figure 831502DEST_PATH_IMAGE005
Figure 770956DEST_PATH_IMAGE006
Figure 662820DEST_PATH_IMAGE015
Figure 223114DEST_PATH_IMAGE007
Figure 539302DEST_PATH_IMAGE016
Figure 755519DEST_PATH_IMAGE008
Figure 700342DEST_PATH_IMAGE017
Figure 865875DEST_PATH_IMAGE009
Figure 870740DEST_PATH_IMAGE018
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 604658DEST_PATH_IMAGE002
Figure 616443DEST_PATH_IMAGE003
Figure DEST_PATH_IMAGE019
Figure 417040DEST_PATH_IMAGE004
Figure 190458DEST_PATH_IMAGE020
Figure DEST_PATH_IMAGE021
Figure 50890DEST_PATH_IMAGE007
Figure 294790DEST_PATH_IMAGE016
Figure 750042DEST_PATH_IMAGE008
Figure 462914DEST_PATH_IMAGE017
Figure 940480DEST_PATH_IMAGE018
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 628950DEST_PATH_IMAGE011
Figure 829119DEST_PATH_IMAGE002
Figure 995658DEST_PATH_IMAGE019
Figure 815464DEST_PATH_IMAGE014
Figure 237350DEST_PATH_IMAGE004
Figure 473159DEST_PATH_IMAGE013
Figure 483840DEST_PATH_IMAGE005
Figure 327162DEST_PATH_IMAGE021
Figure 236344DEST_PATH_IMAGE006
Figure 744685DEST_PATH_IMAGE015
Figure 685572DEST_PATH_IMAGE007
Figure 886746DEST_PATH_IMAGE022
Figure 283224DEST_PATH_IMAGE008
Figure 595256DEST_PATH_IMAGE017
Figure 393579DEST_PATH_IMAGE009
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 765152DEST_PATH_IMAGE002
Figure 420911DEST_PATH_IMAGE019
Figure 963888DEST_PATH_IMAGE003
Figure 69378DEST_PATH_IMAGE013
Figure 988792DEST_PATH_IMAGE004
Figure 496128DEST_PATH_IMAGE021
Figure 147689DEST_PATH_IMAGE005
Figure 255323DEST_PATH_IMAGE020
Figure 463581DEST_PATH_IMAGE006
Figure 74691DEST_PATH_IMAGE022
Figure 972853DEST_PATH_IMAGE007
Figure 990618DEST_PATH_IMAGE016
Figure 986256DEST_PATH_IMAGE008
Figure DEST_PATH_IMAGE023
Figure 682388DEST_PATH_IMAGE018
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 984188DEST_PATH_IMAGE011
Figure 986779DEST_PATH_IMAGE002
Figure 549796DEST_PATH_IMAGE003
Figure 853738DEST_PATH_IMAGE013
Figure 207490DEST_PATH_IMAGE004
Figure 647699DEST_PATH_IMAGE020
Figure 584223DEST_PATH_IMAGE022
Figure 741666DEST_PATH_IMAGE006
Figure 899612DEST_PATH_IMAGE023
Figure 595167DEST_PATH_IMAGE008
Figure 9968DEST_PATH_IMAGE017
Figure 491197DEST_PATH_IMAGE009
Figure 991448DEST_PATH_IMAGE024
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 553011DEST_PATH_IMAGE002
Figure 748817DEST_PATH_IMAGE003
Figure 773722DEST_PATH_IMAGE004
Figure 910917DEST_PATH_IMAGE020
Figure 257585DEST_PATH_IMAGE005
Figure 307898DEST_PATH_IMAGE006
Figure 820099DEST_PATH_IMAGE007
Figure 719922DEST_PATH_IMAGE016
Figure 99082DEST_PATH_IMAGE008
Figure 197488DEST_PATH_IMAGE024
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 6327DEST_PATH_IMAGE011
Figure 224819DEST_PATH_IMAGE002
Figure DEST_PATH_IMAGE027
Figure 897240DEST_PATH_IMAGE003
Figure 289355DEST_PATH_IMAGE004
Figure 626270DEST_PATH_IMAGE020
Figure 656542DEST_PATH_IMAGE005
Figure 565724DEST_PATH_IMAGE015
Figure 152694DEST_PATH_IMAGE006
Figure 345778DEST_PATH_IMAGE016
Figure 484635DEST_PATH_IMAGE007
Figure 615533DEST_PATH_IMAGE024
Figure 988538DEST_PATH_IMAGE017
Figure 360614DEST_PATH_IMAGE009
Figure 978808DEST_PATH_IMAGE025
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 94532DEST_PATH_IMAGE027
Figure 747361DEST_PATH_IMAGE002
Figure 290338DEST_PATH_IMAGE019
Figure 661408DEST_PATH_IMAGE003
Figure 315243DEST_PATH_IMAGE010
Figure 91088DEST_PATH_IMAGE004
Figure 804966DEST_PATH_IMAGE020
Figure 397752DEST_PATH_IMAGE005
Figure 855278DEST_PATH_IMAGE015
Figure 482700DEST_PATH_IMAGE006
Figure 367479DEST_PATH_IMAGE016
Figure 447562DEST_PATH_IMAGE007
Figure 518898DEST_PATH_IMAGE017
Figure 250094DEST_PATH_IMAGE008
Figure 810837DEST_PATH_IMAGE009
Figure 875745DEST_PATH_IMAGE018
, setting encryption parameter C initial value, setting encryption variables q, j, d, e, f, g, h, r and p initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 212179DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is rightCarry out H1=
Figure DEST_PATH_IMAGE029
Figure 314127DEST_PATH_IMAGE002
Figure 360013DEST_PATH_IMAGE011
Figure 963033DEST_PATH_IMAGE003
Figure 153974DEST_PATH_IMAGE030
Figure 817036DEST_PATH_IMAGE004
Figure 93428DEST_PATH_IMAGE013
Figure 500139DEST_PATH_IMAGE005
Figure 984734DEST_PATH_IMAGE032
Figure 569430DEST_PATH_IMAGE006
Figure 582386DEST_PATH_IMAGE015
Figure 277940DEST_PATH_IMAGE007
Figure 630424DEST_PATH_IMAGE016
Figure 635289DEST_PATH_IMAGE008
Figure 886273DEST_PATH_IMAGE017
Figure 651896DEST_PATH_IMAGE018
Ternary variable circulation cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 827663DEST_PATH_IMAGE028
Carry out H1=
Figure 852568DEST_PATH_IMAGE002
Figure 992693DEST_PATH_IMAGE011
Figure 389673DEST_PATH_IMAGE004
Figure 398954DEST_PATH_IMAGE013
Figure 916523DEST_PATH_IMAGE005
Figure 363816DEST_PATH_IMAGE032
Figure 992243DEST_PATH_IMAGE006
Figure 106961DEST_PATH_IMAGE015
Figure 795431DEST_PATH_IMAGE007
Figure 730020DEST_PATH_IMAGE016
Figure 162139DEST_PATH_IMAGE008
Figure 128433DEST_PATH_IMAGE017
Figure 987805DEST_PATH_IMAGE009
Figure 409690DEST_PATH_IMAGE018
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while ternary variable circulation cryptographic calculation, next ternary variable circulation cryptographic calculation is pointed to H2=
Figure 379920DEST_PATH_IMAGE011
Figure 203651DEST_PATH_IMAGE002
Figure 233924DEST_PATH_IMAGE033
Figure 143105DEST_PATH_IMAGE003
Figure 917026DEST_PATH_IMAGE019
Figure 598193DEST_PATH_IMAGE004
Figure 195844DEST_PATH_IMAGE005
Figure 773456DEST_PATH_IMAGE020
Figure 306200DEST_PATH_IMAGE006
Figure 678275DEST_PATH_IMAGE036
Figure 748999DEST_PATH_IMAGE007
Figure 615455DEST_PATH_IMAGE016
Figure 517552DEST_PATH_IMAGE008
Figure 428669DEST_PATH_IMAGE009
Figure 833237DEST_PATH_IMAGE018
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 2013100231815100002DEST_PATH_IMAGE037
Carry out H2=
Figure 402889DEST_PATH_IMAGE011
Figure 382347DEST_PATH_IMAGE002
Figure 975133DEST_PATH_IMAGE033
Figure 432659DEST_PATH_IMAGE003
Figure 51292DEST_PATH_IMAGE019
Figure 936071DEST_PATH_IMAGE004
Figure 16154DEST_PATH_IMAGE034
Figure 277371DEST_PATH_IMAGE005
Figure 759299DEST_PATH_IMAGE020
Figure 54124DEST_PATH_IMAGE007
Figure 390558DEST_PATH_IMAGE016
Figure 882719DEST_PATH_IMAGE008
Figure 937394DEST_PATH_IMAGE017
Figure 274835DEST_PATH_IMAGE009
Figure 731355DEST_PATH_IMAGE018
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while ternary variable circulation cryptographic calculation, next ternary variable circulation cryptographic calculation is pointed to H3=
Figure 128838DEST_PATH_IMAGE011
Figure 673739DEST_PATH_IMAGE002
Figure 690236DEST_PATH_IMAGE019
Figure 1263DEST_PATH_IMAGE003
Figure DEST_PATH_IMAGE038
Figure 648276DEST_PATH_IMAGE004
Figure 661232DEST_PATH_IMAGE013
Figure 416173DEST_PATH_IMAGE005
Figure DEST_PATH_IMAGE039
Figure 644024DEST_PATH_IMAGE006
Figure 399621DEST_PATH_IMAGE015
Figure 899873DEST_PATH_IMAGE007
Figure DEST_PATH_IMAGE041
Figure 195856DEST_PATH_IMAGE008
Figure 308623DEST_PATH_IMAGE017
Figure 484390DEST_PATH_IMAGE009
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this ternary variable circulation cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 509295DEST_PATH_IMAGE001
Carry out ternary variable circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, valid certificates can be provided for true trade mark, there is stronger anti-forgery ability simultaneously.
To solve above-mentioned technical problem, processing is digitized to image false-proof information and character anti-counterfeiting information first, the binary system anti-counterfeiting information table of 8 one group of generation, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, ternary variable circulation cryptographic calculation is carried out to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables, the binary system encryption anti-fake information table of 32 one group of generation, pass through channel coding using 32 binary system encryption anti-fake informations in binary system encryption anti-fake information table, 32 one group of binary modulated signal of the generation with error detecting and error correcting function, channel coding can use loop coding, convolutional encoding or Turbo coding diversified forms, picture signal is adjusted to be handled by rasterizing trade mark page original continuous(RIP)Halftoning hybrid screening picture signal is exported with hybrid screening, including amplitude and FM screened image signal, the electric conductivity of amplitude in hybrid screening picture signal is modulated using circulation look-up table modulation system using 32 one group of binary modulated signals of generation, make the electric conductivity of amplitude according to dielectric ink amplitude and electrically conductive ink amplitude is regular changes, adjacent 32 amplitudes in hybrid screening picture signal are made to carry 32 binary system anti-counterfeiting information by the change of electric conductivity, so as to generate the hybrid screening picture signal of the embedded anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, trade mark page site electric conductivity signal is gathered first, by the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding, decrypts i-th group of 32 binary message in anti-counterfeiting information table by binary system and is denoted as Mi
Binary system is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting encryption parameter C initial value as encryption, initial value when setting encryption variables q, j, d, e, f, g, h, r and p initial value as encryption, it is k=0 that binary operator, which controls variable k initial value design, by ternary variable circulation ciphering process, it is M that binary operator, which controls decryption computing during variable k=0,i=
Figure 383841DEST_PATH_IMAGE010
Figure 730508DEST_PATH_IMAGE002
Figure 956085DEST_PATH_IMAGE011
Figure 46400DEST_PATH_IMAGE003
Figure 103142DEST_PATH_IMAGE004
Figure 65281DEST_PATH_IMAGE013
Figure 444441DEST_PATH_IMAGE005
Figure 808427DEST_PATH_IMAGE014
Figure 922663DEST_PATH_IMAGE006
Figure 122831DEST_PATH_IMAGE015
Figure 554950DEST_PATH_IMAGE007
Figure 258594DEST_PATH_IMAGE016
Figure 117966DEST_PATH_IMAGE008
Figure 539851DEST_PATH_IMAGE017
Figure 596461DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=1,i=
Figure 626734DEST_PATH_IMAGE011
Figure 535916DEST_PATH_IMAGE002
Figure 309837DEST_PATH_IMAGE012
Figure 988074DEST_PATH_IMAGE003
Figure 189248DEST_PATH_IMAGE019
Figure 585725DEST_PATH_IMAGE004
Figure 687292DEST_PATH_IMAGE005
Figure 59367DEST_PATH_IMAGE020
Figure 943141DEST_PATH_IMAGE006
Figure 58864DEST_PATH_IMAGE021
Figure 711694DEST_PATH_IMAGE007
Figure 254671DEST_PATH_IMAGE016
Figure 547112DEST_PATH_IMAGE008
Figure 973862DEST_PATH_IMAGE009
Figure 435543DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=2,i=
Figure 543176DEST_PATH_IMAGE011
Figure 751435DEST_PATH_IMAGE002
Figure 362544DEST_PATH_IMAGE019
Figure 263636DEST_PATH_IMAGE003
Figure 406035DEST_PATH_IMAGE014
Figure 667252DEST_PATH_IMAGE004
Figure 886531DEST_PATH_IMAGE013
Figure 775169DEST_PATH_IMAGE021
Figure 910932DEST_PATH_IMAGE015
Figure 403094DEST_PATH_IMAGE007
Figure 515645DEST_PATH_IMAGE017
Figure 913128DEST_PATH_IMAGE009
Figure 455099DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=3,i=
Figure 406350DEST_PATH_IMAGE011
Figure 966645DEST_PATH_IMAGE002
Figure 285762DEST_PATH_IMAGE019
Figure 564296DEST_PATH_IMAGE003
Figure 259851DEST_PATH_IMAGE013
Figure 674652DEST_PATH_IMAGE004
Figure 930501DEST_PATH_IMAGE005
Figure 167097DEST_PATH_IMAGE020
Figure 701983DEST_PATH_IMAGE006
Figure 362903DEST_PATH_IMAGE022
Figure 350451DEST_PATH_IMAGE007
Figure 387808DEST_PATH_IMAGE016
Figure 777201DEST_PATH_IMAGE008
Figure 287128DEST_PATH_IMAGE009
Figure 111864DEST_PATH_IMAGE018
, it is M that binary operator, which controls decryption computing during variable k=4,i=
Figure 103567DEST_PATH_IMAGE011
Figure 621136DEST_PATH_IMAGE002
Figure 334008DEST_PATH_IMAGE019
Figure 962435DEST_PATH_IMAGE003
Figure 811574DEST_PATH_IMAGE013
Figure 500044DEST_PATH_IMAGE004
Figure 700212DEST_PATH_IMAGE020
Figure 866751DEST_PATH_IMAGE005
Figure 827187DEST_PATH_IMAGE022
Figure 686558DEST_PATH_IMAGE006
Figure 108443DEST_PATH_IMAGE015
Figure 344253DEST_PATH_IMAGE007
Figure 167983DEST_PATH_IMAGE023
Figure 198256DEST_PATH_IMAGE008
Figure 107437DEST_PATH_IMAGE017
Figure 615779DEST_PATH_IMAGE009
Figure 556666DEST_PATH_IMAGE024
, it is M that binary operator, which controls decryption computing during variable k=5,i=
Figure 757840DEST_PATH_IMAGE025
Figure 466350DEST_PATH_IMAGE019
Figure 264673DEST_PATH_IMAGE003
Figure 636748DEST_PATH_IMAGE013
Figure 520522DEST_PATH_IMAGE004
Figure 636245DEST_PATH_IMAGE020
Figure 292005DEST_PATH_IMAGE005
Figure 834981DEST_PATH_IMAGE015
Figure 940472DEST_PATH_IMAGE006
Figure 859886DEST_PATH_IMAGE023
Figure 554173DEST_PATH_IMAGE007
Figure 18783DEST_PATH_IMAGE016
Figure 126417DEST_PATH_IMAGE008
Figure 334675DEST_PATH_IMAGE024
, it is M that binary operator, which controls decryption computing during variable k=6,i=
Figure 986346DEST_PATH_IMAGE011
Figure 665401DEST_PATH_IMAGE013
Figure 41129DEST_PATH_IMAGE005
Figure 698823DEST_PATH_IMAGE006
Figure 552827DEST_PATH_IMAGE007
Figure 78486DEST_PATH_IMAGE024
Figure 118270DEST_PATH_IMAGE009
Figure 396804DEST_PATH_IMAGE025
, it is M that binary operator, which controls decryption computing during variable k=7,i=
Figure 92359DEST_PATH_IMAGE027
Figure 507160DEST_PATH_IMAGE002
Figure 997178DEST_PATH_IMAGE019
Figure 497430DEST_PATH_IMAGE003
Figure 993746DEST_PATH_IMAGE010
Figure 263053DEST_PATH_IMAGE004
Figure 189552DEST_PATH_IMAGE020
Figure 177099DEST_PATH_IMAGE005
Figure 214457DEST_PATH_IMAGE015
Figure 603850DEST_PATH_IMAGE006
Figure 701250DEST_PATH_IMAGE016
Figure 910514DEST_PATH_IMAGE007
Figure 742773DEST_PATH_IMAGE017
Figure 986673DEST_PATH_IMAGE008
Figure 317291DEST_PATH_IMAGE025
Figure 30163DEST_PATH_IMAGE009
Figure 658591DEST_PATH_IMAGE018
, first M from binary system decryption anti-counterfeiting information table1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiCorresponding decryption computing is carried out, binary system anti-counterfeiting information is solved
Figure 507729DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 is the overall structure figure of the present invention.
Fig. 2 is A-A sectional views of the present invention.
Fig. 3 loads anti-counterfeiting information flow chart.
Fig. 4 extracts anti-counterfeiting information flow chart.
Embodiment
As in Fig. 1 and Fig. 2, anti-fake information storage trademark, it is made up of trade mark page paper 7-1, amplitude 6-1 to the 6-150 being printed on trade mark page paper 7-1, horizontal scanning line 1-1 to the 1-15 being printed on trade mark page paper 7-1, column scan line 2-1 to the 2-10 being printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 are made up of amplitude 6-1 to 6-150
According to storage binary system encryption anti-fake information, a part of amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, another part amplitude on trade mark page paper 7-1 is formed by dielectric ink printing, horizontal scanning line 1-1 to 1-15 and column scan line 2-1 to 2-10 on trade mark page paper 7-1 are formed by the printing of electrically conducting transparent ink
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, and the light amplitude on trade mark page paper 7-1 is formed by dielectric ink printing,
The amplitude being printed on trade mark page paper 7-1 is divided into 15 rows 10 on trade mark paper and arranged, amplitude 6-1 to 6-150 is neat arranged in arrays on trade mark page paper 7-1, i is allowed to take 1 to 15, j is allowed to take 1 to 10, j-th strip column scan line on trade mark page paper 7-1 is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper 7-1, i-th horizontal scanning line on trade mark page paper 7-1 is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper 7-1
When the binary system encryption anti-fake information for needing to store the trade mark page is read, the 1st article of horizontal scanning line on trade mark page paper 7-1 is set to high level successively to the 15th article of horizontal scanning line,
When the 1st article of horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary system encryption anti-fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is exported from the 1st bar of column scan line to the 10th bar of column scan line, the 1st row on trade mark page paper 7-1 exports binary message 1 by electrically conductive ink printing into amplitude, the 1st row on trade mark page paper 7-1 exports binary message 0 by dielectric ink printing into amplitude, therefore the binary system encryption anti-fake information 1100001000 that the 1st row is read, above-mentioned readout is repeated to other rows on trade mark page paper 7-1.
In loading anti-counterfeiting information flow chart 3, original anti-counterfeiting information(Image, word)It is digitized into processing, the binary system anti-counterfeiting information table of 8 one group of generation, 8 one group of binary messages in binary system anti-counterfeiting information table are expanded into 32 one group of binary messages, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary message in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 196200DEST_PATH_IMAGE001
, i is the positive integer more than 0, from first 32 binary system encryption anti-fake information in 32 one group of binary system anti-counterfeiting information tables
Figure 127859DEST_PATH_IMAGE028
Start, to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 559977DEST_PATH_IMAGE001
Carry out ternary variable circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize that trademark anti-counterfeit prints, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, realize trademark anti-counterfeit.
In anti-counterfeiting information flow chart 4 is extracted, when extracting anti-counterfeiting information, the electric conductivity signal of trade mark page halftone dot image is gathered first, by the electric conductivity identification to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding.
The binary system generated after decoding is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting the initial value of encryption parameter as encryption, initial value when setting the initial value of encryption variables as encryption, it is k=0 that binary operator, which controls variable k initial value design, first M from the binary system decryption anti-counterfeiting information table of generation1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiComputing is decrypted, binary system anti-counterfeiting information is solved
Figure 529201DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.

Claims (1)

1. a kind of generate binary modulated signal by anti-counterfeiting information by cryptographic calculation and channel coding, and by circulating the single parameter multivariable ternary variable circulation anti-fake information storage trademark that anti-counterfeiting information is embedded in full page by tabling look-up modulation mode,It is characterized in that:Anti-counterfeiting information stores trade mark, it is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, according to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 2013100231815100001DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as HiI is the positive integer more than 0, binary system encryption parameter is denoted as C, encryption parameter C is the binary system positive integer of 0≤C≤256, binary system encryption variables are denoted as q, j, d, e, f, g, h, r and p respectively, and encryption variables q, j, d, e, f, g, h, r and p are 0 to 256 binary system positive integer, and binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 2013100231815100001DEST_PATH_IMAGE003
Figure 2013100231815100001DEST_PATH_IMAGE004
Figure 2013100231815100001DEST_PATH_IMAGE007
Figure 2013100231815100001DEST_PATH_IMAGE009
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 173195DEST_PATH_IMAGE002
Figure 595080DEST_PATH_IMAGE003
Figure 565310DEST_PATH_IMAGE004
Figure 419314DEST_PATH_IMAGE006
Figure 325566DEST_PATH_IMAGE007
Figure 99487DEST_PATH_IMAGE008
Figure 43303DEST_PATH_IMAGE009
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 244477DEST_PATH_IMAGE002
Figure 375375DEST_PATH_IMAGE003
Figure 952987DEST_PATH_IMAGE004
Figure 751310DEST_PATH_IMAGE005
Figure 744510DEST_PATH_IMAGE007
Figure 860233DEST_PATH_IMAGE008
Figure 513062DEST_PATH_IMAGE009
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 56039DEST_PATH_IMAGE002
Figure 427109DEST_PATH_IMAGE003
Figure 80944DEST_PATH_IMAGE004
Figure 853859DEST_PATH_IMAGE005
Figure 219911DEST_PATH_IMAGE007
Figure 428169DEST_PATH_IMAGE008
Figure 304859DEST_PATH_IMAGE009
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 940370DEST_PATH_IMAGE002
Figure 269721DEST_PATH_IMAGE003
Figure 281670DEST_PATH_IMAGE004
Figure 12866DEST_PATH_IMAGE005
Figure 810490DEST_PATH_IMAGE006
Figure 627136DEST_PATH_IMAGE007
Figure 442776DEST_PATH_IMAGE008
Figure 28479DEST_PATH_IMAGE009
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 5793DEST_PATH_IMAGE002
Figure 309735DEST_PATH_IMAGE003
Figure 103696DEST_PATH_IMAGE005
Figure 514561DEST_PATH_IMAGE006
Figure 40221DEST_PATH_IMAGE007
Figure 197664DEST_PATH_IMAGE008
Figure 492379DEST_PATH_IMAGE009
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 77075DEST_PATH_IMAGE002
Figure 785585DEST_PATH_IMAGE004
Figure 200386DEST_PATH_IMAGE005
Figure 958913DEST_PATH_IMAGE006
Figure 20727DEST_PATH_IMAGE008
Figure 40767DEST_PATH_IMAGE009
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 241438DEST_PATH_IMAGE004
Figure 378634DEST_PATH_IMAGE005
Figure 775614DEST_PATH_IMAGE008
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 287815DEST_PATH_IMAGE002
Figure 363535DEST_PATH_IMAGE004
Figure 492902DEST_PATH_IMAGE005
Figure 181372DEST_PATH_IMAGE006
Figure 548079DEST_PATH_IMAGE008
Be respectively defined as+, ×, × ,-,+,-,-, ×, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 2013100231815100001DEST_PATH_IMAGE010
Figure 252041DEST_PATH_IMAGE002
Figure 2013100231815100001DEST_PATH_IMAGE011
Figure 733314DEST_PATH_IMAGE003
Figure 2013100231815100001DEST_PATH_IMAGE012
Figure 516593DEST_PATH_IMAGE004
Figure 2013100231815100001DEST_PATH_IMAGE013
Figure 402641DEST_PATH_IMAGE005
Figure 245963DEST_PATH_IMAGE006
Figure 2013100231815100001DEST_PATH_IMAGE015
Figure 2013100231815100001DEST_PATH_IMAGE016
Figure 807361DEST_PATH_IMAGE008
Figure 686772DEST_PATH_IMAGE009
Figure 83250DEST_PATH_IMAGE018
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=1i=
Figure 660861DEST_PATH_IMAGE011
Figure 190675DEST_PATH_IMAGE002
Figure 375800DEST_PATH_IMAGE012
Figure 867973DEST_PATH_IMAGE019
Figure 770070DEST_PATH_IMAGE004
Figure 63779DEST_PATH_IMAGE014
Figure 684116DEST_PATH_IMAGE005
Figure 85754DEST_PATH_IMAGE020
Figure 842358DEST_PATH_IMAGE006
Figure 572548DEST_PATH_IMAGE021
Figure 499549DEST_PATH_IMAGE008
Figure 464411DEST_PATH_IMAGE009
Figure 479290DEST_PATH_IMAGE018
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 210486DEST_PATH_IMAGE011
Figure 16899DEST_PATH_IMAGE002
Figure 833546DEST_PATH_IMAGE019
Figure 383607DEST_PATH_IMAGE003
Figure 212202DEST_PATH_IMAGE004
Figure 326264DEST_PATH_IMAGE013
Figure 663705DEST_PATH_IMAGE005
Figure 517708DEST_PATH_IMAGE006
Figure 59679DEST_PATH_IMAGE015
Figure 200811DEST_PATH_IMAGE007
Figure 511837DEST_PATH_IMAGE022
Figure 124137DEST_PATH_IMAGE017
Figure 68960DEST_PATH_IMAGE009
Figure 234493DEST_PATH_IMAGE018
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 490342DEST_PATH_IMAGE002
Figure 973276DEST_PATH_IMAGE019
Figure 258895DEST_PATH_IMAGE003
Figure 434661DEST_PATH_IMAGE013
Figure 170012DEST_PATH_IMAGE004
Figure 456636DEST_PATH_IMAGE021
Figure 331183DEST_PATH_IMAGE005
Figure 677850DEST_PATH_IMAGE020
Figure 903426DEST_PATH_IMAGE006
Figure 993742DEST_PATH_IMAGE022
Figure 988374DEST_PATH_IMAGE007
Figure 240364DEST_PATH_IMAGE016
Figure 956166DEST_PATH_IMAGE008
Figure 584593DEST_PATH_IMAGE023
Figure 886262DEST_PATH_IMAGE009
Figure 59885DEST_PATH_IMAGE018
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 509321DEST_PATH_IMAGE011
Figure 692172DEST_PATH_IMAGE002
Figure 645084DEST_PATH_IMAGE019
Figure 255188DEST_PATH_IMAGE003
Figure 926341DEST_PATH_IMAGE013
Figure 909953DEST_PATH_IMAGE004
Figure 982951DEST_PATH_IMAGE020
Figure 922406DEST_PATH_IMAGE022
Figure 251319DEST_PATH_IMAGE006
Figure 929556DEST_PATH_IMAGE015
Figure 130731DEST_PATH_IMAGE007
Figure 527208DEST_PATH_IMAGE023
Figure 839241DEST_PATH_IMAGE008
Figure 637563DEST_PATH_IMAGE017
Figure 9639DEST_PATH_IMAGE009
Figure 890483DEST_PATH_IMAGE024
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 6206DEST_PATH_IMAGE025
Figure 659036DEST_PATH_IMAGE002
Figure 202012DEST_PATH_IMAGE019
Figure 307503DEST_PATH_IMAGE003
Figure 226917DEST_PATH_IMAGE013
Figure 734253DEST_PATH_IMAGE004
Figure 448131DEST_PATH_IMAGE020
Figure 309427DEST_PATH_IMAGE005
Figure 766953DEST_PATH_IMAGE015
Figure 216837DEST_PATH_IMAGE023
Figure 546187DEST_PATH_IMAGE007
Figure 23753DEST_PATH_IMAGE008
Figure 95745DEST_PATH_IMAGE024
Figure 459523DEST_PATH_IMAGE018
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 45225DEST_PATH_IMAGE011
Figure 288119DEST_PATH_IMAGE002
Figure 326482DEST_PATH_IMAGE026
Figure 680234DEST_PATH_IMAGE003
Figure 325476DEST_PATH_IMAGE020
Figure 231988DEST_PATH_IMAGE005
Figure 298350DEST_PATH_IMAGE006
Figure 327617DEST_PATH_IMAGE016
Figure 437973DEST_PATH_IMAGE024
Figure 442838DEST_PATH_IMAGE008
Figure 693822DEST_PATH_IMAGE017
Figure 459445DEST_PATH_IMAGE025
, ternary variable circulation cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 369632DEST_PATH_IMAGE026
Figure 107912DEST_PATH_IMAGE002
Figure 394537DEST_PATH_IMAGE019
Figure 534662DEST_PATH_IMAGE003
Figure 106906DEST_PATH_IMAGE004
Figure 869326DEST_PATH_IMAGE020
Figure 384457DEST_PATH_IMAGE015
Figure 346596DEST_PATH_IMAGE006
Figure 725756DEST_PATH_IMAGE016
Figure 824162DEST_PATH_IMAGE007
Figure 263365DEST_PATH_IMAGE017
Figure 712801DEST_PATH_IMAGE008
Figure 630072DEST_PATH_IMAGE025
Figure 848564DEST_PATH_IMAGE009
Figure 455738DEST_PATH_IMAGE018
, setting encryption parameter C initial value, setting encryption variables q, j, d, e, f, g, h, r and p initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 126891DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 793059DEST_PATH_IMAGE027
Carry out H1=
Figure 616790DEST_PATH_IMAGE028
Figure 647063DEST_PATH_IMAGE002
Figure 556244DEST_PATH_IMAGE011
Figure 64586DEST_PATH_IMAGE003
Figure 147260DEST_PATH_IMAGE004
Figure 793005DEST_PATH_IMAGE013
Figure 23238DEST_PATH_IMAGE006
Figure 156279DEST_PATH_IMAGE015
Figure 22735DEST_PATH_IMAGE007
Figure 218542DEST_PATH_IMAGE008
Figure 246376DEST_PATH_IMAGE009
Figure 2979DEST_PATH_IMAGE018
Ternary variable circulation cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 467590DEST_PATH_IMAGE027
Carry out H1=
Figure 575223DEST_PATH_IMAGE028
Figure 80078DEST_PATH_IMAGE011
Figure 230436DEST_PATH_IMAGE003
Figure 306157DEST_PATH_IMAGE004
Figure 788085DEST_PATH_IMAGE013
Figure 411144DEST_PATH_IMAGE030
Figure 827135DEST_PATH_IMAGE015
Figure 53717DEST_PATH_IMAGE007
Figure 108392DEST_PATH_IMAGE016
Figure 711411DEST_PATH_IMAGE008
Figure 902353DEST_PATH_IMAGE017
Figure 503098DEST_PATH_IMAGE009
Figure 28757DEST_PATH_IMAGE018
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while ternary variable circulation cryptographic calculation, next ternary variable circulation cryptographic calculation is pointed to H2=
Figure 186200DEST_PATH_IMAGE011
Figure 746495DEST_PATH_IMAGE002
Figure 341217DEST_PATH_IMAGE003
Figure 36771DEST_PATH_IMAGE019
Figure 451572DEST_PATH_IMAGE004
Figure 941590DEST_PATH_IMAGE032
Figure 441842DEST_PATH_IMAGE005
Figure 941087DEST_PATH_IMAGE020
Figure 210395DEST_PATH_IMAGE006
Figure 139823DEST_PATH_IMAGE033
Figure 554121DEST_PATH_IMAGE008
Figure 651521DEST_PATH_IMAGE017
Figure 798469DEST_PATH_IMAGE009
Figure 888785DEST_PATH_IMAGE018
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure DEST_PATH_IMAGE034
Carry out H2=
Figure 945733DEST_PATH_IMAGE011
Figure 211105DEST_PATH_IMAGE002
Figure 173245DEST_PATH_IMAGE031
Figure 552405DEST_PATH_IMAGE003
Figure 90014DEST_PATH_IMAGE004
Figure 675213DEST_PATH_IMAGE020
Figure 947681DEST_PATH_IMAGE033
Figure 668643DEST_PATH_IMAGE007
Figure 741641DEST_PATH_IMAGE016
Figure 709597DEST_PATH_IMAGE008
Figure 618779DEST_PATH_IMAGE017
Figure 392699DEST_PATH_IMAGE009
Figure 336516DEST_PATH_IMAGE018
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while ternary variable circulation cryptographic calculation, next ternary variable circulation cryptographic calculation is pointed to H3=
Figure 537690DEST_PATH_IMAGE011
Figure 41593DEST_PATH_IMAGE003
Figure DEST_PATH_IMAGE035
Figure 94180DEST_PATH_IMAGE013
Figure 960636DEST_PATH_IMAGE005
Figure DEST_PATH_IMAGE036
Figure 678712DEST_PATH_IMAGE006
Figure 221689DEST_PATH_IMAGE015
Figure DEST_PATH_IMAGE037
Figure 246593DEST_PATH_IMAGE008
Figure 19509DEST_PATH_IMAGE017
Figure 733387DEST_PATH_IMAGE009
Figure 326173DEST_PATH_IMAGE018
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this ternary variable circulation cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 783699DEST_PATH_IMAGE001
Carry out ternary variable circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN201310023181.5A 2013-01-22 2013-01-22 Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark Expired - Fee Related CN103106449B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310023181.5A CN103106449B (en) 2013-01-22 2013-01-22 Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310023181.5A CN103106449B (en) 2013-01-22 2013-01-22 Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark

Publications (2)

Publication Number Publication Date
CN103106449A true CN103106449A (en) 2013-05-15
CN103106449B CN103106449B (en) 2015-07-15

Family

ID=48314295

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310023181.5A Expired - Fee Related CN103106449B (en) 2013-01-22 2013-01-22 Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark

Country Status (1)

Country Link
CN (1) CN103106449B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5425103A (en) * 1994-03-14 1995-06-13 Shaw; William Y. Variable-key cryptography system
CN1928916A (en) * 2006-08-21 2007-03-14 顾泽苍 Printing medium certificate documents and false proof handling method of copy thereof
CN101699845A (en) * 2009-10-20 2010-04-28 北京印刷学院 Encryption counterfeit printing technology of frequency modulated halftone dot space position for pseudo random signal modulation printed matter

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5425103A (en) * 1994-03-14 1995-06-13 Shaw; William Y. Variable-key cryptography system
CN1928916A (en) * 2006-08-21 2007-03-14 顾泽苍 Printing medium certificate documents and false proof handling method of copy thereof
CN101699845A (en) * 2009-10-20 2010-04-28 北京印刷学院 Encryption counterfeit printing technology of frequency modulated halftone dot space position for pseudo random signal modulation printed matter

Also Published As

Publication number Publication date
CN103106449B (en) 2015-07-15

Similar Documents

Publication Publication Date Title
CN103106442A (en) Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106460A (en) Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark
CN103106513A (en) Multi-parameter univariate poly encryption anti-fake information storage trademark
CN103106449A (en) Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103106450A (en) Single parameter multivariable unitary circulation encryption anti-counterfeiting information storage trademark
CN103106457A (en) Single parameter ternary circulation encryption anti-counterfeiting information storage trademark
CN103106447A (en) Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark
CN103106512A (en) Multiparameter multivariable ternary encryption anti-fake information storage trademark
CN103116797A (en) Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark
CN103106438A (en) Parameter-gradient multivariable multi-encryption anti-fake information storage trademark
CN103106439A (en) Multiparameter multivariable binary encryption anti-fake information storage trademark
CN103106451A (en) Multi-variable-parameter gradient ternary-variant circulating encryption anti-fake information storage brand
CN103116796A (en) One-parameter variation transmutation unary encryption anti-fake information storage trademark
CN103136565A (en) Multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand
CN103106453A (en) Multi-parameter ternary variant circulating encryption anti-fake information storage brand
CN103106429A (en) Single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark
CN103106448A (en) Single variable parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103116788A (en) Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark
CN103106452A (en) Multivariate parameter gradation unitary circulating encryption anti-fake information storage trademark
CN103106440A (en) Multi-parameter unitary encryption anti-fake information storage brand
CN103106517A (en) Parameter transmutation ternary encryption anti-fake information storage trademark
CN103106432A (en) Multi-parametric-variable gradient unitary circulating encryption anti-fake information storage trademark
CN103106443A (en) One-parameter double-variant unary encryption anti-fake information storage brand
CN103136567A (en) One-parameter variable gradient binary encryption anti-fake information storage brand
CN103116790A (en) Parameter transmutation binary encryption anti-fake information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150715

Termination date: 20160122

EXPY Termination of patent right or utility model