CN103136565A - Multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand - Google Patents

Multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand Download PDF

Info

Publication number
CN103136565A
CN103136565A CN2013100223109A CN201310022310A CN103136565A CN 103136565 A CN103136565 A CN 103136565A CN 2013100223109 A CN2013100223109 A CN 2013100223109A CN 201310022310 A CN201310022310 A CN 201310022310A CN 103136565 A CN103136565 A CN 103136565A
Authority
CN
China
Prior art keywords
binary system
binary
group
trade mark
counterfeiting information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013100223109A
Other languages
Chinese (zh)
Other versions
CN103136565B (en
Inventor
张立君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Graphic Communication
Original Assignee
Beijing Institute of Graphic Communication
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Graphic Communication filed Critical Beijing Institute of Graphic Communication
Priority to CN201310022310.9A priority Critical patent/CN103136565B/en
Publication of CN103136565A publication Critical patent/CN103136565A/en
Application granted granted Critical
Publication of CN103136565B publication Critical patent/CN103136565B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Printing Methods (AREA)
  • Storage Device Security (AREA)

Abstract

Provided is a multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand. According to the brand, binary system anti-fake information can be changed into binary system modulating signals through ternary circulating encryption and channel coding. The anti-fake information can be embedded into an entire brand page through orderly changes of conductivity of amplitude-modulated dots through a circulation look-up table modulation type. The anti-fake information can be identified from any arbitrary fragment in the brand identification process, and also can be applied to various anti-fake brands.

Description

Multivariate multi-parameter gradient ternary circulates anti-fake information storage trademark
Art:
The present invention relates to a kind of anti-false trademark, particularly a kind of multivariate multi-parameter gradient ternary circulation anti-fake information storage trademark, binary system encryption anti-fake information can be stored on the trade mark page and realize the false proof of trade mark by the trade mark, the trade mark can be used for extensive stock it is false proof in.
Background technology:
Anti-false trademark, also known as antifalsification label, anti-counterfeiting mark, anti-false sign, anti-fake label, are a kind of proof labels discerned the false from the genuine, prevent personation, are mark true and false, that distinguish marketing quality quality of the people for distinguishing merchandise resources during commodity circulation.Trademark anti-counterfeit is related to businessman, client and market safety, is related to protection businessman and the interests of client.The trade mark of China is audaciously innovated; employ laser anti-counterfeit, core micropore are false proof, invisible graph is false proof, magnetic ink is false proof, microfilm of characters is false proof, indicia distribution is false proof, light carving is false proof etc.; but false proof is high-tech trial of strength with struggle that is faking; advanced anti-counterfeiting technology has certain ageing again; so; trade mark anti-fake technique must constantly be lifted; could be false proof with being maintained the leading position forever in faking, this is also the basic assurance for protecting the interests of businessman and client to maintain commodity circulation safety.
The content of the invention:
In order to improve the reliability and security of trademark anti-counterfeit, the present invention is improved existing trade mark anti-fake technique for the deficiency that existing trademark anti-counterfeit is present, propose a kind of anti-counterfeiting information storage trade mark, the trade mark passes through the change to amplitude electric conductivity in brand printing, encryption anti-fake information is embedded on the whole trade mark page in binary system coded signal form, encryption anti-fake information can be recognized in any one fragment in brand recognition, therefore with very strong disguised and crush resistance.
The technical solution adopted for the present invention to solve the technical problems is:
Anti-counterfeiting information stores trade mark, is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, the image and word on trade mark page paper are made up of amplitude,
According to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, and the horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
The horizontal scanning line being printed on trade mark page paper has N bars, the column scan line being printed on trade mark page paper has M bars, the amplitude being printed on trade mark page paper is divided into N rows M row on trade mark paper, amplitude is neat arranged in arrays on trade mark page paper paper, i is allowed to take 1 to arrive N, j is allowed to take 1 to arrive M, j-th strip column scan line on trade mark page paper is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper, i-th horizontal scanning line on trade mark page paper is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper
When the binary message for needing to store the trade mark page is read, the 1st article on trade mark page paper is set to high level successively to the N articles horizontal scanning line,
When the 1st article of horizontal scanning line on trade mark page paper is set to high level, the binary message of the 1st row storage on trade mark page paper is exported with 0,1 code form from the 1st bar of column scan line to the M bars column scan line, the amplitude that the 1st row on trade mark page paper is printed by electrically conductive ink exports binary message 1, the amplitude that the 1st row on trade mark page paper is printed by dielectric ink exports binary message 0, above-mentioned readout is repeated to other rows on trade mark page paper
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 610987DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and binary system encryption parameter is denoted as respectively
Figure 43105DEST_PATH_IMAGE002
Figure 261597DEST_PATH_IMAGE003
Figure 714444DEST_PATH_IMAGE004
Figure 385596DEST_PATH_IMAGE005
Figure 762351DEST_PATH_IMAGE006
Figure 366508DEST_PATH_IMAGE007
Figure 396781DEST_PATH_IMAGE008
With, encryption parameter
Figure 266834DEST_PATH_IMAGE002
Figure 600863DEST_PATH_IMAGE003
Figure 333196DEST_PATH_IMAGE004
Figure 385465DEST_PATH_IMAGE005
Figure 274662DEST_PATH_IMAGE006
Figure 587831DEST_PATH_IMAGE007
Figure 366431DEST_PATH_IMAGE008
With
Figure 499472DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, binary system encryption variables are denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 146354DEST_PATH_IMAGE010
Figure 454976DEST_PATH_IMAGE011
Figure 529111DEST_PATH_IMAGE012
Figure 555973DEST_PATH_IMAGE013
Figure 740967DEST_PATH_IMAGE014
Figure 904095DEST_PATH_IMAGE015
Figure 414711DEST_PATH_IMAGE016
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 651974DEST_PATH_IMAGE010
Figure 528663DEST_PATH_IMAGE011
Figure 680476DEST_PATH_IMAGE013
Figure 348217DEST_PATH_IMAGE014
Figure 610572DEST_PATH_IMAGE015
Figure 72777DEST_PATH_IMAGE016
Figure 420582DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 626435DEST_PATH_IMAGE010
Figure 223856DEST_PATH_IMAGE011
Figure 247176DEST_PATH_IMAGE012
Figure 957643DEST_PATH_IMAGE013
Figure 826241DEST_PATH_IMAGE014
Figure 938554DEST_PATH_IMAGE015
Figure 867196DEST_PATH_IMAGE016
Figure 64959DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 737249DEST_PATH_IMAGE010
Figure 704068DEST_PATH_IMAGE011
Figure 538031DEST_PATH_IMAGE012
Figure 82145DEST_PATH_IMAGE013
Figure 433492DEST_PATH_IMAGE014
Figure 379451DEST_PATH_IMAGE015
Figure 790841DEST_PATH_IMAGE016
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 711710DEST_PATH_IMAGE010
Figure 777755DEST_PATH_IMAGE011
Figure 878752DEST_PATH_IMAGE013
Figure 165377DEST_PATH_IMAGE014
Figure 695715DEST_PATH_IMAGE015
Figure 573541DEST_PATH_IMAGE016
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 726808DEST_PATH_IMAGE011
Figure 509956DEST_PATH_IMAGE012
Figure 38207DEST_PATH_IMAGE014
Figure 808716DEST_PATH_IMAGE015
Figure 762766DEST_PATH_IMAGE016
Figure 212202DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 534916DEST_PATH_IMAGE011
Figure 800812DEST_PATH_IMAGE012
Figure 3123DEST_PATH_IMAGE013
Figure 645457DEST_PATH_IMAGE014
Figure 249614DEST_PATH_IMAGE015
Figure 686411DEST_PATH_IMAGE016
Figure 376019DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 556464DEST_PATH_IMAGE010
Figure 483969DEST_PATH_IMAGE011
Figure 216302DEST_PATH_IMAGE012
Figure 268571DEST_PATH_IMAGE013
Figure 111763DEST_PATH_IMAGE014
Figure 565878DEST_PATH_IMAGE015
Figure 8677DEST_PATH_IMAGE017
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 655559DEST_PATH_IMAGE010
Figure 964181DEST_PATH_IMAGE011
Figure 507158DEST_PATH_IMAGE012
Figure 719013DEST_PATH_IMAGE014
Figure 6775DEST_PATH_IMAGE015
Figure 765970DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, ternary circulation cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 630020DEST_PATH_IMAGE018
Figure 329172DEST_PATH_IMAGE019
Figure 670241DEST_PATH_IMAGE011
Figure 462616DEST_PATH_IMAGE018
Figure 334758DEST_PATH_IMAGE012
Figure 187176DEST_PATH_IMAGE019
Figure 410347DEST_PATH_IMAGE013
Figure 740834DEST_PATH_IMAGE018
Figure 733061DEST_PATH_IMAGE014
Figure 756380DEST_PATH_IMAGE019
Figure 958615DEST_PATH_IMAGE019
Figure 70928DEST_PATH_IMAGE016
Figure 999570DEST_PATH_IMAGE019
Figure 197333DEST_PATH_IMAGE017
Figure 869622DEST_PATH_IMAGE019
, ternary circulation cryptographic calculation is defined as H during binary operator control variable k=1i
Figure 836441DEST_PATH_IMAGE020
Figure 935984DEST_PATH_IMAGE010
 
Figure 621044DEST_PATH_IMAGE021
Figure 97024DEST_PATH_IMAGE011
 
Figure 918350DEST_PATH_IMAGE020
Figure 923215DEST_PATH_IMAGE012
 
Figure 954625DEST_PATH_IMAGE021
Figure 844084DEST_PATH_IMAGE013
 
Figure 226840DEST_PATH_IMAGE014
 
Figure 745546DEST_PATH_IMAGE021
Figure 32171DEST_PATH_IMAGE015
 
Figure 705915DEST_PATH_IMAGE016
 
Figure 587283DEST_PATH_IMAGE020
 , ternary circulation cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 704647DEST_PATH_IMAGE022
Figure 73311DEST_PATH_IMAGE010
Figure 737828DEST_PATH_IMAGE011
Figure 957457DEST_PATH_IMAGE023
Figure 813417DEST_PATH_IMAGE012
Figure 136131DEST_PATH_IMAGE013
Figure 850880DEST_PATH_IMAGE023
Figure 928557DEST_PATH_IMAGE014
Figure 768523DEST_PATH_IMAGE015
Figure 205321DEST_PATH_IMAGE023
Figure 809795DEST_PATH_IMAGE022
Figure 534037DEST_PATH_IMAGE017
Figure 141736DEST_PATH_IMAGE022
, ternary circulation cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 879491DEST_PATH_IMAGE024
Figure 176798DEST_PATH_IMAGE024
Figure 955398DEST_PATH_IMAGE011
Figure 88439DEST_PATH_IMAGE024
Figure 735321DEST_PATH_IMAGE012
Figure 43942DEST_PATH_IMAGE025
Figure 118078DEST_PATH_IMAGE013
Figure 879360DEST_PATH_IMAGE024
Figure 329933DEST_PATH_IMAGE014
Figure 493061DEST_PATH_IMAGE025
Figure 252256DEST_PATH_IMAGE024
Figure 240940DEST_PATH_IMAGE016
Figure 852050DEST_PATH_IMAGE025
Figure 269442DEST_PATH_IMAGE024
, ternary circulation cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 671605DEST_PATH_IMAGE026
Figure 933959DEST_PATH_IMAGE010
Figure 661743DEST_PATH_IMAGE026
Figure 743969DEST_PATH_IMAGE011
Figure 215401DEST_PATH_IMAGE026
Figure 332262DEST_PATH_IMAGE012
Figure 558844DEST_PATH_IMAGE026
Figure 800469DEST_PATH_IMAGE013
Figure 403489DEST_PATH_IMAGE027
Figure 250222DEST_PATH_IMAGE014
Figure 376627DEST_PATH_IMAGE015
Figure 281315DEST_PATH_IMAGE016
Figure 65918DEST_PATH_IMAGE017
Figure 22459DEST_PATH_IMAGE027
, ternary circulation cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 968418DEST_PATH_IMAGE028
Figure 114228DEST_PATH_IMAGE010
Figure 145638DEST_PATH_IMAGE029
Figure 300676DEST_PATH_IMAGE011
Figure 101142DEST_PATH_IMAGE029
Figure 683433DEST_PATH_IMAGE012
Figure 202139DEST_PATH_IMAGE029
Figure 957605DEST_PATH_IMAGE013
Figure 940474DEST_PATH_IMAGE029
Figure 693666DEST_PATH_IMAGE014
Figure 434089DEST_PATH_IMAGE028
Figure 930929DEST_PATH_IMAGE015
Figure 705987DEST_PATH_IMAGE029
Figure 223556DEST_PATH_IMAGE016
Figure 592221DEST_PATH_IMAGE028
Figure 751807DEST_PATH_IMAGE017
, ternary circulation cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 476366DEST_PATH_IMAGE030
Figure 30024DEST_PATH_IMAGE031
Figure 655041DEST_PATH_IMAGE011
Figure 514412DEST_PATH_IMAGE030
Figure 716724DEST_PATH_IMAGE012
Figure 93478DEST_PATH_IMAGE030
Figure 697635DEST_PATH_IMAGE013
Figure 134432DEST_PATH_IMAGE030
Figure 824040DEST_PATH_IMAGE014
Figure 4485DEST_PATH_IMAGE030
Figure 728728DEST_PATH_IMAGE015
Figure 336427DEST_PATH_IMAGE031
Figure 716592DEST_PATH_IMAGE016
Figure 825363DEST_PATH_IMAGE030
Figure 279478DEST_PATH_IMAGE017
, ternary circulation cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 456698DEST_PATH_IMAGE032
Figure 103580DEST_PATH_IMAGE010
Figure 486337DEST_PATH_IMAGE011
Figure 167034DEST_PATH_IMAGE012
Figure 720375DEST_PATH_IMAGE033
Figure 840778DEST_PATH_IMAGE013
Figure 213991DEST_PATH_IMAGE033
Figure 78041DEST_PATH_IMAGE014
Figure 637702DEST_PATH_IMAGE033
Figure 898919DEST_PATH_IMAGE016
Figure 36639DEST_PATH_IMAGE032
Figure 623478DEST_PATH_IMAGE017
Figure 846649DEST_PATH_IMAGE033
, set encryption parameter
Figure 442715DEST_PATH_IMAGE002
Figure 434942DEST_PATH_IMAGE003
Figure 204401DEST_PATH_IMAGE004
Figure 914868DEST_PATH_IMAGE005
Figure 49047DEST_PATH_IMAGE006
Figure 895780DEST_PATH_IMAGE007
Figure 558842DEST_PATH_IMAGE008
With
Figure 615660DEST_PATH_IMAGE009
Initial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 428895DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 254769DEST_PATH_IMAGE034
Carry out H1=
Figure 495257DEST_PATH_IMAGE035
Figure 39371DEST_PATH_IMAGE010
Figure 764619DEST_PATH_IMAGE019
Figure 710579DEST_PATH_IMAGE011
Figure 121968DEST_PATH_IMAGE035
Figure 153378DEST_PATH_IMAGE012
Figure 577723DEST_PATH_IMAGE013
Figure 496504DEST_PATH_IMAGE019
Figure 292422DEST_PATH_IMAGE015
Figure 904668DEST_PATH_IMAGE019
Figure 407511DEST_PATH_IMAGE019
Figure 651411DEST_PATH_IMAGE017
Figure 575504DEST_PATH_IMAGE019
Ternary circulation cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 803223DEST_PATH_IMAGE034
Carry out H1=
Figure 733319DEST_PATH_IMAGE010
Figure 543329DEST_PATH_IMAGE011
Figure 381972DEST_PATH_IMAGE035
Figure 131622DEST_PATH_IMAGE012
Figure 68671DEST_PATH_IMAGE013
Figure 481067DEST_PATH_IMAGE019
Figure 815096DEST_PATH_IMAGE016
Figure 599699DEST_PATH_IMAGE017
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while ternary circulation cryptographic calculation, next ternary circulation cryptographic calculation is pointed to H2=
Figure 490480DEST_PATH_IMAGE020
Figure 269080DEST_PATH_IMAGE010
Figure 933280DEST_PATH_IMAGE036
Figure 529564DEST_PATH_IMAGE011
Figure 962819DEST_PATH_IMAGE020
Figure 912320DEST_PATH_IMAGE012
Figure 63816DEST_PATH_IMAGE036
Figure 124176DEST_PATH_IMAGE013
Figure 797920DEST_PATH_IMAGE014
Figure 159817DEST_PATH_IMAGE015
Figure 567665DEST_PATH_IMAGE020
Figure 719477DEST_PATH_IMAGE020
Figure 649573DEST_PATH_IMAGE020
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 111778DEST_PATH_IMAGE037
Carry out H2=
Figure 196595DEST_PATH_IMAGE010
Figure 212141DEST_PATH_IMAGE011
Figure 922608DEST_PATH_IMAGE020
Figure 791207DEST_PATH_IMAGE012
Figure 559312DEST_PATH_IMAGE036
Figure 233373DEST_PATH_IMAGE014
Figure 324826DEST_PATH_IMAGE036
Figure 96473DEST_PATH_IMAGE015
Figure 991933DEST_PATH_IMAGE016
Figure 813259DEST_PATH_IMAGE020
Figure 349282DEST_PATH_IMAGE017
Figure 256059DEST_PATH_IMAGE020
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while ternary circulation cryptographic calculation, next ternary circulation cryptographic calculation is pointed to H3=
Figure 270151DEST_PATH_IMAGE022
Figure 211562DEST_PATH_IMAGE010
Figure 918487DEST_PATH_IMAGE022
Figure 660681DEST_PATH_IMAGE012
Figure 538507DEST_PATH_IMAGE022
Figure 419875DEST_PATH_IMAGE013
Figure 41350DEST_PATH_IMAGE038
Figure 691774DEST_PATH_IMAGE014
Figure 474922DEST_PATH_IMAGE022
Figure 843587DEST_PATH_IMAGE015
Figure 773682DEST_PATH_IMAGE016
Figure 727732DEST_PATH_IMAGE022
Figure 583692DEST_PATH_IMAGE017
Figure 953494DEST_PATH_IMAGE022
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this ternary circulation cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 437565DEST_PATH_IMAGE001
Carry out ternary circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, valid certificates can be provided for true trade mark, there is stronger anti-forgery ability simultaneously.
To solve above-mentioned technical problem, processing is digitized to image false-proof information and character anti-counterfeiting information first, the binary system anti-counterfeiting information table of 8 one group of generation, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, ternary circulation cryptographic calculation is carried out to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables, the binary system encryption anti-fake information table of 32 one group of generation, pass through channel coding using 32 binary system encryption anti-fake informations in binary system encryption anti-fake information table, 32 one group of binary modulated signal of the generation with error detecting and error correcting function, channel coding can use loop coding, convolutional encoding or Turbo coding diversified forms, picture signal is adjusted to be handled by rasterizing trade mark page original continuous(RIP)Halftoning hybrid screening picture signal is exported with hybrid screening, including amplitude and FM screened image signal, the electric conductivity of amplitude in hybrid screening picture signal is modulated using circulation look-up table modulation system using 32 one group of binary modulated signals of generation, make the electric conductivity of amplitude according to dielectric ink amplitude and electrically conductive ink amplitude is regular changes, adjacent 32 amplitudes in hybrid screening picture signal are made to carry 32 binary system anti-counterfeiting information by the change of electric conductivity, so as to generate the hybrid screening picture signal of the embedded anti-counterfeiting information in whole trade mark page site, realize the false proof of trade mark.
When extracting anti-counterfeiting information, trade mark page site electric conductivity signal is gathered first, by the identification of the electric conductivity to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding, decrypts i-th group of 32 binary message in anti-counterfeiting information table by binary system and is denoted as Mi
Binary system is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, set encryption parameter
Figure 905772DEST_PATH_IMAGE003
Figure 548106DEST_PATH_IMAGE004
Figure 747509DEST_PATH_IMAGE007
Figure 52589DEST_PATH_IMAGE008
With
Figure 386618DEST_PATH_IMAGE009
Initial value for encryption when initial value, initial value when setting encryption variables j, d, e, f, g, h, r, p and q initial value as encryption, it is k=0 that binary operator, which controls variable k initial value design, by ternary circulation ciphering process, and it is M that binary operator, which controls decryption computing during variable k=0,i=
Figure 130669DEST_PATH_IMAGE018
Figure 182939DEST_PATH_IMAGE010
Figure 26130DEST_PATH_IMAGE019
Figure 11404DEST_PATH_IMAGE011
Figure 383479DEST_PATH_IMAGE018
Figure 569927DEST_PATH_IMAGE019
Figure 359208DEST_PATH_IMAGE018
Figure 245125DEST_PATH_IMAGE014
Figure 571064DEST_PATH_IMAGE019
Figure 858826DEST_PATH_IMAGE015
Figure 979229DEST_PATH_IMAGE019
Figure 618020DEST_PATH_IMAGE016
Figure 324814DEST_PATH_IMAGE019
Figure 342449DEST_PATH_IMAGE017
Figure 23966DEST_PATH_IMAGE019
, it is M that binary operator, which controls decryption computing during variable k=1,i=
Figure 759841DEST_PATH_IMAGE020
Figure 552216DEST_PATH_IMAGE010
 
Figure 424357DEST_PATH_IMAGE021
Figure 276775DEST_PATH_IMAGE011
 
Figure 499946DEST_PATH_IMAGE020
Figure 830434DEST_PATH_IMAGE012
   
Figure 425046DEST_PATH_IMAGE014
 
Figure 537358DEST_PATH_IMAGE021
 
Figure 663763DEST_PATH_IMAGE020
 
Figure 302872DEST_PATH_IMAGE020
Figure 402415DEST_PATH_IMAGE017
 
Figure 618633DEST_PATH_IMAGE020
, it is M that binary operator, which controls decryption computing during variable k=2,i=
Figure 969980DEST_PATH_IMAGE022
Figure 915939DEST_PATH_IMAGE010
Figure 327329DEST_PATH_IMAGE022
Figure 358739DEST_PATH_IMAGE011
Figure 248197DEST_PATH_IMAGE023
Figure 314242DEST_PATH_IMAGE012
Figure 630954DEST_PATH_IMAGE022
Figure 149660DEST_PATH_IMAGE013
Figure 763361DEST_PATH_IMAGE014
Figure 522556DEST_PATH_IMAGE015
Figure 753817DEST_PATH_IMAGE023
Figure 528875DEST_PATH_IMAGE016
Figure 946267DEST_PATH_IMAGE017
Figure 981219DEST_PATH_IMAGE022
, it is M that binary operator, which controls decryption computing during variable k=3,i=
Figure 610783DEST_PATH_IMAGE024
Figure 705778DEST_PATH_IMAGE010
Figure 686373DEST_PATH_IMAGE024
Figure 259436DEST_PATH_IMAGE011
Figure 489013DEST_PATH_IMAGE025
Figure 142028DEST_PATH_IMAGE024
Figure 307933DEST_PATH_IMAGE015
Figure 907542DEST_PATH_IMAGE024
Figure 692144DEST_PATH_IMAGE025
Figure 535335DEST_PATH_IMAGE017
Figure 989450DEST_PATH_IMAGE024
, it is M that binary operator, which controls decryption computing during variable k=4,i=
Figure 892684DEST_PATH_IMAGE026
Figure 586577DEST_PATH_IMAGE010
Figure 108825DEST_PATH_IMAGE026
Figure 542081DEST_PATH_IMAGE011
Figure 377499DEST_PATH_IMAGE012
Figure 703438DEST_PATH_IMAGE026
Figure 111602DEST_PATH_IMAGE027
Figure 750394DEST_PATH_IMAGE014
Figure 614445DEST_PATH_IMAGE026
Figure 756713DEST_PATH_IMAGE015
Figure 313597DEST_PATH_IMAGE027
Figure 174105DEST_PATH_IMAGE016
Figure 838622DEST_PATH_IMAGE017
Figure 566406DEST_PATH_IMAGE027
, it is M that binary operator, which controls decryption computing during variable k=5,i=
Figure 648632DEST_PATH_IMAGE028
Figure 120064DEST_PATH_IMAGE010
Figure 236925DEST_PATH_IMAGE029
Figure 401190DEST_PATH_IMAGE011
Figure 111657DEST_PATH_IMAGE029
Figure 245835DEST_PATH_IMAGE012
Figure 92569DEST_PATH_IMAGE029
Figure 286790DEST_PATH_IMAGE013
Figure 218973DEST_PATH_IMAGE029
Figure 156842DEST_PATH_IMAGE014
Figure 123661DEST_PATH_IMAGE028
Figure 908264DEST_PATH_IMAGE029
Figure 384244DEST_PATH_IMAGE016
Figure 205570DEST_PATH_IMAGE028
Figure 476014DEST_PATH_IMAGE017
Figure 976266DEST_PATH_IMAGE029
, it is M that binary operator, which controls decryption computing during variable k=6,i=
Figure 131304DEST_PATH_IMAGE030
Figure 943488DEST_PATH_IMAGE010
Figure 525779DEST_PATH_IMAGE031
Figure 513327DEST_PATH_IMAGE011
Figure 331110DEST_PATH_IMAGE030
Figure 4854DEST_PATH_IMAGE030
Figure 620643DEST_PATH_IMAGE013
Figure 242117DEST_PATH_IMAGE030
Figure 423700DEST_PATH_IMAGE014
Figure 347793DEST_PATH_IMAGE030
Figure 309933DEST_PATH_IMAGE015
Figure 125311DEST_PATH_IMAGE031
Figure 754876DEST_PATH_IMAGE016
Figure 849871DEST_PATH_IMAGE030
Figure 627203DEST_PATH_IMAGE017
Figure 465846DEST_PATH_IMAGE031
, it is M that binary operator, which controls decryption computing during variable k=7,i=
Figure 215496DEST_PATH_IMAGE032
Figure 481392DEST_PATH_IMAGE010
Figure 683703DEST_PATH_IMAGE033
Figure 60458DEST_PATH_IMAGE011
Figure 664615DEST_PATH_IMAGE032
Figure 853337DEST_PATH_IMAGE033
Figure 33782DEST_PATH_IMAGE013
Figure 758025DEST_PATH_IMAGE033
Figure 365723DEST_PATH_IMAGE014
Figure 323501DEST_PATH_IMAGE015
Figure 902250DEST_PATH_IMAGE033
Figure 266421DEST_PATH_IMAGE032
Figure 788669DEST_PATH_IMAGE017
, first M from binary system decryption anti-counterfeiting information table1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiCorresponding decryption computing is carried out, binary system anti-counterfeiting information is solved
Figure 171426DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.
Brief description of the drawings
The present invention is further described below in conjunction with the accompanying drawings.
Fig. 1 is the overall structure figure of the present invention.
Fig. 2 is A-A sectional views of the present invention.
Fig. 3 loads anti-counterfeiting information flow chart.
Fig. 4 extracts anti-counterfeiting information flow chart.
Embodiment
As in Fig. 1 and Fig. 2, anti-fake information storage trademark, it is made up of trade mark page paper 7-1, amplitude 6-1 to the 6-150 being printed on trade mark page paper 7-1, horizontal scanning line 1-1 to the 1-15 being printed on trade mark page paper 7-1, column scan line 2-1 to the 2-10 being printed on trade mark page paper 7-1, image and word on trade mark page paper 7-1 are made up of amplitude 6-1 to 6-150
According to storage binary system encryption anti-fake information, a part of amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, another part amplitude on trade mark page paper 7-1 is formed by dielectric ink printing, horizontal scanning line 1-1 to 1-15 and column scan line 2-1 to 2-10 on trade mark page paper 7-1 are formed by the printing of electrically conducting transparent ink
In Fig. 1, the dark amplitude on trade mark page paper 7-1 is formed by electrically conductive ink printing, and the light amplitude on trade mark page paper 7-1 is formed by dielectric ink printing,
The amplitude being printed on trade mark page paper 7-1 is divided into 15 rows 10 on trade mark paper and arranged, amplitude 6-1 to 6-150 is neat arranged in arrays on trade mark page paper 7-1, i is allowed to take 1 to 15, j is allowed to take 1 to 10, j-th strip column scan line on trade mark page paper 7-1 is electrically connected with the basal surface of each amplitude of the jth row on trade mark page paper 7-1, i-th horizontal scanning line on trade mark page paper 7-1 is electrically connected with the upper surface of each amplitude of the i-th row on trade mark page paper 7-1
When the binary system encryption anti-fake information for needing to store the trade mark page is read, the 1st article of horizontal scanning line on trade mark page paper 7-1 is set to high level successively to the 15th article of horizontal scanning line,
When the 1st article of horizontal scanning line 1-1 on trade mark page paper 7-1 is set to high level, the binary system encryption anti-fake information of the 1st row storage on trade mark page paper 7-1 is with 0, 1 code form is exported from the 1st bar of column scan line to the 10th bar of column scan line, the 1st row on trade mark page paper 7-1 exports binary message 1 by electrically conductive ink printing into amplitude, the 1st row on trade mark page paper 7-1 exports binary message 0 by dielectric ink printing into amplitude, therefore the binary system encryption anti-fake information 1100001000 that the 1st row is read, above-mentioned readout is repeated to other rows on trade mark page paper 7-1.
In loading anti-counterfeiting information flow chart 3, original anti-counterfeiting information(Image, word)It is digitized into processing, the binary system anti-counterfeiting information table of 8 one group of generation, 8 one group of binary messages in binary system anti-counterfeiting information table are expanded into 32 one group of binary messages, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary message in 32 one group of binary system anti-counterfeiting information tables are denoted as, i is the positive integer more than 0, from first 32 binary system encryption anti-fake information in 32 one group of binary system anti-counterfeiting information tablesStart, to each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 936623DEST_PATH_IMAGE001
Carry out ternary circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize that trademark anti-counterfeit prints, pass through non-obvious the embedded extractible anti-counterfeiting information in the trade mark page, realize trademark anti-counterfeit.
In anti-counterfeiting information flow chart 4 is extracted, when extracting anti-counterfeiting information, the electric conductivity signal of trade mark page halftone dot image is gathered first, by the electric conductivity identification to amplitude, differentiate the electric conductivity of amplitude, extract the electric conductivity information of amplitude, demodulate the electric conductivity information of trade mark page amplitude, the binary modulated signal of 32 one group of output, channel decoding is carried out to 32 one group of binary modulated signal of demodulation output, generation binary system decryption anti-counterfeiting information table after channel decoding.
The binary system generated after decoding is decrypted into 32 binary message M in anti-counterfeiting information tableiPosition control variable i initial value design be i=1, initial value when setting the initial value of encryption parameter as encryption, initial value when setting the initial value of encryption variables as encryption, it is k=0 that binary operator, which controls variable k initial value design, first M from the binary system decryption anti-counterfeiting information table of generation1Start, each 32 binary message M in anti-counterfeiting information table are decrypted to binary systemiComputing is decrypted, binary system anti-counterfeiting information is solved
Figure 57026DEST_PATH_IMAGE001
, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, remove high 24, recover 8 one group of binary system anti-counterfeiting information table of generation, recover anti-counterfeiting signal and simultaneously export anti-counterfeiting information.

Claims (1)

1. a kind of generate binary modulated signal by anti-counterfeiting information by cryptographic calculation and channel coding, and the multivariate multi-parameter gradient ternary being embedded in anti-counterfeiting information in full page by circulating tabling look-up modulation mode circulates anti-fake information storage trademark,It is characterized in that:Anti-counterfeiting information stores trade mark, it is made up of trade mark page paper, the amplitude being printed on trade mark page paper, the horizontal scanning line being printed on trade mark page paper, the column scan line being printed on trade mark page paper, according to the binary system encryption anti-fake information of storage, a part of amplitude on trade mark page paper is formed by electrically conductive ink printing, another part amplitude on trade mark page paper is formed by dielectric ink printing, horizontal scanning line and column scan line on trade mark page paper are formed by the printing of electrically conducting transparent ink
In order to which the encryption for realizing trademark anti-counterfeit information is stored, processing is digitized to image false-proof information and character anti-counterfeiting information first, utilize image false-proof information and the binary system anti-counterfeiting information table of 8 one group of character anti-counterfeiting information generation, to prevent from producing information spillover in ciphering process, each 8 one group of binary system anti-counterfeiting information in binary system anti-counterfeiting information table are expanded into 32 one group of binary system anti-counterfeiting information, generate high 24 be all 0 32 one group of binary system anti-counterfeiting information tables, i-th group of 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables are denoted as
Figure 205542DEST_PATH_IMAGE001
, i-th group of 32 binary system encryption anti-fake information in 32 one group of binary system encryption anti-fake information tables are denoted as Hi, i is the positive integer more than 0, and binary system encryption parameter is denoted as respectively
Figure 710473DEST_PATH_IMAGE002
Figure 930102DEST_PATH_IMAGE003
Figure 520483DEST_PATH_IMAGE004
Figure 483760DEST_PATH_IMAGE005
Figure 401202DEST_PATH_IMAGE008
With
Figure 902591DEST_PATH_IMAGE009
, encryption parameter
Figure 382114DEST_PATH_IMAGE002
Figure 943545DEST_PATH_IMAGE003
Figure 508519DEST_PATH_IMAGE004
Figure 813598DEST_PATH_IMAGE005
Figure 413207DEST_PATH_IMAGE006
Figure 145539DEST_PATH_IMAGE007
Figure 932230DEST_PATH_IMAGE008
With
Figure 41000DEST_PATH_IMAGE009
For 0 to 256 binary system positive integer, binary system encryption variables are denoted as j, d, e, f, g, h, r, p and q respectively, encryption variables j, d, e, f, g, h, r, p and q are 0 to 256 binary system positive integer, binary operator control variable is denoted as k, binary operator controls the binary system positive integer that variable k is 0≤k≤7, operator
Figure 804874DEST_PATH_IMAGE011
Figure 725742DEST_PATH_IMAGE013
Figure 158997DEST_PATH_IMAGE014
Figure 108499DEST_PATH_IMAGE015
Figure 259995DEST_PATH_IMAGE016
Figure 320354DEST_PATH_IMAGE017
Using+,-, ×, four kinds of operators, binary operator control variable k=0 when
Figure 994098DEST_PATH_IMAGE011
Figure 639209DEST_PATH_IMAGE014
Figure 930513DEST_PATH_IMAGE015
Figure 791022DEST_PATH_IMAGE016
Figure 458764DEST_PATH_IMAGE017
Be respectively defined as-,+, × ,+, × ,-, × ,+, during binary operator control variable k=1
Figure 721118DEST_PATH_IMAGE010
Figure 183323DEST_PATH_IMAGE011
Figure 531128DEST_PATH_IMAGE012
Figure 2560DEST_PATH_IMAGE013
Figure 119421DEST_PATH_IMAGE014
Figure 752528DEST_PATH_IMAGE015
Figure 56470DEST_PATH_IMAGE016
Figure 190648DEST_PATH_IMAGE017
Be respectively defined as+, × ,+,+,-, × ,+, ×, during binary operator control variable k=2
Figure 37381DEST_PATH_IMAGE010
Figure 231602DEST_PATH_IMAGE011
Figure 757262DEST_PATH_IMAGE012
Figure 570497DEST_PATH_IMAGE013
Figure 396370DEST_PATH_IMAGE014
Figure 636859DEST_PATH_IMAGE015
Figure 180973DEST_PATH_IMAGE016
Figure 532320DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,+, × ,-,+,-, during binary operator control variable k=3
Figure 478279DEST_PATH_IMAGE010
Figure 889669DEST_PATH_IMAGE011
Figure 389920DEST_PATH_IMAGE012
Figure 669592DEST_PATH_IMAGE013
Figure 345424DEST_PATH_IMAGE014
Figure 52348DEST_PATH_IMAGE015
Figure 446421DEST_PATH_IMAGE016
Figure 264204DEST_PATH_IMAGE017
Be respectively defined as-, × ,+,-, × ,-,+, ×, during binary operator control variable k=4
Figure 60122DEST_PATH_IMAGE010
Figure 147212DEST_PATH_IMAGE012
Figure 644053DEST_PATH_IMAGE013
Figure 467838DEST_PATH_IMAGE015
Figure 707276DEST_PATH_IMAGE016
Figure 742228DEST_PATH_IMAGE017
Be respectively defined as+, × ,-, × ,+,-,+, ×, during binary operator control variable k=5
Figure 637372DEST_PATH_IMAGE010
Figure 732367DEST_PATH_IMAGE011
Figure 447382DEST_PATH_IMAGE012
Figure 286025DEST_PATH_IMAGE013
Figure 35675DEST_PATH_IMAGE014
Figure 895047DEST_PATH_IMAGE015
Figure 972724DEST_PATH_IMAGE016
Figure 474113DEST_PATH_IMAGE017
Be respectively defined as × ,+, × ,-,+,+,-, ×, during binary operator control variable k=6
Figure 953635DEST_PATH_IMAGE010
Figure 515067DEST_PATH_IMAGE011
Figure 80040DEST_PATH_IMAGE012
Figure 385120DEST_PATH_IMAGE013
Figure 920323DEST_PATH_IMAGE015
Figure 97227DEST_PATH_IMAGE016
Be respectively defined as × ,+,+,-, × ,+,+, ×, during binary operator control variable k=7
Figure 394533DEST_PATH_IMAGE010
Figure 173133DEST_PATH_IMAGE011
Figure 359581DEST_PATH_IMAGE013
Figure 792836DEST_PATH_IMAGE014
Figure 335813DEST_PATH_IMAGE015
Figure 362675DEST_PATH_IMAGE016
Figure 547668DEST_PATH_IMAGE017
Be respectively defined as+, ×, × ,-,+,-,-, ×, ternary circulation cryptographic calculation is defined as H during binary operator control variable k=0i=
Figure 710797DEST_PATH_IMAGE018
Figure 221412DEST_PATH_IMAGE010
Figure 469991DEST_PATH_IMAGE019
Figure 458676DEST_PATH_IMAGE011
Figure 741889DEST_PATH_IMAGE018
Figure 157827DEST_PATH_IMAGE012
Figure 487177DEST_PATH_IMAGE019
Figure 154919DEST_PATH_IMAGE013
Figure 417273DEST_PATH_IMAGE018
Figure 879479DEST_PATH_IMAGE014
Figure 227283DEST_PATH_IMAGE019
Figure 433137DEST_PATH_IMAGE015
Figure 752626DEST_PATH_IMAGE019
Figure 621224DEST_PATH_IMAGE017
Figure 733537DEST_PATH_IMAGE019
, ternary circulation cryptographic calculation is defined as H during binary operator control variable k=1i
Figure 662179DEST_PATH_IMAGE020
 
Figure 532232DEST_PATH_IMAGE021
Figure 92526DEST_PATH_IMAGE011
 
Figure 333014DEST_PATH_IMAGE020
Figure 877128DEST_PATH_IMAGE012
 
Figure 821950DEST_PATH_IMAGE021
Figure 643276DEST_PATH_IMAGE013
 
Figure 179299DEST_PATH_IMAGE020
Figure 409379DEST_PATH_IMAGE014
 
Figure 892313DEST_PATH_IMAGE021
Figure 958358DEST_PATH_IMAGE015
 
Figure 540649DEST_PATH_IMAGE020
Figure 59355DEST_PATH_IMAGE016
 
Figure 752504DEST_PATH_IMAGE020
Figure 407477DEST_PATH_IMAGE017
 
Figure 160669DEST_PATH_IMAGE020
, ternary circulation cryptographic calculation is defined as H during binary operator control variable k=2i=
Figure 635513DEST_PATH_IMAGE022
Figure 256987DEST_PATH_IMAGE010
Figure 907411DEST_PATH_IMAGE022
Figure 59224DEST_PATH_IMAGE023
Figure 218810DEST_PATH_IMAGE012
Figure 989320DEST_PATH_IMAGE022
Figure 943369DEST_PATH_IMAGE013
Figure 799330DEST_PATH_IMAGE023
Figure 762606DEST_PATH_IMAGE014
Figure 715519DEST_PATH_IMAGE022
Figure 981415DEST_PATH_IMAGE015
Figure 183726DEST_PATH_IMAGE023
Figure 826060DEST_PATH_IMAGE016
Figure 430217DEST_PATH_IMAGE022
Figure 867015DEST_PATH_IMAGE017
Figure 963147DEST_PATH_IMAGE022
, ternary circulation cryptographic calculation is defined as H during binary operator control variable k=3i=
Figure 268226DEST_PATH_IMAGE024
Figure 602255DEST_PATH_IMAGE010
Figure 334588DEST_PATH_IMAGE024
Figure 386858DEST_PATH_IMAGE011
Figure 230049DEST_PATH_IMAGE024
Figure 684164DEST_PATH_IMAGE012
Figure 587398DEST_PATH_IMAGE025
Figure 82467DEST_PATH_IMAGE014
Figure 368458DEST_PATH_IMAGE024
Figure 531586DEST_PATH_IMAGE016
Figure 776622DEST_PATH_IMAGE025
Figure 290780DEST_PATH_IMAGE017
Figure 279465DEST_PATH_IMAGE024
, ternary circulation cryptographic calculation is defined as H during binary operator control variable k=4i=
Figure 714491DEST_PATH_IMAGE026
Figure 506867DEST_PATH_IMAGE011
Figure 379008DEST_PATH_IMAGE026
Figure 231426DEST_PATH_IMAGE012
Figure 454597DEST_PATH_IMAGE026
Figure 909718DEST_PATH_IMAGE013
Figure 925265DEST_PATH_IMAGE014
Figure 516049DEST_PATH_IMAGE015
Figure 628362DEST_PATH_IMAGE027
Figure 557004DEST_PATH_IMAGE016
Figure 754767DEST_PATH_IMAGE026
Figure 393876DEST_PATH_IMAGE027
, ternary circulation cryptographic calculation is defined as H during binary operator control variable k=5i=
Figure 493419DEST_PATH_IMAGE028
Figure 178478DEST_PATH_IMAGE010
Figure 654459DEST_PATH_IMAGE029
Figure 475784DEST_PATH_IMAGE011
Figure 11808DEST_PATH_IMAGE029
Figure 918584DEST_PATH_IMAGE012
Figure 932676DEST_PATH_IMAGE029
Figure 874087DEST_PATH_IMAGE013
Figure 315433DEST_PATH_IMAGE029
Figure 709505DEST_PATH_IMAGE014
Figure 527288DEST_PATH_IMAGE028
Figure 323206DEST_PATH_IMAGE015
Figure 201032DEST_PATH_IMAGE029
Figure 82401DEST_PATH_IMAGE016
Figure 438296DEST_PATH_IMAGE028
Figure 88720DEST_PATH_IMAGE017
Figure 137447DEST_PATH_IMAGE029
, ternary circulation cryptographic calculation is defined as H during binary operator control variable k=6i=
Figure 506112DEST_PATH_IMAGE030
Figure 72222DEST_PATH_IMAGE010
Figure 701787DEST_PATH_IMAGE031
Figure 796782DEST_PATH_IMAGE011
Figure 777376DEST_PATH_IMAGE030
Figure 350440DEST_PATH_IMAGE012
Figure 100090DEST_PATH_IMAGE030
Figure 365986DEST_PATH_IMAGE013
Figure 814788DEST_PATH_IMAGE030
Figure 941193DEST_PATH_IMAGE031
Figure 856059DEST_PATH_IMAGE016
Figure 580302DEST_PATH_IMAGE030
Figure 188001DEST_PATH_IMAGE017
Figure 364904DEST_PATH_IMAGE031
, ternary circulation cryptographic calculation is defined as H during binary operator control variable k=7i=
Figure 83461DEST_PATH_IMAGE032
Figure 662210DEST_PATH_IMAGE010
Figure 440810DEST_PATH_IMAGE033
Figure 627258DEST_PATH_IMAGE032
Figure 60513DEST_PATH_IMAGE012
Figure 10015DEST_PATH_IMAGE033
Figure 895931DEST_PATH_IMAGE013
Figure 221870DEST_PATH_IMAGE033
Figure 630035DEST_PATH_IMAGE033
Figure 132878DEST_PATH_IMAGE033
Figure 275146DEST_PATH_IMAGE016
Figure 832029DEST_PATH_IMAGE032
Figure 692538DEST_PATH_IMAGE017
Figure 94700DEST_PATH_IMAGE033
, set encryption parameter
Figure 357054DEST_PATH_IMAGE002
Figure 84839DEST_PATH_IMAGE003
Figure 428051DEST_PATH_IMAGE004
Figure 398019DEST_PATH_IMAGE005
Figure 514879DEST_PATH_IMAGE006
Figure 147986DEST_PATH_IMAGE007
Figure 983087DEST_PATH_IMAGE008
WithInitial value, setting encryption variables j, d, e, f, g, h, r, p and q initial value set initial value that binary operator controls variable k as k=0, sets 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tables
Figure 495156DEST_PATH_IMAGE001
Position control variable i=1, setting 32 one group of binary system encryption anti-fake information tables in 32 binary system encryption anti-fake information HiPosition control variable i=1, it is right
Figure 689377DEST_PATH_IMAGE034
Carry out H1=
Figure 588566DEST_PATH_IMAGE019
Figure 688109DEST_PATH_IMAGE011
Figure 373169DEST_PATH_IMAGE035
Figure 317991DEST_PATH_IMAGE012
Figure 263950DEST_PATH_IMAGE019
Figure 472077DEST_PATH_IMAGE013
Figure 658525DEST_PATH_IMAGE014
Figure 458991DEST_PATH_IMAGE019
Figure 559988DEST_PATH_IMAGE019
Figure 642531DEST_PATH_IMAGE019
Figure 520357DEST_PATH_IMAGE017
Figure 136146DEST_PATH_IMAGE019
Ternary circulation cryptographic calculation(Wherein k=0), generate first binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table1, it is right
Figure 288779DEST_PATH_IMAGE034
Carry out H1=
Figure 63837DEST_PATH_IMAGE035
Figure 987930DEST_PATH_IMAGE010
Figure 481228DEST_PATH_IMAGE019
Figure 777167DEST_PATH_IMAGE011
Figure 406731DEST_PATH_IMAGE035
Figure 501726DEST_PATH_IMAGE012
Figure 216741DEST_PATH_IMAGE019
Figure 55384DEST_PATH_IMAGE013
Figure 805035DEST_PATH_IMAGE035
Figure 70931DEST_PATH_IMAGE014
Figure 273242DEST_PATH_IMAGE019
Figure 649997DEST_PATH_IMAGE015
Figure 690951DEST_PATH_IMAGE016
Figure 561004DEST_PATH_IMAGE017
Figure 285246DEST_PATH_IMAGE019
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while ternary circulation cryptographic calculation, next ternary circulation cryptographic calculation is pointed to H2=
Figure 892945DEST_PATH_IMAGE020
Figure 804269DEST_PATH_IMAGE010
Figure 99990DEST_PATH_IMAGE036
Figure 678739DEST_PATH_IMAGE011
Figure 457339DEST_PATH_IMAGE020
Figure 855960DEST_PATH_IMAGE012
Figure 378208DEST_PATH_IMAGE036
Figure 811463DEST_PATH_IMAGE013
Figure 760965DEST_PATH_IMAGE020
Figure 912460DEST_PATH_IMAGE014
Figure 972820DEST_PATH_IMAGE036
Figure 932686DEST_PATH_IMAGE015
Figure 177723DEST_PATH_IMAGE020
Figure 414986DEST_PATH_IMAGE020
Figure 698200DEST_PATH_IMAGE017
Figure 114138DEST_PATH_IMAGE020
(Wherein k=1), generate second binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table2, it is right
Figure 850012DEST_PATH_IMAGE037
Carry out H2=
Figure 642388DEST_PATH_IMAGE020
Figure 780108DEST_PATH_IMAGE010
Figure 366947DEST_PATH_IMAGE036
Figure 590118DEST_PATH_IMAGE011
Figure 178411DEST_PATH_IMAGE012
Figure 936152DEST_PATH_IMAGE036
Figure 646619DEST_PATH_IMAGE013
Figure 780797DEST_PATH_IMAGE020
Figure 627530DEST_PATH_IMAGE014
Figure 821751DEST_PATH_IMAGE036
Figure 753935DEST_PATH_IMAGE015
Figure 816438DEST_PATH_IMAGE020
Figure 517678DEST_PATH_IMAGE016
Figure 882800DEST_PATH_IMAGE020
Figure 302280DEST_PATH_IMAGE017
I+1, q+1, j+1, d+1, e+1, f+1, g+1, h+1, r+1, p+1 and k+1 computing are carried out while ternary circulation cryptographic calculation, next ternary circulation cryptographic calculation is pointed to H3=
Figure 611305DEST_PATH_IMAGE022
Figure 147328DEST_PATH_IMAGE010
Figure 54105DEST_PATH_IMAGE022
Figure 333776DEST_PATH_IMAGE011
Figure 9608DEST_PATH_IMAGE038
Figure 716533DEST_PATH_IMAGE012
Figure 110605DEST_PATH_IMAGE022
Figure 928389DEST_PATH_IMAGE013
Figure 724306DEST_PATH_IMAGE038
Figure 336553DEST_PATH_IMAGE014
Figure 217922DEST_PATH_IMAGE022
Figure 839396DEST_PATH_IMAGE015
Figure 489820DEST_PATH_IMAGE038
Figure 538547DEST_PATH_IMAGE016
Figure 641633DEST_PATH_IMAGE022
Figure 801219DEST_PATH_IMAGE017
Figure 102887DEST_PATH_IMAGE022
(Wherein k=2), generate the 3rd binary system encryption anti-fake information H in 32 one group of binary system encryption anti-fake information table3, this ternary circulation cryptographic calculation goes on until last 32 binary system anti-counterfeiting information in binary system anti-counterfeiting information table always, by each 32 binary system anti-counterfeiting information in 32 one group of binary system anti-counterfeiting information tablesCarry out ternary circulation cryptographic calculation, generation 32 one group of binary system encryption anti-fake information tables corresponding with 32 one group of binary system anti-counterfeiting information tables, processing is digitized to amplitude in label printing, amplitude is set to two kinds, the amplitude wherein printed by dielectric ink is defined as numeral 0, the amplitude printed by electrically conductive ink is defined as numeral 1, modulate the printing process of the amplitude on the trade mark page by circulating look-up table using 32 one group of binary system encryption anti-fake information of generation during label printing, the regular electric conductivity according to above two amplitude of amplitude on the trade mark page is changed by selecting dielectric ink and electrically conductive ink to print amplitude, adjacent 32 amplitudes constitute one group of 32 binary message on the trade mark page after modulation, so that carrying anti-counterfeiting information by the change of amplitude electric conductivity on the trade mark page, and the anti-counterfeiting information is embedded in whole trade mark page site, realize trademark anti-counterfeit.
CN201310022310.9A 2013-01-22 2013-01-22 Multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand Expired - Fee Related CN103136565B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310022310.9A CN103136565B (en) 2013-01-22 2013-01-22 Multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310022310.9A CN103136565B (en) 2013-01-22 2013-01-22 Multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand

Publications (2)

Publication Number Publication Date
CN103136565A true CN103136565A (en) 2013-06-05
CN103136565B CN103136565B (en) 2015-06-17

Family

ID=48496373

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310022310.9A Expired - Fee Related CN103136565B (en) 2013-01-22 2013-01-22 Multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand

Country Status (1)

Country Link
CN (1) CN103136565B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080297853A1 (en) * 2005-12-01 2008-12-04 Peking University Founder Group Co., Ltd. Methods and Apparatus for Embedding and Detecting Digital Watermarks in a Text Document
CN101320433A (en) * 2008-06-20 2008-12-10 王立国 Anti-counterfeit method by graded encryption
US20100060942A1 (en) * 2008-09-10 2010-03-11 Xerox Corporation Encoding message data in a cover contone image via halftone dot orientation
CN102270312A (en) * 2011-07-19 2011-12-07 北京中科联众科技股份有限公司 Method for making point bitmap, and goods-fleeing prevention verification method
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080297853A1 (en) * 2005-12-01 2008-12-04 Peking University Founder Group Co., Ltd. Methods and Apparatus for Embedding and Detecting Digital Watermarks in a Text Document
CN101320433A (en) * 2008-06-20 2008-12-10 王立国 Anti-counterfeit method by graded encryption
US20100060942A1 (en) * 2008-09-10 2010-03-11 Xerox Corporation Encoding message data in a cover contone image via halftone dot orientation
CN102831453A (en) * 2011-06-14 2012-12-19 北京印刷学院 Page storage for printing electronic book pages
CN102270312A (en) * 2011-07-19 2011-12-07 北京中科联众科技股份有限公司 Method for making point bitmap, and goods-fleeing prevention verification method

Also Published As

Publication number Publication date
CN103136565B (en) 2015-06-17

Similar Documents

Publication Publication Date Title
CN103106442A (en) Single variable parameter transmutation multi-element encryption anti-fake information storage trademark
CN103106460A (en) Multi-parametric-variable gradient hierarchical gradient polynary encryption anti-fake storage trademark
CN103106513A (en) Multi-parameter univariate poly encryption anti-fake information storage trademark
CN103136565A (en) Multi-variable multi-parameter gradient ternary circulating encryption anti-fake information storage brand
CN103106453A (en) Multi-parameter ternary variant circulating encryption anti-fake information storage brand
CN103106451A (en) Multi-variable-parameter gradient ternary-variant circulating encryption anti-fake information storage brand
CN103106440A (en) Multi-parameter unitary encryption anti-fake information storage brand
CN103116788A (en) Multi-parameter binary variable cycle encryption anti-counterfeiting information storage trademark
CN103106441A (en) Multi-variable-parameter gradient multi-variant encryption anti-fake information storage brand
CN103116774B (en) Parameter transmutation unary circulation encryption anti-fake information storage trademark
CN103136567A (en) One-parameter variable gradient binary encryption anti-fake information storage brand
CN103106443A (en) One-parameter double-variant unary encryption anti-fake information storage brand
CN103106449B (en) Single parameter multivariable ternary variable circulation encryption anti-counterfeiting information storage trademark
CN103116797A (en) Multivariable multi-parameter gradient multivariate variable circulation encryption anti-fake information storage trademark
CN103106457A (en) Single parameter ternary circulation encryption anti-counterfeiting information storage trademark
CN103106447A (en) Single parameter binary variable circulation encryption anti-counterfeiting information storage trademark
CN103106479B (en) Parameter transmutation binary circulation encryption anti-fake information storage trademark
CN103106512A (en) Multiparameter multivariable ternary encryption anti-fake information storage trademark
CN103116796A (en) One-parameter variation transmutation unary encryption anti-fake information storage trademark
CN103106438A (en) Parameter-gradient multivariable multi-encryption anti-fake information storage trademark
CN103106439A (en) Multiparameter multivariable binary encryption anti-fake information storage trademark
CN103106450A (en) Single parameter multivariable unitary circulation encryption anti-counterfeiting information storage trademark
CN103106448A (en) Single variable parameter transmutation binary variable circulation encryption anti-fake information storage trademark
CN103106429A (en) Single variable parameter transmutation ternary variable circulation encryption anti-fake information storage trademark
CN103106432A (en) Multi-parametric-variable gradient unitary circulating encryption anti-fake information storage trademark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150617

Termination date: 20190122

CF01 Termination of patent right due to non-payment of annual fee