Method for visual cryptography and counterfeit prevention of patterns

A visual encryption and pattern technology, applied in the field of anti-counterfeiting, can solve the problems of long development cycle, inconvenience for consumers, failure of anti-counterfeiting patterns, etc., and achieve the effect of low cost, easy identification and convenient production

Inactive Publication Date: 2010-09-15
TSINGHUA UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing pattern anti-counterfeiting technology research, holographic anti-counterfeiting is gradually developing in the direction of large viewing angle, multiple transformations, and strong three-dimensional effect. The anti-counterfeiting effect is good, but the development cycle is relatively long, and low-level holographic technology is easy to be imitated; The anti-counterfeiting pattern produced by ink anti-counterfeiting is easy to distinguish and analyze, but the difficulty of counterfeiting is mainly limited to the raw materials and production process. Counterfeiters may obtain raw materials and production process through various channels to make the anti-counterfeiting pattern invalid; digital anti-counterfeiting technology uses encryption technology, coding technology , communication technology, etc. generate a unique anti-counterfeiting query code for each product, and consumers can identify the authenticity through inquiries (telephone or Internet, etc.), which solves the problem of being easy to forge, but its identification is not a direct analysis, but needs to be carried out Inquiry, which brings inconvenience to consumers, and many consumers are unwilling to check, which also provides an opportunity for counterfeiters

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for visual cryptography and counterfeit prevention of patterns
  • Method for visual cryptography and counterfeit prevention of patterns
  • Method for visual cryptography and counterfeit prevention of patterns

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] figure 1 A flow chart of a visual encryption anti-counterfeiting method 100 for generating a pattern of a second-order encrypted image E according to the first embodiment of the present invention is shown. Such as figure 1 As shown, first in step 101, generate (or input) a second-order secret image S with the size of row×col. The gray level of the secret image S is 2, that is, the secret image S has only two colors: black and white. The secret image S can be represented as a (row)×(col) matrix. The elements in this matrix are 0 and 1, where 0 represents a white pixel in the secret image S, and 1 represents a black pixel in the secret image S. According to another embodiment of the present invention, the security image S can be input from an image source (such as a memory or an image extraction device (such as a camera)), or can be directly generated by a machine or a human on demand.

[0040]And, in step 101, offset parameters s, t are determined (or input). Here, ...

Embodiment 2

[0055] The computer program flow of the visual encryption anti-counterfeiting method for generating the pattern of the second-order encrypted image E according to the second embodiment of the present invention will be described below, wherein the offset parameters s=0, t=2. The computer program flow includes steps as follows:

[0056] Step 201: Obtain the following basic data: input a binary security image S, the security image has two colors, wherein 0 represents white pixels, 1 represents black pixels, the height (row) of the security image is 200, and the width (col) is 300; encrypt The image E is the offset s=0, t=2 required to restore the secret image S.

[0057] Step 202: Randomly generate a binary grayscale image R of 200×(300+2), wherein 0 represents a white pixel and 1 represents a black pixel;

[0058] Step 203: Starting from the third column in the random image R, process the elements in R column by column, let R(i, j) represent the pixel in row i and column j in R...

Embodiment 3

[0069] Figure 4 A specific encrypted image E realized according to the third embodiment of the present invention is shown. Such as Figure 4 As shown, the secret image S is a black and white binary image, the image size is 100×100, and the offset parameters s=12, t=12.

[0070] It can be seen that the logical XOR operation is performed by the secret image S and the random image R (such as image 3 shown) the obtained encrypted image E is only random black and white image information (such as Figure 4 In the shown encrypted image E), the original secret image S hidden in the encrypted image E cannot be distinguished from the naked eye. By overlapping the two encrypted images E, the original secret image S can be clearly restored. Since the encrypted image E has a good image hiding function, the anti-counterfeit element (such as a label, etc.) formed with the encrypted image E is difficult to be counterfeited, so that it can play a good anti-counterfeiting function.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a visual cryptography and counterfeit prevention method for hiding and maintaining encrypted image information. The visual cryptography and counterfeit prevention method for patterns comprises the following steps: inputting a confidential image S and migration parameters s and t; randomly generating a grey image R; and subjecting the confidential image S and the random image R to the Exclusive-OR operation to generate an encrypted image E, wherein the encrypted image E contains information of the confidential image S. The confidential image S hidden in the encrypted images E is restored by superposing two encrypted images E, thereby achieving the effect of counterfeit prevention. The visual cryptography and counterfeit prevention method for patterns is incorporatedwith rectangular or arc-shaped anti-counterfeiting icons to form counterfeit-prevention elements which are applied to the data carriers such as counterfeit-prevention files and negotiable securities.The counterfeit-prevention algorithm has the characteristics of easy identification, high difficulty in counterfeiting and the like.

Description

technical field [0001] The invention relates to the field of anti-counterfeiting, in particular to a visual encryption anti-counterfeiting method for hiding confidential image information. Background technique [0002] Anti-counterfeiting technology is an ancient research topic. With the increasing prosperity of the market economy and the continuous development of science and technology, it has become a new and changing research field. It integrates chemistry, biology, physics, materials Science, nuclear technology, communication technology, computer science and other emerging edge technologies of many disciplines, and form a complete system of special categories through discipline collaboration. my country's national standard GB / T 17004-1997 defines anti-counterfeiting technology as "a technology adopted for the purpose of anti-counterfeiting, which can accurately identify the authenticity within a certain range and is not easy to be imitated and copied." At present, there...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00G09F3/02B44F1/12B42D25/30
CPCG09C5/00
Inventor 王道顺董琳李顺东戴一奇
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products