Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Arc-shaped anti-fake method and arc-shaped anti-fake element

A technology of anti-counterfeiting components and arcs, which is applied in the field of anti-counterfeiting to achieve unique anti-copying, increase anti-counterfeiting and information hiding, and good anti-counterfeiting effects

Inactive Publication Date: 2011-04-27
TSINGHUA UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if less than k encrypted images overlap, no information about the original confidential image can be obtained even with infinite computing power

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Arc-shaped anti-fake method and arc-shaped anti-fake element
  • Arc-shaped anti-fake method and arc-shaped anti-fake element
  • Arc-shaped anti-fake method and arc-shaped anti-fake element

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0051] Refer below Figure 5-7 A first embodiment of the present invention is described. The first embodiment discloses a method for constructing a rectangular anti-counterfeiting icon by using the single-image visual sharing technique. Specifically, Figure 5 An original security image according to the first embodiment of the present invention is shown. Such as Figure 5 As shown, the original security image is a binary (black and white) rectangular security image S containing the letter pattern "Tsinghua", with a height of row=126, and a width of col=471. The horizontal offset and vertical offset of the target single visible encrypted image are s=12 and t=12 respectively. The following describes the use of a single visual sharing scheme according to the first embodiment of the present invention (that is, the method for recovering a secret image by using only a single sharing image (encrypted image) and its copy) according to Figure 5 The secret image S shown is generat...

no. 2 example

[0065] Refer below Figure 8-10 A second embodiment of the present invention is described. The second embodiment discloses a method for constructing a ring-shaped anti-counterfeiting icon by using the single-image visual sharing technology. Specifically, Figure 8 An original security image according to a second embodiment of the present invention is shown. Such as Figure 8 As shown, the original security image is a binary (black and white) rectangular security image S containing the letter pattern "Tsinghua", the height is row=76, and the width is col=338, where white pixels are represented by 0 and black pixels are represented by 1.

[0066] The steps of constructing the circular anti-counterfeit icon are as follows: First, similar to the first embodiment disclosed above, a binary rectangular encrypted icon E is constructed. Then, map the rectangular encryption icon E into a ring encryption icon (such as Figure 9 shown). Here, those skilled in the field of image proc...

no. 3 example

[0069] Refer below Figures 11 to 13 A third embodiment of the present invention is described. The third embodiment discloses a method for constructing an arc-shaped anti-counterfeiting icon by using the single-image visual sharing technology. Specifically, Figure 11 An original security image according to a third embodiment of the present invention is shown. Such as Figure 11 As shown, the original security image is a binary (black and white) rectangular security image S containing the letter pattern "Tsinghua", the height is row=76, and the width is col=87, where white pixels are represented by 0 and black pixels are represented by 1.

[0070] The steps of constructing an arc-shaped anti-counterfeiting icon are as follows: firstly, similar to the aforementioned second embodiment, a binary rectangular encrypted icon E is constructed. Then, utilize any known image processing software to map the encrypted icon E into an arc, and make two identical transparent sheets E and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an arc-like anti-counterfeiting method for concealing confidential image information and a manufacturing method of such kind of arc-like anti-counterfeiting element. The anti-counterfeiting method comprises the following steps: constructing two same or different rectangular encrypted icons by using visual sharing technology according to a confidential image, then the rectangular encrypted icons are mapped as arc-like encrypted icons, so that two arc-like encrypted icons are constructed; for two different encrypted icons, restoring a confidential image by matched overlapping of the two different encrypted icons; and for two same encrypted icons, restoring a confidential image by unmatched overlapping of the two same encrypted icons. The arc-like anti-counterfeiting element provided by the invention has more flexibility compared with rectangular anti-counterfeiting icons, can be printed on paper, plastics, transparent / semitransparent films, metal coatings, foils or other materials suitable for printing, can increase anti-counterfeiting and information concealing effects through integrally combining with special ink, melting silk screen, gravure or offset printing technology, and has the characteristics of easy recognition and difficult counterfeiting.

Description

technical field [0001] The invention relates to the field of anti-counterfeiting, in particular to a curved anti-counterfeiting method capable of hiding confidential image information and a method for manufacturing the curved anti-counterfeiting element. Background technique [0002] Illegal activities such as counterfeiting and counterfeiting have a long history and are the product of market economic competition. Counterfeiters confuse the authenticity of goods by forging documents, products and their outer packaging, and even forging "anti-counterfeiting" labels. Therefore, it is imminent to research and develop new anti-counterfeiting technologies, especially the development of safe anti-counterfeiting technologies that are difficult to copy and easy to identify. . Currently commonly used anti-counterfeiting technologies include holographic anti-counterfeiting, ink anti-counterfeiting, paper anti-counterfeiting, digital anti-counterfeiting, etc. They use patterns (inclu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00G07D7/20G09F3/02B42D15/00
Inventor 王道顺董琳李顺东戴一奇
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products