A kind of encoding method and decoding method of color characters
A coding method and color technology, which is applied in the field of color character coding and decoding, can solve the problems of low security of anti-counterfeiting code technology and affect the appearance of products, and achieve good concealment, novel production methods and prominent substantive features Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0043] The present invention is a technical solution for combining the anti-counterfeiting code and color to output and decode the anti-counterfeiting code, such as figure 1 As shown, the encoding process is as follows:
[0044] (1) Select N different colors from the RGB color table, and N is a natural number greater than or equal to 2. For ease of identification, the N colors here can be preferentially selected from colors with greater contrast, such as black and white;
[0045] (2) Formulate an N-ary encoding library according to the selected N colors, and match the selected N colors with the bases of the N-ary encoding library one by one. Here, it specifically refers to the number of colors selected by the server system N establishes a base encoding library equal to its value, that is, an N base encoding base. The N base encoding base follows the base conversion rules, and its bases are 0, 1, 2...(N-1). At the same time, the selected color N 0 , N 1 , N 2 ...N n-1 Matc...
Embodiment 2
[0064] Such as image 3 , 4 As shown, the difference from Embodiment 1 is that Embodiment 1 is the encoding and output of non-encrypted source information. In this embodiment, one-way encryption is superimposed on the source information before it is converted into M-ary encoding. algorithm (such as MD5 one-way encryption algorithm or two-way MD5 one-way encryption algorithm), and when decoding, after converting the M-ary code into UNICODE or ASCII code, it is also decrypted with a one-way decryption algorithm, and then The source information is converted, and the encoding and output of the entire source information are in the state of encryption and decryption. This embodiment takes the secondary MD5 one-way encryption algorithm as an example to illustrate the encryption and decryption process of this embodiment:
[0065] Take the conversion of binary and ternary as an example, that is, let M=2, N=3, select three colors of black, red, and blue, and then build a ternary code ...
Embodiment 3
[0069] Such as Figure 5 , 6As shown, the difference from Embodiment 1 is that Embodiment 1 is the encoding and output of non-encrypted source information. In this embodiment, a simple encryption algorithm is superimposed on the source information before it is converted into M-ary encoding. (such as dictionary conversion encryption algorithm, N-ary displacement encryption algorithm, N-ary digit transformation encryption algorithm, character displacement encryption algorithm, logic or transformation encryption algorithm, logic and transformation encryption algorithm, logic XOR transformation encryption algorithm or four mixed operation transformation Encryption algorithm), and when decoding, after the M-ary code is converted into UNICODE or ASCII code, it is also decrypted with a simple decryption algorithm. This embodiment takes the character displacement encryption algorithm as an example to illustrate the encryption and decryption process of this embodiment:
[0070] Take ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com