[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3290420.3290469acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccipConference Proceedingsconference-collections
research-article

Research on printing quantum dot anti-counterfeiting image generation and recognition technology

Published: 02 November 2018 Publication History

Abstract

This paper presents a method of information hiding and recognition based on the reliability codec of printed quantum dots, which is mainly used to solve the problem of authentication and information increment of anti-counterfeiting printing. This method uses multiple detection error-correcting coding method to generate the primitive lattice pattern of printed quantum dots, which figs out the issue of error in lattice pattern data caused by the printing output and the information recognition process. At the same time, in order to meet the requirement of scale matching of printed quantum dot dot matrix pattern mask, it is necessary to make multiple stitching for the primitive lattice pattern of printed quantum dots. In the stitching process, each primitive lattice information is interleaved with pseudo random iterative number, which resolves the trouble of information security vulnerabilities caused by the relative rules of the printed quantum dot dot matrix pattern, and achieves better information anti-counterfeiting and hidden effect. The technique settles the defects of the existing anti-counterfeiting printing in the aspects of anti duplication and damage resistance, and can be widely used in the anti-counterfeiting of cigarette label, wine label, negotiable securities and certificate.

References

[1]
Liu Zhecan, Cao Peng. Halftone halftone and information hiding algorithm based on dot position {J}. Journal of Beijing Information Science and Technology University (NATURAL SCIENCE EDITION), 2013,28 (06): 25--28.
[2]
Liu Zhecan, Cao Peng. An arithmetic based on the shape of dots for halftone{C}. Proceedings of 2013 3rd International Conference on Computer Science and Network Technology, ICCSNT 2013, p 187--190, November 25, 2014.
[3]
Liu Ping Feng, Ai Hua Wen, Ya Li Qi. Clustered-dot halftone watermark using phase modulation{J}. Applied Mechanics and Materials, v 416-417, p 1205--1209, 2013, Linear Drives for Industry Applications IX.
[4]
Feng Liuping, Cong Dongsheng, Shu Hou, Liu Ben. Adaptive halftone watermarking algorithm based on particle swarm optimization{J}. Journal of Multimedia, v 8, n 3, p 183--190, 2013.
[5]
Feng Liu-Ping, Cong Dong-Sheng, Liu Hua-Qun, Wang Meng-Min. A halftone visual cryptography schema using ordered dither{C}. Proceedings of SPIE - The International Society for Optical Engineering, v 9159, 2014, Sixth International Conference on Digital Image Processing, ICDIP 2014.
[6]
Jianhua Hu, Peng Cao, Zhihong Dong, Xiaohe Cao. Halftone information hiding technology based on phase feature of spacefillings curves{C}. Journal of Physics: Conference Series.
[7]
Ping Feng Liu, Fang Yu Li, Hou Shu, Zhi Hong Dong. Visual Cryptography and Steganography Based on Intensity Transformations and Dispersed Dot Halftoning Tcehniques{C}. 2014 International Academic Conference on The Information Science and Communication Engineering, ISCE2014, Oct 18, 2014 Changsha, p534--539.
[8]
Liuping Feng, Peng Cao, Lifang Yu, Hou Shu. Resarch on Information Hiding and Synchronization Algorithm for Halftone Image{J}. International Journal of Information and Computer Science. Volume 4, 2015, p76--79.
[9]
Li Chang, Cao Peng. Research on a new algorithm of halftone screening{C}. Internation Conference on Information Science and Intelligent Control, ISIC 2015, P385--389, December 26, 2017.
[10]
Zhang Shi, Zhang Tianji, Sheng, Ouxudong. Blind identification of the packet interleaving parameters of BCH codes {J}. Television technology, 2015, 39 (15): 88--93.
[11]
Ren Bo, Zhang, Liu-Nong, Zhang Wei. Blind identification method of BCH code under BER condition {J}. Computer Applications, 2014, 34 (12): 3618--3620+3623.
[12]
Zeng Weitao, Chen Jian. Blind identification method of primitive BCH code parameters based on probabilistic approximation {J}. Journal of Electronics and Information, 2014, 36 (02): 332--339.
[13]
Li na. Research on multi-functional watermarking algorithm based on error-correcting coding {D}. Shanxi Normal University, 2015.
[14]
Wang Ke, Zhang Hongwei, Li Xiaohui. Image block encryption algorithm based on DNA coding operation and chaotic system {J}. Television technology, 2017, 41 (03): 6--10.
[15]
Ning Qizhi, Wang Tao, Zhang Wencai. Research on image Digital Watermarking algorithm based on Arnold scrambling {J}. Software Guide, 2012, 11 (01): 144--145.

Cited By

View all
  • (2023)Reliable Encoding and Decoding Algorithm for Printed Quantum Dot Matrix InformationComputer Science and Application10.12677/CSA.2023.13306113:03(617-625)Online publication date: 2023

Index Terms

  1. Research on printing quantum dot anti-counterfeiting image generation and recognition technology

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICCIP '18: Proceedings of the 4th International Conference on Communication and Information Processing
    November 2018
    326 pages
    ISBN:9781450365345
    DOI:10.1145/3290420
    • Conference Chairs:
    • Jalel Ben-Othman,
    • Hui Yu,
    • Program Chairs:
    • Herwig Unger,
    • Masayuki Arai
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 November 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. information hiding
    2. information recognition
    3. lattice mask modulation
    4. printing quantum dots
    5. reliability coding

    Qualifiers

    • Research-article

    Funding Sources

    • National Natural Science Foundation of China

    Conference

    ICCIP 2018

    Acceptance Rates

    Overall Acceptance Rate 61 of 301 submissions, 20%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 10 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Reliable Encoding and Decoding Algorithm for Printed Quantum Dot Matrix InformationComputer Science and Application10.12677/CSA.2023.13306113:03(617-625)Online publication date: 2023

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media