CN114139665B - Anti-counterfeiting embedding method, identification method and anti-counterfeiting device for securities - Google Patents
Anti-counterfeiting embedding method, identification method and anti-counterfeiting device for securities Download PDFInfo
- Publication number
- CN114139665B CN114139665B CN202111199562.XA CN202111199562A CN114139665B CN 114139665 B CN114139665 B CN 114139665B CN 202111199562 A CN202111199562 A CN 202111199562A CN 114139665 B CN114139665 B CN 114139665B
- Authority
- CN
- China
- Prior art keywords
- information
- code image
- image
- dimensional
- embedded
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 238000006243 chemical reaction Methods 0.000 claims abstract description 34
- 239000011159 matrix material Substances 0.000 claims abstract description 31
- 230000008569 process Effects 0.000 claims abstract description 6
- 230000009466 transformation Effects 0.000 claims description 12
- 238000010187 selection method Methods 0.000 claims description 8
- 238000000605 extraction Methods 0.000 claims description 3
- 230000001131 transforming effect Effects 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 description 6
- 230000008859 change Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 230000000007 visual effect Effects 0.000 description 3
- 238000005336 cracking Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000007781 pre-processing Methods 0.000 description 1
- 238000011946 reduction process Methods 0.000 description 1
- 230000010076 replication Effects 0.000 description 1
- 238000000844 transformation Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
Landscapes
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Electromagnetism (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The invention relates to an anti-counterfeiting embedding method, an identification method and an anti-counterfeiting device of securities, wherein the embedding method comprises the steps of firstly carrying out binarization processing on a two-dimensional code image or a bar code image, carrying out conversion processing on an obtained two-dimensional matrix, selecting N random positions in the obtained digital image as embedding parameters, and simultaneously generating secret information S1 of anti-counterfeiting information, wherein the conversion processing is to convert all 1 and 0 in the two-dimensional matrix according to a set relation with another parameter respectively, then sequentially carrying out frequency domain conversion, mbit information embedding and inverse conversion on the digital image after the embedding parameters, and utilizing secret information S2 in the Mbit information embedding process for printing the two-dimensional code image or the bar code image embedded with the anti-counterfeiting information on the surface of the securities; the reverse process of the embedding method is adopted during the identification. The anti-counterfeiting and tracing of the securities are realized, the online management of the anti-counterfeiting and tracing information can be supported, and the authenticity distinguishing and tracing operation is simpler and more efficient.
Description
Technical Field
The invention belongs to the technical field of security anti-counterfeiting, and particularly relates to an anti-counterfeiting embedding method, an identification method and an anti-counterfeiting device for securities.
Background
At present, conventional authenticity and traceability identification means of paper securities (including various commodity coupons, admission tickets, visit tickets and the like) are mainly carried out by 'visual' and 'touch'.
However, the applicant found that: the technical schemes of anti-counterfeiting and traceable printing commonly used in the market at present have the following limitations:
As paper securities for general commercial use, it is generally not possible to adopt a great deal of security technologies such as money. For counterfeiting, all contents including numbers are copied with high precision, and meanwhile, original anti-counterfeiting measures such as optical color light change, miniature characters and the like can be copied with high probability to form counterfeits with spurious. The judgment needs to be compared and the nuances of the original are found out, and the judgment is mainly based on 'visual' and 'touch', so that the problems of complicated flow, long time consumption and large error are unavoidable.
The novel anti-counterfeiting and tracing (one ticket one code) using the information technology can additionally use the serial number, the bar code, the two-dimensional code and the like containing the random number on the basis of the existing anti-counterfeiting technology to realize the tracing of one ticket one code. The printing and reading technologies of the serial numbers, the bar codes and the two-dimensional codes are mature. There are both the advantage of fast reading and the disadvantage of easy replication.
It is clear that the prior art solutions have drawbacks.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides an anti-counterfeiting embedding method, an identification method, an anti-counterfeiting device and a valuable document, which realize anti-counterfeiting and tracing of the valuable document, and can support online management of anti-counterfeiting and tracing information, so that the authenticity distinguishing and tracing operations are simpler and more efficient.
In order to solve the technical problems, the invention adopts the following technical scheme:
The invention relates to an anti-counterfeiting embedding method of securities, which comprises the steps of firstly, carrying out binarization processing on a two-dimensional code image or a bar code image, then, carrying out conversion processing on a two-dimensional matrix obtained by the binarization processing, selecting N random positions in a digital image obtained by the binarization processing as embedding parameters, and simultaneously generating secret information S1 of anti-counterfeiting information, wherein the conversion processing is to convert all 1 and 0 in the two-dimensional matrix according to a set relation with another parameter, and finally, carrying out frequency domain conversion, mbit information embedding and inverse conversion on the digital image after the embedding parameters in sequence, and obtaining the two-dimensional code image or the bar code image with the anti-counterfeiting information embedded, which is printed on the surface of the securities, by utilizing the secret information S2 in the Mbit information embedding process.
Further, the anti-counterfeiting embedding method specifically comprises the following steps:
s101, acquiring a two-dimensional code image or a bar code image;
S102, performing binarization processing on the two-dimensional code image or the bar code image to form a two-dimensional first digital image f (x, y), and obtaining a two-dimensional matrix of the two-dimensional code image or the bar code image;
S103, converting the obtained two-dimensional matrix, namely converting all 1 in the two-dimensional matrix into 1-d1, and converting all 0 into d1, wherein d1 is between 0.01 and 0.30 of a set parameter;
s104, selecting N random positions (xi, yi) in a first digital image of a two-dimensional code image or a bar code image, wherein i=1, 2, 3, … and N, and taking a selection method and N as secret information S1 of anti-counterfeiting information;
s105, setting a parameter d2, embedding the + -d 2 into N random positions selected in the first digital image f (x, y) in the step S104 according to the following formula to obtain a second digital image f',
Wherein i=1, 2,3, …, N;
S106, converting the second digital image f' into frequency domain information And obtaining the whole transformed Mbit information msg (i) according to the following formula,
Where i=1, 2, 3, …, M, P is the setting parameter 3, (ui, vi) is not more thanIs selected as secret information S2 within the range of the highest frequencies Umax and Vmax;
s107, obtaining the product in the step S106 Performing inverse transformation to obtain a two-dimensional code image or a bar code image embedded with Mbit information msg (i)For printing on the surface of a document of value.
The invention also provides an anti-counterfeiting identification method of the securities, which comprises the steps of firstly obtaining a two-dimensional code image or a bar code image which is printed on the surface of the securities and is embedded with anti-counterfeiting information, comparing to obtain a digital image which is completely matched with an original two-dimensional code image or bar code image, then carrying out two-dimensional frequency domain conversion on the obtained digital image, extracting frequency domain information according to secret information S2, restoring to obtain embedded Mbit information according to the relation between the extracted frequency domain information and an embedded random position F (ui, vi), and judging whether the restored embedded Mbit information is confident according to secret information S1.
Further, the anti-counterfeiting identification method specifically comprises the following steps:
S201, acquiring images of a two-dimensional code and a bar code, and comparing the images to obtain a digital image fa (x, y) which is completely matched with an original image;
s202, performing two-dimensional frequency domain conversion on the digital image FA (x, y) to obtain FA (u, v);
s203, extracting the transformed corresponding positions FA (ui, vi) according to M pieces of information (ui, vi) contained in the secret information S2;
s204, restoring to obtain embedded Mbit information msg (i) according to the relation between FA (ui, vi) and F (ui, vi), so as to obtain the embedded Mbit information;
S205, according to N (xi, yi) contained in the secret information S1, adding all fa (xi, yi) -f (xi, yi) with xi+yi as an even number to obtain A, adding fa (xi, yi) -f (xi, yi) with xi+yi as a base number to obtain B, and when A-B is larger than a set threshold value T, restoring to obtain embedded Mbit information msg (i) to be confident, otherwise restoring to obtain embedded Mbit information msg (i) possibly damaged or tampered.
The invention also provides an anti-counterfeiting device for the securities, which is characterized by comprising an anti-counterfeiting embedding device and an anti-counterfeiting recognition device; wherein,
The anti-counterfeit embedding device comprises:
The binarization processing module is used for performing binarization processing on the two-dimensional code image or the bar code image to form a two-dimensional first digital image f (x, y) and obtain a two-dimensional matrix of the two-dimensional code image or the bar code image;
The two-dimensional matrix conversion module is used for carrying out conversion processing on the obtained two-dimensional matrix, and is particularly used for converting all 1 in the two-dimensional matrix into 1-d1 and converting all 0 into d1, wherein d1 is a set parameter between 0.01 and 0.30;
A first embedding module for selecting N random positions (xi, yi) in a first digital image of a two-dimensional code image or a bar code image, wherein i=1, 2, 3, …, N, setting a parameter d2, embedding + -d 2 into the N random positions selected in the first digital image f (x, y) according to the following formula to obtain a second digital image f',
Wherein i=1, 2, 3, …, N, and the selection method and N are used as secret information S1 of the anti-counterfeiting information;
a frequency domain conversion module for converting the second digital image f' into frequency domain information ;
A second embedding module for embedding the converted frequency domain informationThe information msg (i) of Mbit embedded according to the following formula, the whole transformed result,
Where i=1, 2, 3, …, M, P is the setting parameter 3, (ui, vi) is not more thanIs selected as secret information S2 within the range of the highest frequencies Umax and Vmax;
an inverse transformation module for transforming the obtained Performing inverse transformation to obtain a two-dimensional code image or a bar code image embedded with Mbit information msg (i);
The anti-counterfeiting identification device comprises:
the image acquisition unit is used for acquiring images of the two-dimensional code and the bar code printed on the surface of the valuable document;
The position comparison module is used for comparing the positions of the acquired images of the two-dimensional code and the bar code to obtain a digital image fa (x, y) which is completely matched with the original image;
The two-dimensional frequency domain conversion module is used for carrying out two-dimensional frequency domain conversion on the digital image FA (x, y) to obtain FA (u, v);
An extraction module for extracting FA (ui, vi) from M pieces of (ui, vi) information contained in the secret information S2;
An embedded information restoring module, configured to restore to obtain embedded Mbit information msg (i) according to a relationship between FA (ui, vi) and F (ui, vi), thereby obtaining embedded Mbit information;
The restored embedded information assurance judging module is used for adding fa (xi, yi) -f (xi, yi) with all xi+yi as even numbers to obtain A according to N (xi, yi) contained in the secret information S1, adding fa (xi, yi) -f (xi, yi) with all xi+yi as a base number to obtain B, restoring to obtain embedded Mbit information msg (i) to be confident when the A-B is larger than a set threshold value T, otherwise restoring to obtain the embedded Mbit information msg (i) possibly damaged or tampered.
The invention has the following advantages:
By the technical scheme, the anti-counterfeiting and tracing of the securities can be realized, the online management of the anti-counterfeiting and tracing information can be supported, and the authenticity distinguishing and tracing operations can be simpler and more efficient.
Drawings
FIG. 1 is a schematic flow chart of the anti-counterfeit embedding method of securities of the present invention;
FIG. 2 is a flow chart of the anti-counterfeit identification method of securities of the present invention;
FIGS. 3 to 5 are two-dimensional code images after embedding Mbit information msg (i) in an embodiment of the anti-counterfeit embedding method of securities according to the present invention Gray value waveform diagram corresponding to a certain line;
FIG. 6 is a diagram of frequency domain information of a second digital image of a bar code in an embodiment of a security document anti-counterfeit embedding method according to the present invention;
FIG. 7 is a schematic diagram of a value document to be printed with a two-dimensional code image embedded with Mbit information msg (i) obtained by the anti-counterfeit embedding method of the present invention;
fig. 8 is a schematic diagram of a document of value to be printed with a bar code image embedded with Mbit information msg (i) obtained by the anti-counterfeit embedding method of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
As shown in fig. 1, the anti-counterfeiting embedding method of the securities of the present invention comprises the following steps:
Step Sa1, acquiring a two-dimensional code image or a bar code image; the highest frequency Umax and Vmax of the two-dimensional code image can be known according to the two-dimensional code image; wherein umax=vmax=matrix number of two-dimensional code version, such as version1 is 21×21, version2 is 25×25, version3 is 29×29, i.e. version number is 4+17; and from the barcode image, it is known that its highest frequency Umax, vmax=0; wherein Umax is the number of black and white phases; for use in a subsequent embedding.
And step Sa2, performing binarization processing on the two-dimensional code image or the bar code image to form a two-dimensional first digital image f (x, y) (namely, a binary image), and obtaining a two-dimensional matrix of the two-dimensional code image or the bar code image.
And step Sa3, converting the obtained two-dimensional matrix, namely converting all 1 in the two-dimensional matrix into 1-d1, and converting all 0 into d1, wherein d1 is between 0.01 and 0.30 of set parameters.
Step Sa4, selecting N random positions (xi, yi) in a first digital image of a two-dimensional code image or a bar code image, wherein i=1, 2, 3, … and N, and taking the selection method and N as secret information S1 of anti-counterfeiting information; the selection method is a method for randomly obtaining N positions, and various methods can be adopted, but the specific method is used as a part of secret information to prevent cracking; where N is the number of embedded positions, and is also used as secret information, if some images can be embedded in 128 positions, and some images can be embedded in 256 positions, then secret information S1 is also one of means for preventing cracking.
Step Sa5. Setting a parameter d2 (d 2 has a value range which is half of the range of gray values of the image, i.e., between 1 and 127), embedding + -d 2 into N random positions selected in the first digital image f (x, y) according to the following formula to obtain a second digital image f',
Where i=1, 2,3, …, N.
Step Sa6 converting the second digital image f' into frequency domain informationAnd embeds Mbit information msg (i) according to the following formula,
The method comprises the steps of (1) setting parameters 3 (the value ranges of P are different each time, so long as the P is not perceived by human eyes, wherein the setting of P is based on the principle that the embedded image and the original image cannot be distinguished by human eyes, and when the parameter P is larger, the image quality after embedding information is lower, the principle of P is that the maximum value is taken as the parameter P on the premise that the image quality after embedding Mbit information is ensured, namely the signal-to-noise ratio SNR is not lower than 30, and (ui, vi) is selected as secret information S2 within the range of not exceeding the highest frequencies Umax and Vmax; because the number of pixels in the longitudinal and transverse directions of the formed image can far exceed Umax and Vmax no matter what version of the two-dimensional code is; in the range not exceeding Umax and Vmax, embedding msg with the amplitude of P, wherein the first control P can make eyes invisible, and the second control P can ensure that the original frequency is not influenced in the reading process; while bar codes are one-dimensional frequency domain transformations, a description is not repeated here.
Step Sa7. The method obtained in step S106Performing inverse transformation to obtain a two-dimensional code image or a bar code image embedded with Mbit information msg (i)For printing on the surface of a document of value.
As shown in fig. 2, the anti-counterfeiting identification method of the securities of the present invention comprises the following steps:
Sb1, acquiring images of a two-dimensional code and a bar code, and obtaining a digital image fa (x, y) completely matched with an original image through comparison (preprocessing, feature point matching, geometric correction and other conventional technologies can be utilized, so as to obtain the digital image fa mild to the original image);
Sb2. carrying out two-dimensional frequency domain conversion on the digital image FA (x, y) to obtain FA (u, v);
Sb3. extracting the value FA (ui, vi) of the corresponding position after transformation according to M pieces of information (ui, vi) contained in the secret information S2; that is, the value FA (ui, vi) of the corresponding position after conversion is obtained from the secret position information (ui, vi) of the secret information S2, and can be sequentially obtained as long as the secret information S2 is present;
Sb4. according to the size relation between FA (ui, vi) and F (ui, vi), restoring to obtain embedded Mbit information msg (i), thereby obtaining embedded Mbit information; wherein the reduction process is based on the size relationship of FA (ui, vi) and F (ui, vi), i.e., FA (ui, vi) > F (ui, vi), then mgs (i) =0; otherwise, 1;
And Sb5. According to N (xi, yi) contained in the secret information S1, adding all fa (xi, yi) -f (xi, yi) with xi+yi as an even number to obtain A, adding fa (xi, yi) -f (xi, yi) with xi+yi as a base number to obtain B, and when the A-B is larger than a set threshold value T, restoring to obtain embedded Mbit information msg (i) to be confident, otherwise restoring to obtain the embedded Mbit information msg (i) possibly damaged or tampered.
The anti-counterfeiting embedding method of the securities is further described below by taking two-dimensional codes and bar codes as examples.
Two-dimensional code embodiment:
(1) Obtaining an original two-dimensional code image of version2, wherein the size of the original two-dimensional code image is 256 x 256, performing binarization processing to obtain a first digital image and a two-dimensional matrix of the two-dimensional code image, and obtaining umax=vmax=25;
(2) Converting the two-dimensional matrix, namely converting all 1 in the two-dimensional matrix into 1-d1, and converting all 0 into d1, wherein the parameter d1 is set to 20/255 (namely about 0.08), so as to obtain a converted image;
(3) Selecting 20 random positions (xi, yi) in the first digital image obtained in the step (1), wherein i=1, 2, 3, …,20, and using the selection method and 20 as secret information S1 of the anti-counterfeiting information; then setting the parameters d2=20/255, embedding ±d2 to 20 random positions selected in the first digital image f (x, y) according to the following formula, to obtain a second digital image f',
Wherein i=1, 2, 3, …, 20;
Finally, the second digital image f' is converted into frequency domain information And obtaining the whole transformed Mbit information msg (i) according to the following formula,
Wherein i=1, 2, 3, …, 20, P is a setting parameter 3, the setting of P is based on the principle that the human eye cannot distinguish between the embedded image and the original image, (ui, vi) is selected as secret information S2 within a range not exceeding the highest frequencies Umax and Vmax;
(4) To be obtained Performing inverse transformation to obtain a two-dimensional code image embedded with Mbit information msg (i)The two-dimensional code imageThe values of the different positions of the white area are different, and likewise the values of the different positions of the black area are also different, which means that the secret information of the parameter M has been embedded and dispersed to all positions, and the value of each position has a small change, but is not enough to be found by the human eye.
The detected results are: two-dimensional code image embedded with Mbit information msg (i)There is a slight change in the values at 100 columns (see fig. 3), the positions corresponding to the white areas are enlarged by 1 (see fig. 4), and the positions corresponding to the black areas are enlarged by 2 (see fig. 5).
Bar code embodiment:
when the anti-counterfeiting embedding method of the securities is applied to the bar codes, the method is basically the same as the two-dimensional code embodiment, and the difference is that the bar codes only change in one direction, so that one-dimensional frequency domain information (see fig. 6 in detail) in the direction perpendicular to the bar codes, namely in the direction which changes, is utilized when the second digital image f' is subjected to frequency domain conversion, and the subsequent embedding process is only embedded above Umax, and the Vmax direction is not processed.
Thus, the two-dimensional code image or the bar code image with embedded Mbit information msg (i) can be obtainedThe printing is performed on the surface of the valuable paper as shown in fig. 7 and 8, and a blank area is reserved, so that the valuable paper can be endowed with an identification method based on an information technology and anti-counterfeiting information unrecognizable by human eyes except for 'visual' and 'touch' detection authenticity.
In addition, the invention also provides an anti-counterfeiting device for the securities, which is characterized by comprising an anti-counterfeiting embedding device and an anti-counterfeiting recognition device; wherein,
The anti-counterfeit embedding device comprises:
The binarization processing module is used for performing binarization processing on the two-dimensional code image or the bar code image to form a two-dimensional first digital image f (x, y) and obtain a two-dimensional matrix of the two-dimensional code image or the bar code image;
The two-dimensional matrix conversion module is used for carrying out conversion processing on the obtained two-dimensional matrix, and is particularly used for converting all 1 in the two-dimensional matrix into 1-d1 and converting all 0 into d1, wherein d1 is a set parameter between 0.01 and 0.30;
A first embedding module for selecting N random positions (xi, yi) in the first digital image of the two-dimensional code image or the bar code image, wherein i=1, 2, 3, …, N, setting a parameter d2, embedding ±d2 to the N random positions selected in the binary image f (x, y) in step S104 according to the following formula to obtain a second digital image f',
Wherein i=1, 2, 3, …, N, and the selection method and N are used as secret information S1 of the anti-counterfeiting information;
a frequency domain conversion module for converting the second digital image f' into frequency domain information ;
A second embedding module for embedding the converted frequency domain informationThe information msg (i) of Mbit embedded according to the following formula, the whole transformed result,
Wherein i=1, 2, 3, …, M, P is a setting parameter 3, the setting of P is based on the principle that the human eye cannot distinguish between the embedded image and the original image, (ui, vi) is selected as secret information S2 within a range not exceeding the highest frequencies Umax and Vmax;
an inverse transformation module for transforming the obtained Performing inverse transformation to obtain a two-dimensional code image or a bar code image embedded with Mbit information msg (i);
The anti-counterfeiting identification device comprises:
The image acquisition unit is used for acquiring images of the two-dimensional code and the bar code printed on the surface of the valuable document, such as: acquiring images of a two-dimensional code and a bar code printed on the surface of the valuable document by a camera or a scanner;
The position comparison module is used for comparing the positions of the acquired images of the two-dimensional code and the bar code to obtain a digital image fa (x, y) which is completely matched with the original image;
The two-dimensional frequency domain conversion module is used for carrying out two-dimensional frequency domain conversion on the digital image FA (x, y) to obtain FA (u, v);
An extraction module for extracting FA (ui, vi) from M pieces of (ui, vi) information contained in the secret information S2;
an embedded information restoring module, configured to restore to obtain embedded Mbit information msg (i) according to the size relationship between FA (ui, vi) and F (ui, vi), thereby obtaining embedded Mbit information;
The restored embedded information assurance judging module is used for adding fa (xi, yi) -f (xi, yi) with all xi+yi as even numbers to obtain A according to N (xi, yi) contained in the secret information S1, adding fa (xi, yi) -f (xi, yi) with all xi+yi as a base number to obtain B, restoring to obtain embedded Mbit information msg (i) to be confident when the A-B is larger than a set threshold value T, otherwise restoring to obtain the embedded Mbit information msg (i) possibly damaged or tampered.
While the foregoing is directed to the preferred embodiments of the present invention, it will be appreciated by those skilled in the art that changes and modifications may be made without departing from the principles of the invention, such changes and modifications are also intended to be within the scope of the invention.
Claims (3)
1. The anti-counterfeiting embedding method of the securities is characterized by comprising the steps of firstly carrying out binarization processing on a two-dimensional code image or a bar code image, then carrying out conversion processing on a two-dimensional matrix obtained by the binarization processing, selecting N random positions in a digital image obtained by the binarization processing as embedding parameters, and simultaneously generating secret information S1 of anti-counterfeiting information, wherein the conversion processing is to convert all 1 and 0 in the two-dimensional matrix according to a set relation with another parameter, and finally carrying out frequency domain conversion, mbit information embedding and inverse conversion on the digital image after the embedding parameters in sequence, and obtaining the two-dimensional code image or the bar code image with the anti-counterfeiting information embedded on the surface of the securities by utilizing the secret information S2 in the Mbit information embedding process; the method specifically comprises the following steps:
s101, acquiring a two-dimensional code image or a bar code image;
S102, performing binarization processing on the two-dimensional code image or the bar code image to form a two-dimensional first digital image f (x, y), and obtaining a two-dimensional matrix of the two-dimensional code image or the bar code image;
S103, converting the obtained two-dimensional matrix, namely converting all 1 in the two-dimensional matrix into 1-d1, and converting all 0 into d1, wherein d1 is between 0.01 and 0.30 of a set parameter;
s104, selecting N random positions (xi, yi) in a first digital image of a two-dimensional code image or a bar code image, wherein i=1, 2, 3, … and N, and taking a selection method and N as secret information S1 of anti-counterfeiting information;
s105, setting a parameter d2, embedding the + -d 2 into N random positions selected in the first digital image f (x, y) in the step S104 according to the following formula to obtain a second digital image f',
Wherein i=1, 2,3, …, N;
S106, converting the second digital image f' into frequency domain information And obtaining the whole transformed Mbit information msg (i) according to the following formula,
Where i=1, 2, 3, …, M, P is the setting parameter 3, (ui, vi) is not more thanIs selected in the range of the highest frequencies Umax and Vmax and is used as secret information S2;
s107, obtaining the product in the step S106 Performing inverse transformation to obtain a two-dimensional code image or a bar code image embedded with Mbit information msg (i)For printing on the surface of a document of value.
2. The anti-fake identification method of the securities is characterized by comprising the steps of firstly obtaining a two-dimensional code image or a bar code image which is printed on the surface of the securities and embedded with anti-fake information, comparing the two-dimensional code image or the bar code image to obtain a digital image which is completely matched with an original two-dimensional code image or a bar code image, then carrying out two-dimensional frequency domain conversion on the obtained digital image, extracting frequency domain information according to secret information S2, restoring to obtain embedded Mbit information according to the relation between the extracted frequency domain information and an embedded random position F (ui, vi), and judging whether the restored embedded Mbit information is confident according to secret information S1; the method specifically comprises the following steps:
S201, acquiring images of a two-dimensional code and a bar code, and comparing the images to obtain a digital image fa (x, y) which is completely matched with an original image;
s202, performing two-dimensional frequency domain conversion on the digital image FA (x, y) to obtain FA (u, v);
s203, extracting the transformed corresponding positions FA (ui, vi) according to M pieces of information (ui, vi) contained in the secret information S2;
s204, restoring to obtain embedded Mbit information msg (i) according to the size relation between FA (ui, vi) and F (ui, vi), so as to obtain the embedded Mbit information;
S205, according to N (xi, yi) contained in the secret information S1, adding all fa (xi, yi) -f (xi, yi) with xi+yi as an even number to obtain A, adding fa (xi, yi) -f (xi, yi) with xi+yi as a base number to obtain B, and when A-B is larger than a set threshold value T, restoring to obtain embedded Mbit information msg (i) to be confident, otherwise restoring to obtain embedded Mbit information msg (i) possibly damaged or tampered.
3. An anti-counterfeiting device for securities is characterized by comprising an anti-counterfeiting embedding device and an anti-counterfeiting recognition device; wherein,
The anti-counterfeit embedding device comprises:
The binarization processing module is used for performing binarization processing on the two-dimensional code image or the bar code image to form a two-dimensional first digital image f (x, y) and obtain a two-dimensional matrix of the two-dimensional code image or the bar code image;
The two-dimensional matrix conversion module is used for carrying out conversion processing on the obtained two-dimensional matrix, and is particularly used for converting all 1 in the two-dimensional matrix into 1-d1 and converting all 0 into d1, wherein d1 is a set parameter between 0.01 and 0.30;
A first embedding module for selecting N random positions (xi, yi) in the first digital image of the two-dimensional code image or the bar code image, wherein i=1, 2, 3, …, N, setting a parameter d2, embedding ±d2 to the N random positions selected in the binary image f (x, y) in step S104 according to the following formula to obtain a second digital image f',
Wherein i=1, 2, 3, …, N, and the selection method and N are used as secret information S1 of the anti-counterfeiting information;
a frequency domain conversion module for converting the second digital image f' into frequency domain information ;
A second embedding module for embedding the converted frequency domain informationThe information msg (i) of Mbit embedded according to the following formula, the whole transformed result,
Where i=1, 2, 3, …, M, P is the setting parameter 3, (ui, vi) is not more thanIs selected as secret information S2 within the range of the highest frequencies Umax and Vmax;
an inverse transformation module for transforming the obtained Performing inverse transformation to obtain a two-dimensional code image or a bar code image embedded with Mbit information msg (i);
The anti-counterfeiting identification device comprises:
the image acquisition unit is used for acquiring images of the two-dimensional code and the bar code printed on the surface of the valuable document;
The position comparison module is used for comparing the positions of the acquired images of the two-dimensional code and the bar code to obtain a digital image fa (x, y) which is completely matched with the original image;
The two-dimensional frequency domain conversion module is used for carrying out two-dimensional frequency domain conversion on the digital image FA (x, y) to obtain FA (u, v);
An extraction module for extracting FA (ui, vi) from M pieces of (ui, vi) information contained in the secret information S2;
an embedded information restoring module, configured to restore to obtain embedded Mbit information msg (i) according to the size relationship between FA (ui, vi) and F (ui, vi), thereby obtaining embedded Mbit information;
The restored embedded information assurance judging module is used for adding fa (xi, yi) -f (xi, yi) with all xi+yi as even numbers to obtain A according to N (xi, yi) contained in the secret information S1, adding fa (xi, yi) -f (xi, yi) with all xi+yi as a base number to obtain B, restoring to obtain embedded Mbit information msg (i) to be confident when the A-B is larger than a set threshold value T, otherwise restoring to obtain the embedded Mbit information msg (i) possibly damaged or tampered.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111199562.XA CN114139665B (en) | 2021-10-14 | 2021-10-14 | Anti-counterfeiting embedding method, identification method and anti-counterfeiting device for securities |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111199562.XA CN114139665B (en) | 2021-10-14 | 2021-10-14 | Anti-counterfeiting embedding method, identification method and anti-counterfeiting device for securities |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114139665A CN114139665A (en) | 2022-03-04 |
CN114139665B true CN114139665B (en) | 2024-07-26 |
Family
ID=80395019
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111199562.XA Active CN114139665B (en) | 2021-10-14 | 2021-10-14 | Anti-counterfeiting embedding method, identification method and anti-counterfeiting device for securities |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114139665B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106651734A (en) * | 2015-10-30 | 2017-05-10 | 重庆邮电大学 | Binary two-dimensional code image encryption and decryption method and device |
CN109102451A (en) * | 2018-07-24 | 2018-12-28 | 齐鲁工业大学 | A kind of anti-fake halftoning intelligent digital watermarking method of paper media's output |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2013080448A (en) * | 2011-10-04 | 2013-05-02 | Koji Sakahashi | Computer for outputting two-dimensional code and program to be executed by the same |
CN106529633B (en) * | 2015-09-10 | 2019-11-15 | 阿里巴巴集团控股有限公司 | Generation method, coding/decoding method and the device of two dimensional code |
CN106934756B (en) * | 2017-03-14 | 2021-06-04 | 珠海丹德图像技术有限公司 | Method and system for embedding information in single-color or special-color image |
CN107944527A (en) * | 2017-11-06 | 2018-04-20 | 中国东方电气集团有限公司 | A kind of encryption of anti-fake two-dimension code and coding/decoding method |
CN109840875A (en) * | 2019-03-06 | 2019-06-04 | 深圳市金天速科技有限公司 | A kind of anti-counterfei waterprint generation method, device, electronic equipment and storage medium |
CN110211018B (en) * | 2019-06-12 | 2021-06-04 | 山东科技大学 | Chaos encryption reversible information hiding method based on odd-even discrimination strategy |
CN110659709A (en) * | 2019-09-18 | 2020-01-07 | 颐保医疗科技(上海)有限公司 | Anti-counterfeiting two-dimensional code and generation, detection and identification method thereof |
CN113313225B (en) * | 2021-07-09 | 2021-11-19 | 北京微点科技有限公司 | Anti-counterfeiting method based on sparse dot matrix code |
-
2021
- 2021-10-14 CN CN202111199562.XA patent/CN114139665B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106651734A (en) * | 2015-10-30 | 2017-05-10 | 重庆邮电大学 | Binary two-dimensional code image encryption and decryption method and device |
CN109102451A (en) * | 2018-07-24 | 2018-12-28 | 齐鲁工业大学 | A kind of anti-fake halftoning intelligent digital watermarking method of paper media's output |
Also Published As
Publication number | Publication date |
---|---|
CN114139665A (en) | 2022-03-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102184428B (en) | Encrypting anti-counterfeiting printing technology for modulating shapes of amplitude modulation dots of printed work through binary-system encrypting signal | |
EP1514227B1 (en) | Visible authentication patterns for printed document | |
CN100364309C (en) | Digital watermarks and methods for security documents | |
CN103761799B (en) | A kind of bill anti-counterfeit method based on texture image feature and device | |
US8144368B2 (en) | Automated methods for distinguishing copies from original printed objects | |
EP2320389A2 (en) | Visible authentication patterns for printed document | |
CN102955930B (en) | Anti-counterfeiting method and system using physical characteristics of substance to identify | |
CN102194137A (en) | Multi-dimensional encryption anti-counterfeiting printing technology based on shape of amplitude modified screen | |
WO2002065381A1 (en) | Document printed with graphical symbols which encode information | |
CN102402696A (en) | Multi-dimensional encryption anti-counterfeiting printing technology based on binary signals | |
CN102225671A (en) | Encrypted anti-counterfeit printing technology for modulating shape of printed matter amplitude-modulation screen dot by dual-encrypted signal | |
US7787154B2 (en) | Font printing system having embedded security information comprising variable data periodic line patterns | |
CN101122995B (en) | Binary image digit water mark embedding, extraction method and device | |
JP4950124B2 (en) | Variable data guilloche pattern | |
WO2004051917A1 (en) | Systems and methods for authentication of print media | |
CN1290047C (en) | File anti-fake method and its device based on digital water print | |
CN102800043B (en) | The anti-counterfeiting information stacking method of printed matter, recognition methods and verifying attachment | |
CN114139665B (en) | Anti-counterfeiting embedding method, identification method and anti-counterfeiting device for securities | |
JP3709544B2 (en) | Printed material authentication method, printed material authentication system, printed material in which identification information and visible information are embedded | |
Van Beusekom et al. | Automatic counterfeit protection system code classification | |
KR100373443B1 (en) | Apparatus and method for manufacturing and authenticating a card using watermarking technique | |
JP5850370B2 (en) | Printed material production method, printed material and authenticity determination method | |
Zhao et al. | A morphology screen coding anti-counterfeiting method based on visual characteristics | |
CN202795404U (en) | Device for detecting anti-counterfeit information of printed matters | |
Yriarte et al. | A Two-Step Method for Ensuring Printed Document Integrity using Crossing Number Distances |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |