CN103324894A - Method and system for generating composite anti-fake document - Google Patents

Method and system for generating composite anti-fake document Download PDF

Info

Publication number
CN103324894A
CN103324894A CN2013102925623A CN201310292562A CN103324894A CN 103324894 A CN103324894 A CN 103324894A CN 2013102925623 A CN2013102925623 A CN 2013102925623A CN 201310292562 A CN201310292562 A CN 201310292562A CN 103324894 A CN103324894 A CN 103324894A
Authority
CN
China
Prior art keywords
false proof
documentation page
appointment
document
fake
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013102925623A
Other languages
Chinese (zh)
Other versions
CN103324894B (en
Inventor
张丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZOOM COMMERCE TECHNOLOGY Co Ltd
Original Assignee
ZOOM COMMERCE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=49193628&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CN103324894(A) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by ZOOM COMMERCE TECHNOLOGY Co Ltd filed Critical ZOOM COMMERCE TECHNOLOGY Co Ltd
Priority to CN201310292562.3A priority Critical patent/CN103324894B/en
Publication of CN103324894A publication Critical patent/CN103324894A/en
Application granted granted Critical
Publication of CN103324894B publication Critical patent/CN103324894B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to the field of an anti-fake technology, in particular to a method and a system for generating a composite anti-fake document. The method comprises the steps that an appointed-form anti-fake graph is added to an appointed document page to generate an anti-fake document page according to a prearranged rule, wherein the anti-fake graph is one or some of an anti-fake shading graph, an anti-copying graph and a two-dimension code graph; a request command triggered by a user is received, an anti-fake document page appointed by the request command is encoded and is issued to a client; the received anti-fake document page is decoded by the client and an anti document is formed in a combined mode. The system comprises a server end used for generating the anti-fake document page, encoding the anti-fake document page appointed by the request command and insuring the anti-fake document page to the client and the client used for decoding the received anti-fake document page and forming the anti-fake document in a combined mode. The method and the system for generating the composite anti-fake document reduce the situation that a consumer has difficulty identifying the true and false of a document, and improve the anti-fake effect of the anti-fake document.

Description

A kind of composite anti-fake document generates method and system
Technical field
The present invention relates to field of anti-counterfeit technology, generate method and system in particular to a kind of composite anti-fake document.
Background technology
In the correlation technique, the generation method of false proof document mainly contains: by adding laser anti-counterfeit label in document, or, by adding query formulation numerical code anti-fake label in document, or, false proof document generated by in document, adding the various ways such as texture anti-fake label.
But because laser anti-counterfeit label and query formulation digital code anti-false are easy to be forged, in the situation that lack comparison, the antifalsification label of forgery is difficult to be identified.And the texture anti-fake label also can be forged by the mode that high precision scanning copies, and has increased thus the difficulty that the consumer identifies true and false document, has reduced the antifalse effect of false proof document.
Summary of the invention
The object of the present invention is to provide a kind of composite anti-fake document to generate method and system, to solve the above problems.
A kind of composite anti-fake document generation method is provided in an embodiment of the present invention, has comprised:
In the documentation page of appointment, add the false proof figure of true-to-shape by preset rules, generate false proof documentation page;
Wherein said false proof figure comprises: one or more in false proof shading figure, anti-duplicating figure, micro text figure and the two-dimension code figure;
Receive the request instruction that the user triggers, be issued to client after the false proof documentation page of described request instruction appointment is encrypted;
Client is combined into false proof document after the false proof documentation page that receives is deciphered.
A kind of composite anti-fake document creating system comprises:
Server end is used for generating false proof documentation page by the false proof figure of preset rules in the documentation page adding true-to-shape of appointment; Wherein said false proof figure comprises: one or more in false proof shading figure, anti-duplicating figure, micro text figure and the two-dimension code figure; Receive the request instruction that the user triggers, and be issued to client after the false proof documentation page encryption with described request instruction appointment;
Client is used for being combined into false proof document after the false proof documentation page deciphering that receives.
Composite anti-fake document according to the above embodiment of the present invention generates in the false proof document of method and system generation, can according to false proof demand, in documentation page, add false proof shading figure, anti-one or more false proof figures that duplicate in figure, micro text figure and the two-dimension code figure.Can make according to the anti-duplicating figure that adds to demonstrate the figure different from original paper in the documentation page that copies, the consumer is the true and false of identification document intuitively.When adding the micro text figure in the false proof document, key message micro in the document can be generated the micro text figure, realize key message hiding to a certain degree, can also add the two-dimension code figure in the false proof document in addition, the inquiry of anti-counterfeiting information is carried out in realization by two-dimension code, be convenient to the consumer to the Antiforge inquiry of document.Composite anti-fake document therefore according to the above embodiment of the present invention generates the false proof document that method and system generate, and has reduced the difficulty that the consumer identifies true and false document, has improved the antifalse effect of false proof document.
Description of drawings
Fig. 1 shows the process flow diagram of embodiment of the invention composite anti-fake document generation method;
Fig. 2 shows the structural representation of embodiment of the invention composite anti-fake document creating system.
Embodiment
Also by reference to the accompanying drawings the present invention is described in further detail below by specific embodiment.
The embodiment of the invention provides a kind of composite anti-fake document generation method, and as shown in Figure 1, main treatment step comprises:
Step S11: in the documentation page of appointment, add the false proof figure of true-to-shape by preset rules, generate false proof documentation page;
Wherein said false proof figure comprises: one or more in false proof shading figure, anti-duplicating figure, micro text figure and the two-dimension code figure;
Step S12: receive the request instruction that the user triggers, be issued to client after the false proof documentation page of described request instruction appointment is encrypted;
Step S13: client is combined into false proof document after the false proof documentation page that receives is deciphered.
In the false proof document that generates according to the composite anti-fake document generation method of the embodiment of the invention, can according to false proof demand, in documentation page, add false proof shading figure, anti-one or more false proof figures that duplicate in figure, micro text figure and the two-dimension code figure.Can make according to the anti-duplicating figure that adds to demonstrate the figure different from original paper in the documentation page that copies, the consumer is the true and false of identification document intuitively.When adding the micro text figure in the false proof document, key message micro in the document can be generated the micro text figure, realize key message hiding to a certain degree, can also add the two-dimension code figure in the false proof document in addition, the inquiry of anti-counterfeiting information is carried out in realization by two-dimension code, be convenient to the consumer to the Antiforge inquiry of document.Therefore the false proof document of false proof document generation method generation according to the above embodiment of the present invention has reduced the difficulty that the consumer identifies true and false document, has improved the antifalse effect of false proof document.
In the embodiment of the invention, the false proof figure that in the documentation page of appointment, adds true-to-shape by preset rules, generate false proof documentation page, the false proof figure that wherein adds can be for false proof shading figure, anti-ly duplicate in figure, micro text figure and the two-dimension code figure one or more.
When adding false proof shading figure in the documentation page in appointment, comprising: in the documentation page of appointment, determine a plurality of reference mark; Generate the SPL by a plurality of described reference mark; Form false proof shading figure by a plurality of described SPL; Described false proof shading figure is joined the assigned address in the documentation page of appointment, generate false proof documentation page.
In the embodiment of the invention, the structure batten is exactly by one group of given reference mark (one group of X Y value), for example given following four reference mark (X is value between 1 to 100) in the O-XY of appointment coordinate system;
A(10,15)、B(28,78)、C(68,32)、D(76,12)
Four reference mark according to providing calculate a function Y=F (X);
Then X from 1 to 100 complete this function of substitution, just obtain 100 points, with 100 some structure SPL that draw.
When the quantity at reference mark is many, by reference mark segmentation computing function, such as front Y=F1 of 4 dot generation (X), lower four another function of dot generation Y=F2 (X) ... be combined into SPL by a plurality of sectional curves.
For the junction of the curve that makes segmentation keeps level and smooth, need to determine certain condition of continuity (continuity condition), mate the parametric derivative that connects by the public part at segment of curve, thereby set up parametric continuity (parametric continuity).
Particularly, generate the SPL by a plurality of described reference mark in the embodiment of the invention, comprising: determine SPL by a plurality of reference mark by cubic spline interpolation.
The piecewise function that cubic spline generates is cubic polynomial, the cubic spline differential technique is for providing a rational half-way house between the dirigibility of SPL and the computing velocity, compare with higher level polynomial expression, cubic spline function only needs less calculating and storage space, and more stable, compare with low order polynomial, cubic spline seems more flexible when the simulation Arbitrary groove profile.
On mathematics, the quantitative description of smooth degree is: the k order derivative of function (curve) exists and continuously, then claims this curve to have k rank slickness.Wherein the smooth degree of the higher curve of exponent number is better.
Can make the curve that obtains have the higher-order slickness than the polynomial situation of low order by the cubic spline difference.
Particularly, determine that the method for cubic spline function is, set up the O-XY coordinate system in the documentation page of appointment, in the O-XY coordinate system of setting up, the note cubic spline function is designated as s (x), and its interval of definition is [a, b];
This cubic spline function s (x) satisfies at each minizone [Xi-1, Xi] on be a cubic polynomial function, and on whole interval [a, b], its second derivative exists and continuously, can guarantee that so cubic spline function is continuous in the second derivative of each Nodes.
Cubic spline functions determines that method is: given function f (x) is at n+1 node x0, x1 ..., the functional value at xn place is y0, y1, ..., yn asks a cubic spline function s (x), and it is satisfied
s(xi)=yi, i=0,1,…,n;
Piecewise linear interpolation is to determine by two equations (functional value at two end points places is set-point) are unique in two parameters of the linear function of each section; For cubic spline interpolation, the cubic function on each interval has four parameters, and is that set-point is merely able to produce two equations by the functional value of two end points on this interval, and only this is not enough to unique four parameters of determining.Notice cubic spline function to the requirement of whole smooth, its second derivative exists and continuously, considers that from the angle of the overall situation relation of number of parameters and equation number is as follows:
Parameter: determine 4 parameters on each segment, n segment amounts to determines 4n parameter;
Equation: obtain 2 by the given function value on each segment, equation, n segment amounts to 2n equation;
Slickness requires the single order at each internal node place, second derivative continuous, draws its Derivative on the left or on the right and equates, therefore, each node produces 2 equations, amounts to 2 (n-1) individual, can access thus 4n-2 equation, also need determine two equations at this moment.
For this reason, method commonly used is to boundary node subsidiary boundary condition except functional value, and each determines that a boundary condition obtains two required equations by two end points about being, wherein the mode of definite end points boundary condition has three kinds:
(1) m boundary condition: s'(X0)=m0, s'(Xn)=mn, namely the first derivative values of two boundary nodes is set-point: m0, mn.
(2) M boundary condition: s''(x0)=m0, s''(xn)=mn, namely the second derivative value of two boundary nodes is set-point: m0, mn.
Especially, when m0 and mn are zero, be called natural boundary conditions.
(3) periodic boundary condition: s'(x0)=s'(xn); S''(x0)=s''(xn).
Further, when adding anti-duplicating figure in the documentation page in appointment, comprising:
Determine background image and the foreground image of described anti-duplicating figure;
Assigned address in the described background image determined and described foreground image are joined appointment by preset rules the documentation page generates false proof documentation page.
When adding the micro text figure in the documentation page in appointment, comprising: the key message in the documentation page of extraction appointment; With the described key message micro that extracts, generate the micro text figure; The described micro text figure that generates is added to the assigned address in the documentation page of appointment.Particularly, the micro text figure that generates can join in the frame line that is arranged on whole document, realize hiding of key message, wherein, the information content in the micro text figure that generates can be inquired about by two-dimension code, inquires about by two-dimension code and is convenient to the consumer false proof content is inquired about.
When adding the two-dimension code figure in the documentation page in appointment, comprising: extract the key message of the documentation page of appointment, generate the character information that is used for by two-dimension code carried according to the described key message that extracts; According to described character information generator matrix two-dimension code figure; Described matrix two-dimension code figure is added in the assigned address of documentation page of appointment.
Described except generating according to the described key message that extracts for by the character information that two-dimension code carried, also comprise: generate the character information that is used for by two-dimension code carried according to the Antiforge inquiry website information.
Described client is combined into false proof document after the false proof documentation page that receives is deciphered, and comprising:
Client according to the filename of the false proof documentation page that receives, check that password, document Modify password, the page number and Layer Order are number with the synthetic false proof document of false proof documentation page.
The embodiment of the invention also provides a kind of composite anti-fake document creating system, as shown in Figure 2, comprising:
Server end 21 is used for generating false proof documentation page by the false proof figure of preset rules in the documentation page adding true-to-shape of appointment; Wherein said false proof figure comprises: one or more in false proof shading figure, anti-duplicating figure, micro text figure and the two-dimension code figure; Receive the request instruction that the user triggers, and be issued to client after the false proof documentation page encryption with described request instruction appointment;
Client 22 is used for being combined into false proof document after the false proof documentation page deciphering that receives.
Described server end comprises: one or more in false proof shading generation server, anti-duplicating processing server, micro processing server and the two-dimension code processing server.
Composite anti-fake document according to the embodiment of the invention generates the false proof document that method and system generate, can scan by mobile phone terminal the mode of two-dimension code, the summary info that shows false proof content, and provide the Antiforge inquiry network address, by the Antiforge inquiry network address, can represent the false proof shading of every a anti-fake material, anti-label, micro text content and the particular location of duplicating.
Obviously, those skilled in the art should be understood that, above-mentioned each module of the present invention or each step can realize with general calculation element, they can concentrate on the single calculation element, perhaps be distributed on the network that a plurality of calculation elements form, alternatively, they can be realized with the executable program code of calculation element, thereby, they can be stored in the memory storage and be carried out by calculation element, perhaps they are made into respectively each integrated circuit modules, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a composite anti-fake document generation method is characterized in that, comprising:
In the documentation page of appointment, add the false proof figure of true-to-shape by preset rules, generate false proof documentation page;
Wherein said false proof figure comprises: one or more in false proof shading figure, anti-duplicating figure, micro text figure and the two-dimension code figure;
Receive the request instruction that the user triggers, be issued to client after the false proof documentation page of described request instruction appointment is encrypted;
Client is combined into false proof document after the false proof documentation page that receives is deciphered.
2. method according to claim 1 is characterized in that, the described false proof figure that adds true-to-shape by preset rules in the documentation page of appointment generates false proof documentation page, comprising:
In the documentation page of appointment, add false proof shading figure, comprising:
In the documentation page of appointment, determine a plurality of reference mark;
Generate the SPL by a plurality of described reference mark;
Form false proof shading figure by a plurality of described SPL;
Described false proof shading figure is joined the assigned address in the documentation page of appointment, generate false proof documentation page.
3. method according to claim 2 is characterized in that, generates the SPL by a plurality of described reference mark, comprising:
Determine SPL by a plurality of reference mark by cubic spline interpolation.
4. method according to claim 1 is characterized in that, the described false proof figure that adds true-to-shape by preset rules in the documentation page of appointment generates false proof documentation page, comprising:
In the documentation page of appointment, add the anti-figure that duplicates, comprising:
Determine background image and the foreground image of described anti-duplicating figure;
Assigned address in the described background image determined and described foreground image are joined appointment by preset rules the documentation page generates false proof documentation page.
5. method according to claim 1 is characterized in that, the described false proof figure that adds true-to-shape by preset rules in the documentation page of appointment generates false proof documentation page, comprising:
In the documentation page of appointment, add the micro text figure, comprising:
Key message in the documentation page of extraction appointment;
With the described key message micro that extracts, generate the micro text figure;
The described micro text figure that generates is added to the assigned address in the documentation page of appointment.
6. method according to claim 1 is characterized in that, the described false proof figure that adds true-to-shape by preset rules in the documentation page of appointment generates false proof documentation page, comprising:
In the documentation page of appointment, add the two-dimension code figure, comprising:
Extract the key message of the documentation page of appointment, generate the character information that is used for by two-dimension code carried according to the described key message that extracts;
According to described character information generator matrix two-dimension code figure;
Described matrix two-dimension code figure is added in the assigned address of documentation page of appointment.
7. method according to claim 6 is characterized in that, is used for by the character information that two-dimension code carried except generating according to the described key message that extracts, and also comprises: generate the character information that is used for by two-dimension code carried according to the Antiforge inquiry website information.
8. according to claim 1 to 7 each described methods, it is characterized in that, described client is combined into false proof document after the false proof documentation page that receives is deciphered, and comprising:
Client according to the filename of the false proof documentation page that receives, check that password, document Modify password, the page number and Layer Order are number with the synthetic false proof document of false proof documentation page.
9. a composite anti-fake document creating system is characterized in that, comprising:
Server end is used for generating false proof documentation page by the false proof figure of preset rules in the documentation page adding true-to-shape of appointment; Wherein said false proof figure comprises: one or more in false proof shading figure, anti-duplicating figure, micro text figure and the two-dimension code figure; Receive the request instruction that the user triggers, and be issued to client after the false proof documentation page encryption with described request instruction appointment;
Client is used for being combined into false proof document after the false proof documentation page deciphering that receives.
10. system according to claim 9 is characterized in that, described server end comprises:
In false proof shading generation server, anti-duplicating processing server, micro processing server and the two-dimension code processing server one or more.
CN201310292562.3A 2013-07-11 2013-07-11 A kind of composite anti-fake document structure tree method and system Expired - Fee Related CN103324894B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310292562.3A CN103324894B (en) 2013-07-11 2013-07-11 A kind of composite anti-fake document structure tree method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310292562.3A CN103324894B (en) 2013-07-11 2013-07-11 A kind of composite anti-fake document structure tree method and system

Publications (2)

Publication Number Publication Date
CN103324894A true CN103324894A (en) 2013-09-25
CN103324894B CN103324894B (en) 2016-01-06

Family

ID=49193628

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310292562.3A Expired - Fee Related CN103324894B (en) 2013-07-11 2013-07-11 A kind of composite anti-fake document structure tree method and system

Country Status (1)

Country Link
CN (1) CN103324894B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104463412A (en) * 2014-10-29 2015-03-25 中冶天工集团有限公司 Method for carrying out kiln project technical disclosure by utilization of two-dimension codes
WO2018196661A1 (en) * 2017-04-27 2018-11-01 珠海赛纳打印科技股份有限公司 Image processing device and method
CN108805787A (en) * 2018-04-17 2018-11-13 北京溯斐科技有限公司 A kind of method and apparatus that paper document distorts Jianzhen
CN109299763A (en) * 2018-10-17 2019-02-01 国网江苏省电力有限公司无锡供电分公司 The anti-tamper forgery method of papery concerning security matters carrier based on RFID key chain
CN113313782A (en) * 2021-06-15 2021-08-27 福建正孚软件有限公司 File anti-counterfeiting method and system based on three-dimensional grains

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070061889A1 (en) * 2005-09-12 2007-03-15 Sand Box Technologies Inc. System and method for controlling distribution of electronic information
CN101841411A (en) * 2005-10-28 2010-09-22 北京书生数字技术有限公司 Data resource anti-copying encrypted transmission method and device system
CN103065101A (en) * 2012-12-14 2013-04-24 北京思特奇信息技术股份有限公司 Anti-counterfeiting method for documents

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070061889A1 (en) * 2005-09-12 2007-03-15 Sand Box Technologies Inc. System and method for controlling distribution of electronic information
CN101841411A (en) * 2005-10-28 2010-09-22 北京书生数字技术有限公司 Data resource anti-copying encrypted transmission method and device system
CN103065101A (en) * 2012-12-14 2013-04-24 北京思特奇信息技术股份有限公司 Anti-counterfeiting method for documents

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王丰军等: "防伪版纹设计系统研究", 《天津科技大学学报》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104463412A (en) * 2014-10-29 2015-03-25 中冶天工集团有限公司 Method for carrying out kiln project technical disclosure by utilization of two-dimension codes
WO2018196661A1 (en) * 2017-04-27 2018-11-01 珠海赛纳打印科技股份有限公司 Image processing device and method
CN108805787A (en) * 2018-04-17 2018-11-13 北京溯斐科技有限公司 A kind of method and apparatus that paper document distorts Jianzhen
CN108805787B (en) * 2018-04-17 2022-08-23 北京数科网维技术有限责任公司 Paper document tampering and authenticating method and device
CN109299763A (en) * 2018-10-17 2019-02-01 国网江苏省电力有限公司无锡供电分公司 The anti-tamper forgery method of papery concerning security matters carrier based on RFID key chain
CN113313782A (en) * 2021-06-15 2021-08-27 福建正孚软件有限公司 File anti-counterfeiting method and system based on three-dimensional grains

Also Published As

Publication number Publication date
CN103324894B (en) 2016-01-06

Similar Documents

Publication Publication Date Title
Bowen et al. Digitalism: the new realism?
CN103324894B (en) A kind of composite anti-fake document structure tree method and system
US20130304604A1 (en) Systems and methods for dynamic digital product synthesis, commerce, and distribution
Doyle et al. Celebrities and climate change
Liu et al. Digital cardan grille: A modern approach for information hiding
Schrape The promise of technological decentralization. A brief reconstruction
CN113902061A (en) Point cloud completion method and device
Mandal et al. A new approach of text Steganography based on mathematical model of number system
Zhaoxiong et al. Perceptual hashing based on machine learning for blockchain and digital watermarking
CN116977531A (en) Three-dimensional texture image generation method, three-dimensional texture image generation device, computer equipment and storage medium
CN111932438A (en) Image style migration method, equipment and storage device
Gdawiec Inversion fractals and iteration processes in the generation of aesthetic patterns
Li et al. A method for constructing interpolatory subdivision schemes and blending subdivisions
Barnsley et al. Fractal homeomorphism for bi-affine iterated function systems
Qian et al. Constructive steganography using texture synthesis
Tanaka et al. Feature extraction from sketches of objects
Prechtel On strategies and automation in upgrading 2D to 3D landscape representations
Bertini et al. Can information hiding in social media posts represent a threat?
CN114595673A (en) Collaborative creation method of digital works, task release method and device
Shi et al. Polar NURBS surface with curvature continuity
Ma Big Earths of China: Remotely Sensing Xinjiang along the Belt and Road
JP2013167865A (en) Confidential information hiding device, confidential information restoring device, confidential information hiding program, and confidential information restoring program
Darpö et al. The double sign of a real division algebra of finite dimension greater than one
Kuznetsov et al. Software implementation of data hiding in vector images
Jeffcote Technology@ Utopia

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160106

CF01 Termination of patent right due to non-payment of annual fee