Detailed Description
Embodiments of the present specification will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present description have been shown in the accompanying drawings, it is to be understood that the present description may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided to provide a more thorough and complete understanding of the present description. It should be understood that the drawings and examples in this specification are for illustration purposes only and are not intended to limit the scope of the present invention.
In the description of the embodiments of the present specification, the term "comprising" and its similar terms should be understood as open-ended, i.e. "including, but not limited to. The term "based on" should be understood as "based at least in part on". The term "one embodiment" or "the embodiment" should be understood as "at least one embodiment". The terms "first," "second," and the like, may refer to different or the same object. Other explicit and implicit definitions are also possible below.
As mentioned above, the accurate identification of the security tag is critical to the use of the encoded tag. In the process of article circulation, the mechanism such as merchant, platform can paste on the surface or the outer package of article, hang anti-fake label to be used for preventing the forging of article, prevent scurrying goods, sweep the sign indicating number and obtain scenes such as virtual resource. In these usage scenarios, counterfeiters may attack by means of mass production counterfeiting, copy-forgery of the same size, copy-amplified attacks, screen scanning, etc., as follows:
And (3) batch generation counterfeiting, namely firstly, a counterfeiter estimates other code values in batches according to the code values of the two-dimensional code labels of the existing articles, or the counterfeiter can acquire the code values leaked in batches. Then, the counterfeiter presumes the anti-counterfeiting information and the process according to the anti-counterfeiting pattern on the two-dimensional code label, and directly generates a batch of images of the two-dimensional code label containing the anti-counterfeiting information. And finally, the counterfeiter reprints and counterfeits the two-dimensional code label or directly scans the image of the two-dimensional code label in a screen-separating way. In general, two-dimensional code labels without anti-counterfeiting patterns are most easily counterfeited in batches. In addition, for the anti-counterfeiting two-dimensional code label with the anti-counterfeiting pattern anchoring batch code value, the anti-counterfeiting pattern is relatively easy to forge in batch because the anti-counterfeiting pattern has no uniqueness. The anti-counterfeiting two-dimensional code label with one code value is anchored to the anti-counterfeiting pattern, and the anti-counterfeiting pattern has uniqueness, so that the anti-counterfeiting two-dimensional code label is difficult to forge in batches. It should be appreciated that the more complex the anti-counterfeiting process, the greater the difficulty of mass-producing counterfeits.
The same size copy forging, namely, a counterfeiter scans the two-dimensional code by using a scanner to obtain a two-dimensional code pattern and an anti-counterfeiting pattern of a two-dimensional code area, such as a shading pattern, a random pattern and the like, and reprints the two-dimensional code label with the same size by using a printing machine to forge. The more complex the security pattern and process, the higher the precision requirements of its scanner and printing machine, and thus the greater the difficulty of its counterfeiting.
And the amplified size copy forging is that a counterfeiter uses a scanner to scan the two-dimensional code, obtains the two-dimensional code pattern and the anti-counterfeiting pattern of the two-dimensional code area, such as the ground pattern, the random pattern and the like, and uses a printing machine to amplify the size to reprint or copy the two-dimensional code. Since the anti-counterfeiting patterns such as the shading patterns and the random patterns cannot lose excessive texture information under large size, the two-dimensional code label of the amplified version can be directly scanned to realize attack. And the screen-separation code scanning is that a counterfeiter displays the pictures of the two-dimensional code labels on the screen of the mobile phone or the personal computer and the like, and then uses the mobile phone to scan the pictures on the code screen so as to realize attack.
In the related art, the anti-counterfeiting of the two-dimensional code label is generally performed by silver scraping technology, anti-counterfeiting shading technology, holographic anti-counterfeiting technology, invisible digital technology, quantum cloud code technology and the like. The silver scraping anti-counterfeiting label is also called a scraping type digital anti-counterfeiting label, the technology is realized by superposing numbers and a coating (such as silver ink capable of being scraped) on the basis of a two-dimensional code, a user can scan the two-dimensional code to open a verification website, then the coating is scraped to obtain the numbers, and the numbers are input into the verification website for verification. The anti-fake shading technology is to repeatedly connect various different curves or straight lines under the common two-dimensional code layer regularly to form the anti-fake shading. The stripes of the anti-counterfeiting shading are thin and have no obvious color, so the anti-counterfeiting shading is not easy to copy or forge.
The holographic anti-counterfeiting technology is based on a laser anti-counterfeiting label, namely the anti-counterfeiting label which is finished by adopting a color hologram plate making technology and matching with a mould pressing replication technology. The anti-counterfeiting label can be observed by naked eyes, and can also be used for observing the internal engraving characteristics through microscopic equipment, so that authenticity is identified. The uppermost layer of the two-dimensional code label adopted by the invisible digital technology is printed with a varnish layer or a pure color layer, when the varnish layer is subjected to photochemical drying, the optical characteristics of the varnish layer can be changed, and 10-500 microns of random defects are generated on the surface of the varnish layer to form micropores. The optical characteristics of the random defect may be detected by flashing a light when verifying authenticity. And the quantum cloud code technology generates random black code points according to a certain rule outside the black and white code element areas on the two-dimensional code label. In verifying authenticity, authenticity may be identified by detecting the rules of the code points.
However, in the related art, with respect to the silver scraping technology, a counterfeiter may scrape the silver scraping layer to obtain a number after obtaining a true two-dimensional code label, and then reprint the two-dimensional code. The low reprinting costs result in a lower counterfeit threshold for the technology. In addition, the fake-checking mode can only be used for identifying the authenticity by manually scraping off the silver-scraping layer, and the machine fake-checking mode can only be used for scanning the code identification code value, so that the purpose of identifying the authenticity cannot be achieved. For the anti-counterfeiting shading technology, the process requirement for printing the anti-counterfeiting shading is high, and a common printing factory cannot print clear and complete anti-counterfeiting shading, so that the manufacturing difficulty of the anti-counterfeiting shading is high. However, when the user inspects the fake, the mobile phone camera is generally adopted to shoot, so that the tiny and dull shading under the two-dimension code image layer is not easy to shoot clearly, the two-dimension code image shot by the user is not easy to match with the standard two-dimension code image in the server, and the fake inspection fails. The fake-checking mode can be to check the authenticity by observing the shading through human eyes, or to check the fake through machine code scanning, but the identification difficulty is high.
For the holographic anti-counterfeiting technology, the invisible digital technology and the quantum cloud code technology, the production cost of the two-dimensional code label is relatively high, special equipment and technology are required, and the price of the two-dimensional code label is relatively high. In addition, under the general condition, the patterns on the two-dimensional code labels are the same, and once the two-dimensional code labels are totally broken, the two-dimensional codes of code segments of all batches are easy to forge. In addition, the fake verification stage is realized through human eye observation, and the recognition accuracy is low. Based on the above, the anti-counterfeit label identification technology in the related art has the problems of low counterfeit threshold, high manufacturing and identification cost and low identification accuracy.
For this purpose, in an embodiment of the present specification, a method for identifying a security tag is presented. Under the condition of polishing, a polished image of the anti-counterfeit label is obtained, wherein the polished image comprises a laser component and a coding pattern of the anti-counterfeit label. And then, obtaining a base map of the corresponding anti-counterfeit label according to the coding pattern in the shining image, wherein the base map is also acquired under the shining condition. Further, according to the matching result of the color line reflected by the laser component in the polished image and the color line reflected by the laser component in the base map, a message that the anti-counterfeit label is true is generated. By means of the method, whether the anti-counterfeiting label is forged or not can be identified through the shining of the color lines of the laser components in the image and the base map, and compared with the scheme in the related art, the anti-counterfeiting label is low in identification cost and high in identification accuracy. And moreover, the counterfeit threshold of the anti-counterfeit label can be improved through the laser component, and the manufacturing cost is reduced.
FIG. 1 illustrates a schematic diagram of an example environment 100 in which some embodiments of the specification may be implemented. Referring to fig. 1, an exemplary environment 100 includes a terminal 102, a server 104, and a security tag 106. Where the terminal 102 includes, but is not limited to, a client device such as a cell phone, tablet, personal computer, etc., and the server 104 includes, but is not limited to, a computing system, a single server, a distributed server, or a cloud-based server, etc. The anti-counterfeit label 106 comprises a laser assembly 108 and a coding pattern 110, wherein the laser assembly 108 can comprise a plurality of laser unit gratings, and the coding pattern 110 comprises, but is not limited to, a bar code pattern, a two-dimensional code pattern and the like.
In some embodiments, in the case of a lighting, terminal 102 obtains a lighting image (which may be referred to as a first image) of security tag 106. Then, the terminal 102 sends the polished image to the server 104, and the server 104 acquires the polished image and recognizes the coding pattern 110 in the polished image, thereby obtaining the base map of the anti-counterfeit label 106. Further, server 104 compares the color lines reflected by laser assembly 108 in the polished image with the color lines reflected by laser assembly 108 in the base map to determine if the color lines match. If so, the server 104 generates a message that the security tag 106 is true and sends the message to the terminal 102, and if not, the server 104 generates a message that the security tag 106 is false and sends the message to the terminal 102. The terminal 102 displays the message in the screen after receiving the message.
Alternatively or additionally, in the case of a lighting, the terminal 102 acquires a lighting image of the security tag 106. Then, the terminal 102 sends the polished image to the server 104, and the server 104 acquires the polished image and recognizes the coding pattern 110 in the polished image, thereby obtaining the base map of the anti-counterfeit label 106. Further, the server 104 sends the base map to the terminal 102, and the terminal 102 compares the color lines reflected by the laser component 108 in the polished image with the color lines reflected by the laser component 108 in the base map to determine whether the color lines match. If so, the terminal 102 generates a message that the anti-counterfeit label 106 is true and displays the message in the screen, and if not, the server 104 generates a message that the anti-counterfeit label 106 is false and displays the message in the screen.
In this way, whether the anti-counterfeit label 106 is counterfeit or not can be identified by polishing the color lines of the laser component 110 in the image and the base map, thereby reducing the identification cost and improving the identification accuracy. In addition, the laser component 108 can raise the counterfeit threshold of the anti-counterfeit label 106 and reduce the manufacturing cost.
The process according to the embodiment of the present specification will be described in detail below with reference to fig. 2 to 9. For ease of understanding, specific data are set forth in the following description, which are exemplary and are not intended to limit the scope of the present disclosure. It should be understood that the embodiments described below may also include additional acts not shown and/or may omit acts shown, the scope of the present description being not limited in this respect.
Fig. 2 illustrates a flow chart of a method 200 for identifying a security tag in some embodiments of the present description. In some embodiments, in the example environment 100 shown in fig. 1, the method 200 may be performed by the server 104. It should be appreciated that although the following description is described in terms of server 104 as the main body of execution, method 200 may also be performed by other devices, such as terminal 102. Method 200 may also include additional acts not shown and/or may omit acts shown, the scope of the present description being limited in this respect.
At 202, a first image of an anti-counterfeit label acquired with a lighting condition is acquired, the anti-counterfeit label including a laser assembly and a coding pattern. In some embodiments, in the case of lighting, the server 104 may obtain a lighting image (which may be referred to as a first image) from the terminal 102. The polished image may be obtained by the terminal 102 shooting the anti-counterfeit label 106 under the condition of polishing, where the anti-counterfeit label 106 includes the laser component 108 and the code pattern 110.
At 204, a base map of the security label acquired with the lighting is acquired based on the encoding pattern in the first image. In some embodiments, after the server 104 obtains the polished image, the coding pattern 110 in the polished image is identified, so that the base map of the security tag 106 is obtained according to the matching of the coding pattern 110. The base image may be an image taken after the anti-counterfeit label 106 is polished in the production process.
At 206, if the color line reflected by the laser component in the first image matches the color line reflected by the laser component in the base map, a message is generated that the security tag is authentic. In some embodiments, server 104 compares the color lines reflected by laser assembly 108 in the polished image with the color lines reflected by laser assembly 108 in the base map to determine if the color lines match. If so, the server 104 generates a message that the security tag 106 is authentic.
By means of the method, whether the anti-counterfeiting label is forged or not can be identified through the shining of the color lines of the laser components in the image and the base map, and compared with the scheme in the related art, the anti-counterfeiting label is low in identification cost and high in identification accuracy. And moreover, the counterfeit threshold of the anti-counterfeit label can be improved through the laser component, and the manufacturing cost is reduced.
Fig. 3A-3B illustrate front and top views 300A and 300B, respectively, of laser assembly 108 of some embodiments of the present description. Referring to fig. 3A, the laser assembly 108 includes a plurality of circular laser unit gratings with the same center, such as the outermost laser unit grating 302, and the plurality of laser unit gratings form an echelle grating structure. The grating is an optical device formed by a plurality of parallel slits with equal width and equal interval, and is generally manufactured by engraving a plurality of parallel scores on a glass sheet, wherein the scores are opaque parts, and a smooth part between the two scores can transmit light and is equivalent to one slit. The echelle grating structure is formed by scribing a echelle reflecting surface on a substrate to form a echelle structure.
Referring to fig. 3B, three parameters including grating depth h, grating constant d, and blaze angle α may be set in a laser unit grating, such as laser unit grating 302. By modulating the above three parameters, the color of the color line reflected by laser assembly 108 can be adjusted. Wherein, by blazing angle α, the direction of the color line reflected by laser assembly 108 can be adjusted. In some embodiments, the concentric echelle grating structure can be changed into a fresnel lens by modulating the above three parameters for each laser unit grating.
Fig. 4 illustrates multiple front views 400 of a laser assembly including a laser pattern according to some embodiments of the present description. In some embodiments, the echelle grating structure of the laser component may incorporate laser patterns, where the laser patterns include, but are not limited to, pattern information such as numbers, letters, etc., and the fusion manner includes, but is not limited to, overlay, hollowed-out, internal inclusion, etc. Referring to fig. 4, for laser assembly 108 and laser pattern 404, they may be combined to form laser assembly 406 in an overlay-based fashion. For laser assembly 108 and laser pattern 408, they may be combined to form laser assembly 410 on a hollowed-out basis. For laser assembly 108 and laser pattern 412, they may be combined to form laser assembly 414 based on an internal fusion approach.
Fig. 5A shows a schematic diagram of an anti-counterfeit label 500 including a plurality of laser assemblies according to some embodiments of the present disclosure. The anti-counterfeit label 500 includes a plurality of laser components, such as the laser component 502, and each laser component can be set based on the echelle grating structure, so that a polished image photographed under the condition of polishing can display color lines corresponding to each laser component. The direction of the color line reflected by the laser component can be set by adjusting the blaze angle alpha of the laser unit gratings in the laser component. Also, laser patterns, such as laser pattern 504 (number 1), may also be included in the laser assembly. In some embodiments, the color line direction of the laser assemblies may be randomly arranged, the laser pattern of the laser assemblies may also be randomly arranged, and the position of each laser assembly may also be randomly arranged. In this way, the resulting security tag 500 is guaranteed to have a high degree of randomness.
In some embodiments, the direction of the color line reflected by the laser component refers to the light passing through the center of the circle, including white light, red light, green light, blue light, and so on. The white light is reflected after polishing, and can be called as 0-order main maximum stripe, and the red light, green light, blue light and other light are diffracted 1-order or 2-order stripes. Fig. 5B illustrates a schematic diagram of another security tag including multiple laser assemblies according to some embodiments of the present disclosure, in some embodiments, the center of the laser assemblies may be set to be the vertex or center of a hexagon on the basis of the security tag 500 illustrated in fig. 5A, so that the laser assemblies can be uniformly distributed in a hexagonal manner. Wherein the ray direction of each laser component on the vertex or center of the hexagon is random. In this way, it is ensured that the numbers in the laser assembly can be evenly distributed.
Fig. 6 shows a schematic diagram of a security label 600 comprising a plurality of laser assemblies and coding patterns according to some embodiments of the present disclosure. Referring to fig. 6, the anti-counterfeit label 600 may include a laser assembly area 602 and a code pattern area 604, wherein the laser assembly area 602 may be implemented based on the manner shown in fig. 5A or fig. 5B, and the code pattern area 604 is used to set a code pattern, such as a two-dimensional code pattern or a bar code pattern. In some embodiments, the positions and overlapping manner of the region 602 of the laser assembly and the region 604 of the encoding pattern may be randomly arranged, thereby further ensuring the randomness of the security tag 600.
In some embodiments, the laser material is manufactured into a cold wave process by printing a laser format using a stamping technology, and the laser patterns are sequentially cold wave printed on the base material to print the two-dimensional code. Because the cold wave laser pattern and the printing two-dimensional code are two mutually independent processes, the two-dimensional code and the laser pattern information are not aligned, and even if the same two-dimensional code is printed, the laser pattern information is different. After the anti-counterfeiting label is manufactured, a base map of the finished two-dimensional code label can be shot by a camera of a printing production line under the condition of polishing, and the base map is stored in a non-transitory storage medium for subsequent identification of the anti-counterfeiting label.
Fig. 7 illustrates a schematic diagram of a process 700 of identifying a security tag according to some embodiments of the present disclosure. In some embodiments, in the example environment 100 shown in fig. 1, the flow 700 may be performed by the server 104. It should be appreciated that although the following description is described in terms of server 104 as the main body of execution, flowchart 700 may also be performed by other devices, such as terminal 102. Flow 700 may also include additional acts not shown and/or may omit acts shown, the scope of the present description being limited in this respect.
In some embodiments, server 104 obtains a lighting image 702 (which may be referred to as a first image) from terminal 102. The lighting image 102 may be captured by the terminal 102 when lighting, for example, by a mobile phone of the user when turning on a flash. Then, the server 104 decodes the corresponding code value 704 according to the coding pattern in the polished image 702. The code value is a character string resolved by the coding pattern, including but not limited to English, number, chinese, symbol, etc. Then, the server 104 retrieves the base map 706 corresponding to the code value 704 from the database according to the code value 704. After the anti-counterfeit label is produced, the base image 706 is shot by a camera of the production line under the condition of lighting, and the base image 706 and the corresponding code value are associated and stored in a database. In this way, the search efficiency of the base graph 706 can be improved based on the code value 704.
After obtaining the base map 706, the server 104 determines whether the color lines reflected by the laser components in the polished image 702 and the base map 706 match, resulting in a ray match 708. Then, if the result of the ray matching 708 is yes, the server 104 generates an identification success message 710 and sends it to the terminal 102 to inform the user that the security tag is true. If the result of the ray matching 708 is negative, the server 104 generates an identification failure message 712 and sends it to the terminal 102 to inform the user that the security tag is false.
In some embodiments, in determining the result of the ray match 708, the server 104 may first identify the illuminated image 702 and the base map 706 by a neural network model (which may be referred to as a first neural network model) to obtain the region of the encoded pattern in the illuminated image 702 and the region of the encoded pattern in the base map 706. Server 104 may then divide the peripheral region of the code pattern from the polished image 702 as the region of the laser assembly, and divide the peripheral region of the code pattern from the base image 706 as the region of the laser assembly, and align the two divided regions of the laser assembly. Further, server 104 may identify regions of the aligned laser assemblies by another neural network model (which may be referred to as a second neural network model) to obtain the results of ray matching 708. In this way, the server 104 can firstly perform the neural network model on the area of the Ji Leishe assembly and then perform the light identification matching, so that the accuracy of the light matching result is improved, and the accuracy of the anti-counterfeiting identification is further improved.
In some embodiments, server 104 may first determine whether the laser patterns (e.g., numbers, letters, etc.) in the polished image 702 and the base image 706 match, resulting in a recognition result (which may be referred to as a first recognition result) of the laser patterns. Server 104 may then determine whether the color lines reflected by the laser components in the polished image 702 and the base image 706 match, resulting in a color line identification (which may be referred to as a second identification). If the two recognition results are both matched, then a result of the ray match 708 is obtained. If there is at least one mismatch between the two recognition results, a result may be obtained that the ray match 708 is negative. By the mode, the laser pattern and the light of the laser component in the anti-counterfeit label can be combined, so that the recognition accuracy of the matching of the polished image 702 and the base image 706 is improved, and the recognition accuracy of the anti-counterfeit label is further improved.
For the recognition result of the laser pattern, in some embodiments, server 104 may first determine the location of the laser pattern in the polished image 702, and the location of the laser pattern in the base pattern 706. Server 104 may then determine whether the positions of the laser patterns in the polished image 702 and the base image 706 match, thereby obtaining a recognition result of the laser patterns. Alternatively or additionally, server 104 may also determine the recognition result of the laser pattern in combination with information such as the orientation, shape, etc. of the laser pattern in the polished image 702 and the base image 706.
For the color line identification result, in some embodiments, the server 104 may first determine the position of the color line in the shiny image 702, and the position of the color line in the base map 706. Server 104 may then determine whether the positions of the color lines in the shingling image 702 and the base drawing 706 match, resulting in a color line identification result. Alternatively or additionally, server 104 may first determine the direction in which the color lines in image 702 are shined, and the direction in which the color lines in base 706 are shined. Server 104 may then determine whether the directions of the color lines in the lighting image 702 and the base drawing 706 match, resulting in a color line identification result. It should be appreciated that server 104 may also combine the positions and orientations of the color lines in the illuminated image 702 and the base image 706 to obtain a color line identification result.
Fig. 8 illustrates a schematic diagram of another process 800 for identifying a security tag according to some embodiments of the present disclosure. In some embodiments, in the example environment 100 shown in fig. 1, the process 800 may be performed by the server 104. It should be appreciated that although the following description is described in terms of server 104 as the main body of execution, flowchart 800 may also be performed by other devices, such as terminal 102. Flow 800 may also include additional acts not shown and/or may omit acts shown, the scope of the present invention being not limited in this respect.
In some embodiments, the server 104 obtains the untrimmed image 802 (which may be referred to as a second image) and the lit image 804 (which may be referred to as a first image) from the terminal 102. Wherein the unlit image 802 may be acquired by the terminal 102 without flashing the light, and the lit image 804 may be acquired by the terminal 102 with flashing the light. Then, the server 104 decodes the corresponding code value 806 according to the coding pattern in the uncolored image 802 or the polished image 804. Further, the server 104 retrieves the base map 808 corresponding to the code value 806 from the database according to the code value 806. After the anti-counterfeit label is produced, the bottom map 808 is photographed by a camera of the production line under the condition of lighting, and the bottom map 808 and the corresponding code value are associated and stored in a database. In this way, the search efficiency of the base graph 808 can be improved based on the code value 806.
Server 104 then determines whether there is a change in color from the light reflected by the laser components in the undirected image 802 and the shined image 804, resulting in a light change 810. It should be appreciated that the colors of light reflected by the laser assembly differ between the lit and unlit cases based on the grating characteristics of the laser assembly. If the result of the light change 810 is yes, it indicates that the laser component is in an echelle structure at this time, and the next step of recognition can be continued. If the result of the light change 810 is no, it indicates that the laser component is counterfeit, and there is no echelle grating structure, at this time, an identification failure result 816 may be directly generated and sent to the terminal 102. In this way, whether the laser component with the echelle grating structure exists in the anti-counterfeit label can be identified based on the light change of the laser components in the non-polished image 802 and the polished image 804, so that the identification accuracy of the anti-counterfeit label is improved.
In some embodiments, in determining the result of the light change 810, the server 104 may first identify the non-illuminated image 802 and the illuminated image 804 by a neural network model (may be referred to as a first neural network model), thereby obtaining the region of the encoded pattern in the non-illuminated image 802 and the region of the encoded pattern in the illuminated image 804. Then, the server 104 may divide the peripheral area of the coding pattern from the non-polished image 802 as the area of the laser component, and divide the peripheral area of the coding pattern from the polished image 804 as the area of the laser component, and align the two divided areas of the laser component. Further, server 104 may identify regions of the aligned laser assemblies by another neural network model (which may be referred to as a second neural network model) to obtain the results of the light variation 810. In this way, the server 104 can firstly pass through the neural network model to the area of Ji Leishe components, and then perform light identification matching, so that the accuracy of the result of the light change 810 is improved, and the accuracy of anti-counterfeiting identification is further improved.
In the event that the result of the light change 810 is yes, the server 104 determines whether the color lines reflected by the laser components in the polished image 804 and the base map 808 match, resulting in a light match 812. Then, if the result of the ray matching 812 is yes, the server 104 generates an identification success message 814 and sends it to the terminal 102 to inform the user that the security tag is true. If the result of the ray matching 812 is no, the server 104 generates an identification failure message 816 and sends it to the terminal 102 to inform the user that the security tag is false.
In some embodiments, the terminal 102 may be a mobile phone, and the user may start application software or a program in the mobile phone, so as to open the camera to detect the two-dimensional code pattern and determine the sharpness of the two-dimensional code pattern. When the two-dimensional code pattern is clear, the mobile phone can take a photo of the two-dimensional code pattern as an uncomforted image. Meanwhile, the mobile phone can start a flash lamp, at the moment, color lines can appear on laser components on the peripheral area of the two-dimension code pattern, and at the moment, the mobile phone can take a picture of the two-dimension code pattern as a shining image. The handset then sends the un-lit image and the lit image to the server 104.
Then, after receiving the un-polished image and the polished image sent by the mobile phone, the server 104 may first perform code value recognition on the un-polished image or the polished image, and obtain a corresponding base map according to the code value. The server 104 uses the deep neural network model to locate the two-dimensional code areas of the non-polished image, the polished image and the base map, and aligns the two-dimensional code peripheral areas in the non-polished image, the polished image and the base map according to the positions of the two-dimensional code areas.
Further, the server 104 determines whether the color change exists in the light reflected by the laser component based on the non-polished image and the aligned two-dimensional code surrounding area in the polished image. If the color change does not exist, the anti-counterfeit label is counterfeit. If the color change exists, the server 104 further uses the deep neural network model to identify the two-dimensional code peripheral area aligned in the shining image and the base map, so as to compare whether the laser pattern and the color line direction of the laser component are matched. If the identification is successful, if the identification is not successful, the identification is failed, and the anti-counterfeit label is indicated to be counterfeit. After the successful or failed recognition result is obtained, the server 104 issues the recognition result to the mobile phone, and the mobile phone displays the recognition result in the screen after receiving the recognition result.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for apparatus embodiments, computing device embodiments, and computer program product embodiments, the description is relatively simple, as relevant to the description of method embodiments in part, as it is substantially similar to the method embodiments.
FIG. 9 schematically illustrates a block diagram of a computing device 900 suitable for use in implementing embodiments of the present invention. The computing device 900 may be used to implement the terminal 102 or the server 104. As shown in fig. 9, the computing device 900 includes a processing unit (CPU) 901 that can perform various suitable actions and processes in accordance with computer program instructions stored in a Read Only Memory (ROM) 902 or loaded from a storage unit 908 into a Random Access Memory (RAM) 903. In RAM 903, various programs and data required for the operation of computing device 900 may also be stored. The CPU 901, ROM 902, and RAM 903 are connected to each other through a bus 904. An input/output (I/O) interface 905 is also connected to the bus 904.
Various components in the computing device 900 are connected to the I/O interface 905, including an input unit 906, an output unit 907, and a storage unit 908, the processing unit 901 performing the various methods and processes described above. For example, in some embodiments, various processes or operations described above may be implemented as a computer software program stored on a machine-readable medium, such as storage unit 908. In some embodiments, some or all of the computer program may be loaded and/or installed onto computing device 900 via ROM 902 and/or communication unit 909. When the computer program is loaded into RAM 903 and executed by CPU 901, the various methods and processes described above, such as performing one or more operations of method 200, may be performed. Alternatively, in other embodiments, CPU 901 may be configured to perform the various methods and processes described above, such as performing one or more actions of method 200, in any other suitable manner (e.g., by means of firmware).
The computer readable program instructions described herein may be downloaded from a computer readable storage medium to a respective computing/processing device or to an external computer or external storage device over a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmissions, wireless transmissions, routers, firewalls, switches, gateway computers and/or edge servers. The network interface card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium in the respective computing/processing device.
Computer program instructions for carrying out operations of the present invention may be assembly instructions, instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source or object code written in any combination of one or more programming languages, including an object oriented programming language such as SMALLTALK, C ++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer readable program instructions may be executed entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, aspects of the present invention are implemented by personalizing electronic circuitry, such as programmable logic circuitry, field Programmable Gate Arrays (FPGAs), or Programmable Logic Arrays (PLAs), with state information for computer readable program instructions, which can execute the computer readable program instructions.
These computer readable program instructions may be provided to a processor in a voice interaction device, a processing unit of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processing unit of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner.
The foregoing describes specific embodiments of the present disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
The foregoing description of embodiments of the invention has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the various embodiments described. The terminology used herein was chosen in order to best explain the principles of the embodiments, the practical application, or the technical improvements in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.
The above is only an alternative embodiment of the present invention and is not intended to limit the present invention, and various modifications and variations will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.