Disclosure of Invention
The application provides an anti-counterfeiting information embedding method, an anti-counterfeiting information extracting method, an anti-counterfeiting information embedding device and a storage medium, which are beneficial to solving the problem that in the prior art, anti-counterfeiting information is difficult to extract from shredded confidential files so as to trace the source.
In a first aspect, an embodiment of the present application provides an anti-counterfeit information embedding method, including:
According to a preset embedding rule, N embedding areas are determined in a page of a file to be printed, wherein the embedding areas are used for embedding anti-counterfeiting codes, and N is more than or equal to 2;
encoding the anti-counterfeiting information according to a preset encoding rule to obtain an anti-counterfeiting information code;
Adding a positioning code and a fault-tolerant code into the anti-counterfeiting information code to obtain the anti-counterfeiting code, wherein the positioning code and the fault-tolerant code are respectively used for positioning and checking fault tolerance of the anti-counterfeiting code during anti-counterfeiting information extraction;
And converting the anti-counterfeiting codes into anti-counterfeiting point block sets according to a preset point block generation rule, and respectively embedding the anti-counterfeiting point block sets into the N embedding areas, wherein each embedding area corresponds to one anti-counterfeiting point block set.
Preferably, the determining N embedded areas in the page of the file to be printed according to the preset embedding rule includes:
and determining N embedded areas at the sparse area of the printing data of the file to be printed and/or at the corners of the file to be printed according to the page information of the file to be printed.
Preferably, the anti-counterfeiting code further comprises direction codes, angle codes, secret key codes and/or coded form codes;
the direction code and/or the angle code are used for carrying out graphic correction during the extraction of the anti-counterfeiting information;
The key code and/or the code form code are used for carrying out security check during the extraction of the anti-counterfeiting information.
Preferably, the anti-counterfeiting information is at least one of a brand, a model, individual information and a time of receiving the document to be printed of the image forming apparatus to be printed;
The individual information of the image forming device is at least one of a serial number, an IP address and a MAC address of the image forming device, and the individual information of the image forming device is unique information which is different from other image forming devices;
The time of receiving the file to be printed comprises at least one of year, month, day, time, minute and second.
In a second aspect, an embodiment of the present application provides a method for extracting anti-counterfeiting information, including:
Scanning a secret file of anti-counterfeiting information to be extracted to obtain image data corresponding to the secret file, wherein the image data comprises a plurality of repeatedly embedded anti-counterfeiting point block sets;
Determining the position of the anti-counterfeiting point block set in the image data according to the positioning codes in the anti-counterfeiting point block set and a preset embedding rule;
dividing the image data according to the positions of the anti-counterfeiting point block sets to obtain M anti-counterfeiting point block slices, wherein each anti-counterfeiting point block slice corresponds to one anti-counterfeiting point block set, and M is more than or equal to 2;
analyzing the M anti-counterfeiting point block slices according to a preset point block generation rule to obtain M anti-counterfeiting code slices;
Combining and fault-tolerant detecting the M anti-counterfeiting code slices according to a preset fault-tolerant rule, and judging whether any two or more anti-counterfeiting code slices contain repeated codes conforming to the fault-tolerant rule;
if two or more anti-counterfeiting code slices contain repeated codes conforming to fault tolerance rules, splicing the two or more anti-counterfeiting code slices after de-duplication to obtain an anti-counterfeiting code splicing set;
And converting the anti-counterfeiting codes in the anti-counterfeiting code splicing set into anti-counterfeiting information according to a preset coding rule.
Preferably, the security document of the anti-counterfeiting information to be extracted is two or more security document fragments.
Preferably, the converting the anti-counterfeiting codes in the anti-counterfeiting code splicing set into anti-counterfeiting information according to a preset coding rule includes:
judging whether the anti-counterfeiting code splicing set contains a complete anti-counterfeiting code or not;
If the anti-counterfeiting code splicing set contains a complete anti-counterfeiting code, the anti-counterfeiting code in the anti-counterfeiting code splicing set is converted into anti-counterfeiting information according to a preset coding rule.
Preferably, the method further comprises:
if any two or more anti-counterfeiting code slices do not contain repeated codes conforming to fault tolerance rules, judging whether any one anti-counterfeiting code slice contains complete anti-counterfeiting codes or not;
If the ith anti-counterfeiting code slice contains a complete anti-counterfeiting code, converting the anti-counterfeiting code in the ith anti-counterfeiting code slice into character information to obtain anti-counterfeiting information, wherein i is more than or equal to 1 and less than or equal to M.
Preferably, after scanning a security document of the anti-counterfeiting information to be extracted to obtain image data corresponding to the security document, the method further comprises:
correcting the inclination angle of the image data according to the direction point blocks and/or the angle point blocks in the anti-counterfeiting point block set.
Preferably, according to a preset encoding rule, converting the anti-counterfeiting codes in the anti-counterfeiting code splicing set into anti-counterfeiting information includes:
according to a preset encoding rule, the secret key encoding and/or encoding form encoding in the anti-counterfeiting encoding splicing set is converted into secret key information and/or encoding form information;
carrying out security verification on the anti-counterfeiting code according to the secret key information and/or the code form information;
And if the security check passes, converting the anti-counterfeiting information codes in the anti-counterfeiting code splicing set into anti-counterfeiting information according to a preset coding rule.
In a third aspect, an embodiment of the present application provides an anti-counterfeiting information embedding device, comprising a processor, a memory, and a computer program, wherein the computer program is stored in the memory, the computer program comprising instructions that, when executed, cause the device to perform the method of any one of the first aspects.
In a fourth aspect, an embodiment of the present application provides an anti-counterfeiting information extraction device comprising a processor, a memory, and a computer program, wherein the computer program is stored in the memory, the computer program comprising instructions which, when executed, cause the device to perform the method of any one of the second aspects.
In a fifth aspect, an embodiment of the present application provides a computer readable storage medium, where the computer readable storage medium includes a stored program, where the program when executed controls a device in which the computer readable storage medium is located to perform the method of any one of the first aspects.
In a sixth aspect, an embodiment of the present application provides a computer readable storage medium, where the computer readable storage medium includes a stored program, where the program when executed controls a device in which the computer readable storage medium is located to perform the method of any one of the second aspects.
By adopting the technical scheme provided by the embodiment of the application, a plurality of anti-counterfeiting information embedding areas are arranged in the secret file, and under the condition that the secret file is shredded, the anti-counterfeiting information can be accurately and efficiently extracted based on the spliced file fragments.
Detailed Description
For a better understanding of the technical solution of the present application, the following detailed description of the embodiments of the present application refers to the accompanying drawings.
It should be understood that the described embodiments are merely some, but not all, embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The terminology used in the embodiments of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be understood that the term "and/or" as used herein is merely an association relationship describing the associated object, and means that three relationships may exist, for example, a and/or b, and may mean that a single first exists while a single first and a single second exist. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
In order to improve the security of the security document, a common method is to embed anti-counterfeiting information in a watermark manner on the security document. When the secret document is required to be traced and leaked, the anti-fake information is extracted according to a preset rule when the anti-fake information is embedded, so that tracing is performed.
It can be appreciated that if the security document is complete, the security information can be extracted from the security document relatively easily. However, the user usually tears the confidential document after using up the confidential document, thereby ensuring the security of the document information, or tears the confidential document maliciously after being illegally printed by an illegitimate party.
Referring to fig. 1, a schematic diagram of file fragmentation is provided in an embodiment of the present application. As shown in fig. 1, the completed document is torn into 5 pieces, pieces A, B, C, D, E respectively. At this time, the watermarks in the file may be decomposed to A, B, C, D, E different fragments, and it is difficult to extract anti-counterfeiting information corresponding to the watermarks from the different fragments so as to trace the source.
Based on the above, the application provides an anti-counterfeiting information embedding method, an extraction method, an anti-counterfeiting information embedding device and a storage medium, which are beneficial to solving the problem that the anti-counterfeiting information is difficult to extract from a shredded secret file so as to trace the source in the prior art.
It can be appreciated that before tracing the anti-counterfeiting information, the anti-counterfeiting information needs to be embedded in the security document.
Referring to fig. 2, a flow chart of an anti-counterfeiting information embedding method according to an embodiment of the present application is shown. As shown in fig. 2, it mainly includes the following steps.
Step S201, determining N embedding areas in a page of a file to be printed according to a preset embedding rule, wherein the N embedding areas are used for embedding anti-counterfeiting codes, and N is more than or equal to 2.
Firstly, a file to be printed is obtained, specifically, the obtained file to be printed is an electronic component and can be in a picture format, a PDF format or a text format, and the embodiment of the application is not limited in particular.
And determining N embedded areas in the page of the file to be printed according to a preset embedded rule. It will be appreciated that when the document is torn, it is likely that some of the document fragments will be lost, that is, only the extraction of the security information can be performed based on some of the document fragments. Based on the above, in the embodiment of the application, a plurality of embedded areas are set in the file to be printed, namely N is more than or equal to 2, and each embedded area is used for embedding a complete set of anti-counterfeiting codes.
In the embodiment of the present application, the embedding rule may include the following two types.
First kind:
And analyzing the printing data distribution area of the file to be printed, wherein a small amount of embedded areas or no embedded areas can be arranged in the printing data dense area, so that the influence of the subsequently embedded anti-counterfeiting information on the content or the picture of the printed file is reduced. In the sparse region of the printing data, the embedded region can be properly increased, so that the reliability of the subsequent tracing can be increased. Specifically, the print data amount of a certain area may be compared with a preset threshold value, and when the print data amount is greater than the threshold value, a print data dense area is determined, and when the print data amount is less than the threshold value, a print data sparse area is determined.
Second kind:
A mark is set at a specific position of the document to be printed according to size information of the document to be printed. Referring to fig. 3, a schematic diagram of a print file is provided in an embodiment of the present application. As shown in fig. 3, the print file is A4 size, the distance between the upper and lower margins is 25.4mm, the distance between the print data and the left and right margins is 31.8mm, so that marks (i.e., four dots in fig. 3) can be set at four corners of the A4 size print file, and the embedded area of the anti-counterfeit code can be determined based on the marks, and can be four corners of the print file (fragments of the four corners are relatively easy to determine). Of course, the person skilled in the art can set the marks on four sides of the printed document, and the present application is not limited thereto.
Step S202, encoding the anti-counterfeiting information according to a preset encoding rule to obtain anti-counterfeiting information codes.
Before the anti-counterfeiting information is encoded, the anti-counterfeiting information needs to be acquired. The anti-counterfeiting information may be at least one of a brand, a model, individual information, and a time of receiving the document to be printed of the image forming apparatus to be printed. The individual information of the image forming apparatus may be unique information of the image forming apparatus, such as a serial number, an IP address, a MAC address, etc., which is different from other image forming apparatuses, and the time of receiving the file to be printed includes year, month, day, time, minute, second, etc. In a specific implementation, after the image forming device receives a file to be printed sent by a user through a terminal device, information of identification uniqueness such as time of receiving the file to be printed and a serial number of the image forming device is recorded and stored. The image forming apparatus may be an image forming apparatus such as a printer, a copier, a facsimile machine, a scanner, or the like.
The anti-counterfeiting information is encoded, namely, the anti-counterfeiting information is converted into binary digital information. The coding rule can adopt common information coding modes such as ASCII codes, GB2312, GBK, GB18030 and the like. Of course, those skilled in the art may also use other coding modes, and the embodiment of the present application is not limited thereto.
And step 203, adding a positioning code and a fault-tolerant code into the anti-counterfeiting information code to obtain the anti-counterfeiting code, wherein the positioning code and the fault-tolerant code are respectively used for positioning and checking the anti-counterfeiting code in the process of extracting the anti-counterfeiting information.
Specifically, after the anti-counterfeiting information is converted into binary digital information according to the coding rule, the binary digital information is subjected to discrete combination to form an anti-counterfeiting information coding matrix with fixed length and width, the anti-counterfeiting information coding matrix is subjected to row and column expansion, and binary codes such as positioning codes, direction codes, angle codes, fault-tolerant codes, key codes, coding form codes and the like are added to corresponding positions in the expanded matrix, so that a complete anti-counterfeiting code is formed. It will be appreciated that the above-described expansion of the coding matrix and the insertion of the associated special codes (positioning codes, direction codes, angle codes, fault tolerant codes, key codes, code format codes) are various, and embodiments of the present application are not limited thereto.
Specifically:
The positioning code is used for positioning the anti-counterfeiting code during the extraction of the anti-counterfeiting information, so that a camera or a scanner can accurately and quickly read the anti-counterfeiting code.
The direction code and the angle code are used for carrying out graphic correction during the extraction of the anti-counterfeiting information, namely, certain angle and direction deviation of the encoded image data can be allowed, the automatic correction function is realized by automatically identifying the internal correction information, and the decoding accuracy is improved.
The fault-tolerant code is used for carrying out fault-tolerant verification on the spliced anti-counterfeiting code slices when the anti-counterfeiting information is extracted, so that even if the anti-counterfeiting code is locally damaged due to perforation, offset and the like, a camera or a scanner can still correctly read.
The key code and the code form code are used for carrying out security check during the extraction of the anti-counterfeiting information. Specifically, when decoding, key information such as corresponding key codes and coding form codes can be decoded first, security check is carried out on the anti-counterfeiting codes through the key information and the coding form information, and if the security check passes, the anti-counterfeiting information codes are decoded, so that the confidentiality of the information is improved.
Step S204, converting the anti-counterfeiting codes into anti-counterfeiting point block sets according to a preset point block generation rule, and respectively embedding the anti-counterfeiting point block sets into the N embedded areas, wherein each embedded area corresponds to one anti-counterfeiting point block set.
It will be appreciated that the anti-counterfeit code generated in step S203 is a digital matrix, which is required to be converted into a corresponding pattern if it is to be embedded in a print file. Therefore, according to the embodiment of the application, the anti-counterfeiting code is converted into the anti-counterfeiting point block set according to the preset point block generation rule.
In a specific implementation, whether the file to be printed is a black-and-white print job or a color print job, the anti-counterfeiting point block set is embedded into the N embedding areas. Preferably, specific channels of the above-described N embedding regions may be embedded, including yellow channels or invisible color channels, to avoid an influence on print data as much as possible.
And respectively embedding the anti-counterfeiting point block sets into the N embedded areas, and printing to form an encrypted document, namely a secret document.
As described above, the user usually tears down the secret document after using up the secret document, thereby ensuring the security of the document information, or tears down the secret document maliciously after being printed illegally by an illegitimate party. At this time, if tracing the anti-counterfeiting information, any two fragments with larger area as much as possible can be selected for splicing (it can be understood that the more the area is larger for carrying the anti-counterfeiting information, the greater the probability of obtaining the complete anti-counterfeiting information), the anti-counterfeiting information is extracted by using a camera or a scanner, the information of the spliced repeated part is subjected to de-duplication treatment, and then the complete anti-counterfeiting information is obtained. The following will explain the present invention in detail.
Referring to fig. 4, a flow chart of an anti-counterfeiting information extraction method according to an embodiment of the present application is shown. As shown in fig. 4, it mainly includes the following steps.
Step S401, scanning a secret file of anti-counterfeiting information to be extracted, and obtaining image data corresponding to the secret file, wherein the image data comprises an anti-counterfeiting point block set.
It will be appreciated that when the security document is torn down, the security document scanned here is a spliced security document fragment. Specifically, there may be a concatenation of two fragments having a large area and less print data. For example, the fragment a and fragment C shown in fig. 1 are selected for splicing. And then, scanning the spliced security document fragments by using a camera or a scanner to obtain image data corresponding to the security document fragments.
Referring to fig. 5, a schematic diagram of image data is provided in an embodiment of the present application. As shown in fig. 5, the anti-counterfeiting information in the image data is in the form of a dot matrix, i.e., a set of anti-counterfeiting dot blocks. In an alternative embodiment, the set of anti-counterfeiting dots is not visible to the naked eye and can only be extracted using a camera or scanner. Each dot block in the set of anti-counterfeiting dot blocks contains specific information. For example, a black dot block with a square frame is a positioning dot block, a dot block with a circular shape is a fault-tolerant dot block, and for convenience of viewing, the dot block is drawn as a black dot, and in practical application, the dot block may be a yellow dot or a fluorescent dot invisible to naked eyes. The broken line in fig. 5 is a dividing line, and the anti-counterfeiting information on both sides of the broken line is the same, i.e. the anti-counterfeiting information is repeatedly embedded on both sides of the broken line.
In order to facilitate subsequent data processing, a PC may be used to perform color enhancement and morphological processing on the image data to obtain enhanced image data.
Step S402, determining the position of the anti-counterfeiting point block set in the image data according to the positioning codes in the anti-counterfeiting point block set and a preset embedding rule.
It should be noted that, in the above image data, besides the embedded set of anti-counterfeit point blocks, point blocks without any information are stored, and these point blocks may interfere, so that the position of the embedded set of anti-counterfeit point blocks needs to be accurately determined by using the embedded anchor point blocks and a preset embedding rule, so as to perform extraction.
In addition, since the anti-counterfeiting point block set is repeatedly embedded, the anti-counterfeiting point block set needs to be accurately determined by utilizing the positioning point block and a preset embedding rule so as to avoid errors.
Referring to fig. 6, an error extraction schematic diagram is provided in an embodiment of the present application. In fig. 6, a set of anti-counterfeit point block sets should be above the dotted line, and a set of anti-counterfeit point block sets should be below the dotted line, if the positions of the anti-counterfeit point block sets are not confirmed by using the positioning point blocks and the predetermined embedding rules, the anti-counterfeit point block sets are likely to be erroneously identified and extracted as point block sets in the dotted line frame, resulting in extraction errors of the anti-counterfeit point block sets.
It should be noted that fig. 6 is merely an exemplary illustration. The error identification in the embodiment of the application refers to the range where one anti-counterfeiting point block set cannot be identified. For example, the identification range of the dashed box in fig. 6 spans multiple sets of anti-counterfeiting point blocks.
In an optional embodiment, the anti-counterfeit point block set further includes a direction point block and/or an angle point block, so that the inclination angle of the image data can be corrected according to the direction point block and/or the angle point block in the anti-counterfeit point block set.
And S403, dividing the image data according to the positions of the anti-counterfeiting point block sets to obtain M anti-counterfeiting point block slices, wherein each anti-counterfeiting point block slice corresponds to one anti-counterfeiting point block set, and M is more than or equal to 2.
After determining the positions of the anti-counterfeiting point block sets in step S402, dividing the image data according to the positions of the anti-counterfeiting point block sets to obtain M anti-counterfeiting point block slices. It can be understood that the number of the anti-counterfeiting point block slices is matched with the number of the anti-counterfeiting point block sets, and one anti-counterfeiting point block slice corresponds to one anti-counterfeiting point block set.
Referring to fig. 7, a schematic diagram of an anti-counterfeit dot block slice is provided in an embodiment of the present application. In the implementation of the application, the image data is cut into 4 anti-counterfeiting point block slices.
And S404, analyzing the M anti-counterfeiting point block slices according to a preset point block generation rule to obtain M anti-counterfeiting code slices.
It can be understood that each point block in the anti-counterfeiting point block slice corresponds to specific information, so that the anti-counterfeiting point block slice can be analyzed according to the point block generation rule to obtain a corresponding anti-counterfeiting code slice.
Referring to tables 1-4, the anti-counterfeiting code slices corresponding to the 4 anti-counterfeiting point block slices shown in fig. 7 are binary anti-counterfeiting codes.
And step 405, combining and fault-tolerant detection is carried out on the M anti-counterfeiting code slices according to a preset fault-tolerant rule, and whether any two or more anti-counterfeiting code slices contain repeated codes conforming to the fault-tolerant rule is judged.
As described above, in order to perform the fault-tolerant check, the fault-tolerant code is inserted into the anti-counterfeit code when the anti-counterfeit code is generated. In the specific implementation, the M anti-counterfeiting code slices can be combined in pairs, and whether repeated codes conforming to fault tolerance rules exist in the combined anti-counterfeiting code slices or not is judged. For example, the shaded portions in the above tables 1 and 2 are repetition codes conforming to the fault tolerance rule, and the shaded portions in the tables 3 and 4 are repetition codes conforming to the fault tolerance rule.
Step S406, if two or more anti-counterfeiting code slices contain repeated codes conforming to fault tolerance rules, splicing the two or more anti-counterfeiting code slices after de-duplication to obtain an anti-counterfeiting code splicing set.
Because the repetition coding is an inserted repetition part, the two anti-counterfeiting coded slices are spliced and then need to be subjected to de-duplication treatment.
For example, after table 1 and table 2 are spliced, the shadow portion is subjected to a deduplication treatment, to obtain table 5.
TABLE 5
Step S407, converting the anti-counterfeiting codes in the anti-counterfeiting code splicing set into anti-counterfeiting information according to a preset coding rule.
It can be understood that the codes shown in table 5 are binary codes, and in order to facilitate the user to read the information carried in the binary codes, the binary codes need to be decoded to obtain the relevant anti-counterfeiting information. For example, after decoding the binary code shown in table 5, the obtained anti-counterfeiting information is "XX split printing at XX year XX month XX day XX using an XX printer".
It should be noted that, the anti-counterfeiting information is the anti-counterfeiting information embedded in the anti-counterfeiting information embedding step. Other anti-counterfeiting information can be embedded according to actual needs by a person skilled in the art, and the embodiment of the application does not limit the specific content of the anti-counterfeiting information.
In an alternative embodiment, the anti-counterfeit code splice set further includes a key code and/or a code format code, and step S407 specifically includes converting the key code and/or the code format code in the anti-counterfeit code splice set into key information and/or code format information according to a preset code rule, performing security check on the anti-counterfeit code according to the key information and/or the code format information, and converting the anti-counterfeit information code in the anti-counterfeit code splice set into anti-counterfeit information according to the preset code rule if the security check passes. That is, when the key code and/or the code format code exists, the key code and/or the code format code is first decoded, and if the related verification condition is met, the anti-counterfeiting information code is then decoded.
In an alternative embodiment, after the anti-counterfeiting code slices are spliced, whether the anti-counterfeiting code splicing set contains a complete anti-counterfeiting code or not is judged, if the anti-counterfeiting code splicing set contains the complete anti-counterfeiting code, the anti-counterfeiting code in the anti-counterfeiting code splicing set is converted into anti-counterfeiting information according to a preset coding rule, and if the anti-counterfeiting code splicing set does not contain the complete anti-counterfeiting code, the anti-counterfeiting information extraction fails.
In an alternative embodiment, any two or more than two anti-counterfeiting code slices do not contain repeated codes conforming to fault tolerance rules, whether any one anti-counterfeiting code slice contains a complete anti-counterfeiting code is judged at the moment, and if any one anti-counterfeiting code slice contains a complete anti-counterfeiting code, the anti-counterfeiting code in the anti-counterfeiting code slice is converted into character information, so that anti-counterfeiting information is obtained.
By adopting the technical scheme provided by the embodiment of the application, a plurality of anti-counterfeiting information embedding areas are arranged in the secret file, and under the condition that the secret file is shredded, the anti-counterfeiting information can be accurately and efficiently extracted based on the spliced file fragments.
Corresponding to the above embodiment, the application also provides a security information embedding device comprising a processor, a memory and a computer program, wherein the computer program is stored in the memory, the computer program comprises instructions which, when executed, cause the image forming device to perform part or all of the steps in the above method embodiments.
Corresponding to the above embodiment, the present application also provides a security information extraction device comprising a processor, a memory and a computer program, wherein the computer program is stored in the memory, the computer program comprising instructions which, when executed, cause the image forming apparatus to perform part or all of the steps in the above method embodiments.
In a specific implementation, the present application also provides a computer storage medium, where the computer storage medium may store a program, where the program may include some or all of the steps in the embodiments provided by the present application when executed. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), a random-access memory (random access memory RAM), or the like.
In a specific implementation, an embodiment of the present application further provides a computer program product, where the computer program product includes executable instructions, where the executable instructions when executed on a computer cause the computer to perform some or all of the steps in the method embodiment.
In the embodiments of the present application, "at least one" means one or more, and "a plurality" means two or more. "and/or", describes an association relation of association objects, and indicates that there may be three kinds of relations, for example, a and/or B, and may indicate that a alone exists, a and B together, and B alone exists. Wherein A, B may be singular or plural. The character "/" generally indicates that the context-dependent object is an "or" relationship. "at least one of the following" and the like means any combination of these items, including any combination of single or plural items. For example, at least one of a, b and c may represent a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or plural.
Those of ordinary skill in the art will appreciate that the various elements and algorithm steps described in the embodiments disclosed herein can be implemented as a combination of electronic hardware, computer software, and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
The foregoing is merely exemplary embodiments of the present application, and any person skilled in the art may easily conceive of changes or substitutions within the technical scope of the present application, which should be covered by the present application. The protection scope of the present application shall be subject to the protection scope of the claims.