[go: up one dir, main page]

CN113076528B - Anti-counterfeiting information embedding method, extraction method, device and storage medium - Google Patents

Anti-counterfeiting information embedding method, extraction method, device and storage medium Download PDF

Info

Publication number
CN113076528B
CN113076528B CN202110311711.0A CN202110311711A CN113076528B CN 113076528 B CN113076528 B CN 113076528B CN 202110311711 A CN202110311711 A CN 202110311711A CN 113076528 B CN113076528 B CN 113076528B
Authority
CN
China
Prior art keywords
counterfeiting
code
information
point block
counterfeiting information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110311711.0A
Other languages
Chinese (zh)
Other versions
CN113076528A (en
Inventor
彭继兵
李海雄
马杨晓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Pantum Electronics Co Ltd
Original Assignee
Zhuhai Pantum Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Pantum Electronics Co Ltd filed Critical Zhuhai Pantum Electronics Co Ltd
Priority to CN202110311711.0A priority Critical patent/CN113076528B/en
Publication of CN113076528A publication Critical patent/CN113076528A/en
Application granted granted Critical
Publication of CN113076528B publication Critical patent/CN113076528B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0065Extraction of an embedded watermark; Reliable detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

本申请实施例提供一种防伪信息嵌入方法、提取方法、装置及存储介质,所述防伪信息嵌入方法包括按照预设的嵌入规则,在待打印文件的页面中确定N个嵌入区域;按照预设的编码规则,对防伪信息进行编码,获得防伪信息编码;在所述防伪信息编码中添加定位编码和容错编码,获得防伪编码,所述定位编码和容错编码分别用于在防伪信息提取时对所述防伪编码进行定位和容错校验;根据预设的点块生成规则,将所述防伪编码转换为防伪点块集合,分别嵌入所述N个嵌入区域。采用本申请实施例提供的技术方案,在保密文件中设置多个防伪信息嵌入区域,在保密文件被撕碎的情况下,可以基于拼接的文件碎片准确高效的提取出防伪信息。

The embodiment of the present application provides an anti-counterfeiting information embedding method, extraction method, device and storage medium, the anti-counterfeiting information embedding method includes determining N embedding areas in the page of the to-be-printed file according to a preset embedding rule; encoding the anti-counterfeiting information according to a preset coding rule to obtain the anti-counterfeiting information code; adding a positioning code and a fault-tolerant code to the anti-counterfeiting information code to obtain the anti-counterfeiting code, the positioning code and the fault-tolerant code are respectively used to locate and fault-tolerantly check the anti-counterfeiting code when extracting the anti-counterfeiting information; according to a preset point block generation rule, the anti-counterfeiting code is converted into an anti-counterfeiting point block set, and embedded in the N embedding areas respectively. By adopting the technical solution provided by the embodiment of the present application, multiple anti-counterfeiting information embedding areas are set in the confidential document, and in the case where the confidential document is torn, the anti-counterfeiting information can be accurately and efficiently extracted based on the spliced file fragments.

Description

Anti-fake information embedding method, extraction method, device and storage medium
Technical Field
The application relates to the technical field of anti-counterfeiting, in particular to an anti-counterfeiting information embedding method, an anti-counterfeiting information extracting device and a storage medium.
Background
In order to improve the security of the security document, a common method is to embed anti-counterfeiting information in a watermark manner on the security document. When the secret document needs to be verified, the anti-counterfeiting information is extracted according to a preset rule when the anti-counterfeiting information is embedded, so that tracing is performed.
It can be appreciated that if the security document is complete, the security information can be extracted from the security document relatively easily. However, the user usually tears the confidential document after using up the confidential document, thereby ensuring the security of the document information, or tears the confidential document maliciously after being illegally printed by an illegitimate party. If the security document is torn, it is difficult to extract the anti-counterfeiting information from the torn security document to trace the source.
Disclosure of Invention
The application provides an anti-counterfeiting information embedding method, an anti-counterfeiting information extracting method, an anti-counterfeiting information embedding device and a storage medium, which are beneficial to solving the problem that in the prior art, anti-counterfeiting information is difficult to extract from shredded confidential files so as to trace the source.
In a first aspect, an embodiment of the present application provides an anti-counterfeit information embedding method, including:
According to a preset embedding rule, N embedding areas are determined in a page of a file to be printed, wherein the embedding areas are used for embedding anti-counterfeiting codes, and N is more than or equal to 2;
encoding the anti-counterfeiting information according to a preset encoding rule to obtain an anti-counterfeiting information code;
Adding a positioning code and a fault-tolerant code into the anti-counterfeiting information code to obtain the anti-counterfeiting code, wherein the positioning code and the fault-tolerant code are respectively used for positioning and checking fault tolerance of the anti-counterfeiting code during anti-counterfeiting information extraction;
And converting the anti-counterfeiting codes into anti-counterfeiting point block sets according to a preset point block generation rule, and respectively embedding the anti-counterfeiting point block sets into the N embedding areas, wherein each embedding area corresponds to one anti-counterfeiting point block set.
Preferably, the determining N embedded areas in the page of the file to be printed according to the preset embedding rule includes:
and determining N embedded areas at the sparse area of the printing data of the file to be printed and/or at the corners of the file to be printed according to the page information of the file to be printed.
Preferably, the anti-counterfeiting code further comprises direction codes, angle codes, secret key codes and/or coded form codes;
the direction code and/or the angle code are used for carrying out graphic correction during the extraction of the anti-counterfeiting information;
The key code and/or the code form code are used for carrying out security check during the extraction of the anti-counterfeiting information.
Preferably, the anti-counterfeiting information is at least one of a brand, a model, individual information and a time of receiving the document to be printed of the image forming apparatus to be printed;
The individual information of the image forming device is at least one of a serial number, an IP address and a MAC address of the image forming device, and the individual information of the image forming device is unique information which is different from other image forming devices;
The time of receiving the file to be printed comprises at least one of year, month, day, time, minute and second.
In a second aspect, an embodiment of the present application provides a method for extracting anti-counterfeiting information, including:
Scanning a secret file of anti-counterfeiting information to be extracted to obtain image data corresponding to the secret file, wherein the image data comprises a plurality of repeatedly embedded anti-counterfeiting point block sets;
Determining the position of the anti-counterfeiting point block set in the image data according to the positioning codes in the anti-counterfeiting point block set and a preset embedding rule;
dividing the image data according to the positions of the anti-counterfeiting point block sets to obtain M anti-counterfeiting point block slices, wherein each anti-counterfeiting point block slice corresponds to one anti-counterfeiting point block set, and M is more than or equal to 2;
analyzing the M anti-counterfeiting point block slices according to a preset point block generation rule to obtain M anti-counterfeiting code slices;
Combining and fault-tolerant detecting the M anti-counterfeiting code slices according to a preset fault-tolerant rule, and judging whether any two or more anti-counterfeiting code slices contain repeated codes conforming to the fault-tolerant rule;
if two or more anti-counterfeiting code slices contain repeated codes conforming to fault tolerance rules, splicing the two or more anti-counterfeiting code slices after de-duplication to obtain an anti-counterfeiting code splicing set;
And converting the anti-counterfeiting codes in the anti-counterfeiting code splicing set into anti-counterfeiting information according to a preset coding rule.
Preferably, the security document of the anti-counterfeiting information to be extracted is two or more security document fragments.
Preferably, the converting the anti-counterfeiting codes in the anti-counterfeiting code splicing set into anti-counterfeiting information according to a preset coding rule includes:
judging whether the anti-counterfeiting code splicing set contains a complete anti-counterfeiting code or not;
If the anti-counterfeiting code splicing set contains a complete anti-counterfeiting code, the anti-counterfeiting code in the anti-counterfeiting code splicing set is converted into anti-counterfeiting information according to a preset coding rule.
Preferably, the method further comprises:
if any two or more anti-counterfeiting code slices do not contain repeated codes conforming to fault tolerance rules, judging whether any one anti-counterfeiting code slice contains complete anti-counterfeiting codes or not;
If the ith anti-counterfeiting code slice contains a complete anti-counterfeiting code, converting the anti-counterfeiting code in the ith anti-counterfeiting code slice into character information to obtain anti-counterfeiting information, wherein i is more than or equal to 1 and less than or equal to M.
Preferably, after scanning a security document of the anti-counterfeiting information to be extracted to obtain image data corresponding to the security document, the method further comprises:
correcting the inclination angle of the image data according to the direction point blocks and/or the angle point blocks in the anti-counterfeiting point block set.
Preferably, according to a preset encoding rule, converting the anti-counterfeiting codes in the anti-counterfeiting code splicing set into anti-counterfeiting information includes:
according to a preset encoding rule, the secret key encoding and/or encoding form encoding in the anti-counterfeiting encoding splicing set is converted into secret key information and/or encoding form information;
carrying out security verification on the anti-counterfeiting code according to the secret key information and/or the code form information;
And if the security check passes, converting the anti-counterfeiting information codes in the anti-counterfeiting code splicing set into anti-counterfeiting information according to a preset coding rule.
In a third aspect, an embodiment of the present application provides an anti-counterfeiting information embedding device, comprising a processor, a memory, and a computer program, wherein the computer program is stored in the memory, the computer program comprising instructions that, when executed, cause the device to perform the method of any one of the first aspects.
In a fourth aspect, an embodiment of the present application provides an anti-counterfeiting information extraction device comprising a processor, a memory, and a computer program, wherein the computer program is stored in the memory, the computer program comprising instructions which, when executed, cause the device to perform the method of any one of the second aspects.
In a fifth aspect, an embodiment of the present application provides a computer readable storage medium, where the computer readable storage medium includes a stored program, where the program when executed controls a device in which the computer readable storage medium is located to perform the method of any one of the first aspects.
In a sixth aspect, an embodiment of the present application provides a computer readable storage medium, where the computer readable storage medium includes a stored program, where the program when executed controls a device in which the computer readable storage medium is located to perform the method of any one of the second aspects.
By adopting the technical scheme provided by the embodiment of the application, a plurality of anti-counterfeiting information embedding areas are arranged in the secret file, and under the condition that the secret file is shredded, the anti-counterfeiting information can be accurately and efficiently extracted based on the spliced file fragments.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of a file fragment according to an embodiment of the present application;
Fig. 2 is a schematic flow chart of an anti-counterfeiting information embedding method according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a print file according to an embodiment of the present application;
fig. 4 is a schematic flow chart of an anti-counterfeiting information extraction method according to an embodiment of the present application;
FIG. 5 is a schematic diagram of image data according to an embodiment of the present application;
FIG. 6 is a schematic diagram of error extraction according to an embodiment of the present application;
Fig. 7 is a schematic diagram of an anti-counterfeiting point block slice according to an embodiment of the present application.
Detailed Description
For a better understanding of the technical solution of the present application, the following detailed description of the embodiments of the present application refers to the accompanying drawings.
It should be understood that the described embodiments are merely some, but not all, embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The terminology used in the embodiments of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be understood that the term "and/or" as used herein is merely an association relationship describing the associated object, and means that three relationships may exist, for example, a and/or b, and may mean that a single first exists while a single first and a single second exist. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
In order to improve the security of the security document, a common method is to embed anti-counterfeiting information in a watermark manner on the security document. When the secret document is required to be traced and leaked, the anti-fake information is extracted according to a preset rule when the anti-fake information is embedded, so that tracing is performed.
It can be appreciated that if the security document is complete, the security information can be extracted from the security document relatively easily. However, the user usually tears the confidential document after using up the confidential document, thereby ensuring the security of the document information, or tears the confidential document maliciously after being illegally printed by an illegitimate party.
Referring to fig. 1, a schematic diagram of file fragmentation is provided in an embodiment of the present application. As shown in fig. 1, the completed document is torn into 5 pieces, pieces A, B, C, D, E respectively. At this time, the watermarks in the file may be decomposed to A, B, C, D, E different fragments, and it is difficult to extract anti-counterfeiting information corresponding to the watermarks from the different fragments so as to trace the source.
Based on the above, the application provides an anti-counterfeiting information embedding method, an extraction method, an anti-counterfeiting information embedding device and a storage medium, which are beneficial to solving the problem that the anti-counterfeiting information is difficult to extract from a shredded secret file so as to trace the source in the prior art.
It can be appreciated that before tracing the anti-counterfeiting information, the anti-counterfeiting information needs to be embedded in the security document.
Referring to fig. 2, a flow chart of an anti-counterfeiting information embedding method according to an embodiment of the present application is shown. As shown in fig. 2, it mainly includes the following steps.
Step S201, determining N embedding areas in a page of a file to be printed according to a preset embedding rule, wherein the N embedding areas are used for embedding anti-counterfeiting codes, and N is more than or equal to 2.
Firstly, a file to be printed is obtained, specifically, the obtained file to be printed is an electronic component and can be in a picture format, a PDF format or a text format, and the embodiment of the application is not limited in particular.
And determining N embedded areas in the page of the file to be printed according to a preset embedded rule. It will be appreciated that when the document is torn, it is likely that some of the document fragments will be lost, that is, only the extraction of the security information can be performed based on some of the document fragments. Based on the above, in the embodiment of the application, a plurality of embedded areas are set in the file to be printed, namely N is more than or equal to 2, and each embedded area is used for embedding a complete set of anti-counterfeiting codes.
In the embodiment of the present application, the embedding rule may include the following two types.
First kind:
And analyzing the printing data distribution area of the file to be printed, wherein a small amount of embedded areas or no embedded areas can be arranged in the printing data dense area, so that the influence of the subsequently embedded anti-counterfeiting information on the content or the picture of the printed file is reduced. In the sparse region of the printing data, the embedded region can be properly increased, so that the reliability of the subsequent tracing can be increased. Specifically, the print data amount of a certain area may be compared with a preset threshold value, and when the print data amount is greater than the threshold value, a print data dense area is determined, and when the print data amount is less than the threshold value, a print data sparse area is determined.
Second kind:
A mark is set at a specific position of the document to be printed according to size information of the document to be printed. Referring to fig. 3, a schematic diagram of a print file is provided in an embodiment of the present application. As shown in fig. 3, the print file is A4 size, the distance between the upper and lower margins is 25.4mm, the distance between the print data and the left and right margins is 31.8mm, so that marks (i.e., four dots in fig. 3) can be set at four corners of the A4 size print file, and the embedded area of the anti-counterfeit code can be determined based on the marks, and can be four corners of the print file (fragments of the four corners are relatively easy to determine). Of course, the person skilled in the art can set the marks on four sides of the printed document, and the present application is not limited thereto.
Step S202, encoding the anti-counterfeiting information according to a preset encoding rule to obtain anti-counterfeiting information codes.
Before the anti-counterfeiting information is encoded, the anti-counterfeiting information needs to be acquired. The anti-counterfeiting information may be at least one of a brand, a model, individual information, and a time of receiving the document to be printed of the image forming apparatus to be printed. The individual information of the image forming apparatus may be unique information of the image forming apparatus, such as a serial number, an IP address, a MAC address, etc., which is different from other image forming apparatuses, and the time of receiving the file to be printed includes year, month, day, time, minute, second, etc. In a specific implementation, after the image forming device receives a file to be printed sent by a user through a terminal device, information of identification uniqueness such as time of receiving the file to be printed and a serial number of the image forming device is recorded and stored. The image forming apparatus may be an image forming apparatus such as a printer, a copier, a facsimile machine, a scanner, or the like.
The anti-counterfeiting information is encoded, namely, the anti-counterfeiting information is converted into binary digital information. The coding rule can adopt common information coding modes such as ASCII codes, GB2312, GBK, GB18030 and the like. Of course, those skilled in the art may also use other coding modes, and the embodiment of the present application is not limited thereto.
And step 203, adding a positioning code and a fault-tolerant code into the anti-counterfeiting information code to obtain the anti-counterfeiting code, wherein the positioning code and the fault-tolerant code are respectively used for positioning and checking the anti-counterfeiting code in the process of extracting the anti-counterfeiting information.
Specifically, after the anti-counterfeiting information is converted into binary digital information according to the coding rule, the binary digital information is subjected to discrete combination to form an anti-counterfeiting information coding matrix with fixed length and width, the anti-counterfeiting information coding matrix is subjected to row and column expansion, and binary codes such as positioning codes, direction codes, angle codes, fault-tolerant codes, key codes, coding form codes and the like are added to corresponding positions in the expanded matrix, so that a complete anti-counterfeiting code is formed. It will be appreciated that the above-described expansion of the coding matrix and the insertion of the associated special codes (positioning codes, direction codes, angle codes, fault tolerant codes, key codes, code format codes) are various, and embodiments of the present application are not limited thereto.
Specifically:
The positioning code is used for positioning the anti-counterfeiting code during the extraction of the anti-counterfeiting information, so that a camera or a scanner can accurately and quickly read the anti-counterfeiting code.
The direction code and the angle code are used for carrying out graphic correction during the extraction of the anti-counterfeiting information, namely, certain angle and direction deviation of the encoded image data can be allowed, the automatic correction function is realized by automatically identifying the internal correction information, and the decoding accuracy is improved.
The fault-tolerant code is used for carrying out fault-tolerant verification on the spliced anti-counterfeiting code slices when the anti-counterfeiting information is extracted, so that even if the anti-counterfeiting code is locally damaged due to perforation, offset and the like, a camera or a scanner can still correctly read.
The key code and the code form code are used for carrying out security check during the extraction of the anti-counterfeiting information. Specifically, when decoding, key information such as corresponding key codes and coding form codes can be decoded first, security check is carried out on the anti-counterfeiting codes through the key information and the coding form information, and if the security check passes, the anti-counterfeiting information codes are decoded, so that the confidentiality of the information is improved.
Step S204, converting the anti-counterfeiting codes into anti-counterfeiting point block sets according to a preset point block generation rule, and respectively embedding the anti-counterfeiting point block sets into the N embedded areas, wherein each embedded area corresponds to one anti-counterfeiting point block set.
It will be appreciated that the anti-counterfeit code generated in step S203 is a digital matrix, which is required to be converted into a corresponding pattern if it is to be embedded in a print file. Therefore, according to the embodiment of the application, the anti-counterfeiting code is converted into the anti-counterfeiting point block set according to the preset point block generation rule.
In a specific implementation, whether the file to be printed is a black-and-white print job or a color print job, the anti-counterfeiting point block set is embedded into the N embedding areas. Preferably, specific channels of the above-described N embedding regions may be embedded, including yellow channels or invisible color channels, to avoid an influence on print data as much as possible.
And respectively embedding the anti-counterfeiting point block sets into the N embedded areas, and printing to form an encrypted document, namely a secret document.
As described above, the user usually tears down the secret document after using up the secret document, thereby ensuring the security of the document information, or tears down the secret document maliciously after being printed illegally by an illegitimate party. At this time, if tracing the anti-counterfeiting information, any two fragments with larger area as much as possible can be selected for splicing (it can be understood that the more the area is larger for carrying the anti-counterfeiting information, the greater the probability of obtaining the complete anti-counterfeiting information), the anti-counterfeiting information is extracted by using a camera or a scanner, the information of the spliced repeated part is subjected to de-duplication treatment, and then the complete anti-counterfeiting information is obtained. The following will explain the present invention in detail.
Referring to fig. 4, a flow chart of an anti-counterfeiting information extraction method according to an embodiment of the present application is shown. As shown in fig. 4, it mainly includes the following steps.
Step S401, scanning a secret file of anti-counterfeiting information to be extracted, and obtaining image data corresponding to the secret file, wherein the image data comprises an anti-counterfeiting point block set.
It will be appreciated that when the security document is torn down, the security document scanned here is a spliced security document fragment. Specifically, there may be a concatenation of two fragments having a large area and less print data. For example, the fragment a and fragment C shown in fig. 1 are selected for splicing. And then, scanning the spliced security document fragments by using a camera or a scanner to obtain image data corresponding to the security document fragments.
Referring to fig. 5, a schematic diagram of image data is provided in an embodiment of the present application. As shown in fig. 5, the anti-counterfeiting information in the image data is in the form of a dot matrix, i.e., a set of anti-counterfeiting dot blocks. In an alternative embodiment, the set of anti-counterfeiting dots is not visible to the naked eye and can only be extracted using a camera or scanner. Each dot block in the set of anti-counterfeiting dot blocks contains specific information. For example, a black dot block with a square frame is a positioning dot block, a dot block with a circular shape is a fault-tolerant dot block, and for convenience of viewing, the dot block is drawn as a black dot, and in practical application, the dot block may be a yellow dot or a fluorescent dot invisible to naked eyes. The broken line in fig. 5 is a dividing line, and the anti-counterfeiting information on both sides of the broken line is the same, i.e. the anti-counterfeiting information is repeatedly embedded on both sides of the broken line.
In order to facilitate subsequent data processing, a PC may be used to perform color enhancement and morphological processing on the image data to obtain enhanced image data.
Step S402, determining the position of the anti-counterfeiting point block set in the image data according to the positioning codes in the anti-counterfeiting point block set and a preset embedding rule.
It should be noted that, in the above image data, besides the embedded set of anti-counterfeit point blocks, point blocks without any information are stored, and these point blocks may interfere, so that the position of the embedded set of anti-counterfeit point blocks needs to be accurately determined by using the embedded anchor point blocks and a preset embedding rule, so as to perform extraction.
In addition, since the anti-counterfeiting point block set is repeatedly embedded, the anti-counterfeiting point block set needs to be accurately determined by utilizing the positioning point block and a preset embedding rule so as to avoid errors.
Referring to fig. 6, an error extraction schematic diagram is provided in an embodiment of the present application. In fig. 6, a set of anti-counterfeit point block sets should be above the dotted line, and a set of anti-counterfeit point block sets should be below the dotted line, if the positions of the anti-counterfeit point block sets are not confirmed by using the positioning point blocks and the predetermined embedding rules, the anti-counterfeit point block sets are likely to be erroneously identified and extracted as point block sets in the dotted line frame, resulting in extraction errors of the anti-counterfeit point block sets.
It should be noted that fig. 6 is merely an exemplary illustration. The error identification in the embodiment of the application refers to the range where one anti-counterfeiting point block set cannot be identified. For example, the identification range of the dashed box in fig. 6 spans multiple sets of anti-counterfeiting point blocks.
In an optional embodiment, the anti-counterfeit point block set further includes a direction point block and/or an angle point block, so that the inclination angle of the image data can be corrected according to the direction point block and/or the angle point block in the anti-counterfeit point block set.
And S403, dividing the image data according to the positions of the anti-counterfeiting point block sets to obtain M anti-counterfeiting point block slices, wherein each anti-counterfeiting point block slice corresponds to one anti-counterfeiting point block set, and M is more than or equal to 2.
After determining the positions of the anti-counterfeiting point block sets in step S402, dividing the image data according to the positions of the anti-counterfeiting point block sets to obtain M anti-counterfeiting point block slices. It can be understood that the number of the anti-counterfeiting point block slices is matched with the number of the anti-counterfeiting point block sets, and one anti-counterfeiting point block slice corresponds to one anti-counterfeiting point block set.
Referring to fig. 7, a schematic diagram of an anti-counterfeit dot block slice is provided in an embodiment of the present application. In the implementation of the application, the image data is cut into 4 anti-counterfeiting point block slices.
And S404, analyzing the M anti-counterfeiting point block slices according to a preset point block generation rule to obtain M anti-counterfeiting code slices.
It can be understood that each point block in the anti-counterfeiting point block slice corresponds to specific information, so that the anti-counterfeiting point block slice can be analyzed according to the point block generation rule to obtain a corresponding anti-counterfeiting code slice.
Referring to tables 1-4, the anti-counterfeiting code slices corresponding to the 4 anti-counterfeiting point block slices shown in fig. 7 are binary anti-counterfeiting codes.
And step 405, combining and fault-tolerant detection is carried out on the M anti-counterfeiting code slices according to a preset fault-tolerant rule, and whether any two or more anti-counterfeiting code slices contain repeated codes conforming to the fault-tolerant rule is judged.
As described above, in order to perform the fault-tolerant check, the fault-tolerant code is inserted into the anti-counterfeit code when the anti-counterfeit code is generated. In the specific implementation, the M anti-counterfeiting code slices can be combined in pairs, and whether repeated codes conforming to fault tolerance rules exist in the combined anti-counterfeiting code slices or not is judged. For example, the shaded portions in the above tables 1 and 2 are repetition codes conforming to the fault tolerance rule, and the shaded portions in the tables 3 and 4 are repetition codes conforming to the fault tolerance rule.
Step S406, if two or more anti-counterfeiting code slices contain repeated codes conforming to fault tolerance rules, splicing the two or more anti-counterfeiting code slices after de-duplication to obtain an anti-counterfeiting code splicing set.
Because the repetition coding is an inserted repetition part, the two anti-counterfeiting coded slices are spliced and then need to be subjected to de-duplication treatment.
For example, after table 1 and table 2 are spliced, the shadow portion is subjected to a deduplication treatment, to obtain table 5.
TABLE 5
Step S407, converting the anti-counterfeiting codes in the anti-counterfeiting code splicing set into anti-counterfeiting information according to a preset coding rule.
It can be understood that the codes shown in table 5 are binary codes, and in order to facilitate the user to read the information carried in the binary codes, the binary codes need to be decoded to obtain the relevant anti-counterfeiting information. For example, after decoding the binary code shown in table 5, the obtained anti-counterfeiting information is "XX split printing at XX year XX month XX day XX using an XX printer".
It should be noted that, the anti-counterfeiting information is the anti-counterfeiting information embedded in the anti-counterfeiting information embedding step. Other anti-counterfeiting information can be embedded according to actual needs by a person skilled in the art, and the embodiment of the application does not limit the specific content of the anti-counterfeiting information.
In an alternative embodiment, the anti-counterfeit code splice set further includes a key code and/or a code format code, and step S407 specifically includes converting the key code and/or the code format code in the anti-counterfeit code splice set into key information and/or code format information according to a preset code rule, performing security check on the anti-counterfeit code according to the key information and/or the code format information, and converting the anti-counterfeit information code in the anti-counterfeit code splice set into anti-counterfeit information according to the preset code rule if the security check passes. That is, when the key code and/or the code format code exists, the key code and/or the code format code is first decoded, and if the related verification condition is met, the anti-counterfeiting information code is then decoded.
In an alternative embodiment, after the anti-counterfeiting code slices are spliced, whether the anti-counterfeiting code splicing set contains a complete anti-counterfeiting code or not is judged, if the anti-counterfeiting code splicing set contains the complete anti-counterfeiting code, the anti-counterfeiting code in the anti-counterfeiting code splicing set is converted into anti-counterfeiting information according to a preset coding rule, and if the anti-counterfeiting code splicing set does not contain the complete anti-counterfeiting code, the anti-counterfeiting information extraction fails.
In an alternative embodiment, any two or more than two anti-counterfeiting code slices do not contain repeated codes conforming to fault tolerance rules, whether any one anti-counterfeiting code slice contains a complete anti-counterfeiting code is judged at the moment, and if any one anti-counterfeiting code slice contains a complete anti-counterfeiting code, the anti-counterfeiting code in the anti-counterfeiting code slice is converted into character information, so that anti-counterfeiting information is obtained.
By adopting the technical scheme provided by the embodiment of the application, a plurality of anti-counterfeiting information embedding areas are arranged in the secret file, and under the condition that the secret file is shredded, the anti-counterfeiting information can be accurately and efficiently extracted based on the spliced file fragments.
Corresponding to the above embodiment, the application also provides a security information embedding device comprising a processor, a memory and a computer program, wherein the computer program is stored in the memory, the computer program comprises instructions which, when executed, cause the image forming device to perform part or all of the steps in the above method embodiments.
Corresponding to the above embodiment, the present application also provides a security information extraction device comprising a processor, a memory and a computer program, wherein the computer program is stored in the memory, the computer program comprising instructions which, when executed, cause the image forming apparatus to perform part or all of the steps in the above method embodiments.
In a specific implementation, the present application also provides a computer storage medium, where the computer storage medium may store a program, where the program may include some or all of the steps in the embodiments provided by the present application when executed. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), a random-access memory (random access memory RAM), or the like.
In a specific implementation, an embodiment of the present application further provides a computer program product, where the computer program product includes executable instructions, where the executable instructions when executed on a computer cause the computer to perform some or all of the steps in the method embodiment.
In the embodiments of the present application, "at least one" means one or more, and "a plurality" means two or more. "and/or", describes an association relation of association objects, and indicates that there may be three kinds of relations, for example, a and/or B, and may indicate that a alone exists, a and B together, and B alone exists. Wherein A, B may be singular or plural. The character "/" generally indicates that the context-dependent object is an "or" relationship. "at least one of the following" and the like means any combination of these items, including any combination of single or plural items. For example, at least one of a, b and c may represent a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or plural.
Those of ordinary skill in the art will appreciate that the various elements and algorithm steps described in the embodiments disclosed herein can be implemented as a combination of electronic hardware, computer software, and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
The foregoing is merely exemplary embodiments of the present application, and any person skilled in the art may easily conceive of changes or substitutions within the technical scope of the present application, which should be covered by the present application. The protection scope of the present application shall be subject to the protection scope of the claims.

Claims (13)

1.一种防伪信息嵌入方法,其特征在于,包括:1. A method for embedding anti-counterfeiting information, comprising: 按照预设的嵌入规则,在待打印文件的页面中确定N个嵌入区域,所述嵌入区域用于嵌入防伪编码,N≥2,且每个所述嵌入区域将用于嵌入一套完整的防伪编码;According to a preset embedding rule, N embedding areas are determined in the page of the document to be printed, wherein the embedding areas are used to embed the anti-counterfeiting code, N≥2, and each of the embedding areas will be used to embed a complete set of anti-counterfeiting codes; 按照预设的编码规则,对防伪信息进行编码,获得防伪信息编码;Encoding the anti-counterfeiting information according to a preset encoding rule to obtain the anti-counterfeiting information code; 在所述防伪信息编码中添加定位编码和容错编码,获得防伪编码,所述定位编码用于在防伪信息提取时对所述防伪编码进行定位,并根据定位的结果对图像数据进行分割获得多个防伪点块切片,所述容错编码用于在防伪信息提取时对所述防伪编码进行容错校验,并根据容错校验的结果对所述防伪点块切片对应的防伪编码切片进行拼接,所述图像数据为待提取防伪信息的保密文件对应的图像数据,所述待提取防伪信息的保密文件为两个或两个以上保密文件碎片;A positioning code and a fault-tolerant code are added to the anti-counterfeiting information code to obtain an anti-counterfeiting code, wherein the positioning code is used to locate the anti-counterfeiting code when extracting the anti-counterfeiting information, and the image data is segmented according to the positioning result to obtain a plurality of anti-counterfeiting point block slices, and the fault-tolerant code is used to perform fault-tolerant verification on the anti-counterfeiting code when extracting the anti-counterfeiting information, and the anti-counterfeiting code slices corresponding to the anti-counterfeiting point block slices are spliced according to the result of the fault-tolerant verification, and the image data is the image data corresponding to the confidential file of the anti-counterfeiting information to be extracted, and the confidential file of the anti-counterfeiting information to be extracted is two or more confidential file fragments; 根据预设的点块生成规则,将所述防伪编码转换为防伪点块集合,分别嵌入所述N个嵌入区域,其中,每个所述嵌入区域对应一个所述防伪点块集合。According to a preset point block generation rule, the anti-counterfeiting code is converted into an anti-counterfeiting point block set, and is embedded in the N embedding areas respectively, wherein each of the embedding areas corresponds to one anti-counterfeiting point block set. 2.根据权利要求1所述的方法,其特征在于,所述按照预设的嵌入规则,在待打印文件的页面中确定N个嵌入区域,包括:2. The method according to claim 1, characterized in that the step of determining N embedding areas in a page of a file to be printed according to a preset embedding rule comprises: 根据待打印文件的页面信息,在待打印文件的打印数据稀疏区域和/或在所述待打印文件的边角处确定N个嵌入区域。According to the page information of the file to be printed, N embedding areas are determined in the print data sparse area of the file to be printed and/or at the corners of the file to be printed. 3.根据权利要求1所述的方法,其特征在于,所述防伪编码中还包括方向编码、角度编码、秘钥编码和/或编码形式编码;3. The method according to claim 1, characterized in that the anti-counterfeiting code also includes direction coding, angle coding, secret key coding and/or coding form coding; 所述方向编码和/或角度编码,用于在防伪信息提取时进行图形校正;The direction coding and/or angle coding is used to perform graphic correction when extracting anti-counterfeiting information; 所述秘钥编码和/或编码形式编码,用于在防伪信息提取时进行安全校验。The secret key encoding and/or encoding form encoding is used for security verification when extracting anti-counterfeiting information. 4.根据权利要求1所述的方法,其特征在于,所述防伪信息为即将对所述待打印文件进行打印的图像形成装置的品牌、型号、个体信息和接收到待打印文件的时间中的至少一种;4. The method according to claim 1, characterized in that the anti-counterfeiting information is at least one of a brand, a model, individual information of an image forming device that will print the file to be printed, and a time when the file to be printed is received; 所述图像形成装置的个体信息为图像形成装置的序列号、IP地址、MAC地址中的至少一种,所述图像形成装置的个体信息为区别于其它图像形成装置的独有信息;The individual information of the image forming device is at least one of a serial number, an IP address, and a MAC address of the image forming device, and the individual information of the image forming device is unique information that is distinguished from other image forming devices; 所述接收到待打印文件的时间包括年份、月份、日、时、分钟、秒中的至少一种。The time of receiving the file to be printed includes at least one of year, month, day, hour, minute and second. 5.一种防伪信息提取方法,其特征在于,包括:5. A method for extracting anti-counterfeiting information, comprising: 扫描待提取防伪信息的保密文件,获得所述保密文件对应的图像数据,所述图像数据中包括多个重复嵌入的防伪点块集合;Scanning a confidential document to be used for extracting anti-counterfeiting information, and obtaining image data corresponding to the confidential document, wherein the image data includes a plurality of repeatedly embedded anti-counterfeiting point block sets; 根据所述防伪点块集合中的定位编码和预设的嵌入规则,确定所述图像数据中防伪点块集合的位置;Determining the position of the anti-counterfeiting point block set in the image data according to the positioning code in the anti-counterfeiting point block set and a preset embedding rule; 根据所述防伪点块集合的位置,对所述图像数据进行分割,获得M个防伪点块切片,其中,每个所述防伪点块切片对应一个所述防伪点块集合,M≥2,所述防伪点块切片的数量与所述防伪点块集合的数量相匹配;According to the position of the anti-counterfeiting point block set, the image data is segmented to obtain M anti-counterfeiting point block slices, wherein each of the anti-counterfeiting point block slices corresponds to one of the anti-counterfeiting point block sets, M≥2, and the number of the anti-counterfeiting point block slices matches the number of the anti-counterfeiting point block sets; 根据预设的点块生成规则,对所述M个防伪点块切片进行解析,获得M个防伪编码切片;According to a preset point block generation rule, the M anti-counterfeiting point block slices are parsed to obtain M anti-counterfeiting code slices; 根据预设的容错规则,对所述M个防伪编码切片进行组合、容错检测,判断任意两个或两个以上防伪编码切片中是否包含符合容错规则的重复编码;According to the preset fault tolerance rules, the M security code slices are combined and fault-tolerantly tested to determine whether any two or more security code slices contain repeated codes that comply with the fault tolerance rules; 若存在两个或两个以上防伪编码切片中包含符合容错规则的重复编码,则对所述两个或两个以上防伪编码切片去重后拼接,获得防伪编码拼接集合;If there are two or more anti-counterfeiting code slices containing repeated codes that comply with the fault tolerance rule, the two or more anti-counterfeiting code slices are deduplicated and then spliced to obtain an anti-counterfeiting code splicing set; 根据预设的编码规则,将所述防伪编码拼接集合中的防伪编码转换为防伪信息;According to a preset coding rule, the anti-counterfeiting codes in the anti-counterfeiting code splicing set are converted into anti-counterfeiting information; 所述待提取防伪信息的保密文件为两个或两个以上保密文件碎片。The confidential document from which the anti-counterfeiting information is to be extracted is two or more confidential document fragments. 6.根据权利要求5所述的方法,其特征在于,所述根据预设的编码规则,将所述防伪编码拼接集合中的防伪编码转换为防伪信息,包括:6. The method according to claim 5, characterized in that the step of converting the anti-counterfeiting codes in the anti-counterfeiting code splicing set into anti-counterfeiting information according to a preset coding rule comprises: 判断所述防伪编码拼接集合中是否包含完整的防伪编码;Determining whether the anti-counterfeiting code splicing set contains a complete anti-counterfeiting code; 若所述防伪编码拼接集合中包含完整的防伪编码,则根据预设的编码规则,将所述防伪编码拼接集合中的防伪编码转换为防伪信息。If the anti-counterfeiting code splicing set includes a complete anti-counterfeiting code, the anti-counterfeiting code in the anti-counterfeiting code splicing set is converted into anti-counterfeiting information according to a preset coding rule. 7.根据权利要求5所述的方法,其特征在于,还包括:7. The method according to claim 5, further comprising: 若任意两个或两个以上防伪编码切片中不包含符合容错规则的重复编码,则判断任意一个防伪编码切片中是否包含完整的防伪编码;If any two or more anti-counterfeiting code slices do not contain repeated codes that comply with the fault tolerance rule, then determine whether any anti-counterfeiting code slice contains a complete anti-counterfeiting code; 若第i个防伪编码切片中包含一个完整的防伪编码,则将所述第i个防伪编码切片中的防伪编码转换为字符信息,获得防伪信息,1≤i≤M。If the i-th security code slice contains a complete security code, the security code in the i-th security code slice is converted into character information to obtain security information, 1≤i≤M. 8.根据权利要求5所述的方法,其特征在于,在扫描待提取防伪信息的保密文件,获得所述保密文件对应的图像数据之后,还包括:8. The method according to claim 5, characterized in that after scanning the confidential document from which the anti-counterfeiting information is to be extracted and obtaining the image data corresponding to the confidential document, it further comprises: 根据所述防伪点块集合中的方向点块和/或角度点块,对所述图像数据的倾斜角度进行校正。The tilt angle of the image data is corrected according to the direction point blocks and/or angle point blocks in the anti-counterfeiting point block set. 9.根据权利要求5所述的方法,其特征在于,根据预设的编码规则,将所述防伪编码拼接集合中的防伪编码转换为防伪信息,包括:9. The method according to claim 5, characterized in that, according to a preset coding rule, converting the anti-counterfeiting codes in the anti-counterfeiting code splicing set into anti-counterfeiting information comprises: 根据预设的编码规则,将所述防伪编码拼接集合中的秘钥编码和/或编码形式编码转换为秘钥信息和/或编码形式信息;According to a preset coding rule, the key code and/or the coding form code in the anti-counterfeiting code splicing set is converted into key information and/or coding form information; 根据所述秘钥信息和/或编码形式信息对所述防伪编码进行安全校验;Performing security verification on the anti-counterfeiting code according to the secret key information and/or encoding form information; 若所述安全校验通过,则根据预设的编码规则,将所述防伪编码拼接集合中的防伪信息编码转换为防伪信息。If the security check passes, the anti-counterfeiting information codes in the anti-counterfeiting code splicing set are converted into anti-counterfeiting information according to a preset coding rule. 10.一种防伪信息嵌入装置,其特征在于,包括:处理器、存储器以及计算机程序,其中所述计算机程序被存储在所述存储器中,所述计算机程序包括指令,当所述指令被执行时,使得所述装置执行权利要求1-4任一项所述的方法。10. An anti-counterfeiting information embedding device, characterized in that it comprises: a processor, a memory and a computer program, wherein the computer program is stored in the memory, and the computer program comprises instructions, and when the instructions are executed, the device executes the method according to any one of claims 1 to 4. 11.一种防伪信息提取装置,其特征在于,包括:处理器、存储器以及计算机程序,其中所述计算机程序被存储在所述存储器中,所述计算机程序包括指令,当所述指令被执行时,使得所述装置执行权利要求5-9任一项所述的方法。11. An anti-counterfeiting information extraction device, characterized in that it comprises: a processor, a memory and a computer program, wherein the computer program is stored in the memory, and the computer program comprises instructions, and when the instructions are executed, the device executes the method described in any one of claims 5 to 9. 12.一种计算机可读存储介质,其特征在于,所述计算机可读存储介质包括存储的程序,其中,在所述程序运行时控制所述计算机可读存储介质所在设备执行权利要求1-4任一项所述的方法。12. A computer-readable storage medium, characterized in that the computer-readable storage medium comprises a stored program, wherein when the program is executed, the device where the computer-readable storage medium is located is controlled to execute the method according to any one of claims 1 to 4. 13.一种计算机可读存储介质,其特征在于,所述计算机可读存储介质包括存储的程序,其中,在所述程序运行时控制所述计算机可读存储介质所在设备执行权利要求5-9任一项所述的方法。13. A computer-readable storage medium, characterized in that the computer-readable storage medium comprises a stored program, wherein when the program is executed, the device where the computer-readable storage medium is located is controlled to execute the method according to any one of claims 5 to 9.
CN202110311711.0A 2021-03-24 2021-03-24 Anti-counterfeiting information embedding method, extraction method, device and storage medium Active CN113076528B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110311711.0A CN113076528B (en) 2021-03-24 2021-03-24 Anti-counterfeiting information embedding method, extraction method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110311711.0A CN113076528B (en) 2021-03-24 2021-03-24 Anti-counterfeiting information embedding method, extraction method, device and storage medium

Publications (2)

Publication Number Publication Date
CN113076528A CN113076528A (en) 2021-07-06
CN113076528B true CN113076528B (en) 2024-12-31

Family

ID=76613881

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110311711.0A Active CN113076528B (en) 2021-03-24 2021-03-24 Anti-counterfeiting information embedding method, extraction method, device and storage medium

Country Status (1)

Country Link
CN (1) CN113076528B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114564705B (en) * 2022-04-29 2022-08-05 杭州安司源科技有限公司 Traceable anti-shooting method and device and storage medium
CN119150899B (en) * 2024-11-15 2025-08-22 深圳前海量子云码科技有限公司 Microscopic code image scanning efficiency optimization method, device, mobile terminal and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106874819A (en) * 2016-11-22 2017-06-20 复旦大学 Can be by sparse horizontal and vertical parity check code control method of handset identity
CN110335189A (en) * 2019-05-31 2019-10-15 平安科技(深圳)有限公司 Fill method, apparatus, computer equipment and the storage medium of anti-counterfeiting information
CN111292219A (en) * 2018-11-21 2020-06-16 慧盾信息安全科技(苏州)股份有限公司 Method for realizing hidden watermark of picture image data
CN112395565A (en) * 2019-08-15 2021-02-23 中国移动通信集团广东有限公司 Watermark information embedding and extracting method and device and electronic equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4448156B2 (en) * 2007-07-05 2010-04-07 キヤノン株式会社 Apparatus, method and program
CN111008923B (en) * 2018-10-08 2022-10-18 阿里巴巴集团控股有限公司 Watermark embedding method, watermark extracting method, watermark embedding device, watermark extracting device and watermark extracting equipment
KR102023101B1 (en) * 2018-12-20 2019-11-04 주식회사 엔퍼 Apparatus for preventing forgery of original data and method thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106874819A (en) * 2016-11-22 2017-06-20 复旦大学 Can be by sparse horizontal and vertical parity check code control method of handset identity
CN111292219A (en) * 2018-11-21 2020-06-16 慧盾信息安全科技(苏州)股份有限公司 Method for realizing hidden watermark of picture image data
CN110335189A (en) * 2019-05-31 2019-10-15 平安科技(深圳)有限公司 Fill method, apparatus, computer equipment and the storage medium of anti-counterfeiting information
CN112395565A (en) * 2019-08-15 2021-02-23 中国移动通信集团广东有限公司 Watermark information embedding and extracting method and device and electronic equipment

Also Published As

Publication number Publication date
CN113076528A (en) 2021-07-06

Similar Documents

Publication Publication Date Title
CN108805787B (en) Paper document tampering and authenticating method and device
US10373033B2 (en) Two dimensional barcode and method of authentication of such barcode
CN108229596B (en) Combined two-dimensional code, electronic certificate carrier, generating and reading device and method
US6940995B2 (en) Method for embedding and extracting text into/from electronic documents
US8379261B2 (en) Creation and placement of two-dimensional barcode stamps on printed documents for storing authentication information
US20040001606A1 (en) Watermark fonts
EP0629972A2 (en) Method and apparatus for embedding identification codes in printed documents
US20030145206A1 (en) Document authentication and verification
EP2237546B1 (en) Device and process for protecting a digital document, and corresponding process for verifying the authenticity of a printed hardcopy
US20080301815A1 (en) Detecting Unauthorized Changes to Printed Documents
JP7619964B2 (en) Method for protecting graphic data from counterfeiting and alteration
Tan et al. Print-Scan Resilient Text Image Watermarking Based on Stroke Direction Modulation for Chinese Document Authentication.
CN113076528B (en) Anti-counterfeiting information embedding method, extraction method, device and storage medium
CN112650992B (en) A document tracking encryption method based on digital watermark
US20080292136A1 (en) Data Processing System And Method
WO2020237881A1 (en) Method and apparatus for injecting anti-counterfeit information, computer device, and storage medium
WO2015140562A1 (en) Steganographic document alteration
Varna et al. Data hiding in hard-copy text documents robust to print, scan and photocopy operations
Mantoro et al. Real-time printed document authentication using watermarked qr code
CN116457792A (en) Method and device for protecting a document, method and device for authenticating a document, document protected by such a method
JP4260076B2 (en) Document creation device, document verification device, document creation method, document verification method, document creation program, document verification program, recording medium storing document creation program, and recording medium storing document verification program
JP4297040B2 (en) Electronic watermarked document handling apparatus, electronic watermarked document handling system, and electronic watermarked document handling method
JP4517667B2 (en) Document image collation device, document image alignment method and program
JP2005210464A (en) Document creation device for falsification verification, document falsification verification device, falsification verification document creation method, document falsification verification method, falsification verification document creation program, document falsification verification program, storage medium storing falsification verification document creation program and document falsification Recording medium storing verification program
US10404886B2 (en) Method of rendering a document secure

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant