Unlock instant, AI-driven research and patent intelligence for your innovation.
Anti-counterfeiting method of 3D icons
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A three-dimensional, three-dimensional image technology, applied in the field of information security, can solve the problems of unable to hide image information, no anti-counterfeiting function, unable to three-dimensionally display icons, etc.
Inactive Publication Date: 2010-01-20
TSINGHUA UNIV
View PDF3 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0012] However, the three-dimensional image technology does not have the anti-counterfeiting function, that is, the image information cannot be hidden
[0013] To sum up, in the prior art, either the information in the icon can only be simply hidden, and the icon cannot be displayed in three dimensions; or the icon can only be displayed in three dimensions, without anti-counterfeiting function, and the icon information cannot be hidden
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0034] This embodiment provides a method for anti-counterfeiting using three-dimensional icons, such as figure 1 As shown, the method combines the visual sharing technology and the three-dimensional drawing technology to generate a three-dimensional visual sharing icon according to the probability of using the visual sharing picture and the probability of using the three-dimensional drawing. This probability can be controlled and change.
[0035] Assume that the probability used in the generated 3D stereoscopic visual sharing icon is p, and the probability used in the 3D stereographic image is q, 0
[0036] When p=100%, when q=0, the generated n visual sharing images are pure (k, n) visual sharing images, and do not have the effect of three-dimensional display; when p=0, q = 100%, the generated n visual sharing images are n three-dimensional display images, which do not have a visual sharing function and cannot hide secret image information.
[0037...
Embodiment 2
[0067] The present embodiment has described the computer program flow that realizes the anti-counterfeiting method utilizing three-dimensional icons. In this example, k=n=2, p=50%, and q=50%. The specific steps are as follows:
[0068] Step 201: Obtain the following basic data;
[0069] 1.(k, n), n refers to the quantity of visible sub-store diagrams, and k refers to the threshold value of the required visual sub-store diagram quantity to restore the dense map, k=n=2 in this example;
[0070] 2. According to (2, 2), according to the existing visual sharing technology, determine the basic matrix B 0 , B 1 , and expansion coefficient m;
[0071] 3. Obtain two grayscale images, and use the grayscale images to represent the height information of the two three-dimensional images, and the color c 1 ,...,c n ∈{0,...,255} is grayscale information, and these images have the same size;
[0072] 4. Select the probability values p=50% and q=50% of using the visual sharing map and u...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
An anti-fake method by using a 3D stereoscopic icon pertains to the information security field. The invention discloses the anti-fake method by using the 3D stereoscopic icon, which can show 3D stereoscopic icons and hide the confidential image information in the 3D stereoscopic icons, comprising the following steps of: obtaining parameters, inputting confidential images and grey images; then using a visual divided storage method to build n visual divided storage images, using a 3D stereograph method to build n 3D stereoscopic images, adjusting the sizes of the n visual divided storage images and the n 3D stereoscopic images and dividing the n visual divided storage images and the n 3D stereoscopic images into a plurality of basic blocks; finally random choosing the basic blocks in the corresponding positions in the visual divided storage images or the 3D stereoscopic images to build n 3D stereoscopic and visual divided storage icons, etc. The invention combines the visual divided storage technique with the 3D stereograph technique by the data fusion technique, therefore, each generated icon is a 3D stereograph in which the confidential information is stored dividedly.
Description
technical field [0001] The invention relates to the field of information security, in particular to an anti-counterfeiting method using three-dimensional icons. Background technique [0002] In recent years, with the application of icon anti-counterfeiting technology, the technology in the field of information security has developed rapidly, especially the development of visual sharing technology and three-dimensional image technology, which has further promoted the progress of icon anti-counterfeiting technology. [0003] Visual sharing technology and 3D stereoscopic image technology are both based on the characteristics of human vision, and the process of restoring the image is to use human eye recognition: [0004] 1. Visual sharing technology [0005] Visual sharing technology is a technology that uses human eyes as a decryption tool to share secret images. Its characteristic is that the decryption process does not require complicated calculations, and it directly uses ...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.