A kind of encoding method and decoding method of color characters

A coding method and color technology, which is applied in the field of color character coding and decoding, can solve the problems of low security of anti-counterfeiting code technology and affect the appearance of products, and achieve good concealment, novel production methods and prominent substantive features Effect

Inactive Publication Date: 2017-12-22
曾芝渝 +3
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a color character encoding method and its decoding method, which mainly solves the problem that the existing anti-counterfeiting code technology has low security and affects the appearance of the product

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of encoding method and decoding method of color characters
  • A kind of encoding method and decoding method of color characters
  • A kind of encoding method and decoding method of color characters

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] The present invention is a technical solution for combining the anti-counterfeiting code and color to output and decode the anti-counterfeiting code, such as figure 1 As shown, the encoding process is as follows:

[0044] (1) Select N different colors from the RGB color table, and N is a natural number greater than or equal to 2. For ease of identification, the N colors here can be preferentially selected from colors with greater contrast, such as black and white;

[0045] (2) Formulate an N-ary encoding library according to the selected N colors, and match the selected N colors with the bases of the N-ary encoding library one by one. Here, it specifically refers to the number of colors selected by the server system N establishes a base encoding library equal to its value, that is, an N base encoding base. The N base encoding base follows the base conversion rules, and its bases are 0, 1, 2...(N-1). At the same time, the selected color N 0 , N 1 , N 2 ...N n-1 Matc...

Embodiment 2

[0064] Such as image 3 , 4 As shown, the difference from Embodiment 1 is that Embodiment 1 is the encoding and output of non-encrypted source information. In this embodiment, one-way encryption is superimposed on the source information before it is converted into M-ary encoding. algorithm (such as MD5 one-way encryption algorithm or two-way MD5 one-way encryption algorithm), and when decoding, after converting the M-ary code into UNICODE or ASCII code, it is also decrypted with a one-way decryption algorithm, and then The source information is converted, and the encoding and output of the entire source information are in the state of encryption and decryption. This embodiment takes the secondary MD5 one-way encryption algorithm as an example to illustrate the encryption and decryption process of this embodiment:

[0065] Take the conversion of binary and ternary as an example, that is, let M=2, N=3, select three colors of black, red, and blue, and then build a ternary code ...

Embodiment 3

[0069] Such as Figure 5 , 6As shown, the difference from Embodiment 1 is that Embodiment 1 is the encoding and output of non-encrypted source information. In this embodiment, a simple encryption algorithm is superimposed on the source information before it is converted into M-ary encoding. (such as dictionary conversion encryption algorithm, N-ary displacement encryption algorithm, N-ary digit transformation encryption algorithm, character displacement encryption algorithm, logic or transformation encryption algorithm, logic and transformation encryption algorithm, logic XOR transformation encryption algorithm or four mixed operation transformation Encryption algorithm), and when decoding, after the M-ary code is converted into UNICODE or ASCII code, it is also decrypted with a simple decryption algorithm. This embodiment takes the character displacement encryption algorithm as an example to illustrate the encryption and decryption process of this embodiment:

[0070] Take ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a color character coding method and a decoding method thereof, which solves the problems of low security and affecting product appearance in anti-counterfeiting code technology. The encoding method of the colored characters includes: (1) selecting N different colors; (2) formulating an N-ary encoding library and matching its base with the selected color; (3) inputting source information and converting it into M-ary Encoding; (4) Convert the M-ary code to N-ary code to obtain the corresponding data; (5) Use the color that matches the base of the N-ary code library to replace the data and arrange and combine to form a color character; (6 ) to output colored characters. The decoding method of the colored characters includes: (1) using terminal equipment to identify colored characters and replacing them with M-ary codes; (2) converting M-ary codes to UNICODE or ASCII codes; (3) terminal equipment converting UNICODE or ASCII code is converted to source information and output. The anti-counterfeiting code of the present invention is novel and has high security.

Description

technical field [0001] The invention relates to a coding method of color characters and a decoding method thereof. Background technique [0002] With the gradual development of social economy, people's requirements for material products are getting higher and higher, but what follows is that more and more counterfeit products have begun to flood the market, and criminals have illegally obtained a lot of benefits from them. , which not only affects the reputation of the manufacturer, but also makes consumers feel uneasy. [0003] Based on this, many manufacturers have begun to add anti-counterfeiting codes to their products, and by verifying the anti-counterfeiting codes, the authenticity of the products can be distinguished. However, the existing anti-counterfeiting code technologies, including two-dimensional codes, barcodes, color barcodes and color graphic codes, all adopt anti-counterfeiting codes on the packaging of products separately. Considering the appearance and a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06K19/06
Inventor 张琦刘磊肖贤勇曾芝渝
Owner 曾芝渝
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products