Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Image security code generation method based on anti-counterfeiting encryption and visual identification

An encryption security and visual recognition technology, applied in the field of image processing, can solve the problem of low security performance of image identification code anti-counterfeiting, and achieve the effect of being convenient for wide application, improving applicability, and high recognition.

Active Publication Date: 2020-04-21
中发国码(北京)科技有限公司
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, intelligent identification codes mainly include image identification codes and security codes as encrypted security codes. Among them, the image identification codes specifically include stacked two-dimensional codes, QR two-dimensional codes, data matrix codes, compact matrix codes and Square code, etc., the image recognition code is easy to generate, easy to convert and form according to the information of different target objects, and can store a large amount of data information. It is widely used in mobile payment recognition and other fields, but the structure of the image recognition code is simple. The anti-counterfeiting security performance of the image recognition code is low; while the Chinese security code uses special information compression technology, information coding technology and information encryption technology to process the original data information, so as to obtain a high anti-counterfeiting security and error control information code
Since the intelligent identification codes in the prior art do not have the characteristics of large capacity, large error tolerance rate, high anti-counterfeiting security and wide application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image security code generation method based on anti-counterfeiting encryption and visual identification
  • Image security code generation method based on anti-counterfeiting encryption and visual identification
  • Image security code generation method based on anti-counterfeiting encryption and visual identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0079] refer to figure 1 , is a schematic flowchart of a method for generating an image security code based on anti-counterfeiting encryption and visual recognition provided by an embodiment of the present invention. The image security code generation method based on anti-counterfeiting encryption and visual recognition includes the following steps:

[0080] Step S1, acquiring first characteristic information about a first object, and generating an encrypted secur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an image security code generation method based on anti-counterfeiting encryption and visual identification. According to the image security code generation method based on anti-counterfeiting encryption and visual identification, an encrypted security code and an image identification code are organically combined through special encryption processing and data coding processing to correspondingly obtain an image security code; the image security code has the characteristics of high anti-counterfeiting security, large data capacity, high traceability and high error-tolerant rate of an encrypted security code; and the image security code also has the characteristics of high identification degree and convenience for wide application of the image identification code, so that the intelligent identification performance and the application convenience of the image security code can be effectively improved, and the applicability of the intelligent identification code to different occasions is further improved.

Description

technical field [0001] The invention relates to the technical field of image processing, in particular to an image security code generation method based on anti-counterfeiting encryption and visual recognition. Background technique [0002] With the continuous development of mobile terminal intelligent identification technology, different types of intelligent identification codes have appeared in the prior art, and the user can obtain the data information contained in the intelligent identification code by scanning the intelligent identification code through the mobile terminal. At present, intelligent identification codes mainly include image identification codes and security codes as encrypted security codes. Among them, the image identification codes specifically include stacked two-dimensional codes, QR two-dimensional codes, data matrix codes, compact matrix codes and Square code, etc., the image recognition code is easy to generate, easy to convert and form according t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K19/06G06K9/00G06T5/30G06T7/90G06F21/60
CPCG06K19/06037G06F21/602G06K19/06046G06T5/30G06T7/90G06V40/16
Inventor 赵辉张治平
Owner 中发国码(北京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products