CN-121982278-A - Multi-scale identification safety two-dimensional code system and identification method
Abstract
The invention relates to the technical field of graphic processing and image recognition, in particular to a multi-scale recognition safety two-dimensional code system and a recognition method, wherein the system comprises a coding end, a composite tag physical carrier containing a micro-feature area and a recognition end, wherein the coding end realizes information fusion coding by asymmetrically encrypting and compressing data and combining a verification mechanism to generate a 10-50-micrometer customized micro-feature array; the multi-scale identification safe two-dimensional code system and the identification method solve the problem that the traditional two-dimensional code is easy to copy and tamper, have physical unclonability and high robustness, can tolerate +/-10 degrees of rotation and 25 percent of shielding, take less than 1.5 seconds for identification on main stream mobile equipment, adapt to common equipment, widen the application range of the bar code and provide a safe and reliable alternative scheme.
Inventors
- DENG JIAWEI
- HU YUMING
- LI KANGXIN
Assignees
- 深圳市金天速科技有限公司
Dates
- Publication Date
- 20260505
- Application Date
- 20260114
Claims (10)
- 1. The multi-scale identification safety two-dimensional code system is characterized by comprising a coding end, a composite label physical carrier containing a micro-characteristic area and an identification end; The encoding end is used for carrying out information fusion encoding on the original data and generating a customized micro-feature array, and the information fusion encoding comprises data compression by adopting an asymmetric encryption mode and a combination check mechanism; The composite tag physical carrier is used for bearing a macroscopic two-dimensional code structure and the customized microscopic feature array; the identification end is used for collecting the image of the composite label physical carrier, and the identification is completed through preprocessing, multi-scale analysis, feature extraction and data verification.
- 2. The multi-scale identification safety two-dimensional code system according to claim 1, wherein the coding end comprises an information fusion coding module and a micro-feature generating module; the information fusion coding module encrypts source data into short data through asymmetric encryption, and adopts a data verification algorithm to increase data verification bits so as to realize recovery and correctness verification after data damage; the customized micro-feature array generated by the micro-feature generation module is a graphic unit array with a specific size.
- 3. The multi-scale identification safety two-dimensional code system according to claim 2, wherein the graphic unit of the customized micro-feature array comprises a micro-lattice or a special geometric shape, and the layout mode of the micro-feature array is any one of the following, wherein the micro-feature array is arranged around a common two-dimensional code, is independently arranged at a blank position of a packing material and is embedded into a redundant space of a data coding region of the common two-dimensional code.
- 4. The multi-scale identification safety two-dimensional code system according to claim 1, wherein the identification end comprises an image acquisition unit, a preprocessing unit, a multi-scale analysis unit, a feature extraction unit and a data verification unit; the image acquisition unit comprises a self-adaptive exposure control module and a spectrum adjustment acquisition module, which are respectively used for dynamically adjusting exposure parameters and acquiring images under different wavelength light sources; The multi-scale analysis unit reserves standard two-dimensional code recognition logic and supports adjustment of recognition multiplying power, the feature extraction unit extracts data through processes of binarization processing, space relation topological graph construction and the like, and a core algorithm of the recognition terminal is written in C language.
- 5. The multi-scale identified secure two-dimensional code system of claim 1, wherein the custom micro-feature array has a graphic element size of 10-50 microns, the system tolerates ±10° rotation angles and 25% local occlusion of data blocks, and the complete identification verification process on mainstream mobile devices does not exceed 1.5 seconds.
- 6. The method for identifying the secure two-dimensional code based on the multi-scale identification is characterized by comprising the following steps of: S1, an encoding end performs information fusion encoding on original data to generate a customized micro-feature array; S2, carrying a macroscopic two-dimensional code structure and the customized micro-feature array through a composite tag physical carrier; and S3, the identification end collects the image of the composite label physical carrier, and the identification of the safe two-dimensional code is completed through preprocessing, multi-scale analysis, feature extraction and data verification.
- 7. The method for identifying a secure two-dimensional code according to claim 6, wherein in step S1, the process of information fusion encoding and micro-feature array generation includes: S11, carrying out coding compression processing on the original data to obtain a short-bit character string; s12, performing fault-tolerant coding processing on the short-bit character strings to generate coded data blocks containing check symbols and arranging the coded data blocks in a staggered manner; s13, converting the coded data block into a binary bit stream, adding gap bits and positioning points, and constructing a code map data block; And S14, constructing an image object based on the code image data block, performing color mode conversion and printing precision adaptation, and generating a microscopic code image.
- 8. The method for identifying a secure two-dimensional code according to claim 7, wherein step S12 uses RS encoding to perform fault-tolerant processing, and generates an information symbol and a check symbol, and the fault-tolerant processing can correct a preset number of symbol-level errors.
- 9. The method for identifying a secure two-dimensional code according to claim 6, wherein the specific process of step S3 includes: S31, performing binarization processing on the acquired image, and dividing black and white pixels; S32, traversing the binarized image through a BFS algorithm, and determining a minimum circumscribed rectangular area of the code pattern data block based on the feature matching locating points of the connected areas; s33, carrying out rotation correction on the code pattern data block area, extracting effective binary bit stream according to a preset structure and converting the effective binary bit stream into byte data; s34, decoding and checking the byte data, detecting and correcting errors, and restoring the original data.
- 10. The method for identifying the secure two-dimensional code by multi-scale identification according to claim 9, wherein step S31 adopts sliding window mean value calculation to determine a threshold value, and binarization processing is realized based on the threshold value; Step S33 detects an image edge line by hough transform and calculates an inclination angle, completing rotation correction.
Description
Multi-scale identification safety two-dimensional code system and identification method Technical Field The invention relates to the technical field of graphic processing and image recognition, in particular to a multi-scale recognition safety two-dimensional code system and a recognition method. Background Two-dimensional Code (QR Code) has been widely used in various fields such as commodity tracing, payment, authentication, and advertisement marketing since it was invented by the company Denso Wave in japan in 1994 as an information storage and identification technology. The conventional two-dimensional Code recognition technology is mainly based on image processing and pattern recognition algorithms, decodes information by recognizing the arrangement combination of black and white modules, and the structure of the two-dimensional Code recognition technology conforms to the QR Code symbol specification [1]. Currently, mainstream recognition libraries such as Zbar and ZXing are optimized for the standardized structure to improve recognition speed and accuracy [2]. However, the existing exposed traditional two-dimensional code technology has obvious potential safety hazards. Because the structure of the two-dimensional code is disclosed and standardized, an attacker can easily acquire the content of the two-dimensional code through common scanning equipment to copy or tamper. Research shows that the mobile payment two-dimensional code system faces higher malicious replacement risk [3]. Meanwhile, due to the fact that the traditional two-dimensional code lacks of physical unclonable characteristics, the success rate of counterfeiting attack is extremely high, and the security application scene [4] based on the two-dimensional code is seriously threatened. To address these security challenges, researchers have proposed improvements. Some schemes attempt to combine the digital watermarking technology with the two-dimensional code to enhance the security, and research and explore the use of micro-nano structures to manufacture the physically unclonable two-dimensional code [5]. However, these methods still have significant limitations in that watermarking technology is vulnerable to image processing attacks and the physical micro-nano structure is expensive to manufacture and requires special equipment for identification, which is difficult to apply on a large scale. More importantly, the prior art cannot effectively solve the problem [6] of fusion identification of the macroscopic two-dimensional code and the microscopic anti-counterfeiting characteristic. The current commercial identification system is mainly optimized for a standardized macroscopic two-dimensional code structure, and customized graphic features embedded in microscopic dimensions cannot be effectively identified. When the existing computer vision algorithm processes micro-characteristics, the existing computer vision algorithm is often interfered by factors such as illumination change, angle offset, image noise and the like, so that the recognition rate is obviously reduced. Therefore, the main problems faced by the prior art include (1) the bare traditional two-dimensional code structure is easy to copy and replace, (2) the prior anti-counterfeiting technology is not enough in safety or high in identification complexity and poor in practicability, and (3) the efficient and robust algorithm capable of identifying the macroscopic two-dimensional code structure and the microscopic customized graph simultaneously is lacked. Under the scene of high security requirement, the conventional two-dimension code technology is difficult to meet the practical application requirement, and a novel micro pattern recognition technology is needed to improve the security and anti-counterfeiting capability of the two-dimension code. Disclosure of Invention The invention aims to provide a multi-scale identification safety two-dimensional code system and an identification method, which are used for solving the problems in the background technology. In order to achieve the above purpose, the present invention provides the following technical solutions: A multi-scale identification safety two-dimensional code system comprises a coding end, a composite label physical carrier containing micro-characteristic areas and an identification end; The encoding end is used for carrying out information fusion encoding on the original data and generating a customized micro-feature array, and the information fusion encoding comprises data compression by adopting an asymmetric encryption mode and a combination check mechanism; The composite tag physical carrier is used for bearing a macroscopic two-dimensional code structure and the customized microscopic feature array; the identification end is used for collecting the image of the composite label physical carrier, and the identification is completed through preprocessing, multi-scale analysis, feature extraction and data verific