A Summary of the Techniques of Using Information for Printing Anti-Counterfeiting
We are a big printing company in Shenzhen China . We offer all book publications, hardcover book printing, papercover book printing, hardcover notebook, sprial book printing, saddle stiching book printing, booklet printing,packaging box, calendars, all kinds of PVC, product brochures, notes, Children's book, stickers, all kinds of special paper color printing products, game cardand so on.
For more information please visit
http://www.joyful-printing.com. ENG only
http://www.joyful-printing.net
http://www.joyful-printing.org
email: info@joyful-printing.net
Since China's reform and opening up, the economy has developed rapidly and the commodities are abundant. Companies engaged in the production of various products have rushed to create brands and prospered the commodity market. But all kinds of counterfeit and shoddy goods have flooded the market at an alarming rate, causing very serious economic losses. To this end, anti-counterfeiting technology has been created to prevent counterfeiting and counterfeiting of products. Printing anti-counterfeiting is one of the main anti-counterfeiting technologies for packaging. The main discussion in this paper uses information to print anti-counterfeiting technology.
1. Human body information bar code anti-counterfeiting technology. Since the end of the century, IBM Corporation of the United States has begun to study the concentric circular (so-called bull's-eye) code mark, which has been continuously improved since it was used for commodities. There are currently barcodes visible to the naked eye for the identification of merchandise. It is invisible to the naked eye under visible light illumination, but can display fluorescent strips under ultraviolet and infrared illumination.
A barcode printed with a colorless security ink. It is composed of several characters or mixed characters, featuring high density, high capacity, reliable decoding, strong error correction capability and good confidentiality. It can not only store natural photos such as personal photos, address, telephone and other information. Deposited into personal identification marks, such as photos, blood type, fingerprints, retinal blood vessels and other secondary barcodes (tWO - djmensjnal bar codes). It is more difficult to copy than the general two-dimensional bar code. It is integrated with the paper through special photochemical treatment. It can not be peeled off. It can only be used once. It can't be recognized by the human eye. It can't be used for visible light or copying. A paper-recessive bar code that reads information in a bar code with a scanner that emits a certain wavelength. Signature, toughness, high mechanical strength, not easy to deform, long-term use in harsh outdoor environments, weatherproof, high and low temperature, acid and alkali corrosion resistance, suitable for mechanical, electronic and other famous products. It can be read by long-distance laser, and it is compatible with universal code system and is not compatible with electromagnetic interference.
The integrated anti-counterfeiting barcode of the human body information after adding the anti-counterfeiting information of the human body to the two-dimensional barcode having the information anti-counterfeiting function is a more anti-counterfeiting method for the anti-counterfeiting function. Human body information that can be used for anti-counterfeiting includes:
(1) Fingerprint information. Fingerprints (FingerPrints) is a pattern formed by the bulging of the papillary line on the palm of the hand. It is the most important type of fingerprint. The patterns formed on the palms of the hands and feet are called palmprints.
Fingerprints can be divided into hundreds of kinds of graphics. Each fingerprint is arranged into 13 different feature points by points and lines of 13 different shapes. In addition, the position and distribution of each feature point and line are different, and the fingerprint is specific. Sex, stability, and heredity reach the so-called "lifetime constant, people are different." Some people in France reported that the mathematical features of the fingerprints are summarized into four types, and each fingerprint has about 100 details. The number of gates is arranged and combined, and then calculated by the population of about 5 billion people in a century. Ten fingers, that is, 50 billion fingers. It is estimated that it is impossible for humans to have absolutely repeated fingerprints after a century of 50 digits. In fact, it is impossible for the world to have two people with identical fingerprints. Therefore, fingerprints are recognized as an absolutely reliable sign of personal identification. It has been used for a long time in forensic science. In ancient China, fingerprints have been used to prove personal identity and are highly respected by countries all over the world. It can be seen that fingerprints are universally recognized and are not counterfeit personal marks. The fingerprint is used as a special mark, and the pattern identification code can be made into a magnetic barcode by using the magnetic code anti-counterfeiting ink. The anti-counterfeiting purpose can be achieved when the package is safely exited through the channel and recognized by the fingerprint automatic identification system.
(2) Palm print and hand shape anti-counterfeiting. The formation of human palm prints and their specificity are the same as fingerprints. It is only used when the palmprint is large, and it can be used as the same identification after the whole separation. Some people use it as anti-counterfeiting for bulk goods to prevent some of the goods in the box from being "tune-packed" to partially replenish the products.
Palm prints can also be used for access security systems.
The palm shape is measured according to anthropological methods, and the difference between each person can be found, but the accuracy is far less than the finger and palm print. But it is also a way to discriminate.
(3) DNA anti-counterfeiting. DNA (deoxyribonucleic acid) is present in all nucleated animals and plants, and all genetic information of the organism is stored in the DNA molecule. The coding region in the DNA structure, that is, the genetic gene or the sequence of the gene sequence accounts for 1/10 to 1/30 of the total length of the DNA, which is a so-called genetic code region.
In terms of humans, there are about 100,000 genetic genes, each consisting of four nucleotides A, T, G, and c, arranged in order on two complementary helical DNA long chains. The total number of nucleotides is about 3 billion. If you randomly check the DNA profiles of two people, the probability of the exact same is only one-thousandth of a billion, which is far lower than the reciprocal of the total population of the world before the dry day, so it is recognized as an individual. The value can be seen as 100%. Like a human being, any organism, whether an animal or a plant, is a eukaryote with DNA in its nucleus, and this DNA fragment is polymorphic and is a natural genetic code. Especially in higher animals and plants, the number of genes is extremely large, exceeding the basic gene comparison (basicpair.bp). If it is used for anti-counterfeiting, only a few hundred bp is enough, visible DNA is used as a password, and the room for selection is very broad. It can be described as inexhaustible. In recent years, there have been reports of using DNA as a password anti-counterfeiting at home and abroad, and DNA encryption inks have been introduced for signature.
The Institute of Biological DNA Anti-Counterfeiting Technology of Shandong Normal University has passed expert appraisal. They constructed a new plasmid vector, mass-produced DNA molecules by DNA cloning technology and established a PCR (polymerase chain reaction) detection method. Because DNA molecules are non-toxic and stable, they are soluble in water and some polar solvents. They can be added to the products or their packaging for anti-counterfeiting with water or other solvents. The biology research group of Shandong Normal University has incorporated the DNA code of the plant DNA into the printing ink, glue, cosmetics and low-grade liquor to study the feasibility of anti-counterfeiting. Since PCR detection requires special equipment, it is still an expert anti-counterfeiting method to see DNA passwords. In the true and false litigation of batch products, reliable scientific evidence can be produced through expert appraisal and play a huge role.
The Institute of Anti-Counterfeiting Technology of Nankai University is studying the grafting of the double-helical bond of ONA gene on photochemical identification materials. The institute has expanded a variety of base countries, gradually built libraries, and has synthesized a variety of photochemical materials such as fluorescence, photochromism, magneto-optical, and photoacoustic. The bar code printed by these materials can simplify the existing detection method, and can determine whether the DNA code of the sequence exists by observing whether there are indicators such as fluorescence or color development, so as to distinguish between true and false.
(4) Anti-counterfeiting of retinal blood vessels in the human fundus. The central artery of the human eyeball retina is divided into upper and lower branches from the fundus to the optic nerve nipple. It is then divided into four small arteries, the small arteries, the small arteries, and the small arteries. The grading is finer and smaller, so that a capillary network extending in all directions is formed on the retina, which is a fundus angiogram observed by a clinician. The gradual branching of these blood vessels and even the netting, such as the step-by-step tree branching of the towering tree, form an inconspicuous leaf, and there is absolutely no identical fundus vascular map, such as if a certain fundus has a congenital variation or acquired variation. Older lesions of the blood vessels or fundus add a special sign of identification. Therefore, the fundus retinal angiogram is regarded as one of the preferred methods of personal identification in forensic science.
The retinal blood vessel map was photographed by a double-tube CCD camera, and stored and built by a computer. As the image password is stored in the two-dimensional barcode, when the barcode is detected, the detector converts the information into a number, and the computer processor compares with the stored retinal blood vessel image of the fundus, and finally obtains the identification or negation. The conclusion.
(5) Anti-counterfeiting of iris images of human eyes. The iris of the human eye is located behind the cornea of the eye, before the crystal. The color varies depending on the amount and distribution of the pigment. In addition to a few ethnic minorities, China is mostly brown. Through the cornea, the iris is disc-shaped, and there is a small hole in the center called the pupil. The pupil can be automatically reduced or enlarged according to the brightness of the environment. The disc-shaped iris has a radial texture and a small concave around the central pupil, like a skirt fold. When the pupil is reduced, the texture becomes straighter; when the pupil is enlarged, the texture is wavy, and the fine features such as texture, blood vessels, and spots on the iris are different. It has been reported that a device developed by Iriscan in 1993 to check the iris of the human eye, an iris automatic identification device, has been patented. The instrument captures a video image of the iris a few feet away to identify an individual. This method is more convenient to apply than retinal blood vessel images.
(6) Anti-counterfeiting of the back vein image of the hand. The shape and distribution of the subcutaneous venous vessels in human hands are different. The formation and significance of the subcutaneous venous vessels are the same as those of the retinal vessels, but they are not as complicated as the retinal vessels, and the blood vessels visible through the skin are limited. Since the method of recording and checking is simple, the hand of the clenching fist is placed under the camera for a few seconds, and the recorded image information is printed into a barcode, and the package with such a password is passed through the detector. The conclusion that the computer processes and compares with the stored image can be identified or denied.
(7) Anti-counterfeiting facial features. People's faces are different, and differences can be found either by anthropological methods measured by a pair of twins. If anthropological methods are used to measure the points and lines between the various anatomical parts of the face, and the facial thermal phase is scanned by infrared rays, personal portrait recognition can be performed, and a computer automatic identification system can also be established for anti-counterfeiting.
2. Magnetic code. Write a password on the magnetic strip or print the password with magnetic ink. Interpreted with a magnetic decoder. The magnetic medium can generally be fixed to a specific position on the surface of the paper or card or document by printing, coating or affixing. At present, the magnetic code has been used in the fields of finance, communication control and so on. Since general commercial codes are easily changed and forged, watermark magnetics have been introduced in recent years. In the production of the watermark magnetic strip, after the temperature is applied, the computer creates a pattern of 2-bit spacing, which is dried and then retained in the magnetic oxide, resulting in a unique unchangeable 12-digit number. When reading, add a special watermark magnetic verification track on the common magnetic head to judge whether the watermark magnetic number exists and is correct, so as to distinguish between true and false.
The magnetic strip can also be combined with the hologram to make a full magnetic strip anti-counterfeiting technology. That is to say, the information of magnetism and light is locked together for anti-counterfeiting, and the obtained grating numbers and bar code numbers are independent, but the two complement each other to form a huge identification number of the holographic magnetic card, which is more conducive to anti-counterfeiting and confidentiality. A holographic magnetic card reader is used for detection. Magnetic code technology has been used for magnetic code printing on solid packaging such as boxes and bottles.
3. Laser holographic anti-counterfeiting technology. At present, laser rainbow embossed hologram anti-counterfeiting technology is commonly used, which is a kind of visual graphic or information produced on the product by using laser rainbow hologram plate making technology and mold copying technology.
The first holographic logo used hand whiskey, which later became popular in the world and gradually used on various tickets and credit cards. China was introduced in the 1980s and has been widely used in various brand-name products. It is the most used of various anti-counterfeiting technologies.
The rainbow hologram is a rainbow hologram made by a series of programs using a common holographic image as a photographed object. For example, a photo-sensitive etch resist is used instead of a hologram taken by an ordinary photo. After exposure processing, an embossed phase hologram is obtained, that is, a master for making a rainbow hologram. The surface of the master is filled with rugged interference fringes with a fineness of more than a thousand. These embossed stripes record the light intensity and phase information of the object being photographed, realizing holographic recording. Then, by vacuum coating or electroless plating, a thin metal film is plated on the surface of the master, and then nickel or other metal of appropriate thickness is plated to form a molded metal plate with good mechanical properties. The plate is mounted on a stamping machine, the polyester plastic film is hot pressed, the embossed hologram is embossed on the film, and finally an aluminum film is vacuum-deposited on the film to increase the reflectivity of the film. After the aluminum film is plated or coated with a protective layer, a hologram is produced. This is an opaque laser embossed holographic anti-counterfeiting diagram. This hologram can be observed with white light. Light of each wavelength in white light is diffracted by interference fringes on the picture. Because of the different diffraction angles, there are different colors of reproduced images when viewed at different angles.

