Abstract

To get the most clear security image for optimal security, the relationship of grayscale between the digital grating and host image was studied using the optical properties of the transmission grating. In this anticounterfeiting technology, the correspondence between the digital grating and the host image was analyzed. The same security patterns were embedded into eight host images of different tones. The clarity of the extracted security information was evaluated to determine the best relationship of grayscale between digital grating and host image. Studies have shown that the security of a bright tone image is better. When the grayscale of the host image is 40%, the anticounterfeiting effectiveness is the best; when the grayscale is more than 60%, this anticounterfeiting technology no longer applies. At the same time, the corresponding curves of the grayscale between the digital grating and the host image with common screen size were provided and the mathematical model for expressing their correlation was established.

© 2014 Optical Society of America

Full Article  |  PDF Article

References

  • View by:
  • |
  • |
  • |

  1. E. Boisdur, D. Gesbert, and B. Kress, “High security optical tags for automotive/avionics parts anti-counterfeiting,” Proc. SPIE 7675, 76750P (2010).
    [CrossRef]
  2. S.-L. Yeh, “Using random features of dot-matrix holograms for anticounterfeiting,” Appl. Opt. 45, 3698–3703 (2006).
    [CrossRef]
  3. X. Zhuge and K. Nakano, “Halftoning-based algorithms for image hiding,” J. Commun. Comp. 6, 39–45 (2009).
  4. B. Baloukas, J.-M. Lamarre, and L. Martinu, “Active metameric security device using an electrochromic material,” Appl. Opt. 50, C41–C49 (2011).
    [CrossRef]
  5. S. Maleshliyski and R. Gunter, “Security printing techniques based on substrate and print-process individualities,” in Proceedings of Technical Association of the Graphic Arts (2010), pp. 37–54.
  6. S. Maleshliyski, R. Gunter, and S. Bonev, “Method for the extraction of print-process error signals from matrix codes and its application in security printing,” in Proceedings of IADIS International Conference (IADIS, 2010), pp. 155–160.
  7. Z. Liu and L. Ren, “Study of anti-counterfeit printing with cylindrical lens sheet basic on screening copy,” Adv. Mater. Res. 174, 140–143 (2010).
    [CrossRef]
  8. X. Shi and X. Zhao, “Research on application of moiré effect in security printing,” Packag. Eng. 31, 99–101 (2010).
  9. X. Wang, Q. Wang, and X. Liu, “Research of halftone anti-counterfeiting technology based on infinite periodic vertical moiré,” Packag. Eng.1 (2014).
  10. Q. Liu and Z. Hong, Image Replication Principle (Wuhan University, 2006), pp. 98–99.
  11. G. Chen, “Digital Screening Technology Research in Map Publishing Visualization,” (PLA Information Engineering University, 2005).
  12. L. Liu, “Application and development of the grating,” J. Changsha Univ. 23, 23–26 (2009).
  13. J. Lu and L. Tian, How to process the raster image to print,” Digital Technol. (2008).
  14. Y. F. Chang, J. B. Feng, and C. S. Tsai, “New data hiding scheme using pixel swapping for halftone images,” Imaging Sci. J. 56, 279–290 (2008).
    [CrossRef]
  15. F. Li and Z. Tang, “Digital screening technology,” Packag. Eng. 26, 47–49 (2005).
  16. J. Xu and S. Chen, “The design method of threshold matrix and principle for AM screening,” China Printing Packag. Study 1, 38–42 (2009).
  17. H. Yao, “AM inverse halftoning identify based on template matching,” Knowledge Syst. Constr. (2005).
  18. F. Duan, C. Liu, and J. Zhang, “Mathematical Description and Experimental Verification about Black–White Grating,” (Research and Exploration in Laboratory, 2005), Vol. 24, pp. 29–31.
  19. S. Cai, H. Zhang, H. Chen, and J. Sha, “Research of piecewise cubic curve-fitting method based on least-square principle,” Sci. Technol. Eng. 7, 352–355 (2007).

2011 (1)

2010 (3)

Z. Liu and L. Ren, “Study of anti-counterfeit printing with cylindrical lens sheet basic on screening copy,” Adv. Mater. Res. 174, 140–143 (2010).
[CrossRef]

X. Shi and X. Zhao, “Research on application of moiré effect in security printing,” Packag. Eng. 31, 99–101 (2010).

E. Boisdur, D. Gesbert, and B. Kress, “High security optical tags for automotive/avionics parts anti-counterfeiting,” Proc. SPIE 7675, 76750P (2010).
[CrossRef]

2009 (3)

X. Zhuge and K. Nakano, “Halftoning-based algorithms for image hiding,” J. Commun. Comp. 6, 39–45 (2009).

J. Xu and S. Chen, “The design method of threshold matrix and principle for AM screening,” China Printing Packag. Study 1, 38–42 (2009).

L. Liu, “Application and development of the grating,” J. Changsha Univ. 23, 23–26 (2009).

2008 (1)

Y. F. Chang, J. B. Feng, and C. S. Tsai, “New data hiding scheme using pixel swapping for halftone images,” Imaging Sci. J. 56, 279–290 (2008).
[CrossRef]

2007 (1)

S. Cai, H. Zhang, H. Chen, and J. Sha, “Research of piecewise cubic curve-fitting method based on least-square principle,” Sci. Technol. Eng. 7, 352–355 (2007).

2006 (1)

2005 (1)

F. Li and Z. Tang, “Digital screening technology,” Packag. Eng. 26, 47–49 (2005).

Baloukas, B.

Boisdur, E.

E. Boisdur, D. Gesbert, and B. Kress, “High security optical tags for automotive/avionics parts anti-counterfeiting,” Proc. SPIE 7675, 76750P (2010).
[CrossRef]

Bonev, S.

S. Maleshliyski, R. Gunter, and S. Bonev, “Method for the extraction of print-process error signals from matrix codes and its application in security printing,” in Proceedings of IADIS International Conference (IADIS, 2010), pp. 155–160.

Cai, S.

S. Cai, H. Zhang, H. Chen, and J. Sha, “Research of piecewise cubic curve-fitting method based on least-square principle,” Sci. Technol. Eng. 7, 352–355 (2007).

Chang, Y. F.

Y. F. Chang, J. B. Feng, and C. S. Tsai, “New data hiding scheme using pixel swapping for halftone images,” Imaging Sci. J. 56, 279–290 (2008).
[CrossRef]

Chen, G.

G. Chen, “Digital Screening Technology Research in Map Publishing Visualization,” (PLA Information Engineering University, 2005).

Chen, H.

S. Cai, H. Zhang, H. Chen, and J. Sha, “Research of piecewise cubic curve-fitting method based on least-square principle,” Sci. Technol. Eng. 7, 352–355 (2007).

Chen, S.

J. Xu and S. Chen, “The design method of threshold matrix and principle for AM screening,” China Printing Packag. Study 1, 38–42 (2009).

Duan, F.

F. Duan, C. Liu, and J. Zhang, “Mathematical Description and Experimental Verification about Black–White Grating,” (Research and Exploration in Laboratory, 2005), Vol. 24, pp. 29–31.

Feng, J. B.

Y. F. Chang, J. B. Feng, and C. S. Tsai, “New data hiding scheme using pixel swapping for halftone images,” Imaging Sci. J. 56, 279–290 (2008).
[CrossRef]

Gesbert, D.

E. Boisdur, D. Gesbert, and B. Kress, “High security optical tags for automotive/avionics parts anti-counterfeiting,” Proc. SPIE 7675, 76750P (2010).
[CrossRef]

Gunter, R.

S. Maleshliyski and R. Gunter, “Security printing techniques based on substrate and print-process individualities,” in Proceedings of Technical Association of the Graphic Arts (2010), pp. 37–54.

S. Maleshliyski, R. Gunter, and S. Bonev, “Method for the extraction of print-process error signals from matrix codes and its application in security printing,” in Proceedings of IADIS International Conference (IADIS, 2010), pp. 155–160.

Hong, Z.

Q. Liu and Z. Hong, Image Replication Principle (Wuhan University, 2006), pp. 98–99.

Kress, B.

E. Boisdur, D. Gesbert, and B. Kress, “High security optical tags for automotive/avionics parts anti-counterfeiting,” Proc. SPIE 7675, 76750P (2010).
[CrossRef]

Lamarre, J.-M.

Li, F.

F. Li and Z. Tang, “Digital screening technology,” Packag. Eng. 26, 47–49 (2005).

Liu, C.

F. Duan, C. Liu, and J. Zhang, “Mathematical Description and Experimental Verification about Black–White Grating,” (Research and Exploration in Laboratory, 2005), Vol. 24, pp. 29–31.

Liu, L.

L. Liu, “Application and development of the grating,” J. Changsha Univ. 23, 23–26 (2009).

Liu, Q.

Q. Liu and Z. Hong, Image Replication Principle (Wuhan University, 2006), pp. 98–99.

Liu, X.

X. Wang, Q. Wang, and X. Liu, “Research of halftone anti-counterfeiting technology based on infinite periodic vertical moiré,” Packag. Eng.1 (2014).

Liu, Z.

Z. Liu and L. Ren, “Study of anti-counterfeit printing with cylindrical lens sheet basic on screening copy,” Adv. Mater. Res. 174, 140–143 (2010).
[CrossRef]

Lu, J.

J. Lu and L. Tian, How to process the raster image to print,” Digital Technol. (2008).

Maleshliyski, S.

S. Maleshliyski and R. Gunter, “Security printing techniques based on substrate and print-process individualities,” in Proceedings of Technical Association of the Graphic Arts (2010), pp. 37–54.

S. Maleshliyski, R. Gunter, and S. Bonev, “Method for the extraction of print-process error signals from matrix codes and its application in security printing,” in Proceedings of IADIS International Conference (IADIS, 2010), pp. 155–160.

Martinu, L.

Nakano, K.

X. Zhuge and K. Nakano, “Halftoning-based algorithms for image hiding,” J. Commun. Comp. 6, 39–45 (2009).

Ren, L.

Z. Liu and L. Ren, “Study of anti-counterfeit printing with cylindrical lens sheet basic on screening copy,” Adv. Mater. Res. 174, 140–143 (2010).
[CrossRef]

Sha, J.

S. Cai, H. Zhang, H. Chen, and J. Sha, “Research of piecewise cubic curve-fitting method based on least-square principle,” Sci. Technol. Eng. 7, 352–355 (2007).

Shi, X.

X. Shi and X. Zhao, “Research on application of moiré effect in security printing,” Packag. Eng. 31, 99–101 (2010).

Tang, Z.

F. Li and Z. Tang, “Digital screening technology,” Packag. Eng. 26, 47–49 (2005).

Tian, L.

J. Lu and L. Tian, How to process the raster image to print,” Digital Technol. (2008).

Tsai, C. S.

Y. F. Chang, J. B. Feng, and C. S. Tsai, “New data hiding scheme using pixel swapping for halftone images,” Imaging Sci. J. 56, 279–290 (2008).
[CrossRef]

Wang, Q.

X. Wang, Q. Wang, and X. Liu, “Research of halftone anti-counterfeiting technology based on infinite periodic vertical moiré,” Packag. Eng.1 (2014).

Wang, X.

X. Wang, Q. Wang, and X. Liu, “Research of halftone anti-counterfeiting technology based on infinite periodic vertical moiré,” Packag. Eng.1 (2014).

Xu, J.

J. Xu and S. Chen, “The design method of threshold matrix and principle for AM screening,” China Printing Packag. Study 1, 38–42 (2009).

Yao, H.

H. Yao, “AM inverse halftoning identify based on template matching,” Knowledge Syst. Constr. (2005).

Yeh, S.-L.

Zhang, H.

S. Cai, H. Zhang, H. Chen, and J. Sha, “Research of piecewise cubic curve-fitting method based on least-square principle,” Sci. Technol. Eng. 7, 352–355 (2007).

Zhang, J.

F. Duan, C. Liu, and J. Zhang, “Mathematical Description and Experimental Verification about Black–White Grating,” (Research and Exploration in Laboratory, 2005), Vol. 24, pp. 29–31.

Zhao, X.

X. Shi and X. Zhao, “Research on application of moiré effect in security printing,” Packag. Eng. 31, 99–101 (2010).

Zhuge, X.

X. Zhuge and K. Nakano, “Halftoning-based algorithms for image hiding,” J. Commun. Comp. 6, 39–45 (2009).

Adv. Mater. Res. (1)

Z. Liu and L. Ren, “Study of anti-counterfeit printing with cylindrical lens sheet basic on screening copy,” Adv. Mater. Res. 174, 140–143 (2010).
[CrossRef]

Appl. Opt. (2)

China Printing Packag. Study (1)

J. Xu and S. Chen, “The design method of threshold matrix and principle for AM screening,” China Printing Packag. Study 1, 38–42 (2009).

Imaging Sci. J. (1)

Y. F. Chang, J. B. Feng, and C. S. Tsai, “New data hiding scheme using pixel swapping for halftone images,” Imaging Sci. J. 56, 279–290 (2008).
[CrossRef]

J. Changsha Univ. (1)

L. Liu, “Application and development of the grating,” J. Changsha Univ. 23, 23–26 (2009).

J. Commun. Comp. (1)

X. Zhuge and K. Nakano, “Halftoning-based algorithms for image hiding,” J. Commun. Comp. 6, 39–45 (2009).

Packag. Eng. (2)

X. Shi and X. Zhao, “Research on application of moiré effect in security printing,” Packag. Eng. 31, 99–101 (2010).

F. Li and Z. Tang, “Digital screening technology,” Packag. Eng. 26, 47–49 (2005).

Proc. SPIE (1)

E. Boisdur, D. Gesbert, and B. Kress, “High security optical tags for automotive/avionics parts anti-counterfeiting,” Proc. SPIE 7675, 76750P (2010).
[CrossRef]

Sci. Technol. Eng. (1)

S. Cai, H. Zhang, H. Chen, and J. Sha, “Research of piecewise cubic curve-fitting method based on least-square principle,” Sci. Technol. Eng. 7, 352–355 (2007).

Other (8)

H. Yao, “AM inverse halftoning identify based on template matching,” Knowledge Syst. Constr. (2005).

F. Duan, C. Liu, and J. Zhang, “Mathematical Description and Experimental Verification about Black–White Grating,” (Research and Exploration in Laboratory, 2005), Vol. 24, pp. 29–31.

X. Wang, Q. Wang, and X. Liu, “Research of halftone anti-counterfeiting technology based on infinite periodic vertical moiré,” Packag. Eng.1 (2014).

Q. Liu and Z. Hong, Image Replication Principle (Wuhan University, 2006), pp. 98–99.

G. Chen, “Digital Screening Technology Research in Map Publishing Visualization,” (PLA Information Engineering University, 2005).

J. Lu and L. Tian, How to process the raster image to print,” Digital Technol. (2008).

S. Maleshliyski and R. Gunter, “Security printing techniques based on substrate and print-process individualities,” in Proceedings of Technical Association of the Graphic Arts (2010), pp. 37–54.

S. Maleshliyski, R. Gunter, and S. Bonev, “Method for the extraction of print-process error signals from matrix codes and its application in security printing,” in Proceedings of IADIS International Conference (IADIS, 2010), pp. 155–160.

Cited By

OSA participates in CrossRef's Cited-By Linking service. Citing articles from OSA journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (7)

Fig. 1.
Fig. 1.

Halftone anticounterfeiting technology effect. (a) Infinite periodic vertical moiré. (b) Host image superimposed digital grating. (c) Halftone image embedded hidden information. (d) Detection of anticounterfeiting effect.

Fig. 2.
Fig. 2.

AM dot shape of different grayscales. (a) grayscale of 25%, (b) grayscale of 37.5%, and (c) grayscale of 62.5%.

Fig. 3.
Fig. 3.

Structure of black–white grating. (a) Mimic diagram of black–white grating. (b) Enlarged sectional structure of black–white grating.

Fig. 4.
Fig. 4.

Enlarged view of host image before and after overlapped digital grating. (a) Host image before overlap digital grating. (b) Host image after overlapped digital grating.

Fig. 5.
Fig. 5.

Host image anticounterfeit detection of different grayscales.

Fig. 6.
Fig. 6.

Relationship of halftone dot percentages to digital grating grayscale.

Fig. 7.
Fig. 7.

Relationship of the host image grayscale and digital grating grayscale of different screening lines.

Tables (3)

Tables Icon

Table 1. Optical Parameters of Corresponding Digital Grating for Different Grayscales of the Host Image with Screening Lines of 72 lpi (Unit: pixel)

Tables Icon

Table 2. Optical Parameters of Corresponding Digital Grating for Different Grayscales of the Host Image with Screening Lines of 96 lpi (Unit: pixel)

Tables Icon

Table 3. Optical Parameters of Corresponding Digital Grating for Different Grayscales of the Host Image with Screening Lines of 144 lpi (Unit: pixel)

Equations (8)

Equations on this page are rendered with MathJax. Learn more.

f(i,j)=64×[1g(i,j)255].
k=StdSt×100%.
k=(td)×H×Nt×H×N×100%=(td)t×100%.
t=D,
t=25.4L.
P1:k=(2.2242e06)D3+(3.243e04)D20.0197D+0.9752,
P2:k=(1.8046e06)D3+(2.5985e04)D20.0177D+0.9873,
P3:k=(8.547e07)D3+(1.2821e04)D20.0143D+1.0035.

Metrics