Research on Ceramic Artworks’ Anti-Counterfeiting and Authentication Based on Two-Dimensional Code

Article Preview

Abstract:

The prosperity of the Chinese art market promoted the spiritual and cultural development. However, counterfeit, fake artworks often happen. After in-depth analysis of the characters of the two-dimensional code and current artworks anti-counterfeiting technology, and combined with the characteristics of ceramic art, an efficient ceramic artworks anti-counterfeiting and authentication method was proposed based two-dimensional code and WAP technology. Art-related information with a random code was built dynamic encryption security sequence, and consumer can use a phone quickly and efficiently achieve certification of ceramic artwork via WAP. The performance analysis shows that this method is feasible and easy to implement, maneuverability, and safety.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 791-793)

Pages:

2096-2099

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Qi WanChuao. Artwork share of transactions: security first[N]. Financial Times, 2010. 6. 15.

Google Scholar

[2] Zhou Xian. The legal protection of utility artwork[J]. Legal System and Society, 2009. 9, 78-82.

Google Scholar

[3] YX Zang. Security technology of packaging material[J]. Packaging Engineering, 2012. 9, 14-17.

Google Scholar

[4] Zhang Zhong. Glimpse of foreign anti-counterfeiting technology [J]. China Brand and Anti-counterfeiting, 2012, 6, 68-69.

Google Scholar

[5] Tao Sun, Di Zhou. Automatic identification technology: Application of two-dimensional code [C]. 2011 IEEE International Conference on Automation and Logistics. Chongqing, 2011, 8.

DOI: 10.1109/ical.2011.6024704

Google Scholar

[6] Zhang Jianfu, Ping fa. Automatic identification-enabled traceability in supply chain management [C] . In: 2008 International Conference on Wireless Communications, Networkin g and Mobile Computing. United States: Institute of Electronics Engineers Computer Society, (2008).

DOI: 10.1109/wicom.2008.1530

Google Scholar

[7] Chu Ying. Mobile ADC Business Applications' Research Based on Cloud Computing Architecture[D]. Dongbei University of Finance and Economics. 2011. 05.

Google Scholar

[8] Xiao Enjian. Study on Construction and Randomness Analysis of Pseudorandom Sequences[D]. Xi'an University of Electronic Science and Technology, 2004. 07.

Google Scholar