ÄãºÃ£¬»¶Ó­À´µ½¾­¹ÜÖ®¼Ò [µÇ¼] [×¢²á]

ÉèΪÊ×Ò³ | ¾­¹ÜÖ®¼ÒÊ×Ò³ | Êղر¾Õ¾

Ī¶ûÌõÎÆ·Àαӡˢ¼¼Êõ̽ÌÖ_Ó¡Ë¢¹¤³ÌרҵÂÛÎÄ·¶ÎÄ

·¢²¼Ê±¼ä£º2015-04-06 À´Ô´£ºÈË´ó¾­¼ÃÂÛ̳
Ó¡Ë¢¹¤³ÌרҵÂÛÎÄ·¶ÎÄ Ä¿ ¼ ÖÐÎÄÕªÒªI Ó¢ÎÄÕªÒª.II Ä¿ ¼III 1 Ð÷ÂÛ1 1.1 Ñо¿µÄ±³¾°ÓëÒâÒå1 1.2 Ñо¿ÏÖ×´¼°ÄÚÈÝ2 1.3 ÂÛÎĽṹ3 2 Ī¶ûÎƵÄÀíÂÛ·ÖÎöÓëÑо¿4 2.1 Ī¶ûÎƵÄÒ»°ã±í´ïʽµÄÍƵ¼4 2.2 Ó¡Ë¢ÖйêÎƼÆË㹫ʽµÄÍƵ¼5 3 Ī¶ûÌõÎƵÄÓ°ÏìÒòËصķÖÎöÓëÑо¿7 3.1 Դͼ°¸µþºÏ½Ç¶ÈµÄ±ä»¯¶ÔĪ¶ûÎƵÄÓ°Ïì7 3.2 Դͼ°¸ÆµÂʵı仯¶ÔĪ¶ûÌõÎƵÄÓ°Ïì8 3.3 Դͼ°¸ÐÎ×´µÄ±ä»¯¶ÔĪ¶ûÎƵÄÓ°Ïì9 4 Ī¶ûÌõÎÆ·ÀαµÄ»ù±¾Í¼°¸Éè¼Æ11 4.1 ÀûÓÃĪ¶ûÌõÎƵķŴóÌØÐÔ½øÐзÀα11 4.2 ÀûÓÃÏ߶Î×éµÄ×éºÏÐγɵÄĪ¶ûÌõÎƽøÐзÀα13 4.3 ÀûÓÃͼ°¸±àÂë½øÐÐĪ¶ûÎÆ·Àα15 5 Ī¶ûÎÆ·Àα¼¼ÊõÓëÆäËû·Àα¼¼ÊõµÄ½áºÏ18 5.1 Ī¶ûÎÆ·Àα¼¼ÊõÓ뼤¹âÈ«Ï¢·Àα¼¼ÊõµÄ½áºÏ18 5.2 Ī¶ûÎÆ·Àα¼¼ÊõÓëÓÍÄ«·Àα¼¼ÊõµÄ½áºÏ19 5.3 Ī¶ûÎÆ·Àα¼¼ÊõÓë·ÀαλÖõĽáºÏ19 6 ×ܽáÓëÕ¹Íû20 6.1 ×ܽá20 6.2 ´´ÐÂÖ®´¦20 6.3 ²»×ãÖ®´¦20 6.4 Õ¹Íû21 Ö л22 ²Î¿¼ÎÄÏ×23 ÕªÒª£ºÔÚ¼ÙðαÁÓÉÌÆ·µÄѹÁ¦Ï£¬ÎÒÃÇһֱѰÇó×ÅеķÀα¼¼Êõ¡£Äª¶ûÌõÎÆÒÔÆä×ÔÉíµÄÓÅÔ½ÐÔ³öÏÖÔÚÎÒÃǵÄÊÓÏßÖУ¬³ÉΪÎÒÃÇËù¹Ø×¢µÄ½¹µã¡£±¾ÎÄÊ×ÏÈÀûÓü¸ºÎ·ÖÎö·¨¶ÔĪ¶ûÎÆÀíÂÛ½øÐзÖÎöºÍÑо¿£¬µÃ³öĪ¶ûÎƵIJúÉú»úÀíºÍÓ¡Ë¢ÖйêÎƵļÆË㹫ʽ¡£È»ºó£¬½áºÏĪ¶ûÌõÎÆ»ù´¡ÀíÂÛÓëʵ¼ù£¬µÃ³öÓ°ÏìĪ¶ûÌõÎƱ仯µÄ¼¸¸öÒòËØ£¬ÈçԴͼ°¸µþºÏ½Ç¶ÈµÄ±ä»¯¶ÔĪ¶ûÎƵÄÓ°Ï졢Դͼ°¸ÆµÂʵı仯¶ÔĪ¶ûÌõÎƵÄÓ°Ï졢Դͼ°¸ÐÎ×´µÄ±ä»¯¶ÔĪ¶ûÎƵÄÓ°ÏìºÍԴͼÏñ΢½á¹¹µÄ±ä»¯¶ÔĪ¶ûÎƵÄÓ°Ïì¡£×îºó£¬Ñо¿ÁËĪ¶ûÌõÎÆ·Àαͼ°¸µÄÉè¼Æ·½·¨£¬×ܽáÁËĪ¶ûÌõÎÆ·Àαͼ°¸Éè¼Æ·½·¨µÄÀàÐÍ£¬ÈçÀûÓÃĪ¶ûÌõÎƵķŴóÌØÐÔ½øÐзÀα¡¢ÀûÓÃÏ߶Î×éµÄ×éºÏÐγɵÄĪ¶ûÌõÎƽøÐзÀα¡¢ÀûÓÃԴͼ°¸±àÂë½øÐÐĪ¶ûÎÆ·Àᣬ²¢¸ø³öÁËÕ⼸ÖÖÀàÐ͵ÄЧ¹ûͼ¡£ ¹Ø¼ü×Ö£ºÄª¶ûÎÆ£»·Àα£»Ô´Í¼Ïñ£»µþºÏ£»Íø°å Abstract: Under the attack of counterfeit goods, we are always seeking new anti-counterfeiting technology .For its superior advantages, the moir¨¦ pattern came into our views and became the focus of the public. Firstly a deep analysis and research of the moir¨¦ pattern through Geometric analysis was provided in this article, in conjunction with the mechanism of its production as well as its equations in printing. After that , through integrating with the practice, the main factors that affects the moir¨¦ pattern was discovered, such as the fit angles , frequency, shape and microstructure of the original pictures. Finally, this article discussed the design principle of the moir¨¦ security pattern, and the different patterns about it were concluded with impression drawings. Such patterns for security mainly included zoom behavior, composing and coding. Keywords: moir¨¦£»anti-counterfeiting£»superimposed£»source pattern£»optical
¾­¹ÜÖ®¼Ò¡°Ñ§µÀ»á¡±Ð¡³ÌÐò
  • ɨÂë¼ÓÈë¡°¿¼ÑÐѧϰ±Ê¼ÇȺ¡±
ÍƼöÔĶÁ
¾­¼ÃѧÏà¹ØÎÄÕÂ
±êÇ©ÔÆ
¾­¹ÜÖ®¼Ò¾«²ÊÎÄÕÂÍƼö