Ī¶ûÌõÎÆ·Àαӡˢ¼¼Êõ̽ÌÖ_Ó¡Ë¢¹¤³ÌרҵÂÛÎÄ·¶ÎÄ
·¢²¼Ê±¼ä£º
2015-04-06
À´Ô´£º
ÈË´ó¾¼ÃÂÛ̳
Ó¡Ë¢¹¤³ÌרҵÂÛÎÄ·¶ÎÄ
Ŀ ¼
ÖÐÎÄÕªÒªI
Ó¢ÎÄÕªÒª.II
Ŀ ¼III
1 Ð÷ÂÛ1
1.1 Ñо¿µÄ±³¾°ÓëÒâÒå1
1.2 Ñо¿ÏÖ×´¼°ÄÚÈÝ2
1.3 ÂÛÎĽṹ3
2 Ī¶ûÎƵÄÀíÂÛ·ÖÎöÓëÑо¿4
2.1 Ī¶ûÎƵÄÒ»°ã±í´ïʽµÄÍƵ¼4
2.2 Ó¡Ë¢ÖйêÎƼÆË㹫ʽµÄÍƵ¼5
3 Ī¶ûÌõÎƵÄÓ°ÏìÒòËصķÖÎöÓëÑо¿7
3.1 Դͼ°¸µþºÏ½Ç¶ÈµÄ±ä»¯¶ÔĪ¶ûÎƵÄÓ°Ïì7
3.2 Դͼ°¸ÆµÂʵı仯¶ÔĪ¶ûÌõÎƵÄÓ°Ïì8
3.3 Դͼ°¸ÐÎ×´µÄ±ä»¯¶ÔĪ¶ûÎƵÄÓ°Ïì9
4 Ī¶ûÌõÎÆ·ÀαµÄ»ù±¾Í¼°¸Éè¼Æ11
4.1 ÀûÓÃĪ¶ûÌõÎƵķŴóÌØÐÔ½øÐзÀα11
4.2 ÀûÓÃÏ߶Î×éµÄ×éºÏÐγɵÄĪ¶ûÌõÎƽøÐзÀα13
4.3 ÀûÓÃͼ°¸±àÂë½øÐÐĪ¶ûÎÆ·Àα15
5 Ī¶ûÎÆ·Àα¼¼ÊõÓëÆäËû·Àα¼¼ÊõµÄ½áºÏ18
5.1 Ī¶ûÎÆ·Àα¼¼ÊõÓ뼤¹âÈ«Ï¢·Àα¼¼ÊõµÄ½áºÏ18
5.2 Ī¶ûÎÆ·Àα¼¼ÊõÓëÓÍÄ«·Àα¼¼ÊõµÄ½áºÏ19
5.3 Ī¶ûÎÆ·Àα¼¼ÊõÓë·ÀαλÖõĽáºÏ19
6 ×ܽáÓëÕ¹Íû20
6.1 ×ܽá20
6.2 ´´ÐÂÖ®´¦20
6.3 ²»×ãÖ®´¦20
6.4 Õ¹Íû21
Ö л22
²Î¿¼ÎÄÏ×23
ÕªÒª£ºÔÚ¼ÙðαÁÓÉÌÆ·µÄѹÁ¦Ï£¬ÎÒÃÇһֱѰÇó×ÅеķÀα¼¼Êõ¡£Äª¶ûÌõÎÆÒÔÆä×ÔÉíµÄÓÅÔ½ÐÔ³öÏÖÔÚÎÒÃǵÄÊÓÏßÖУ¬³ÉΪÎÒÃÇËù¹Ø×¢µÄ½¹µã¡£±¾ÎÄÊ×ÏÈÀûÓü¸ºÎ·ÖÎö·¨¶ÔĪ¶ûÎÆÀíÂÛ½øÐзÖÎöºÍÑо¿£¬µÃ³öĪ¶ûÎƵIJúÉú»úÀíºÍÓ¡Ë¢ÖйêÎƵļÆË㹫ʽ¡£È»ºó£¬½áºÏĪ¶ûÌõÎÆ»ù´¡ÀíÂÛÓëʵ¼ù£¬µÃ³öÓ°ÏìĪ¶ûÌõÎƱ仯µÄ¼¸¸öÒòËØ£¬ÈçԴͼ°¸µþºÏ½Ç¶ÈµÄ±ä»¯¶ÔĪ¶ûÎƵÄÓ°Ï졢Դͼ°¸ÆµÂʵı仯¶ÔĪ¶ûÌõÎƵÄÓ°Ï졢Դͼ°¸ÐÎ×´µÄ±ä»¯¶ÔĪ¶ûÎƵÄÓ°ÏìºÍԴͼÏñ΢½á¹¹µÄ±ä»¯¶ÔĪ¶ûÎƵÄÓ°Ïì¡£×îºó£¬Ñо¿ÁËĪ¶ûÌõÎÆ·Àαͼ°¸µÄÉè¼Æ·½·¨£¬×ܽáÁËĪ¶ûÌõÎÆ·Àαͼ°¸Éè¼Æ·½·¨µÄÀàÐÍ£¬ÈçÀûÓÃĪ¶ûÌõÎƵķŴóÌØÐÔ½øÐзÀα¡¢ÀûÓÃÏ߶Î×éµÄ×éºÏÐγɵÄĪ¶ûÌõÎƽøÐзÀα¡¢ÀûÓÃԴͼ°¸±àÂë½øÐÐĪ¶ûÎÆ·Àᣬ²¢¸ø³öÁËÕ⼸ÖÖÀàÐ͵ÄЧ¹ûͼ¡£
¹Ø¼ü×Ö£ºÄª¶ûÎÆ£»·Àα£»Ô´Í¼Ïñ£»µþºÏ£»Íø°å
Abstract: Under the attack of counterfeit goods, we are always seeking new anti-counterfeiting technology .For its superior advantages, the moir¨¦ pattern came into our views and became the focus of the public. Firstly a deep analysis and research of the moir¨¦ pattern through Geometric analysis was provided in this article, in conjunction with the mechanism of its production as well as its equations in printing. After that , through integrating with the practice, the main factors that affects the moir¨¦ pattern was discovered, such as the fit angles , frequency, shape and microstructure of the original pictures. Finally, this article discussed the design principle of the moir¨¦ security pattern, and the different patterns about it were concluded with impression drawings. Such patterns for security mainly included zoom behavior, composing and coding.
Keywords: moir¨¦£»anti-counterfeiting£»superimposed£»source pattern£»optical