Authentication Type

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 7398 Experts worldwide ranked by ideXlab platform

Bin Xing - One of the best experts on this subject based on the ideXlab platform.

  • a real time agro food Authentication and supervision system on a novel code for improving traceability credibility
    Food Control, 2016
    Co-Authors: Xinting Yang, Jianping Qian, Beilei Fan, Bin Xing
    Abstract:

    Abstract Counterfeiting products and abusing labels lead to less credibility for traceability system in China recently. Authentication and supervision agencies driven by government departments play an important role for ensuring the quality safety in the case of lacking the willingness and credit of enterprises. A complete Authentication and supervision flow framework was constructed based on an identification code (IdC) for authenticated origin base, which linked two actors of the agencies and the enterprises, and three subsystems of On-line Authentication Subsystem (OAS), Safety Production Management Client (SMC) and Mobile Supervision Application (MSA). IdC consisted of longitude and latitude of origin base as position code, production code and Authentication Type code. With a relative position partition method on 6 zones every 27° for China map and a coordination transformation algorithm, an absolute longitude and latitude value was converted into a relative position value and a zone mark value. IdC and packaging date code formed initial traceability code (TC). 8 digits packaging date code was reconstructed into 3 digits relative time value and 1 digit period mark according to a relative time period partition method with a period of 999d as time intervals and four periods form a cycle. Validation code was generated integrating the zone mark value, period mark value and Authentication Type code. Therefore, transformed 20 digits TC with the characters of shorter code length and stronger encryption was formed with IdC, relative time value and validation code. Three subsystems for different actors which provide the main function such as origin base registration, agency Authentication, QR code generation, data uploading and product verification, were developed. The system has been used in Tianjin city from 2012. 213 enterprises were audited through OAS and used SMC. Through investigating 8 supervision agency staffs, 30 origin base owners, and 50 customers, it is shown that the positive effects are approved by most of the investigators and two negative effects for enhancing the costs and doubting the Authentication reliability are laid by 17 enterprises and 12 customers. Furthermore, 4 typical cases for counterfeiting and abusing the labels were exampled and can be solved to a certain extent with the system. However, except for the technology itself, a management measures fitting the supervision flow and system need to draft in order to improve the system application well in the future.

Şenol Ahmet - One of the best experts on this subject based on the ideXlab platform.

  • RESILIENT IMAGE WATERMARKING: BLOCK-BASED IMAGE WATERMARKING ANALYSIS, USING VECTOR IMAGE AS WATERMARK AND IMPROVING Authentication PURPOSE WATERMARKING
    'Canakkale Onsekiz Mart Universitesi Fen Bilimleri Enstitusu Dergisi', 2018
    Co-Authors: Şenol Ahmet
    Abstract:

    As we live in a digital World, protecting our digital property and to be sure that the data we receive is the same as original has become more important. Digital watermarking emerged as a discipline to ensure copyright ownership and authenticating digital data. The image is transformed into another domain, watermarked in this new domain and restransformed into pixel domain by applying inverse transform in most of the copyright protection and Authentication Type of watermarking algorithms. In the scope of this thesis, it is searched if it makes a difference between transforming an image to the new domain as a whole or dividing the image into blocks and transforming each block to new domain separately. It is examined if using block-based approach affects watermarking performance for different block sizes for DWT-based watermarking. It is revealed by this study that dividing the image into blocks beforehand, transforming each block to new domain separately, and then watermarking the blocks improves robustness drastically. It is also revealed by this study that as block size decreased, robustness increased with the cost of extra cpu time needed. In most of the previous image watermarking studies, an image digest, a pseudo random number sequence, a binary image logo etc is inserted as a watermark. To the best of our knowledge a vector image is not used as a watermark before. A vector image is different from a binary image in that it does not consist of pixels but consists of points, circles, polygons, lines, beziers etc. All those items have their own attributes. For example, a circle has center point coordinates (x,y), diameter, line color, line width etc. Vector images’ quality does not suffer from scaling operations. In this thesis a vector image is embedded as a watermark in a robust way in DWT domain that survived jpeg compression, histogram equilization, 3x3 low-pass filter except cropping and rotation attacks. The Type of watermarking that pursues proving the image’s geunineness is image Authentication Type of watermarking. Fragile Type of Authentication purpose image watermarking is sensitive to every Type and amount of change and does not discriminate the changes as ill purposed or innocent. In the scope of this thesis, a new fragile DWT-based Authentication Type of image watermarking algorithm is introduced. The method detects the changed region of the image successfully and it is easy to implement. The ideal Authentication Type of watermarking is expected to be robust against innocent Type of changes applied to the image and to be fragile against ill-purpose changes performed on the image. Lossy image compression applied to the image, scaling, sharpening, blurring, histogram equilization that affect all of the image can be given as examples of innocent Type of operations to be performed on an image. Removing an existing person from an image, changing one’s face, changing a car’s licence plate, perform “man in the middle attack” can be given examples for the ill-purpose operations that can be performed on an image. The semi-fragile Authentication watermarking method will approach the ideal form as the Type of ill-purpose attacks it detects increases and authenticates the images that are subjected to innocent operations. In the scope of this thesis, a new semi-fragile Authentication image watermarking method is built up that uses DCT and DWT domains, that embeds two watermarks to the image for copyright protection and Authentication purposes. The built-up method authenticates %75 quality jpeg compressed images and in addition to the existing methods, authenticates images that are subjected to histogram equilization, intensity adjustment and gamma correction. The new method is also immune to collage attacks.Sayfa ÖZET.……………………………………………………………………………………....i ABSTRACT………………………………………………………………………………..iv TEŞEKKÜR….…………………………………………………………………………...vii İÇİNDEKİLER….………………………………………………………………………...viii TABLOLAR….…………………………………………………………………………….xi ŞEKİLLER….………………………………………………………………………….….xii KISALTMALAR….…………………………………………………..……………….….xvi 1. GİRİŞ….………………………………………………………………………….….. 1 1.1 Problem….………………………………………………………………………….…8 1.2 Amaç….………………………………………………………………………….… 11 1.3 Özgünlük….……………………………………………………………………….…13 1.4 Tez Organizasyonu…………………………………………………………….…15 2. ALAN BİLGİSİ VE ALAN YAZIN ÖZETİ….…………………………………….…17 2.1 Damgalama, Steganografi ve Kriptografi….……………………………..….…19 2.2 Damgalamanın Kullanım Alanları….……………………………………..….…22 2.2.1 Sahipliğin İspatı, telif haklarının korunması….…………………….……….…23 2.2.1.1 İlgili Mevzuat….…………………………………………………………….…23 2.2.1.2 Sahipliğin İspatının Damgalama ile Yapılması.…………………….……….24 2.2.2 Reklam Yayını Takibi….…………………………………………………………….25 2.2.3 Parmak İzi takibi: ….……………………………………………………………. 27 2.2.4 Doğruluğunu Kanıtlama….…………………………… ………….28 2.2.5 Meta Veri Saklama….…………………………………………………………….30 2.3 Damgalamada Kullanılan Dönüşüm Uzayları…………………….……….31 2.3.1 Ayrık Kosinüs Dönüşümü (Discrete Cosine Transform: DCT) …………………31 2.3.2 Fourier Dönüşümü, Hızlı Fourier Dönüşümü (Fast Fourier Transform: FFT) 31 2.3.3 Ayrık Dalgacık Dönüşümü (Discrete Wavelet Transform : DWT) ……………33 2.3.4 Tekil Değer Ayrışması (Singular Value Decomposition SVD) …………………35 2.3.5 LU Ayrışması…………………………………………………………………………36 2.4 Frekans Uzayında Yapılan Çalışmalar……………………………………………36 2.5 Kör ve Kör Olmayan Damgalama…………………………………………………38 2.6 Kullanılan Damga Çeşitleri………………………………………………………39 2.7 Damgalamanın Başarı Kriterleri…………………………………………………40 2.7.1 Damgalı Resmin Orijinal Resme Benzerliği (Fidelity), Ayırtedilmezliği…………40 2.7.2 Çıkarılan Damganın Orijinal Damgaya Benzerliği…………………42 2.7.2.1 Similarity Ratio SR değeri………………………………………………………43 2.7.2.2 Normalized SR (NSR) ………………………………………………………43 2.7.2.3 Doğrusal Korelasyon (Linear Correlation) ……………………………………43 2.7.2.4 Normalize Korelasyon (Normalized Correlation) …………………………43 2.7.2.5 Korelasyon Katsayısı (Correlation Coefficient) ……………………………44 2.7.3 Saldırılara Karşı Gürbüzlük (Robustness) ……………………………………44 2.8 Damganın Ortadan Kaldırılmasına Yönelik Saldırılar…………………46 2.8.1 Kötü Maksatlı Olma İhtimali Az Olan Değişiklikler(Daha yaygın) ……………46 2.8.2 Maksatlı Olma İhtimali Orta Seviye Olan Değişiklikler…………………47 2.8.3 Maksatlı Yapılan Değişiklikler……………………………………47 3. DAMGALAMA YÖNTEMİ………………………………………………………48 3.1 DWT Uzayında Bloklu Damgalama ve Blok Büyüklüğü Analizi…………………48 3.1.1 Bloklu Damgalama………………………………………………………51 3.1.1.1 Damga Ekleme Algoritması: ………………………………………………51 3.1.1.2 Damga Çıkartma Algoritması: ……………………………………………52 3.1.2 Deneyler………………………………………………………53 3.1.3 Katkılar………………………………………………………64 3.2 Ana Resme Damga Olarak Vektör Resmi Damgalamak…………………65 3.2.1 SVG Vektör Resmi Damgası………………………………………………………66 3.2.2 Damgalama Ön İşlemi………………………………………………………67 3.2.3 Damgalama İşlemi………………………………………………………68 3.2.4 Deneyler ve Önerilen Vektör Damga Başarı Metriği…………………71 3.2.5 Katkılar………………………………………………………74 3.3 Doğrulama Amaçlı Damgalama……………………………………75 3.3.1 Doğrulama Amaçlı Damgalama Genel Bilgiler……………………………………75 3.3.1.1 Tam Kırılgan Damgalama………………………………………………………78 3.3.1.2 Yarı Kırılgan Damgalama………………………………………………………79 3.3.1.3 Önceki Çalışmalar………………………………………………………79 3.3.2 Doğrulama Damgalama Algoritması KırılganDoğKenarTopOrtDWT………86 3.3.2.1 Damga Ekleme Algoritması………………………………………………………86 3.3.2.2 Doğrulama Algoritması………………………………………………………87 3.3.2.3 Deneyler…………………………………………………………………………89 3.3.2.4 Benzer Çalışmalar ile Kıyaslama…………………………………………95 3.3.2.5 Katkılar…………………………………………………………………………98 3.3.3 Doğrulama Damgalama Algoritması YarKırDoğDCTDWTOrtaKenar 99 3.3.3.1 Damga Ekleme Algoritması……………………………………………101 3.3.3.2 Doğrulama Algoritması………………………………………………………105 3.3.3.3 Karıştırma ve Eşleştirme Algoritması……………………………………106 3.3.3.4 Deneyler…………………………………………………………………………107 3.3.3.5 Benzer Çalışmalar ile Kıyaslama……………………………………113 3.3.3.6 Katkılar…………………………………………………………………………116 4. SONUÇ VE KATKILAR………………………………………………………117 ŞEKİLLER….…………………………………………………………………………….123 ÖZGEÇMİŞ…………………………………………………………………………129Dijital bir çağda yaşamakla beraber verilerin korunması, başkası tarafından sahiplenilmesinin engellenmesi, dosyanın orijinali ile aynı olduğunun, bize gönderilen dosyanın iletim ortamında değiştirilmediğinin teyidi daha önem kazanmıştır. Dijital ortamdaki resimlerin ve videoların telif haklarının korunması, değişikliğe uğrayıp uğramadığının kontrol edilebilmesi amacıyla dijital damgalama tekniği geliştirilmiştir. Sahiplik ispatı veya orijinalliğin teyidi amacıyla yapılan damgalama işlemlerinde resim bir bütün olarak ele alınıp başka bir uzaya çevrilmekte, yeni uzayda damgalanmakta, uzay dönüşümünün ters işlemi ile tekrar piksel uzayına dönülüp damgalı resim elde edilmektedir. Bu tez kapsamında yapılan bir çalışmada, resmi bütün olarak diğer uzaya alma ile bloklara ayırdıktan sonra diğer uzaya alma arasında ne gibi farklar olduğu, blok büyüklüğünün dayanıklı damgalamaya etkisi araştırılmış ve ortaya konmuştur. Buna göre, blok tabanlı çalışmaların dayanıklı damgalamada daha başarılı sonuçlar verdiği ancak işlemci kaynağını daha fazla kullandığı ve damga ekleme ve çıkarma işleminin daha uzun sürdüğü tespit edilmiştir. Mevcut çalışmalar incelendiğinde damgalama işlemlerinde damga olarak resmin özet değeri, sözde rastgele sayı dizisi, siyah beyaz resim logosu v.b. kullanıldığı görülmektedir. Damgalama işleminde vektör resmi formatındaki firma logosunun damga olarak uygulanması bilindiği kadarı ile bu çalışmadan önce denenmemiştir. Vektör resmi, siyah beyaz resimden farklı olarak, piksel değerlerinden oluşan bir matris değil, nokta, çizgi, bezir eğrisi, poligon gibi geometrik şekillerin pozisyon ve özelliklerinin girildiği dosya biçimidir. Vektör resimlerinin özelliği, resmin büyüme ve küçültülmesinde kalite kaybına uğramamasıdır. Bu tez çalışması kapsamında yapılan çalışmada, ana resme damga olarak vektör resmi dayanıklı damgalama yaklaşımı ile DWT uzayında damgalanmış, kesme ve döndürme saldırıları hariç kayıplı sıkıştırma, histogram eşitleme, 3x3 alçak geçirgen filtreleme gibi birçok saldırıya karşı dayanıklı olarak damgalama yapılabildiği gösterilmiştir. Resmin orijinalliğini ispatlamak için yapılan damgalama işlemlerine doğrulama amaçlı damgalama denir. Resme yapılan her türlü değişikliğe karşı hassas olan, yapılan değişikliği masum veya kötü niyetli olarak ayırmayıp doğrulama işleminin neticesini olumsuz olarak neticelendiren damgalama işlemlerine kırılgan damgalama işlemleri denir. Bu tezde DWT uzayında damgalama yapan kırılgan bir doğrulama yöntemi geliştirilmiştir. Söz konusu yöntem, resimde değişikliğe uğramış bölümleri başarılı bir şekilde ortaya çıkarması, uygulama kolaylığı getirmesi ile öne çıkmaktadır. İdeal doğrulama damgalama algoritması masum resim işleme operasyonlarına karşı dayanıklı, kötü niyetli resim hilelerine karşı kırılgan olmalıdır. Resmin kayıplı sıkıştırmaya uğraması, büyüklüğünün değiştirilmesi, keskinleştirme veya alçak geçirgen filtreye maruz kalması, histogram eşitleme v.b. işlemler masum işlemlere örnek verilebilir. Resimdeki bir kişinin resimden çıkarılması, kişinin yüzünün değişmesi, aracın plakasının değiştirilmesi, araya girme saldırı yöntemi ile gönderilen asıl resmin yerine başka resim gönderilmesi v.b. işlemler kötü niyetli işlemlere örnek verilebilir. Yarı kırılgan damgalama yöntemleri masum resim işlemlerine uğramış resimleri doğrulayacak, kötü niyetli olan işlemleri ortaya çıkaracak olan ideal yarı kırılgan yönteme yaklaştığı ölçüde başarılı sayılır. Tez çalışması kapsamında DWT ve DCT uzayını kullanan, doğrulama ve telif hakkı damgalama amaçlarının ikisini de gerçekleştiren yarı kırılgan bir damgalama yöntemi geliştirilmiştir. Geliştirilen yarı kırılgan yöntem, kötü niyetli değişiklikleri başarılı şekilde tespit etmekle beraber, kayıplı %75 kalitede jpeg sıkıştırmasına maruz kalmış resmi başarılı olarak doğrulamakta, diğer mevcut yarı-kırılgan yöntemlerden üstün olarak, histogram eşitleme, şiddet ayarlama, gamma düzeltmesi işlemlerine maruz kalmış resimleri de doğrulayabilmektedir. Geliştirilen yöntem, kolaj saldırılarına karşı da dayanıklıdır

Xinting Yang - One of the best experts on this subject based on the ideXlab platform.

  • a real time agro food Authentication and supervision system on a novel code for improving traceability credibility
    Food Control, 2016
    Co-Authors: Xinting Yang, Jianping Qian, Beilei Fan, Bin Xing
    Abstract:

    Abstract Counterfeiting products and abusing labels lead to less credibility for traceability system in China recently. Authentication and supervision agencies driven by government departments play an important role for ensuring the quality safety in the case of lacking the willingness and credit of enterprises. A complete Authentication and supervision flow framework was constructed based on an identification code (IdC) for authenticated origin base, which linked two actors of the agencies and the enterprises, and three subsystems of On-line Authentication Subsystem (OAS), Safety Production Management Client (SMC) and Mobile Supervision Application (MSA). IdC consisted of longitude and latitude of origin base as position code, production code and Authentication Type code. With a relative position partition method on 6 zones every 27° for China map and a coordination transformation algorithm, an absolute longitude and latitude value was converted into a relative position value and a zone mark value. IdC and packaging date code formed initial traceability code (TC). 8 digits packaging date code was reconstructed into 3 digits relative time value and 1 digit period mark according to a relative time period partition method with a period of 999d as time intervals and four periods form a cycle. Validation code was generated integrating the zone mark value, period mark value and Authentication Type code. Therefore, transformed 20 digits TC with the characters of shorter code length and stronger encryption was formed with IdC, relative time value and validation code. Three subsystems for different actors which provide the main function such as origin base registration, agency Authentication, QR code generation, data uploading and product verification, were developed. The system has been used in Tianjin city from 2012. 213 enterprises were audited through OAS and used SMC. Through investigating 8 supervision agency staffs, 30 origin base owners, and 50 customers, it is shown that the positive effects are approved by most of the investigators and two negative effects for enhancing the costs and doubting the Authentication reliability are laid by 17 enterprises and 12 customers. Furthermore, 4 typical cases for counterfeiting and abusing the labels were exampled and can be solved to a certain extent with the system. However, except for the technology itself, a management measures fitting the supervision flow and system need to draft in order to improve the system application well in the future.

Cotelo Nieto Alberto - One of the best experts on this subject based on the ideXlab platform.

  • Desarrollo de una aplicación integrada en una ciudad inteligente basada en una plataforma de interoperabilidad semántica
    E.T.S.I y Sistemas de Telecomunicación (UPM), 2018
    Co-Authors: Cotelo Nieto Alberto
    Abstract:

    La aparición del concepto de ciudad inteligente es cada vez más frecuente en la actualidad, debido a su carácter tecnológico y revolucionario y a las ventajas ofrecidas por esta tendencia, la cual ha propiciado la aparición de un número elevado de servicios, innovaciones y soluciones tecnológicas en el mercado por parte diferentes fabricantes y organismos. Teniendo en cuenta la amplia diversidad de soluciones, se hace necesaria la implantación e integración de la interoperabilidad semántica entre las mismas, con el objetivo de garantizar el funcionamiento adecuado de los subsistemas y servicios desplegados en la ciudad de forma independiente al fabricante, la tecnología, el modo de operación y el tipo de datos utilizado. El proyecto de fin de grado consiste en la implementación de una aplicación integrada en una plataforma ya existente utilizada para la provisión de subsistemas y servicios similares a los que podrían encontrarse en un ciudad inteligente real, garantizando así la interoperabilidad semántica entre los mismos y llevando a cabo las ampliaciones necesarias sobre dicha plataforma para lograr el funcionamiento adecuado de la aplicación desarrollada. La plataforma a utilizar dispone de una ontología integrada, la cual define la estructura, los parámetros y el formato que deben cumplir los subsistemas y servicios a desplegar. Una de las ampliaciones necesarias, puesto que la plataforma a utilizar no dispone de esta funcionalidad de forma nativa, consiste en la implementación de una base de datos local destinada al almacenamiento de la información correspondiente a los servicios disponibles. Para la consecución de este objetivo, se realizará un análisis sobre las soluciones existentes relacionadas con el almacenamiento de datos, llevando a cabo la implementación de la solución determinada y su integración con los componentes funcionales desplegados previamente en la plataforma. La aplicación implementada será accesible desde un navegador web y desde un dispositivo móvil Android a través de una aplicación instalada en el mismo. El acceso a la misma se realizará mediante autenticación de tipo usuario/contraseña, lo cual implica la incorporación de la gestión de cuentas de usuario a la solución desarrollada, ofreciendo de esta forma la posibilidad de creación y eliminación de cuentas asociadas a los usuarios de la aplicación. Como caso de uso del proyecto, se plantea un escenario en el cuál un usuario desea desplazarse entre 2 puntos de la ciudad de Madrid, recibiendo información sobre el nivel de polen, contaminación en el aire, congestión de tráfico y las incidencias en la vía pública ubicadas en la ruta seleccionada. Teniendo en consideración el escenario planteado, los subsistemas y servicios registrados en la plataforma corresponderán a la obtención y provisión de las medidas relativas a la información mencionada, la cual se mostrará al usuario directamente a través de la aplicación, de una forma sencilla e intuitiva. Los servicios disponibles en la plataforma utilizarán datos obtenidos de fuentes abiertas correspondientes a los valores de las medidas según el tipo de servicio y de acuerdo con el caso de uso planteado, los cuales serán almacenados en la base de datos local desplegada. A través de la obtención y utilización de estos datos se pretende simular la información recogida por los sensores desplegados en una ciudad inteligente, con el objetivo de aportar un enfoque más realista tanto al proyecto como al escenario planteado. Abstract: Nowadays, the appearance of the smart city concept is more and more frequent, due to our technological al revolutionary character and the advantages provided by this tendency, which had promoted the appearance of a big amount of services, innovations and technological solutions in the market by different manufacturing companies and organizations. Taking into account the big diversity of solutions, it becomes necessary the integration of the semantic interoperability between them, in order to guarantee the good operation of the subsystems and services deployed in the city independently of the manufacturer, the technology, the operation mode and the used data Type. The project consists on the implementation of an application integrated on an existing platform used to provide subsystems and services similar to which could find in a real smart city, guaranteeing the semantic interoperability between them and carrying out the necessary extensions over this platform in order to reach the suitable operation of the developed application. The platform to use dispose of a integrated ontology, which define the structure, the parameters and the format which must use the deployed subsystems and services. One of the necessary extensions, because the platform to use does not have it, consists on the implementation of a local database used to store the information about the available services. In order to reach this target, it will be analysed the existing solutions related to the data storage, carrying out the implementation of the definitive solution and its integration with the functional components previously deployed in the platform. The implemented application will be accessible by a web browser and by a mobile Android device through an application installed on it. The access will be realized through user/password Authentication Type, it imply the incorporation of a user account management to the developed solution, providing the functionality of create and remove account associated to the users of the application. As case of use of the project, it is posed an scenario in which an user wants to move between 2 points of the city of Madrid, receiving information about the pollen level, the air pollution level, the traffic congestion level and the incidences in the public road located in the selected route. Taking into account the posed scenario, the subsystems and services registered in the platform will correspond to the obtaining and supply of the values related to the previously mentioned information, which will be displayed to the user directly through the application, in a simple and intuitive way. The available services in the platform will use the obtained data from open sources, corresponding to the values of the measures according to the Type of service and the posed case of use, which will be stored in the local database deployed. Through the extraction and use of these data, the intention is to simulate the real information acquired from the sensors deployed in the smart city, in order to provide a realistic focus to the project and posed scenario

Jianping Qian - One of the best experts on this subject based on the ideXlab platform.

  • a real time agro food Authentication and supervision system on a novel code for improving traceability credibility
    Food Control, 2016
    Co-Authors: Xinting Yang, Jianping Qian, Beilei Fan, Bin Xing
    Abstract:

    Abstract Counterfeiting products and abusing labels lead to less credibility for traceability system in China recently. Authentication and supervision agencies driven by government departments play an important role for ensuring the quality safety in the case of lacking the willingness and credit of enterprises. A complete Authentication and supervision flow framework was constructed based on an identification code (IdC) for authenticated origin base, which linked two actors of the agencies and the enterprises, and three subsystems of On-line Authentication Subsystem (OAS), Safety Production Management Client (SMC) and Mobile Supervision Application (MSA). IdC consisted of longitude and latitude of origin base as position code, production code and Authentication Type code. With a relative position partition method on 6 zones every 27° for China map and a coordination transformation algorithm, an absolute longitude and latitude value was converted into a relative position value and a zone mark value. IdC and packaging date code formed initial traceability code (TC). 8 digits packaging date code was reconstructed into 3 digits relative time value and 1 digit period mark according to a relative time period partition method with a period of 999d as time intervals and four periods form a cycle. Validation code was generated integrating the zone mark value, period mark value and Authentication Type code. Therefore, transformed 20 digits TC with the characters of shorter code length and stronger encryption was formed with IdC, relative time value and validation code. Three subsystems for different actors which provide the main function such as origin base registration, agency Authentication, QR code generation, data uploading and product verification, were developed. The system has been used in Tianjin city from 2012. 213 enterprises were audited through OAS and used SMC. Through investigating 8 supervision agency staffs, 30 origin base owners, and 50 customers, it is shown that the positive effects are approved by most of the investigators and two negative effects for enhancing the costs and doubting the Authentication reliability are laid by 17 enterprises and 12 customers. Furthermore, 4 typical cases for counterfeiting and abusing the labels were exampled and can be solved to a certain extent with the system. However, except for the technology itself, a management measures fitting the supervision flow and system need to draft in order to improve the system application well in the future.