CN106910156A - A kind of New chaotic image encryption method with plaintext association key stream generting machanism - Google Patents

A kind of New chaotic image encryption method with plaintext association key stream generting machanism Download PDF

Info

Publication number
CN106910156A
CN106910156A CN201710106798.1A CN201710106798A CN106910156A CN 106910156 A CN106910156 A CN 106910156A CN 201710106798 A CN201710106798 A CN 201710106798A CN 106910156 A CN106910156 A CN 106910156A
Authority
CN
China
Prior art keywords
pixel
plaintext
image
value
key stream
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710106798.1A
Other languages
Chinese (zh)
Other versions
CN106910156B (en
Inventor
付冲
郑宇�
何兴文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northeastern University China
Original Assignee
Northeastern University China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northeastern University China filed Critical Northeastern University China
Priority to CN201710106798.1A priority Critical patent/CN106910156B/en
Publication of CN106910156A publication Critical patent/CN106910156A/en
Application granted granted Critical
Publication of CN106910156B publication Critical patent/CN106910156B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention discloses a kind of New chaotic image encryption method with plaintext association key stream generting machanism.The method is realized based on " scramble-diffusion " framework.Scrambling algorithm is based on pixel exchanging mechanism, and the position for exchanging target is generated by logistic chaotic maps.Diffusion key stream is generated based on Generalized Lorenz like systems, and introduces a kind of key stream Quantification of elements mechanism related to plaintext.The mechanism enhances encryption system and resists the ability of known-plaintext and chosen -plain attact, while accelerating diffusion process, can reduce the diffusion wheel number needed for reaching preferable diffusion.With existing key stream compared with plaintext correlation technique, the present invention solves the problems, such as that chaos sequence cannot be reused in many wheel encryptions, therefore with lower computational load.Cryptanalysis result shows that encryption method proposed by the invention has good security.

Description

A kind of New chaotic image encryption method with plaintext association key stream generting machanism
Technical field
It is specifically a kind of to have and plaintext association key stream generation machine the present invention relates to New chaotic image encryption technical field The New chaotic image encryption method of system.
Background technology
In recent years, developing rapidly with multimedia and computer networking technology, digital picture is used as most intuitively information Carrier has carried out the important means of information interchange as people.Increasing digital picture is with Internet, wireless network Deng propagating in the Open Network for representative, the access of information and shared is very easy to.At the same time, business, finance, doctor Transmission of the image information of many Sensitive Domains such as treatment, scientific research, military affairs, politics under open network environment has huge peace Full hidden danger, often suffer from it is various it is potential it is artificial attack, including information illegal acquisition, distort with issue etc., to information Owner causes huge loss.Therefore image information is encrypted most important.
The image encryption that develops into of chaology provides a brand-new thinking in recent years.From the mid-90 in last century Since, many scholars have found to there is natural contact between Chaos and cryptography.Initial value and system that chaos system has The series of characteristics such as parameter extreme sensitivity, ergodic, track unpredictability and good pseudo-randomness, can be very The demand for building a good cryptographic system of security performance is met well.Based on the encryption system of chaotic dynamics construction, carry A good balance of security and encryption efficiency is supplied, it both has safety very high, and with soft and hardware reality Now simply, the characteristics of speed, it is particularly suitable for the digital picture larger to data volume and is encrypted, realizes the reality of digital picture When, safe transmission.At present, Chaotic Image Encryption Algorithm has turned into the mainstream technology and study hotspot of image information safety, has Great application potential.
1998, American scholar Jessica Fridrich proposed a kind of general image encryption framework, such as Fig. 1 first It is shown.The framework realizes a safety by " scramble " (confusion) and " diffusion " (diffusion) two nucleus modules Encryption system.In the scramble stage, the position of each pixel is disturbed in a kind of pseudorandom mode in image, but pixel value Generally remain constant.For diffusion process, in addition to changing the pixel value of each point, its another Core Feature is by each The influence of pixel diffuses to whole ciphertext graph picture, so as to ensure that encryption system can effectively resist differential attack.
Behind between more than ten years, countries in the world scholar based on the framework that Fridrich is proposed, to based on chaos Digital image encryption technology has been carried out research extensively and profoundly, achieves many achievements.At the same time, for technique Cryptanalysis work also flourishing launch.Scholars are successive in recent years finds in existing many schemes, for what is spread Key stream is only related to key, if that is, key does not make alterations, identical key stream is by for encrypting different plaintext images. Such method for designing is highly prone to selection in plain text or known plain text attack in the case where single-wheel is encrypted.For example, attacker can structure The plaintext image (such as complete white or all black picture) that a width is made up of special pixel value is made, the image is carried out using encryption system Encryption.One basic demand of contemporary cryptology is that cryptographic algorithm is in itself full disclosure.Attacker is based on to AES Grasp, compared with plaintext image by by ciphertext graph picture, can obtain used key stream.And be based on realizing that cost is examined Consider, in most practical applications, encryption system does not use typically the one-time pad mechanism, therefore cracking for key stream to mean The failure of encryption system.
The available strategy for solving the problem is that key stream element is related to plaintext.The method of current main flow is using in plain text The iterative process of chaos system is influenceed, for example, disturbing the track of chaos system using plaintext.Chaos encryption process general by taking turns more Complete, due to chaos iteration process and the correlation of plaintext, chaos sequence is no longer able to be reused by the cryptographic operation of different wheels. Because for the second wheel encryption, the intermediate ciphertext of first round encryption generation is equivalent to bright operated by the second wheel encryption Text, thus each round encryption be required for again iterative chaotic system cannot be completed to produce independent key stream, otherwise decryption behaviour Make.This reduces the operational efficiency of system to a certain extent.
To solve problem above, the inventive method devises a kind of key stream Quantification of elements mechanism related to plaintext.Should Method realizes that scrambling algorithm is based on pixel exchanging mechanism based on " scramble-diffusion ", exchanges the position of target by logistic Chaotic maps are generated.Diffusion key stream is generated based on Generalized Lorenz-like systems, during key stream Quantification of elements, by Plaintext pixel value determines the number of significant figures of the chaos state variable for participating in key stream Quantification of elements, it is achieved thereby that key stream It is related to plaintext image.Because key stream and plaintext related mechanism are introduced rather than iterative process in quantizing process, mix Ignorant sequence can be reused in many wheel encryptions, therefore improve the operational efficiency of encryption system.Additionally, key stream is related to plaintext The use of technology, the overall encryption round number required for can also effectively accelerating diffusion process, reduction to reach preferable diffusion effect.Password Learn analysis result and show that encryption method proposed by the invention has good security.
The content of the invention
This encryption system can carry out adding for different wheel numbers based on the realization of " scramble-diffusion " framework according to security requirement Close, i.e. encryption round number is more, and security is higher.This method is encrypted to image and is divided into two processes of scramble and diffusion, scramble Process is based on logistic mappings and produces one-dimensional pseudorandom coordinate position, and uses pixel exchanging mechanism;Diffusion process is using wide Adopted Lorenz-like mappings produce key stream.
Without loss of generality, if image to be encrypted is 24 true color images, its size is H × W.
Concrete methods of realizing of the invention is as follows:
Step 1:It is an one-dimension array, note by the sequential deployment that image pixel to be encrypted is pressed from left to right, from top to bottom It is imgData={ p0,p1,…,p3×H×W-1, wherein p0,p1,p2Represent first red, green, blue of point, three kinds of color components Pixel value, p3,p4,p5Second red, green, blue of point, three kinds of pixel values of color component are represented, by that analogy.
Step 2:Shuffle operation is implemented to plaintext image.Basic ideas are:Will be each in plaintext image array imgData Individual pixel (last pixel need not be exchanged), is exchanged with some pixel behind, the coordinate of exchangeable object by Logistic chaotic maps are produced.The state variable initial value x' of logistic mappings0(i.e. scramble key) is set by encipherer.Tool Body method is:
Step 2-1:One length L of generationpermThe pseudo-random sequence of=len (imgData) -1.Wherein, len (imgData) length of plaintext image array imgData is returned.Concrete operation method is:
Step 2-1-1:Pre- iteration logistic maps N0Secondary (N0It is constant, typically takes N0>=200), reflect logistic Penetrate well into chaos state.Logistic mappings are as shown in formula (1).
x'n+1=μ x'n(1-x'n),x'n∈[0,1],μ∈[0,4] (1)
Wherein μ and x' are respectively control parameter and state variable, x'nNth iteration value is represented, its initial value x'0As putting Random key, is set by encipherer.When μ ∈ [3.57,4], logistic mappings are in chaos state.Here μ is set to 4, is made It is operated in surjection state.It should be noted that:When μ=4, there is two " bad point " in mapping:0.5 and 0.75, shape can be made It is " fixed point " 0 and 0.75 that state variable is constant in successive iterations.If the situation occurs, the value of x' is done one it is small Disturbance, for example, increased or decrease 0.001.
Step 2-1-2:The iteration logistic mappings L on the basis of step 2-1-1permIt is secondary, each iteration is obtained Current state variables values x'n+1It is sequentially placed into one-dimension array logSeq={ ls0,ls1,…,ls3×H×W-2In.
Step 2-1-3:(2) quantify to logistic mapping status variable arrays logSeq according to the following formula, obtain puppet Random scrambling sequence perm={ r0,r1,…,r3×H×W-2}。
Wherein, pos (rn) function return rnPosition in logistic mapping status variable arrays perm, i.e. n;abs X () function returns to the absolute value of x;Sig (x, m) function returns to the preceding m significant digits of x;Mod (x, y) function returns to x divided by y Remainder.When realizing, all of state variable is defined as double-precision floating pointses (64 double types) to this encryption system, According to computer expression precision, m is set to 15.
From formula (2), rnSpan be [(n+1), (len (imgData) -1)], i.e.,:Plaintext image array The exchange target of each pixel (puppet) random selection from all pixels behind in imgData.
Step 2-2:By each pixel p in plaintext image array imgDatan(except last pixel) be located at rnThe pixel at placeIt is exchanged.
Step 3:Dispersion operation is implemented to the image after scramble.Specific method is:
Step 3-1:Generation length is LksThe diffusion key stream sequence of=len (imgData).Concrete operation method is:
Step 3-1-1:Pre- iteration Generalized Lorenz-like systems N0Secondary (N0It is constant, typically takes N0>=200), fill it Divide and enter chaos state.Generalized Lorenz-like the systematic mathematicals for being used are defined as follows:
Wherein x, y, z are state variable, and t represents the time, and a, b, c are systematic parameter.Work as a=-10, b=-4, during c=0, System is in chaos state.
Equation (3) is solved using Fourth order Runge-Kutta, its formula is:
Wherein
H is step-length, and 0.005, x is taken heren,yn,znNth iteration value is represented, its initial value (x0,y0,z0) as diffusion Key, is set by encipherer.
Step 3-1-2:To system (3) iteration H × W times on the basis of step 3-1-1.For each iteration, by 3 shapes The currency x of state variablen+1,yn+1,zn+1It is sequentially written in one-dimension array lozlSeq={ lls0,lls1,lls2,…, lls3×H×W-1}。
Step 3-1-3:(5) quantify to array lozlSeq according to the following formula, obtain key stream keyStm={ k0,k1, k2,…,k3×W×H-1}。
kn=mod [sig (abs (llsn),(α+mod(pn-1,β))),CL], (5)
Wherein, pn-1It is knCorresponding plaintext pixel pnPrevious point value, CLFor input picture quantized level (for 24 true color images, CL=256), and (α, β the ∈ N of (alpha+beta) ≡ 16+), so that (α+mod (pn-1, β))≤15, i.e.,:Dynamic Preceding α~15 significant digits of chaos state variable are selected for the quantization of key stream element.For first plaintext pixel, pn-1Initial value p0A value can be set to [0, C by enciphererL] between integer constant.
By formula (5) as can be seen that plaintext pixel value determines the chaos state variable for participating in key stream Quantification of elements Number of significant figures, therefore generation key stream with plaintext it is related.Explanation is needed exist for, parameter alpha adds with the selection pair of β The validity of close system has important influence.If α is too small, it will reduce the randomness of key stream;If β is too small, it will reduce The correlation of key stream and plaintext.In order to meet two performance requirements, in the present invention, α=9, β=7 are set.
Step 3-2:Each pixel in the image array imgData after scramble is implemented using key stream keyStm Encryption, encrypting formula is:
Wherein, cnIt is to pnThe ciphertext value that encryption is obtained, cn-1It is the ciphertext value of previous pixel, its initial value c-1Can One span is set to [0, C by enciphererL] integer constant,Represent step-by-step xor operation.
In the ciphering process to pixel, due to cn-1Introducing, the influence of each pixel can effectively be spread Into follow-up all of pixel.
Step 4:Many wheel encryptions can be carried out according to security level required, i.e., perform step 2 and step 3 repeatedly.Need exist for Illustrate, the chaos sequence that step 3-1-2 is generated can be reused in many wheel encryptions, thus the second wheel and it is follow-up plus In close wheel, step 3-1-1 and step 3-1-2 can be omitted.
Step 5:Pixel value in array imgData is rearranged to the matrix of a H row, 3 × W row, as encrypted image Output.
Formula (6) for decrypting are inversely transformed into:
It is an advantage of the invention that:
It is proposed by the invention with the New chaotic image encryption method with plaintext association key stream generting machanism, with following 2 advantages:
(1) it is to strengthen the ability that image encryption system resists known plain text attack and chosen -plain attact, existing encryption side Typically there is chaos sequence and can not be taken turns cryptographic operation institutes by different in case using iterative process and mechanism related in plain text, but the method The problem of reuse.The present invention can reuse in many wheel encryptions, improve and add in quantization stage introducing related mechanism, chaos sequence The operational efficiency of close system.
(2) key stream and the use of plaintext correlation technique, effectively accelerate diffusion process, reduce and reach preferable diffusion effect Overall encryption round number required for fruit.Diffusion test shows that encryption method proposed by the present invention takes turns dispersion operations by 2 Preferable NPCR and UACI indexs can be obtained, and for conventional encryption algorithm, it is necessary to 3 wheel dispersion operations can be only achieved.
Brief description of the drawings
Fig. 1 is the common architecture figure of existing New chaotic image encryption method.
Fig. 2 is the conventional image in a width international standard test image storehouse.
Fig. 3 is to the result figure after Fig. 2 scrambles.
Fig. 4 is encrypted image of the present invention to Fig. 2.
Fig. 5 a are the first width plaintext test charts of the invention.
Fig. 5 b are the second width test charts of the invention.
Fig. 5 c are the 3rd width test charts of the invention.
Fig. 5 d are the 4th width test charts of the invention.
Fig. 5 e are the 5th width test charts of the invention.
Fig. 5 f are the 6th width test charts of the invention.
Fig. 6 is the histogram picture of Fig. 5 a.
Fig. 7 is the ciphertext graph picture of Fig. 5 a.
Fig. 8 is Fig. 5 a adjacent pixel correlation visual testing result figures.
Fig. 9 is the key sensitivity testses result figure of Fig. 5 a.
Specific implementation method
With reference to Figure of description, the present invention is described in more detail.
Conventional image in one width international standard test image storehouse is encrypted (as shown in Figure 2).The image is 24 Coloured image, its width W=512, height H=512.
Specific AES is as follows:
Step 1:It is an one-dimension array, note by the sequential deployment that image pixel to be encrypted is pressed from left to right, from top to bottom It is imgData={ p0,p1,…,p3×H×W-1, wherein p0,p1,p2Represent first red, green, blue of point, three kinds of color components Pixel value, p3,p4,p5Second red, green, blue of point, three kinds of pixel values of color component are represented, by that analogy.
Here, plaintext image array imgData={ 39,46,66 ... }.
Step 2:Shuffle operation is implemented to plaintext image.Basic ideas are:Will be each in plaintext image array imgData Individual pixel (last pixel need not be exchanged), is exchanged with some pixel behind, the coordinate of exchangeable object by Logistic chaotic maps are produced.The state variable initial value x' of logistic mappings0(i.e. scramble key) is set by encipherer.Tool Body method is:
Step 2-1:One length L of generationpermThe pseudo-random sequence of=len (imgData) -1.Wherein, len (imgData) length of plaintext image array imgData is returned.
Here, len (imgData)=512 × 512=262144, Lp=262143.
Concrete operation method is:
Step 2-1-1:Pre- iteration logistic maps N0Secondary (N0It is constant, typically takes N0>=200), reflect logistic Penetrate well into chaos state.Logistic mappings are as shown in formula (8).
x'n+1=μ x'n(1-x'n),x'n∈[0,1],μ∈[0,4] (1)
Wherein μ and x' are respectively control parameter and state variable, x'nNth iteration value is represented, its initial value x'0As putting Random key, is set by encipherer.When μ ∈ [3.57,4], logistic mappings are in chaos state.Here μ is set to 4, is made It is operated in surjection state.It should be noted that:When μ=4, there is two " bad point " in mapping:0.5 and 0.75, shape can be made It is " fixed point " 0 and 0.75 that state variable is constant in successive iterations.If the situation occurs, the value of x' is done one it is small Disturbance, for example, increased or decrease 0.001.
Step 2-1-2:The iteration logistic mappings L on the basis of step 2-1-1permIt is secondary, each iteration is obtained Current state variables values x'n+1It is sequentially placed into one-dimension array logSeq={ ls0,ls1,…,ls3×H×W-2In.
Step 2-1-3:(9) quantify to logistic mapping status variable arrays logSeq according to the following formula, obtain puppet Random scrambling sequence perm={ r0,r1,…,r3×H×W-2}。
Wherein, pos (rn) function return rnPosition in logistic mapping status variable arrays perm, i.e. n;abs X () function returns to the absolute value of x;Sig (x, m) function returns to the preceding m significant digits of x;Mod (x, y) function returns to x divided by y Remainder.When realizing, all of state variable is defined as double-precision floating pointses (64 double types) to this encryption system, According to computer expression precision, m is set to 15.
From formula (4), rnSpan be [(n+1), (len (imgData) -1)], i.e.,:Plaintext image array The exchange target of each pixel (puppet) random selection from all elements behind in imgData.
Here, pseudorandom scrambling sequence perm={ 365827,233010,369102 ... }
Step 2-2:By each pixel p in plaintext image array imgDatan(except last pixel) be located at rnThe pixel at placeIt is exchanged.
Here, by p0With p365827Exchange, p1With p233010Exchange, p2With p369102Exchange, the exchange of remaining point is by that analogy.
Step 3:Dispersion operation is implemented to the image after scramble.Specific method is:
Step 3-1:Generation length is LksThe diffusion key stream sequence of=len (imgData).Concrete operation method is:
Step 3-1-1:Pre- iteration Generalized Lorenz-like systems N0Secondary (N0It is constant, typically takes N0>=200), fill it Divide and enter chaos state.Generalized Lorenz-like the systematic mathematicals for being used are defined as follows:
Wherein x, y, z are state variable, and t represents the time, and a, b, c are systematic parameter.Work as a=-10, b=-4, during c=0, System is in chaos state.
System is solved with fourth-order Runge-Kutta method, and its formula is:
Wherein
H is step-length, and 0.005, x is taken heren,yn,znNth iteration value is represented, its initial value (x0,y0,z0) as diffusion Key, is set by encipherer.
Here, the state variable initial value of Generalized Lorenz-like systems is taken as:
(x0=-11.905791, y0=3.126986, z0=15.913375).
Step 3-1-2:To system (3) iteration H × W times on the basis of step 3-1-1.For each iteration, by 3 shapes The currency x of state variablen+1,yn+1,zn+1It is sequentially written in one-dimension array lozlSeq={ lls0,lls1,lls2,…, lls3×H×W-1}。
Here, lozlSeq=6.59492129653895,2.96322961473550, 4.69550053819010,…}。
Step 3-1-3:(12) quantify to array lozlSeq according to the following formula, obtain key stream keyStm={ k0,k1, k2,…,k3×W×H-1}。
kn=mod [sig (abs (llsn),(α+mod(pn-1,β))),CL], (5)
Here, keyStm={ 13,174,250 ... }.
Wherein, pn-1It is knCorresponding plaintext pixel pnPrevious point value, CLFor input picture quantized level (for 24 true color images, CL=256), and (α, β the ∈ N of (alpha+beta) ≡ 16+), so that (α+mod (pn-1, β))≤15, i.e.,:Dynamic Preceding α~15 significant digits of chaos state variable are selected for the quantization of key stream element.For first plaintext pixel, pn-1Initial value p0A value can be set to [0, C by enciphererL] between integer constant.
By formula (5) as can be seen that plaintext pixel value determines the chaos state variable for participating in key stream Quantification of elements Number of significant figures, therefore generation key stream with plaintext it is related.Explanation is needed exist for, parameter alpha adds with the selection pair of β The validity of close system has important influence.If α is too small, it will reduce the randomness of key stream;If β is too small, it will reduce The correlation of key stream and plaintext.In order to meet two performance requirements, in the present invention, α=9, β=7 are set.
Step 3-2:Each pixel in the image array imgData after scramble is implemented using key stream keyStm Encryption, encrypting formula is:
Wherein cnIt is to pnThe ciphertext value that encryption is obtained, cn-1It is the ciphertext value of previous pixel, its initial value c-1Can be by Encipherer is set to a span [0, CL] integer constant,Represent step-by-step xor operation.In the ciphering process to pixel In, due to cn-1Introducing, the influence of each pixel can be diffused to effectively in follow-up all of pixel.
Here, c-1128 are set to, to the p after scramble0It is encrypted, the ciphertext value for obtaining is:
The encryption of rest of pixels color component is by that analogy.
Step 4:Many wheel encryptions can be carried out according to security level required, i.e., perform step 2 and step 3 repeatedly.Need exist for Illustrate, the chaos sequence that step 3-1-2 is generated can be reused in many wheel encryptions, thus the second wheel and it is follow-up plus In close wheel, step 3-1-1 and step 3-1-2 can be omitted.
Step 5:Pixel value in array imgData is rearranged to the matrix of a H row, 3 × W row, as encrypted image Output.
Formula (13) for decrypting are inversely transformed into:
Use above encryption method, taken turns through scramble one, spread one wheel after, the encrypted image for obtaining is as shown in Figure 4.Encryption system System security and efficiency test and analysis
Carry out comprehensive safety Analysis to system proposed by the invention to be analyzed with test and to result, to test Demonstrate,prove its validity and performance advantage.Specific test event includes:
1. broadcast algorithm performance evaluation;
2. anti-exhaustive attack (key space) analysis;
3. anti-statistical attack analyzes (including histogram, adjacent pixel correlation, comentropy);
4. key sensitivity testses.
Fully to show the versatility of the inventive method, the image for participating in test amounts to 6 width, is all tested from international standard Chosen in image library, image size is 512 × 512 pixels, form is 24 true color images.Fig. 5 lists this 6 width figure respectively Picture.
(1) broadcast algorithm performance evaluation
Good diffusion is to resist the effective guarantee of differential attack.Differential attack is the most normal in chosen -plain attact A kind of means.Its basic ideas is:Attacker uses identical key, and two width of encryption have extremely that fine difference is (for example One bit) plaintext image.The two width ciphertext graph pictures obtained by contrast, analyze used key stream or even key feelings Condition.Therefore, if a minor alteration for pixel value can effectively diffuse to view picture ciphertext graph picture, differential attack is invalid.
NPCR (number of pixels change rate) and UACI (unified average change Intensity it is) to weigh the two of image encryption system diffusion core index.Between NPCR is used to test two images Diversity factor.If I1(i, j, k) and I2(i, j, k) represents I respectively1With I2Two images be located at (i, j) point pixel value (k=1, 2,3 R, G, B component for representing pixel respectively).The definition of NPCR is:
Wherein H and W are respectively the height and width of image.The definition of D (i, j, k) is:
For two pure random images, its NPCR theoretical value:
For example, for 2 24 RGB random image (CL=256), its NPCR theoretical value 99.609%.
UACI is used to test the mean difference intensity between two images, and it is defined as:
For two pure random images, its UACI theoretical value:
For example, for 2 24 RGB random image (CL=256), its UACI theoretical value 33.464%.
The image encryption system good for a design, its NPCR should be as close possible to theoretical value with UACI indexs.
Image encryption method diffusion in the limiting case is obtained for test is proposed by the invention, following steps are taken: A width test image is chosen first, and builds the image of a width and its only one of which bit difference.The position of difference pixel, correspondence Color channel and+1/-1 operations, it is random selected.Test result to six width test images in Fig. 5 is as shown in table 1 below.
The test image initial value of table 1 and amended result
The NPCR test results of table 2
The UACI test results of table 3
Be can see from table 2,3, AES proposed by the invention obtains preferable NPCR by only needing 2 wheel dispersion operations With UACI indexs, and for conventional encryption algorithm, it is necessary to 2 wheel dispersion operations can be only achieved preferable NPCR indexs, need 3 wheel expand Scattered operation can be only achieved preferable UACI indexs.Therefore, the present invention carries algorithm with computational efficiency higher.
(2) anti-exhaustive attack (key space) analysis,
Key space refers to the total amount of the available different keys in encryption or decryption process.For an encryption for safety System, key space should be sufficiently large so that exhaustive attack (Brute Force) fails.Arithmetic speed according to active computer and Development trend in the coming years, Current Password educational circles effectively resists exhaustive attack by thinking key length more than 100.This The key of the proposed encryption system of invention is made up of two parts:Scramble key and diffusion key.Scramble key is by logistic The initial value of mapping determines, diffusion key is by three state variable initial value sets of Generalized Lorenz-like systems into this encryption When realizing, all state variables are defined as double-precision floating pointses (64 double types) to system.According to IEEE floating number marks Standard, the effective accuracy of the data type is 53, therefore the key length of encryption system proposed by the invention is 53 × 4= 212.
(3) anti-statistical attack analysis
(a) histogram analysis
Histogram intuitively describes the pixel value frequency distribution of piece image.The image encryption good for a design System, the ciphertext image pixel value frequency of its output should be obeyed and is uniformly distributed, and be attacked with hiding the redundancy in cleartext information and prevention The person of hitting observe it is any about in plain text and the information associated between ciphertext.Fig. 6 (a) is the first width figure plaintext image;B ()-(d) is respectively It is R, G, the B component of (a);E ()-(g) is respectively the histogram of (b)-(d);Fig. 7 (h) is the first width figure ciphertext graph picture;(i)- K () is respectively R, G, the B component of (h);L ()-(n) is respectively the histogram of (i)-(k).By Fig. 6,7 as can be seen that ciphertext graph The histogram of picture is uniformly distributed in good, does not possess any relevance between the histogram of plaintext image, therefore can effectively support Imperial frequency analysis.
(b) adjacent pixel correlation
The digital picture with clear and definite vision implication for one, each of which pixel is in level, vertical and diagonal Correlation very high is respectively provided between the pixel adjacent thereto of line direction.And the image encryption system good for a design, its Should not possess any correlation between the adjacent pixel of the ciphertext graph picture of output.It is close with it that Fig. 8 gives the first width figure plaintext image The horizontal direction adjacent pixel correlation visual testing result of three color components of texts and pictures picture.The test is by a pair adjacent pictures The pixel value of element is drawn on two dimensional surface in dots as horizontal, ordinate.From test result as can be seen that for bright Texts and pictures picture, the point of the overwhelming majority is all concentrated near diagonal, has extremely strong correlation between illustrating adjacent pixel.And for close Texts and pictures picture, is uniformly distributed on gray-scale plane a little, has not had any correlation between illustrating its adjacent pixel.
For further quantitative measurement and the adjacent pixel correlation for comparing plaintext image and ciphertext graph picture, figure is calculated below The coefficient correlation of picture, method is as follows:
(level, vertical, diagonal) is randomly selected first on certain adjacent direction of image (each color component) 5000 pairs of consecutive points.Then, image correlation coefficient r in this direction is calculated using formula (12)-(14)x,y
Wherein, xiAnd yiTwo pixel values of consecutive points, S respectively in imagenIt is the number of sampled point.
The phase of the adjacent pixel on the plaintext image of 6 width figures and three color components of its ciphertext graph picture is listed in table 4 Relation number.Be can see from table, the ciphertext graph picture that AES proposed by the invention is produced, its correlation in all directions Coefficient is all close to 0.
The coefficient correlation of the plaintext of table 4 and ciphertext graph picture
Comentropy is the important indicator for characterizing an information source randomness and unpredictability.Comentropy is generally by average information Measure to describe, that is, the average number of bits needed for expressing a code element in an information source, it is defined as:
Wherein S is represented by N number of different code element { s1,...,sNConstitute information source, P (si) it is code element siThe probability of appearance.By Formula (23) understands, for a pure random image of 256 grades of gray scales, the theoretical value H (S)=8 of its comentropy.Therefore for one The good image encryption system of individual design, the comentropy of the ciphertext graph picture of its output should be as closely as possible to 8.
Table 5 gives the comentropy of the plaintext image and corresponding ciphertext graph picture drawn using formula (23).Can from table To see, the comentropy of whole ciphertext graph pictures is all extremely close to ideal value 8, it means that what can be exported this encryption system is close Texts and pictures picture regards a random information source as.
The comentropy of the plaintext of table 5 and ciphertext graph picture
By the test in terms of three above, there is the image encryption system that the present invention builds good anti-statistics to attack Hit ability.
(4) key sensitivity testses
Key sensitiveness is a basic norm of encryption system design.The attribute specification has pole when application any two During the key encryption identical plaintext of small difference, entirely different ciphertext will be produced.Conversely, when attacker attempts using and encryption When the extremely close decruption key of key implements decryption, it is impossible to obtain any information related to plaintext.
In this test, a group encryption keys (x' is selected at random first0=0.625356071474465, x0=- 14.7498731304718,y0=4.95344592160937, z0=7.16150473769644) to the first width figure plaintext image Implement encryption, shown in the ciphertext graph picture such as Fig. 9 (a) for obtaining.Then the ciphertext graph picture for obtaining is entered using 5 decruption keys respectively Row decryption.In 5 decruption keys, only the 1st is identical with encryption key, and remaining 4 only in a state variable There is a difference for bit in upper and encryption key, as shown in table 6.Shown in the decrypted result for obtaining such as Fig. 9 (b)-(f).To it Its test image can obtain similar result, no longer be given here.
Table 6 is applied to the cipher key list of key sensitivity testses
From above test result, there is image encryption system proposed by the present invention good key sensitiveness to ensure.

Claims (1)

1. a kind of New chaotic image encryption method with plaintext association key stream generting machanism, it is characterised in that:To a width state Conventional image in the standard testing image storehouse of border is encrypted, and specific AES is as follows:
Step 1:The sequential deployment that image pixel to be encrypted is pressed from left to right, from top to bottom is an one-dimension array, is designated as ImgData={ p0,p1,…,p3×H×W-1, wherein p0,p1,p2Represent first red, green, blue of point, three kinds of pictures of color component Element value, p3,p4,p5Second red, green, blue of point, three kinds of pixel values of color component are represented, by that analogy;
Step 2:Shuffle operation is implemented to plaintext image;Basic ideas are:By each picture in plaintext image array imgData Element, last pixel need not be exchanged, and be exchanged with some pixel behind, and the coordinate of exchangeable object is by logistic Chaotic maps are produced;The state variable initial value x' of logistic mappings0(i.e. scramble key) is set by encipherer;
Specific method is:
Step 2-1:One length L of generationpermThe pseudo-random sequence of=len (imgData) -1;Wherein, len (imgData) is returned The length of plaintext image array imgData;Concrete operation method is:
Step 2-1-1:Pre- iteration logistic maps N0It is secondary, wherein N0It is constant, typically takes N0>=200, map logistic Well into chaos state;Logistic mappings are as shown in formula (1);
x'n+1=μ x'n(1-x'n),x'n∈[0,1],μ∈[0,4] (1)
Wherein μ and x' are respectively control parameter and state variable, x'nNth iteration value is represented, its initial value x'0It is close as scramble Key, is set by encipherer;When μ ∈ [3.57,4], logistic mappings are in chaos state;Here μ is set to 4, makes its work Make in surjection state;It should be noted that:When μ=4, there is two " bad point " in mapping:0.5 and 0.75, can become state It is " fixed point " 0 and 0.75 that amount is constant in successive iterations;If the situation occurs, one is done to the value of x' and small is disturbed It is dynamic, for example increased or decrease 0.001;
Step 2-1-2:The iteration logistic mappings L on the basis of step 2-1-1permCurrent shape secondary, that each iteration is obtained State variable value x'n+1It is sequentially placed into one-dimension array logSeq={ ls0,ls1,…,ls3×H×W-2In;
Step 2-1-3:(2) quantify to logistic mapping status variable arrays logSeq according to the following formula, obtain pseudorandom Scrambling sequence perm={ r0,r1,…,r3×H×W-2};
r n = p o s ( r n ) + ( 1 + mod s i g ( a b s ( ls n ) , m ) ( ( l e n ( i m g D a t a ) - 1 ) - p o s ( r n ) ) ) , - - - ( 2 )
Wherein, pos (rn) function return rnPosition in logistic mapping status variable arrays perm, i.e. n;Abs (x) letters Number returns to the absolute value of x;Sig (x, m) function returns to the preceding m significant digits of x;Mod (x, y) function returns to x divided by more than y Number;When realizing, all of state variable is defined as double-precision floating pointses to this encryption system, using 64 double types, According to computer expression precision, m is set to 15;
From formula (2), rnSpan be [(n+1), (len (imgData) -1)], i.e.,:Plaintext image array imgData In each pixel exchange target from all pixels behind (puppet) random selection;
Step 2-2:By each pixel p in plaintext image array imgDatan, except last pixel, and positioned at rnPlace PixelIt is exchanged;
Step 3:Dispersion operation is implemented to the image after scramble;Specific method is:
Step 3-1:Generation length is LksThe diffusion key stream sequence of=len (imgData);Concrete operation method is:
Step 3-1-1:Pre- iteration Generalized Lorenz-like systems N0It is secondary, wherein N0It is constant, typically takes N0>=200, fill it Divide and enter chaos state;Generalized Lorenz-like the systematic mathematicals for being used are defined as follows:
d x d t = - a b a + b x - y z + c d y d t = a y + x z d z d t = b z + x y , - - - ( 3 )
Wherein x, y, z are state variable, and t represents the time, and a, b, c are systematic parameter;Work as a=-10, b=-4, during c=0, system In chaos state;
Equation (3) is solved using Fourth order Runge-Kutta, its formula is:
x n + 1 = x n + ( h / 6 ) ( K 1 + 2 K 2 + 2 K 3 + K 4 ) y n + 1 = y n + ( h / 6 ) ( L 1 + 2 L 2 + 2 L 3 + L 4 ) z n + 1 = z n + ( h / 6 ) ( M 1 + 2 M 2 + 2 M 3 + M 4 ) , - - - ( 4 )
Wherein
K j = - a b a + b x n - y n z n + c L j = ay n + x n z n M j = bz n + x n y n , , ( j = 1 )
K j = - a b a + b ( x n + hK j - 1 / 2 ) - ( y n + hL j - 1 / 2 ) ( z n + hM j - 1 / 2 ) + c L j = a ( y n + hL j - 1 / 2 ) + ( x n + hK j - 1 / 2 ) ( z n + hM j - 1 / 2 ) M j = b ( z n + hM j - 1 / 2 ) + ( x n + hK j - 1 / 2 ) ( y n + hL j - 1 / 2 ) , , ( j = 2 , 3 )
K j = - a b a + b ( x n + hK j - 1 ) - ( y n + hL j - 1 ) ( z n + hM j - 1 ) + c L j = a ( y n + hL j - 1 ) + ( x n + hK j - 1 ) ( z n + hM j - 1 ) M j = b ( z n + hM j - 1 ) + ( x n + hK j - 1 ) ( y n + hL j - 1 ) , , ( j = 4 )
H is step-length, and 0.005, x is taken heren,yn,znNth iteration value is represented, its initial value (x0,y0,z0) as diffusion key, Set by encipherer;
Step 3-1-2:To system (3) iteration H × W times on the basis of step 3-1-1;For each iteration, 3 states are become The currency x of amountn+1,yn+1,zn+1It is sequentially written in one-dimension array lozlSeq={ lls0,lls1,lls2,…,lls3×H×W-1};
Step 3-1-3:(5) quantify to array lozlSeq according to the following formula, obtain key stream keyStm={ k0,k1,k2,…, k3×W×H-1};
kn=mod [sig (abs (llsn),(α+mod(pn-1,β))),CL], (5)
Wherein, pn-1It is knCorresponding plaintext pixel pnPrevious point value, CLIt is the quantized level of input picture (for 24 True color image, CL=256), and (α, β the ∈ N of (alpha+beta) ≡ 16+), so that (α+mod (pn-1, β))≤15, i.e.,:Dynamic select Preceding α~15 significant digits of chaos state variable are used for the quantization of key stream element;For first plaintext pixel, pn-1 Initial value p0A value can be set to [0, C by enciphererL] between integer constant;
By formula (5) as can be seen that plaintext pixel value determines having for the chaos state variable for participating in key stream Quantification of elements Effect digit, therefore the key stream of generation is related to plaintext;Explanation is needed exist for, parameter alpha is to encryption with the selection of β The validity of system has important influence;If α is too small, it will reduce the randomness of key stream;If β is too small, it will reduce key Flow the correlation with plaintext;In order to meet two performance requirements, in the present invention, α=9, β=7 are set;
Step 3-2:Each pixel in the image array imgData after scramble is implemented using key stream keyStm add Close, encryption formula is:
c n = k n ⊕ [ mod ( ( p n + k n ) , C L ) ] ⊕ c n - 1 - - - ( 6 )
Wherein, cnIt is to pnThe ciphertext value that encryption is obtained, cn-1It is the ciphertext value of previous pixel, its initial value c-1Can be by encrypting Person is set to a span [0, CL] integer constant,Represent step-by-step xor operation;
In the ciphering process to pixel, due to cn-1Introducing, after the influence of each pixel can be diffused to effectively In continuous all of pixel;
Step 4:Many wheel encryptions can be carried out according to security level required, i.e., perform step 2 and step 3 repeatedly;Need exist for explanation , the chaos sequence that step 3-1-2 is generated can be reused in many wheel encryptions, therefore be taken turns and follow-up encryption round second In, step 3-1-1 and step 3-1-2 can be omitted;
Step 5:Pixel value in array imgData is rearranged to the matrix of a H row, 3 × W row, is exported as encrypted image;
Formula (6) for decrypting are inversely transformed into:
p n = mod [ ( k n ⊕ c n ⊕ c n - 1 + C L - k n ) , C L ] . - - - ( 7 )
Use above encryption method, taken turns through scramble one, spread one wheel after, the encrypted image for obtaining.
CN201710106798.1A 2017-02-27 2017-02-27 A kind of New chaotic image encryption method with plaintext association key stream generting machanism Expired - Fee Related CN106910156B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710106798.1A CN106910156B (en) 2017-02-27 2017-02-27 A kind of New chaotic image encryption method with plaintext association key stream generting machanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710106798.1A CN106910156B (en) 2017-02-27 2017-02-27 A kind of New chaotic image encryption method with plaintext association key stream generting machanism

Publications (2)

Publication Number Publication Date
CN106910156A true CN106910156A (en) 2017-06-30
CN106910156B CN106910156B (en) 2019-07-19

Family

ID=59207920

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710106798.1A Expired - Fee Related CN106910156B (en) 2017-02-27 2017-02-27 A kind of New chaotic image encryption method with plaintext association key stream generting machanism

Country Status (1)

Country Link
CN (1) CN106910156B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107633175A (en) * 2017-09-14 2018-01-26 交通运输部水运科学研究所 A kind of fast colourful image encryption method based on chaos
CN107911208A (en) * 2017-12-28 2018-04-13 中国人民解放军陆军工程大学 A kind of method for generating chaos sequence and generator
CN108665964A (en) * 2018-05-14 2018-10-16 江西理工大学应用科学学院 A kind of medical image wavelet field real-time encryption and decryption algorithm based on multi-chaos system
CN108833733A (en) * 2018-06-04 2018-11-16 河南师范大学 A kind of decryption method of the resume image based on chaos S box
CN109873696A (en) * 2019-01-18 2019-06-11 天津大学 It is a kind of to be able to achieve the video encryption method for distorting frame alignment
CN110136045A (en) * 2019-04-18 2019-08-16 电子科技大学 A method of it is hidden and is restored based on the mutual scramble of two images
CN112541854A (en) * 2020-12-10 2021-03-23 东北大学 Selective encryption method based on target detection
CN114124344A (en) * 2021-11-03 2022-03-01 中国人民解放军陆军炮兵防空兵学院 Bit shift bitmap image encryption method based on Lorenz chaotic system
CN116781234A (en) * 2023-05-04 2023-09-19 深圳市海德盈富信息技术策划有限公司 Financial data sharing method and device based on pseudorandom disordered encryption
CN116886270A (en) * 2023-09-05 2023-10-13 山东科技大学 Three-band encryption method based on national encryption algorithm and double-chaotic system
CN117793267A (en) * 2024-02-23 2024-03-29 山东交通学院 Privacy protection method and system for passenger data

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103258312A (en) * 2013-03-20 2013-08-21 东北大学 Digital image encryption method with rapid key stream generative mechanism
CN104144343A (en) * 2014-07-11 2014-11-12 东北大学 Digital image compressing, encrypting and encoding combined method
CN104851071A (en) * 2015-05-21 2015-08-19 东北大学 Digital image encryption method based on three-dimensional chaotic system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103258312A (en) * 2013-03-20 2013-08-21 东北大学 Digital image encryption method with rapid key stream generative mechanism
CN104144343A (en) * 2014-07-11 2014-11-12 东北大学 Digital image compressing, encrypting and encoding combined method
CN104851071A (en) * 2015-05-21 2015-08-19 东北大学 Digital image encryption method based on three-dimensional chaotic system

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
ZHANG YONG: "Image Encryption with Logistic Map and Cheat Image", 《2011 3RD INTERNATIONAL CONFERENCE ON COMPUTER RESEARCH AND DEVELOPMENT》 *
付冲 等: "复杂系统混沌行为判别与混沌时间序列的分形建模", 《南京航空航天大学学报》 *
李杨 等: "一种基于复合混沌系统的数字图像加密算法", 《科技资讯》 *
洪联系 等: "扩散映射置乱与超混沌系统组合图像加密算法", 《计算机应用》 *
牛永洁 等: "基于混沌扩散加密的图像置乱隐藏算法", 《计算机与现代化》 *

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107633175A (en) * 2017-09-14 2018-01-26 交通运输部水运科学研究所 A kind of fast colourful image encryption method based on chaos
CN107911208A (en) * 2017-12-28 2018-04-13 中国人民解放军陆军工程大学 A kind of method for generating chaos sequence and generator
CN107911208B (en) * 2017-12-28 2019-01-11 中国人民解放军陆军工程大学 A kind of method for generating chaos sequence and generator
CN108665964A (en) * 2018-05-14 2018-10-16 江西理工大学应用科学学院 A kind of medical image wavelet field real-time encryption and decryption algorithm based on multi-chaos system
CN108665964B (en) * 2018-05-14 2022-01-25 江西理工大学应用科学学院 Medical image wavelet domain real-time encryption and decryption algorithm based on multiple chaotic systems
CN108833733A (en) * 2018-06-04 2018-11-16 河南师范大学 A kind of decryption method of the resume image based on chaos S box
CN108833733B (en) * 2018-06-04 2019-08-16 河南师范大学 A kind of decryption method of the resume image based on chaos S box
CN109873696A (en) * 2019-01-18 2019-06-11 天津大学 It is a kind of to be able to achieve the video encryption method for distorting frame alignment
CN110136045B (en) * 2019-04-18 2022-12-20 电子科技大学 Method for hiding and recovering based on mutual scrambling of two images
CN110136045A (en) * 2019-04-18 2019-08-16 电子科技大学 A method of it is hidden and is restored based on the mutual scramble of two images
CN112541854A (en) * 2020-12-10 2021-03-23 东北大学 Selective encryption method based on target detection
CN112541854B (en) * 2020-12-10 2023-09-29 东北大学 Selective encryption method based on target detection
CN114124344A (en) * 2021-11-03 2022-03-01 中国人民解放军陆军炮兵防空兵学院 Bit shift bitmap image encryption method based on Lorenz chaotic system
CN116781234A (en) * 2023-05-04 2023-09-19 深圳市海德盈富信息技术策划有限公司 Financial data sharing method and device based on pseudorandom disordered encryption
CN116781234B (en) * 2023-05-04 2024-02-02 深圳市海德盈富信息技术策划有限公司 Financial data sharing method and device based on pseudorandom disordered encryption
CN116886270A (en) * 2023-09-05 2023-10-13 山东科技大学 Three-band encryption method based on national encryption algorithm and double-chaotic system
CN116886270B (en) * 2023-09-05 2023-11-21 山东科技大学 Three-band encryption method based on national encryption algorithm and double-chaotic system
CN117793267A (en) * 2024-02-23 2024-03-29 山东交通学院 Privacy protection method and system for passenger data

Also Published As

Publication number Publication date
CN106910156B (en) 2019-07-19

Similar Documents

Publication Publication Date Title
CN106910156B (en) A kind of New chaotic image encryption method with plaintext association key stream generting machanism
Pareek et al. Image encryption using chaotic logistic map
CN110417539B (en) Color image encryption method for dynamic chaos and matrix convolution operation
Fu et al. A novel chaos-based bit-level permutation scheme for digital image encryption
CN101739695B (en) Three-dimensional Arnold mapping-based image grouping encryption method
CN104851071B (en) A kind of digital image encryption method based on three-dimensional chaotic system
CN104751403B (en) A kind of plaintext associated picture encryption method based on multi-chaos system
CN106778304A (en) A kind of quick New chaotic image encryption method with related scramble mechanism in plain text
Ismail et al. A digital image encryption algorithm based a composition of two chaotic logistic maps.
CN103167213B (en) Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system
CN107239708A (en) It is a kind of that the image encryption method converted with score field is mapped based on quantum chaos
Wang et al. Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps
CN107633175A (en) A kind of fast colourful image encryption method based on chaos
CN103491279B (en) The 4-neighborhood XOR image encryption method of Hyperchaotic Lorenz system
CN103258312B (en) There is the digital image encryption method of fast key stream generting machanism
RU2374770C1 (en) Method for steganographical cloaking of information
CN103530571A (en) Image encryption method based on sine mapping and Logistic chaos sequence
CN107220923B (en) Digital picture feedback encryption method based on image network
CN107633474B (en) A kind of chaos color image encrypting method with fast key stream generating process
CN103440613B (en) The color image encrypting method of hyperchaos Rossler system
CN103281504A (en) Chaotic image encryption method with double-direction diffusion mechanism
Wang et al. An image encryption scheme using a chaotic neural network and a network with multistable hyperchaos
CN105513002A (en) Novel image encryption method based on correlation between chaos and plaintext
CN106407824A (en) Image encryption method and device
CN106651735A (en) Chaos theory-based digital image parallel encryption method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190719

CF01 Termination of patent right due to non-payment of annual fee