CN115001666A - Image local encryption algorithm based on bit plane template XOR - Google Patents
Image local encryption algorithm based on bit plane template XOR Download PDFInfo
- Publication number
- CN115001666A CN115001666A CN202210929803.XA CN202210929803A CN115001666A CN 115001666 A CN115001666 A CN 115001666A CN 202210929803 A CN202210929803 A CN 202210929803A CN 115001666 A CN115001666 A CN 115001666A
- Authority
- CN
- China
- Prior art keywords
- matrix
- image
- template
- encrypted
- generating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Abstract
An image local encryption algorithm based on bit plane template exclusive OR comprises the following steps: step 1: acquiring a BMP image to be encrypted; and 2, step: generating a mark matrix, and generating the mark matrix according to pixels related to the content to be encrypted of the BMP image; and step 3: generating a template matrix, generating a random binary matrix by using the key K, and carrying out and operation on the random binary matrix and the mark matrix to obtain a corresponding template matrix; and 4, step 4: and generating an encrypted image space domain matrix, and performing XOR operation on the encrypted image space domain matrix and the bit plane by using the template matrix to obtain the encrypted image space domain matrix to finish encryption. The invention respectively carries out template matrix encryption on RGB three color component images of the color BMP image, and the three component images are merged and stored as the BMP image which is the final encrypted image. The third party can not decrypt the image content without the template matrix, the safety factor is high, and the encryption and decryption transportation efficiency is high.
Description
Technical Field
The invention relates to the technical field related to image encryption and decryption algorithms, in particular to an image local encryption algorithm based on bit plane template exclusive OR.
Background
With the development of digital media and internet technology, the phenomenon of individuals or organizations publishing or disseminating images over networks has become more and more common. In particular, rapid advances in cloud computing have allowed more and more image data to be uploaded to cloud storage. The access of multiple users in the big data environment greatly facilitates the work and life of people. However, the act of publishing or sending the raw picture without processing also risks revealing the privacy of the individual.
In order to solve the problem of privacy disclosure caused by image privacy content release, an effective and feasible method is to encrypt a sensitive portion in an image, for example, to perform mosaic addition on related protected content or directly delete the sensitive content. These processed images are often irreproducible and even thus result in permanent loss of true information. The other method is to encrypt the whole image, and the method takes the whole image as a protected object and protects the whole image by a cryptographic method. But this will cause the hiding of other non-private information, affecting the distribution of non-private information. Generally, the user only wants to restrict the access rights of the image part content to the part of people. It does not restrict access to sensitive data by all people or to all data by third parties. When the conditions permit, the user wishes himself or an authorized party to restore the original content by means of the protected image. Therefore, the local encryption technology will become an important development direction of the image content protection technology.
Disclosure of Invention
In order to solve the problem of identification of a signer in a double-recording video in the prior art, the invention provides an image local encryption algorithm based on bit plane template XOR, which adopts the following technical scheme:
an image local encryption algorithm based on bit plane template exclusive OR comprises the following steps:
step 1: acquiring a BMP image to be encrypted;
step 2: generating a mark matrix, and generating the mark matrix according to the pixels related to the content needing to be encrypted of the BMP image;
and step 3: generating a template matrix, generating a random binary matrix by using the key K, and carrying out and operation on the random binary matrix and the mark matrix to obtain a corresponding template matrix;
and 4, step 4: and generating an encrypted image space domain matrix, and performing XOR operation on the encrypted image space domain matrix and the bit plane by using the template matrix to obtain the encrypted image space domain matrix to finish encryption.
Through the technical scheme, after the steps, the RGB three color component images of the BMP image are encrypted, and the three component images are merged and stored as the BMP image which is the final encrypted image. After the encryption process is completed, the encryptor may send the encrypted image and template matrix to the decryptor. The third party cannot decrypt the image content without the template matrix.
Optionally, the specific method for generating the label matrix in step 2 is as follows:
generating a binary marking matrix=,i=1,2,3,…,hAnd is provided withj=1,2,3,…wWhen it comes toWhen the pixel needs to be encrypted, let=1, otherwise order=0。
By the technical scheme, the spatial domain pixel matrix of the image needing to be encrypted is set as=,i=1,2,3,…,hAnd j =1,2,3, …,w,is a single pixel of the image and,handwrespectively the height and width of the image.
The user needs to select the parameters in advanceNIs set hereN=1,2,3,…,7;
For the spatial pixel matrix is=Generating a binary marking matrix=For subsequent encryption of the marked area.
Optionally, the specific method for generating the encrypted image spatial domain matrix in step 3 is:
Further performing a bit AND operation, the following can be obtainedNMatrix of each template:
…
Through the technical scheme, an encryptor uses the key K and the binary mark matrix to carry out bit and operation to obtain the template matrix, the bit and operation execution efficiency is higher, and the calculation can be rapidly completed to obtain the template matrix.
Optionally, the bit AND operation will,,… ,And clearing the binary matrix elements corresponding to the positions of the middle unencrypted pixels, and keeping the binary matrix elements at other positions unchanged.
Through the technical scheme, the key is cleared by clearing the binary matrix element corresponding to the non-encrypted pixel positionKGeneratingNEach composed of random 0 and 1The template matrix encryption is realized by clearing the binary matrix elements corresponding to the non-encrypted pixel positions in the binary matrix, so that users who do not obtain the template matrix cannot realize the encryption through a secret keyKAnd the safety factor is higher when decryption is carried out.
Optionally, the specific method for generating the encrypted image spatial matrix in step 4 is:
for image pixel matrix=The high to low numbers 1,2,3, …,Nthis is achieved byNA bit plane is respectively connected withNMatrix of individual templates,,…,Perform an XOR operation, i.e.To obtainFor encrypting the spatial matrix of the image, the method comprisesAnd storing the image file to obtain a final encrypted image.
By the technical scheme, the pixel matrix of the element image is subjected to XOR operation encryption in a template matrix mode, decryption cannot be realized for users who do not obtain template proof, and the safety factor is higher.
Optionally, the representation represents pre-encryption image pixelsFrom high to lowkThe number of the bits is one,k=1,2,3,…,NsaidRepresenting encrypted image pixelsFrom high to lowkThe number of the bits is one,k=1,2,3,…,N,if it is usedN<8, then,t=N+1,N+2, …,8。
Optionally, the image decryptor decrypts the image by using the template matrix exclusive-or operation using the template matrix and the highest of the imageNAnd (4) respectively carrying out XOR operation on the bit planes, and restoring the original numerical values of the bit planes to restore the original image after the XOR operation.
According to the technical scheme, the picture encrypted by the template matrix exclusive-or operation is encrypted, the only decryption method is to obtain the template matrix and perform exclusive-or operation reversely to realize decryption, other key decryption modes cannot perform decryption, and the encryption safety is better.
Optionally, the specific method for decrypting the image is as follows:
for image pixel matrix=The number 1,2,3, …,Nthis is achieved byNA bit plane respectively andNmatrix of individual templates,,…,Perform an exclusive OR operation, i.e.To obtainFor encrypting the spatial matrix of the image, the method comprisesStored as an image file to obtain the final decrypted image.
According to the technical scheme, decryption is achieved through the reverse operation exclusive-or operation of the template matrix, decryption cannot be achieved through other key decryption modes, encryption safety is better, decryption efficiency is higher, and safety and controllability are achieved.
Optionally, theAndrespectively representing pre-encryption image pixelsAnd encrypted image pixelsFrom high to lowkThe number of the bits is one,k=1,2,3,…,N. If it is notN<8, then,t=N+1,N+2, …,8。
In summary, the present invention includes at least one of the following beneficial effects:
the invention provides an image local encryption algorithm based on bit plane template XOR, wherein three RGB color component images of a color BMP image are encrypted by a template matrix, and the three component images are merged and stored as the BMP image as a final encrypted image. After the encryption process is completed, the encryptor may send the encrypted image and template matrix to the decryptor. The third party can not decrypt the image content without the template matrix, the safety factor is high, and the encryption and decryption transportation efficiency is high.
Drawings
FIG. 1 is a schematic diagram of an encryption flow of the present invention;
fig. 2 is a schematic diagram of the decryption process of the present invention.
Detailed Description
The present invention is described in further detail below with reference to fig. 1-2.
The embodiment of the invention discloses a speaker role distinguishing method and system.
Referring to fig. 1, an image local encryption algorithm based on bit plane template xor includes the following steps:
step 1: acquiring a BMP image to be encrypted;
step 2: generating a mark matrix, and generating the mark matrix according to the pixels related to the content needing to be encrypted of the BMP image;
and step 3: generating a template matrix, generating a random binary matrix by using the key K, and carrying out and operation on the random binary matrix and the mark matrix to obtain a corresponding template matrix;
and 4, step 4: and generating an encrypted image space domain matrix, and performing XOR operation on the encrypted image space domain matrix and the bit plane by using the template matrix to obtain the encrypted image space domain matrix to finish encryption.
After the above steps, the RGB three color component images of the BMP image are all encrypted, and the three component images are merged and stored as the BMP image as a final encrypted image. After the encryption process is completed, the encryptor may send the encrypted image and template matrix to the decryptor. The third party cannot decrypt the image content without the template matrix.
The specific method for generating the mark matrix in the step 2 is as follows:
generating a binary marking matrix=,i=1,2,3,…,hAnd isj=1,2,3,…wWhen is coming into contact withWhen the pixel needs to be encrypted, order=1, otherwise=0。
Setting the spatial pixel matrix of the image needing encryption as=I =1,2,3, ·, h and j =1,2,3 … W,is a single pixel of the image and,handwrespectively the height and width of the image.
The user needs to select parameters in advanceNThe value of (a) is set here as N =1,2,3 … 7;
for the spatial pixel matrix is=Generating a binary marking matrix=By usingThe marked area is subsequently encrypted.
The specific method for generating the encrypted image spatial domain matrix in the step 3 is as follows:
Further performing a bit AND operation, the following can be obtainedNMatrix of each template:
…
The encryptor uses the key K and the binary mark matrix to carry out bit and operation to obtain the template matrix, the bit and operation execution efficiency is higher, and the calculation can be rapidly completed to obtain the template matrix.
The bit and operation will,,… ,And clearing the binary matrix elements corresponding to the positions of the middle unencrypted pixels, and keeping the binary matrix elements at other positions unchanged.
The key is realized by clearing the binary matrix element corresponding to the non-encrypted pixel positionKGeneratingNThe template matrix encryption is realized by clearing binary matrix elements corresponding to non-encrypted pixel positions in a binary matrix consisting of random 0 and random 1, so that users who do not obtain the template matrix cannot realize the encryption through a secret keyKAnd the safety factor is higher when decryption is carried out.
The specific method for generating the encrypted image spatial domain matrix in the step 4 is as follows:
for image pixel matrix=High to low numbers 1,2, …,Nthis is achieved byNA bit plane is respectively connected withNMatrix of individual templates,,…,Perform an XOR operation, i.e.To obtainFor encrypting the spatial matrix of the image, the method comprisesAnd storing the image file to obtain a final encrypted image.
The pixel matrix of the element image is encrypted by the exclusive-OR operation in the mode of the template matrix, so that decryption cannot be realized for users who do not obtain template proof, and the safety coefficient is higher.
Representing pre-encryption image pixelsFrom high to lowkThe number of the bits is one,k=1,2,3,…,NsaidRepresenting encrypted image pixelsFrom high to lowkThe number of the bits is one,k=1,2,3,…,N,if it is notN<8, then,t=N+1,N+2, …,8。
The person who decrypts the image by adopting the exclusive-or operation of the template matrix uses the template matrix and the highest of the imageNAnd (4) respectively carrying out XOR operation on the bit planes, and restoring the original numerical values of the bit planes to restore the original image after the XOR operation.
By adopting the picture encrypted by the template matrix XOR operation, the only decryption method is to obtain the template matrix and perform XOR operation reversely to realize decryption, and other key decryption modes cannot perform decryption, so that the encryption security is better.
The specific method for decrypting the image comprises the following steps:
for image pixel matrix=High to low numbers 1,2, …,Nthis is achieved byNA bit plane is respectively connected withNMatrix of individual templates,,…,Perform an XOR operation, i.e.To obtainFor encrypting the spatial matrix of the image, the method comprisesStored as an image file to obtain the final decrypted image.
Decryption is realized by the reverse operation of the template matrix and exclusive-or operation, decryption cannot be performed by other key decryption modes, encryption safety is better, decryption efficiency is higher, and safety and controllability are realized.
Andrespectively representing pre-encryption image pixelsAnd encrypted image pixelsFrom high to lowkBits, k =1,2,3, ·, N, ifN<8, then,t=N+1,N+2, …,8。
The implementation principle of the image local encryption algorithm based on the bit plane template XOR is as follows:
see FIG. 1, in color BMP imageNFor the case of =4, let us say that the spatial pixel matrix of the image to be encrypted is=,i=1,2,3,…,hAnd j =1,2,3, …,w,is a single pixel of the image and,handwrespectively the height and width of the image. The user needs to select parameters in advanceNHere, N =1,2,3 … 7 is set.
1. Generating a mark matrix:
generating a binary marking matrix=,i=1,2,3,…,hAnd isj=1,2,3,…wWhen is coming into contact withFor pixels requiring encryption=1, otherwise=0。
2. Using a secret keyKGeneratingNA template matrix:
Further performing a bit AND operation, the following can be obtainedNMatrix of each template:
…
whereinFor bit AND operation, the operation in the above formula will,,… ,And clearing the binary matrix elements corresponding to the positions of the middle unencrypted pixels, and keeping the binary matrix elements at other positions unchanged.
3. Encrypting the image by using template matrix XOR operation:
for image pixel matrix=The number 1,2, …,Nthis is achieved byNA bit plane is respectively connected withNMatrix of individual templates,,…,Perform an XOR operation, i.e.Here, theAndrepresenting pixels of an image before encryption separatelyAnd encrypted image pixelsFrom high to lowkThe number of the bits is one,k=1,2,3,…,N. If it is notN<8, then,t=N+1,N+2, …,8, to giveFor encrypting the spatial matrix of the image, the method comprisesAnd storing the image file to obtain a final encrypted image.
The step of image decryption is the reverse of the step of encryption, see fig. 2, as follows:
decrypting the image by using template matrix XOR operation, and for the image pixel matrix=High to low numbers 1,2, …,Nthis is achieved byNA bit plane is respectively connected withNMatrix of individual templates,,…,Perform an XOR operation, i.e.Here, theAndrespectively representing pre-encryption image pixelsAnd encrypted image pixelsFrom high to lowkA bit ofk=1,2,3,…,N. If it is usedN<8, then,t=N+1,N+2, …,8, to giveFor encrypting the spatial matrix of the image, the method comprisesStored as an image file to obtain the final decrypted image.
The specific implementations described herein are merely illustrative of the spirit of the invention. Various fine-tuning modifications or additions may be made to the described embodiments or by a similar method, such as transmitting the mask matrix and the key K to the decryptor without directly transmitting the template matrix, so that the decryptor can calculate the template matrix from the mask matrix and the key K, without departing from the spirit of the invention or exceeding the scope defined by the claims.
The above are all preferred embodiments of the present invention, and the protection scope of the present invention is not limited thereby, so: all equivalent changes made according to the structure, shape and principle of the invention are covered by the protection scope of the invention.
Claims (9)
1. An image local encryption algorithm based on bit plane template XOR is characterized in that: the method comprises the following steps:
step 1: acquiring a BMP image to be encrypted;
step 2: generating a mark matrix, and generating the mark matrix according to the pixels related to the content needing to be encrypted of the BMP image;
and 3, step 3: generating a template matrix using a keyKGenerating a random binary matrix, and carrying out and operation on the random binary matrix and the mark matrix to obtain a corresponding template matrix;
and 4, step 4: and generating an encrypted image space domain matrix, and performing XOR operation on the encrypted image space domain matrix and the bit plane by using the template matrix to obtain the encrypted image space domain matrix to finish encryption.
2. The image local encryption algorithm based on bit plane template exclusive or according to claim 1, characterized in that: the specific method for generating the mark matrix in the step 2 is as follows:
3. The image local encryption algorithm based on bit plane template exclusive or according to claim 1, characterized in that: the specific method for generating the encrypted image spatial domain matrix in the step 3 is as follows:
Further performing a bit AND operation, the following can be obtainedNMatrix of each template:
…
5. The image local encryption algorithm based on bit plane template exclusive or according to claim 1, characterized in that: the specific method for generating the encrypted image spatial domain matrix in the step 4 is as follows:
for image pixel matrix=The number 1,2,3, …,Nthis is achieved byNA bit plane is respectively connected withNMatrix of individual templates,,…,Perform an exclusive OR operation, i.e.To obtainFor encrypting the spatial matrix of the image, the method comprisesAnd storing the image file to obtain a final encrypted image.
6. The image local encryption algorithm based on bit plane template exclusive OR as claimed in claim 5, wherein:
7. The image partial encryption algorithm based on bit-plane template XOR of any one of claims 1-6, characterized in that: the method for decrypting the image comprises the following steps: the highest of the template matrix and the image is used by the decipherer for deciphering the image by the exclusive OR operation of the template matrixNAnd (4) respectively carrying out XOR operation on the bit planes, and restoring the original numerical values of the bit planes to restore the original image after the XOR operation.
8. The image local encryption algorithm based on bit plane template exclusive or according to claim 7, characterized in that: the specific method for decrypting the image comprises the following steps:
for image pixel matrix=The high to low numbers 1,2,3, …,Nthis is achieved byNA bit plane is respectively connected withNMatrix of individual templates,,…,Perform an XOR operation, i.e.To obtainFor encrypting the spatial matrix of the image, the method comprisesStored as an image file to obtain the final decrypted image.
9. The image local encryption algorithm based on bit plane template exclusive or according to claim 8, characterized in that:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210929803.XA CN115001666A (en) | 2022-08-04 | 2022-08-04 | Image local encryption algorithm based on bit plane template XOR |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210929803.XA CN115001666A (en) | 2022-08-04 | 2022-08-04 | Image local encryption algorithm based on bit plane template XOR |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115001666A true CN115001666A (en) | 2022-09-02 |
Family
ID=83023215
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210929803.XA Pending CN115001666A (en) | 2022-08-04 | 2022-08-04 | Image local encryption algorithm based on bit plane template XOR |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115001666A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116776301A (en) * | 2023-08-18 | 2023-09-19 | 北京点聚信息技术有限公司 | Quick traceability management method for electronic seal |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108133445A (en) * | 2016-12-01 | 2018-06-08 | 钦州市晶通科技有限公司 | A kind of image encryption method for spreading mapping scramble and being combined with chaos system |
CN108898539A (en) * | 2018-05-14 | 2018-11-27 | 湘潭大学 | A kind of color image encrypting method of compatible JPEG compression standard |
CN112040086A (en) * | 2019-06-03 | 2020-12-04 | 湖北微模式科技发展有限公司 | Image encryption and decryption method and device, equipment and readable storage medium |
WO2021227349A1 (en) * | 2020-05-11 | 2021-11-18 | 华南理工大学 | Front-end facial image encryption and recognition method for biometric privacy protection |
CN114679250A (en) * | 2021-12-17 | 2022-06-28 | 中国人民解放军海军工程大学 | Image encryption algorithm based on mixed chaos and Arnold transformation |
-
2022
- 2022-08-04 CN CN202210929803.XA patent/CN115001666A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108133445A (en) * | 2016-12-01 | 2018-06-08 | 钦州市晶通科技有限公司 | A kind of image encryption method for spreading mapping scramble and being combined with chaos system |
CN108898539A (en) * | 2018-05-14 | 2018-11-27 | 湘潭大学 | A kind of color image encrypting method of compatible JPEG compression standard |
CN112040086A (en) * | 2019-06-03 | 2020-12-04 | 湖北微模式科技发展有限公司 | Image encryption and decryption method and device, equipment and readable storage medium |
WO2021227349A1 (en) * | 2020-05-11 | 2021-11-18 | 华南理工大学 | Front-end facial image encryption and recognition method for biometric privacy protection |
CN114679250A (en) * | 2021-12-17 | 2022-06-28 | 中国人民解放军海军工程大学 | Image encryption algorithm based on mixed chaos and Arnold transformation |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116776301A (en) * | 2023-08-18 | 2023-09-19 | 北京点聚信息技术有限公司 | Quick traceability management method for electronic seal |
CN116776301B (en) * | 2023-08-18 | 2023-10-20 | 北京点聚信息技术有限公司 | Quick traceability management method for electronic seal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112040086B (en) | Image encryption and decryption methods and devices, equipment and readable storage medium | |
US20090290711A1 (en) | Method, Apparatus and System for Secure Distribution of Content | |
Arora et al. | Digital image security based on the hybrid model of image hiding and encryption | |
Abdel-Nabi et al. | Medical imaging security using partial encryption and histogram shifting watermarking | |
CN112035847B (en) | Image encryption and decryption methods and devices, electronic equipment and storage medium | |
CN115001666A (en) | Image local encryption algorithm based on bit plane template XOR | |
Baby et al. | Combined Strength of Steganography and Cryptography-A Literature Survey. | |
Hashim et al. | Medical image encryption based on hybrid AES with chaotic map | |
El Abbadi et al. | Image encryption based on singular value decomposition | |
Sahila et al. | Secure digital image watermarking by using SVD and AES | |
CN115330580B (en) | Image content encryption algorithm based on data addition | |
Rao et al. | A novel information security scheme using cryptic steganography | |
Audhi et al. | Secure mechanism for communication using image steganography | |
Schick et al. | Document tracking-on the way to a new security service | |
Meghana et al. | A new method for secret image transmission via mosaic fragments using ecc key | |
Nooh | Combining encryption and preservation in information security to secure sending a message | |
Deepak et al. | High payload capacity using steganography combined with cryptography | |
Yadav et al. | A hybrid approach to metamorphic cryptography using KIMLA and DNA concept | |
Bhatia et al. | Digital image security using hybrid visual cryptography | |
TWI437506B (en) | A multiple regions visual cryptography method | |
Jawad | Combining A Cryptography and Steganography Techniques–Based Securing Transmitted Video Through Unsecure Channel | |
Kamal et al. | A Novel Remedy for Image Encryption and Data Hiding | |
Lukose et al. | Combining Cryptography and Steganography for Data Hiding in Videos | |
Thomas et al. | Encryption then steganography framework on high capacity data hiding in grayscale images | |
Monika | A Research Paper on Image Encryption & Decryption Techniques |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20220902 |
|
RJ01 | Rejection of invention patent application after publication |