CN106651735A - Chaos theory-based digital image parallel encryption method - Google Patents
Chaos theory-based digital image parallel encryption method Download PDFInfo
- Publication number
- CN106651735A CN106651735A CN201610812070.6A CN201610812070A CN106651735A CN 106651735 A CN106651735 A CN 106651735A CN 201610812070 A CN201610812070 A CN 201610812070A CN 106651735 A CN106651735 A CN 106651735A
- Authority
- CN
- China
- Prior art keywords
- image
- sequence
- plaintext
- chaos
- plaintext image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
Abstract
The invention discloses a chaos theory-based digital image parallel encryption method comprising the following steps: a chaotic sequence is used for subjecting a plaintext image to overall position scrambling operation, the plaintext image is divided into a number of parts, each part of the plaintext image is subjected to parallel local dispersal operation, a last pixel of each part of the plaintext image and a first pixel of a next part of the plaintext image are swapped, and the last step is repeated till overall dispersal of the plaintext image is completed. Compared with technologies of the prior art, the chaos theory-based digital image parallel encryption method is advantageous in that differential attacks and statistical characteristic analysis can be well resisted, chose-plaintext or cryptograph attacks can be also effectively resisted, large secret key space and good encryption effect can be exerted, and parallel calculating capability of a computer multinucleated cpu can be effectively used for effectively improving calculating speed and encryption performance.
Description
Technical field
The present invention relates to information security field, more particularly to a kind of digital picture parallel encryption side based on chaology
Method.
Background technology
Chaos is one of important discovery of 20th century, the three big physicss arranged side by side with quantum mechanics, the Theory of Relativity, and chaos phenomenon is
Refer to it is determined that nonlinear system in, not in addition under conditions of any random factor, due to the interaction table of therein
A kind of phenomenon for revealing to be similar to stochastic process.And the inherent various features of chaos meet substantially will in cryptography very much
Ask.Such as:First, extreme sensitivity of the chaos system to initial condition so that the key space of cryptographic system is wider and key is quick
Perception is extremely strong;Secondly, the chaotic signal that chaos system is produced is aperiodic and non-convergent, has good randomness and multiple again
Polygamy, so this characteristic is well suited for allowing it to make Cryptographic random number generator;Finally, chaotic signal has complex structure, class
The characteristic such as noise-like causes it to have natural disguise.Therefore, there is the cryptography scheme for being proposed based on chaology tradition to add
The good characteristic that secret skill art does not have, and then chaos applications are had a wide range of applications in digital image encryption field.
The resume image research incipient stage based on chaos is based primarily upon obscuring and spreading frame for Shannon propositions
Frame.First, chaos sequence that the stage produced using chaos system is being obscured come the position of scramble pixel;Secondly, in diffusion rank
Section obtains more preferable cipher round results mainly by the pixel value of change pixel.And Cat maps therein are to obscure the stage
Used in the most classical method, it is not only easy to realize, and the speed of service make the features such as fast it so far still by much plus
Close algorithm is favored.Guan et al. proposes a kind of by Cat maps and the Chaotic Image Encryption Algorithm of Chen systems;Chen etc.
Two-dimentional Cat maps are further generalized to three-dimensional by people, and then draw a kind of Chaotic Image Encryption Algorithm using three-dimensional Cat maps;
Gao et al. employs a kind of ranks of the sequence pair image pixel for being referred to as Scrambling Matrix and enters line translation, and it is before this using one-dimensional
Logistic mappings produce a pseudorandom chaos sequence, the row again for recycling the sequence to enter pixel every trade respectively
What is arranged and arrange rearranges, and as a result shows that this disorder method has higher safety than Cat maps, so also extensive
It is applied in image encryption;Zhu Jianliang et al. proposes a kind of chaos of the stochastic parameter change during chaotic signal is generated
Pseudo-random series producing method, and based on this method proposing a kind of new resume image;Zhang et al. is proposed and is passed through
DNA encoding carries out image encryption.In sum, for New chaotic image encryption technology research either range or depth all takes
Obtained very big development and breakthrough, new algorithm is continued to bring out so that New chaotic image encryption technology also increasingly moves to maturity.And
Some current image encryption methods are primarily present,
And algorithm is essentially all that the serial encryption mode of employing carries out encryption and decryption.
The content of the invention
For above-mentioned safety issue and encryption performance problem, the present invention proposes a kind of digital picture based on chaology
Parallel encryption method.
A kind of digital picture parallel encryption method based on chaology of the present invention, including step
S1:Position scramble of overall importance is carried out to plaintext image using chaos sequence;
S2:Plaintext image is divided into into several pieces;
S3:Carry out parallel local diffusion to per part of plaintext image, and by last pixel of every a plaintext image and
First pixel of lower a plaintext image is swapped;
S4:Repeat step S3, the global diffusion until completing plaintext image.
Further, chaos sequence described in step S1 is produced using Kent chaos systems.
Further, step S1 includes step:
S11:By former plaintext image according to row major be sequentially converted into a length be m × n one-dimensional sequence L={ l1,
l2,l3,…,lm×n, the span of the sequence is [0,255];
S12:It is sum all pixels value of former plaintext image to be added and obtains a total value, then again with sum come divided by figure
Total pixel number of picture is m × n, and thus an average pixel value to obtain whole image is avg, by formulaWith formula t=m+n+mod (avg × 108, m+n) and institute in Kent chaos systems can be respectively obtained
Control parameter a for needing and iterationses t;
S13:If the system variable initial value of Kent chaos systems is x0, by x0Substitute in Kent chaos systems with a, carry out
Kent maps t iteration, is then further continued for iteration m × n time, and one length of generation is the one-dimensional chaos sequence K={ k of m × n1,
k2,…,km×n};
S14:K described in chaos sequence is sorted from small to large, one is produced for each in the sequence after record ordering
One position sequence K'={ k of individual element position in former sequence K1',k2',…,k'm×n, and by the position sequence
Position scramble of overall importance is carried out to plaintext sequence L, scramble image sequence L'={ l are finally given1',l2',…,l'm×n}。
The beneficial effects of the present invention is, compared with prior art, the present invention can not only preferably resist differential attack, system
Meter specificity analysises, and be highly resistant to selection plaintext or cipher text and attack, and key space is big, cipher round results are good, while can have
Effect effectively improves calculating speed and encryption performance using the computation capability of computer multinuclear cpu.
Description of the drawings
Fig. 1 is digital picture parallel encryption method flow chart of the present invention based on chaology.
Fig. 2 is grey level histogram before and after former plaintext image encryption.
Fig. 3 is the grey level histogram after the plaintext image encryption in Fig. 2.
Fig. 4 is neighbor dependency graph before plaintext image encryption.
Fig. 5 is neighbor dependency graph after plaintext image encryption.
Fig. 6 is the picture after correct decryption.
Fig. 7 is the picture after mistake decryption.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than the embodiment of whole.It is based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made
Embodiment, belongs to the scope of protection of the invention.
Refer to Fig. 1, a kind of digital picture parallel encryption method based on chaology of the present invention, including step
S1:Position scramble of overall importance is carried out to plaintext image using chaos sequence;
S2:Plaintext image is divided into into several pieces;
S3:Carry out parallel local diffusion to per part of plaintext image, and by last pixel of every a plaintext image and
First pixel of lower a plaintext image is swapped;
S4:Repeat step S3, the global diffusion until completing plaintext image.
Scramble of the process that step S1 is implemented for image pixel positions.The maximum that this method is different from other encryption methods is special
Point is that common resume image is all the serial encryption mode for adopting, in order to make full use of present computer multinuclear cpu
Can parallel computation characteristic, in the image dispersion operation stage, former plaintext image is divided into several pieces by the present invention, allows every portion to carry out
Parallel local diffusion operation, after each wheel terminates, in order that image can carry out diffusion of overall importance, will be per a
Last pixel and lower first a pixel swap, carry out the dispersion operation of next round, such iterative cycles
To the last, so reach the global diffusion of image.
If gray level image A sizes are m × n, used as chaos system iterationses, sum is pixel value summation to t, and avg is all
The meansigma methodss of pixel, concrete encryption method step are as follows:
Step S11:Original document image A according to row major be sequentially converted into a length be m × n one-dimensional sequence L=
{l1,l2,l3,…,lm×n, the span of the sequence is [0,255].
Step S12:The all pixels value of original document image is added and obtains a total value for sum, then again with sum come divided by
Total pixel number of image is m × n, and thus an average pixel value to obtain whole image is avg, by formula (1) and formula
(2) control parameter a and iterationses t needed for Kent chaos systems can be respectively obtained.
T=m+n+mod (avg × 108,m+n) (2)
Step S13:If the system variable initial value of chaos system is x0, by x0Substitute in formula kent chaos system with a, enter
Row Kent maps t iteration and is used for eliminating the harmful effect of transient effect, then with it as starting point continuation iteration m × n time, it will
Produce one-dimensional chaos sequence K={ k of the length for m × n1,k2,…,km×n}。
Step S14:Chaos sequence K is sorted from small to large, one is produced for each in the sequence after record ordering
One position sequence K'={ k of individual element position in former sequence K1',k2',…,k'm×n, thus come in plain text with it
Sequence L carries out position scramble of overall importance, finally gives scramble image sequence L'={ l1',l2',…,l'm×n}。
Step S2-S5 is diffusion parallel to image pixel
The process is that scramble image sequence is divided into several pieces first, and specific formula is respectively adopted per portion then
Parallel to each subsequence is diffused operation, after each subsequence circulates certain number of times, then will be sub per adjacent two
First of sequence and last value are swapped, and so reach diffusion of overall importance.Then it is further continued for above behaviour
Make, the ciphertext sequence after a diffusion will be obtained after so circulating certain number of times, so as to obtain final encrypted cipher text.It is concrete to walk
It is rapid as follows:
Step S2:Experiment herein uses the gray level image of 256*256, and cpu is 4 cores, so L' is divided into 4
Part an equal amount of subsequence is respectively p1, p2, p3, p4, creates four threads so that each thread be each responsible for one it is sub
Sequence, with reference to formula (3), is calculated once during the value of four subsequences to be updated to formula (3) respectively successively, is obtained first
Secondary diffusion effect.For formula (3), c can be made0For Arbitrary Digit in [0,255], therefore c0Also can be used as a key.This step makes
It is closely related before and after obtaining intermediate ciphertext, to reach pixel diffusion.
Step S3:Each subsequence continues cycling through calculating 10 times according still further to formula (3), obtains the subsequence after four diffusions
P1 ', p2 ', p3 ', p4 ' so that abundant diffusion is obtained inside each subsequence, but can only so cause each height
Interior sequences spread, and are local diffusion for whole scrambling sequence, in order to each subsequence can be influenced each other, will
First exchange in last sequential value and p2 ' in p1 '
Step S4:The operation of step S3 identical, first in last value of last p4 ' and p1 ' sequence are carried out successively
Train value is exchanged, thus, making close ties are generated between them, the change of any one sequence is all changed and has influence on whole sequence
Great variety.
Step S5:After each subsequence carries out head and the tail value exchange, the operation of step S2 and step S3 is re-started, so
10 circulate operations are carried out continuously, final ciphertext C={ c is obtained1,c2,......,cm×n}.Ciphertext sequence c is converted to finally
Ciphertext graph picture.
The image selected during this paper experiment simulations is the Cameraman gray level images that size is 256 × 256, with this
Used as in plain text, the initial key of encryption system China mainly has the x in Kent chaos systems0=0.4561592650, and encryption
Parameter c of formula used in process (3)0=250, and control parameter S in Kent chaos systems is then determined by image self-characteristic
It is fixed.Experiment simulation shows, encryption method simple possible and encryption/decryption speed is fast, and this method can not only obtain preferably encryption effect
Really, also with higher safety.
Fig. 2 is the grey level histogram of the plaintext image before encryption, hence it is evident that presents uneven distribution, therefore can draw figure
As the characteristic distributions of pixel value.Fig. 3 is the ciphertext image grey level histogram after encryption, it can be seen which distributes very evenly, therefore
Can reach the effect of hiding plaintext image information well.
From 800 groups of consecutive points of horizontal direction are randomly selected with ciphertext graph picture in plain text, with the secondary pass for making image pixel value
System's figure, Fig. 4 and two figures of Fig. 5 present the pixel value relation and ciphertext graph of plaintext image level consecutive points respectively as horizontally adjacent point
Pixel value relation, thus can obtain, the pixel value after encryption between consecutive points is completely without any relation.
Fig. 6 and Fig. 7 are visible, during to plaintext image decryption, even there is very small change in some decruption key,
Finally all cannot get plaintext image.In experiment simulation, after correct decryption, gained decrypted image is Fig. 5, by X0=
0.3234321210 is changed to X0=0.3234321211, and other are all constant, and the decrypted image for obtaining is as shown in Figure 6.Therefore, which
I guess 10-10Minor alteration also cannot successful decryption image, illustrate that the method has preferable key sensitivity.
The above is the preferred embodiment of the present invention, it is noted that for those skilled in the art
For, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications are also considered as
Protection scope of the present invention.
Claims (3)
1. a kind of digital picture parallel encryption method based on chaology, it is characterised in that including step
S1:Position scramble of overall importance is carried out to plaintext image using chaos sequence;
S2:Plaintext image is divided into into several pieces;
S3:Carry out parallel local diffusion to per part of plaintext image, and by last pixel of every a plaintext image and next
First pixel of part plaintext image is swapped;
S4:Repeat step S3, the global diffusion until completing plaintext image.
2. it is as claimed in claim 1 in the digital picture parallel encryption method of chaology, it is characterised in that institute in step S1
State chaos sequence to produce using Kent chaos systems.
3. it is as claimed in claim 2 in the digital picture parallel encryption method of chaology, it is characterised in that step S1 includes
Step:
S11:By former plaintext image according to row major be sequentially converted into a length be m × n one-dimensional sequence L={ l1,l2,
l3,…,lm×n, the span of the sequence is [0,255];
S12:It is sum all pixels value of former plaintext image to be added and obtains a total value, then again with sum come divided by image
Total pixel number is m × n, and thus an average pixel value to obtain whole image is avg, by formulaWith formula t=m+n+mod (avg × 108, m+n) and institute in Kent chaos systems can be respectively obtained
Control parameter a for needing and iterationses t;
S13:If the system variable initial value of Kent chaos systems is x0, by x0Substitute in Kent chaos systems with a, carry out Kent
T iteration of mapping, is then further continued for iteration m × n time, and one length of generation is the one-dimensional chaos sequence K={ k of m × n1,k2,…,
km×n};
S14:K described in chaos sequence is sorted from small to large, one is produced for each yuan in the sequence after record ordering
One position sequence K'={ k of element position in former sequence K1',k2',…,k'm×n, and come right by the position sequence
Plaintext sequence L carries out position scramble of overall importance, finally gives scramble image sequence L'={ l1',l2',…,l'm×n}。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610812070.6A CN106651735A (en) | 2016-09-08 | 2016-09-08 | Chaos theory-based digital image parallel encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610812070.6A CN106651735A (en) | 2016-09-08 | 2016-09-08 | Chaos theory-based digital image parallel encryption method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106651735A true CN106651735A (en) | 2017-05-10 |
Family
ID=58852933
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610812070.6A Pending CN106651735A (en) | 2016-09-08 | 2016-09-08 | Chaos theory-based digital image parallel encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106651735A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107239709A (en) * | 2017-06-07 | 2017-10-10 | 广东工业大学 | A kind of method of New chaotic image encryption, apparatus and system |
CN109933755A (en) * | 2019-03-21 | 2019-06-25 | 江苏工程职业技术学院 | A kind of generation method of garbage classification code |
CN110784619A (en) * | 2019-10-24 | 2020-02-11 | 广西师范大学 | Novel parallel image encryption method based on chaos |
CN111597574A (en) * | 2020-04-16 | 2020-08-28 | 南通职业大学 | Parallel image encryption system and method based on spatial diffusion structure |
CN113067958A (en) * | 2021-03-02 | 2021-07-02 | 甘肃同兴智能科技发展有限责任公司 | Image encryption method and device, electronic equipment and storage medium |
CN113297606A (en) * | 2021-06-25 | 2021-08-24 | 燕山大学 | Color quantum image encryption and decryption method based on multiple chaos and DNA operation |
CN114338023A (en) * | 2022-03-10 | 2022-04-12 | 山东云海国创云计算装备产业创新中心有限公司 | Image encryption method, image decryption method, image processing apparatus, and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101702117A (en) * | 2009-11-09 | 2010-05-05 | 东南大学 | Method for generating random pseudorandom sequence based on discrete progressive determinacy |
CN103679625A (en) * | 2013-11-08 | 2014-03-26 | 西安理工大学 | Single-channel color image encryption method based on chaos and phase retrieval process |
CN104574259A (en) * | 2015-01-08 | 2015-04-29 | 大连大学 | Image encryption method based on chaotic system and insertion-deletion model |
CN104751401A (en) * | 2015-04-16 | 2015-07-01 | 大连大学 | Novel piecewise linear chaotic mapping image encrypting and encoding method |
-
2016
- 2016-09-08 CN CN201610812070.6A patent/CN106651735A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101702117A (en) * | 2009-11-09 | 2010-05-05 | 东南大学 | Method for generating random pseudorandom sequence based on discrete progressive determinacy |
CN103679625A (en) * | 2013-11-08 | 2014-03-26 | 西安理工大学 | Single-channel color image encryption method based on chaos and phase retrieval process |
CN104574259A (en) * | 2015-01-08 | 2015-04-29 | 大连大学 | Image encryption method based on chaotic system and insertion-deletion model |
CN104751401A (en) * | 2015-04-16 | 2015-07-01 | 大连大学 | Novel piecewise linear chaotic mapping image encrypting and encoding method |
Non-Patent Citations (5)
Title |
---|
吴家新: "《混沌数字图像加密算法研究》", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
朱从旭等: "《基于超混沌系统和密文交错扩散的图像加密新算法》", 《电子与信息学报》 * |
王春淋等: "《基于分块置乱与扩散的分数阶混沌彩色图像加密算法》", 《河南大学学报(自然科学版)》 * |
谢国波等: "《一种新的基于比特置乱的超混沌图像加密算法》", 《微电子学与计算机》 * |
谢国波等: "《基于Logistic映射的可变置乱参数的图像加密算法》", 《微电子学与计算机》 * |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107239709B (en) * | 2017-06-07 | 2020-08-11 | 广东工业大学 | Chaotic image encryption method, device and system |
CN107239709A (en) * | 2017-06-07 | 2017-10-10 | 广东工业大学 | A kind of method of New chaotic image encryption, apparatus and system |
CN109933755B (en) * | 2019-03-21 | 2021-12-21 | 江苏工程职业技术学院 | Method for generating garbage classification code |
CN109933755A (en) * | 2019-03-21 | 2019-06-25 | 江苏工程职业技术学院 | A kind of generation method of garbage classification code |
CN110784619A (en) * | 2019-10-24 | 2020-02-11 | 广西师范大学 | Novel parallel image encryption method based on chaos |
CN110784619B (en) * | 2019-10-24 | 2021-08-10 | 广西师范大学 | Novel parallel image encryption method based on chaos |
CN111597574A (en) * | 2020-04-16 | 2020-08-28 | 南通职业大学 | Parallel image encryption system and method based on spatial diffusion structure |
CN111597574B (en) * | 2020-04-16 | 2021-03-23 | 南通职业大学 | Parallel image encryption system and method based on spatial diffusion structure |
CN113067958A (en) * | 2021-03-02 | 2021-07-02 | 甘肃同兴智能科技发展有限责任公司 | Image encryption method and device, electronic equipment and storage medium |
CN113067958B (en) * | 2021-03-02 | 2023-01-31 | 甘肃同兴智能科技发展有限责任公司 | Image encryption method and device, electronic equipment and storage medium |
CN113297606A (en) * | 2021-06-25 | 2021-08-24 | 燕山大学 | Color quantum image encryption and decryption method based on multiple chaos and DNA operation |
CN113297606B (en) * | 2021-06-25 | 2022-07-19 | 燕山大学 | Color quantum image encryption and decryption method based on multiple chaos and DNA operation |
CN114338023A (en) * | 2022-03-10 | 2022-04-12 | 山东云海国创云计算装备产业创新中心有限公司 | Image encryption method, image decryption method, image processing apparatus, and storage medium |
CN114338023B (en) * | 2022-03-10 | 2022-06-07 | 山东云海国创云计算装备产业创新中心有限公司 | Image encryption method, image decryption method, image processing apparatus, and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106651735A (en) | Chaos theory-based digital image parallel encryption method | |
CN111105339B (en) | Image encryption method based on multidimensional chaotic system and Joseph scrambling | |
Zhu et al. | A chaos-based symmetric image encryption scheme using a bit-level permutation | |
CN101739695B (en) | Three-dimensional Arnold mapping-based image grouping encryption method | |
CN104380245B (en) | random number generator and stream cipher | |
CN106910156B (en) | A kind of New chaotic image encryption method with plaintext association key stream generting machanism | |
CN108898025A (en) | New chaotic image encryption method based on dual scramble and DNA encoding | |
CN104766264B (en) | A kind of piecemeal two tier adaptive diffusion image encryption method | |
CN103167213B (en) | Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system | |
Liu et al. | Quantum block image encryption based on arnold transform and sine chaotification model | |
CN110086601A (en) | Based on the associated Josephus traversing of pixel value and hyperchaotic system image encryption method | |
CN107239708A (en) | It is a kind of that the image encryption method converted with score field is mapped based on quantum chaos | |
CN107220923B (en) | Digital picture feedback encryption method based on image network | |
CN103258312B (en) | There is the digital image encryption method of fast key stream generting machanism | |
CN106327414A (en) | Plaintext feature-based double-chaos image encryption method | |
CN106778304A (en) | A kind of quick New chaotic image encryption method with related scramble mechanism in plain text | |
CN112202545B (en) | Image encryption method based on Y-type filling curve and variable-step Joseph traversal | |
CN110120079A (en) | Based on three-dimensional Logistic mapping and broad sense Cat mapping color image encryption method | |
CN109102452A (en) | A kind of image encryption method based on Latin square scramble and directional diffusion | |
CN107094072A (en) | A kind of mixed chaos encryption method based on general Henon Map | |
Zhang et al. | An image encryption scheme based on constructing large permutation with chaotic sequence | |
CN108122188A (en) | A kind of image encryption method | |
CN107590394B (en) | A kind of image encryption method based on chaotic maps and bit recombination | |
CN103281504A (en) | Chaotic image encryption method with double-direction diffusion mechanism | |
CN104050617B (en) | Image encryption method based on Liu chaos systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170510 |
|
RJ01 | Rejection of invention patent application after publication |