CN107392971B - Image encryption effect evaluation method based on gap detection - Google Patents

Image encryption effect evaluation method based on gap detection Download PDF

Info

Publication number
CN107392971B
CN107392971B CN201710667394.XA CN201710667394A CN107392971B CN 107392971 B CN107392971 B CN 107392971B CN 201710667394 A CN201710667394 A CN 201710667394A CN 107392971 B CN107392971 B CN 107392971B
Authority
CN
China
Prior art keywords
vector
gap
image data
dimensional image
dimensional
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710667394.XA
Other languages
Chinese (zh)
Other versions
CN107392971A (en
Inventor
李珊珊
马若兰
周怡同
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Topworld (Xi'an) Optoelectronics Technology Co.,Ltd.
Original Assignee
Changan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changan University filed Critical Changan University
Priority to CN201710667394.XA priority Critical patent/CN107392971B/en
Publication of CN107392971A publication Critical patent/CN107392971A/en
Application granted granted Critical
Publication of CN107392971B publication Critical patent/CN107392971B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T9/00Image coding

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Facsimile Transmission Control (AREA)
  • Image Analysis (AREA)

Abstract

The invention relates to an image encryption effect evaluation method based on gap detection, which comprises the steps of firstly reading an encrypted image file, and obtaining a one-dimensional image data vector by utilizing block scanning; uniformly quantizing the grade of an element value in the one-dimensional image data, and converting the element value into a one-dimensional vector; binarizing element values in the one-dimensional vector to obtain a binarized vector; regarding 0 in the binary vector as a gap between 1, calculating a gap observation probability, and obtaining an observation probability vector according to ascending arrangement of the gap length j; calculating prior probabilities of gaps with different lengths in an ideal randomly distributed binary vector, and obtaining prior probability vectors according to ascending arrangement of the gap lengths j; and calculating the chi-square distance between the observation probability vector and the prior probability vector to serve as a quantized image encryption effect evaluation result, and finishing image encryption effect evaluation based on gap detection. The invention does not need plaintext image information, can evaluate various different types of image encryption schemes, and has high evaluation speed.

Description

Image encryption effect evaluation method based on gap detection
Technical Field
The invention belongs to the technical field of image processing, and relates to an image encryption effect evaluation method based on gap detection.
Background
With the development of hardware technology, image acquisition devices are more and more popular, and when these images are distributed and communicated through public networks, the demand for encryption of private contents is increasing. The image encryption hides visual information through an algorithm, and data security is protected. The evaluation of the image encryption effect can evaluate the effectiveness of the encryption method, optimize the selection of algorithm parameters and improve the encryption scheme. The effectively encrypted image should exhibit a uniform distribution of pixel values and a chaotic detailed state. For the characteristics, the objective encryption effect evaluation method usually calculates the similarity degree between the encrypted image and white noise or random distribution, and the current main methods are as follows:
such as S.Chapaneri, R.Chapaneri, and T.Sarode, "Evaluation of a genetic map Systems for image encryption". in Proceedings of the International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA' 14), pp.59-64, IEEE, Mumbai, India, April 2014. The shannon information entropy of the gray value distribution of the ciphertext image is used as an encryption effect evaluation standard, the gray value one-dimensional distribution of the ciphertext image is counted, the probability space is regarded as the description of the information source, and then the shannon information entropy of the information source is calculated. The method does not consider the relation between adjacent pixels, and cannot estimate the encryption effect of the encryption algorithm with disturbed pixel positions.
Such as a.h.m.ragab, o.s.fall alah, a.y.noaman, and k.w.magld, "Encryption quality evaluation of robust textual block cipher for digital imaging". International Journal of Recent Technology and Engineering, vol.2, No.6, pp.4-9,2014. statistical gray value distributions of plaintext image and ciphertext image, calculate the degree of similarity of these two probability spaces, and evaluate the Encryption quality. This method requires information from the plaintext image, but also does not allow an estimation of the encryption effect of the encryption algorithm with a disturbed pixel position.
Disclosure of Invention
Aiming at the encrypted image, a two-dimensional image matrix is converted into a one-dimensional binary sequence by utilizing block scanning and twice quantization, the result of the gap inspection is calculated as an image encryption quality evaluation standard, plaintext image information is not required, and various image encryption schemes can be evaluated.
In order to achieve the purpose, the invention adopts the following technical scheme:
the method comprises the following steps:
the method comprises the following steps: reading in the encrypted image file to obtain a two-dimensional image data matrix;
step two: converting a two-dimensional image data matrix into a one-dimensional image data vector by utilizing block scanning;
step three: uniformly quantizing element values in the one-dimensional image data into N grades, and converting the N grades into one-dimensional vectors of integers with the element values in a [1, N ] interval; wherein N is an integer greater than 1;
step four: inputting a threshold value t, and binarizing element values in the one-dimensional vector to obtain a binarized vector with element values in a set {0,1 };
step five: regarding 0 in the binary vector as a gap between 1, counting the occurrence frequency of gaps with different lengths in the whole vector, calculating the gap observation probability, and arranging the gap observation probabilities in ascending order according to the gap length j to obtain an observation probability vector;
step six: calculating prior probabilities of gaps with different lengths in an ideal randomly distributed binary vector, and arranging the prior probabilities in ascending order according to the gap length j to obtain a prior probability vector;
step seven: and calculating the chi-square distance between the observation probability vector obtained in the fifth step and the prior probability vector obtained in the sixth step, and taking the chi-square distance as a quantized image encryption effect evaluation result to finish image encryption effect evaluation based on gap detection.
Further, in the first step, the rows of the two-dimensional image data matrix correspond to the width of the encrypted image size, the columns correspond to the height of the encrypted image size, and the elements in the two-dimensional image data matrix correspond to the pixel points of the image, and the value range is [0, 2]L-1]Where L is the pixel grayscale depth.
And further, converting the two-dimensional image data matrix into a one-dimensional image data vector in the second step, namely dividing the two-dimensional image data matrix into non-overlapping blocks, scanning element values in each block, and connecting the scanning results of each block in sequence to complete the conversion from the two-dimensional image data matrix to the one-dimensional image data vector.
Further, scanning the element values in the two-dimensional image data matrix in each block in a scanning mode of a progressive scanning mode, a column-by-column scanning mode, a zigzag scanning mode or a clip-type scanning mode; the value range of the elements in the one-dimensional image data vector is [0, 2]L-1]L is the pixel gray scale depth.
Further, in step five, assuming that a gap with a gap length of j occurs together cjNext, if the longest gap value is J, the observation probability of the gap with the gap length J is:
Figure BDA0001372190780000031
then all o are arranged in ascending order of gap length jjObtaining an observation probability vector O ═ O1,o2,...,oj,...oJ]。
Further, in the ideal randomly distributed binarization vector of the step six, a prior probability calculation formula for the occurrence of gaps with different lengths is as follows:
Figure BDA0001372190780000041
wherein ejIs the prior probability of the gap with the gap length j, t is the threshold value selected during binarization, and all e are arranged according to the ascending order of the gap length jjObtaining a prior probability vector E ═ E1,e2,...,ej,...eJ]。
Further, the chi-square distance in the seventh step is calculated by the following formula:
Figure BDA0001372190780000042
wherein o isjIs the probability of observation of a gap with a gap length of j, ejIs the prior probability of a gap having a gap length j.
Compared with the prior art, the invention has the following beneficial technical effects:
according to the method, the encrypted ciphertext image is converted into a one-dimensional sequence by utilizing block scanning, local neighborhood pixel distribution of the image is considered, neighborhood information of the image is reserved, and the method is favorable for evaluating the encryption effect of the whole image; when the elements of the one-dimensional sequence are converted into binary elements, twice quantization is adopted, more original information can be stored, and the threshold value can be adjusted according to specific conditions. The encryption effect evaluation method provided by the invention considers the characteristics that the huge data volume of image signals and the ciphertext image are close to the noise distribution, does not need plaintext image information, can evaluate various different types of image encryption schemes, has simple parameter selection, easy realization and adjustment of the calculation process and high evaluation speed.
Drawings
FIG. 1 is a flow chart of the present invention;
FIG. 2(a) is a plaintext image; fig. 2(b) is a ciphertext image obtained by encrypting one round of images by using the Anorld cat mapping, fig. 2(c) is a ciphertext image obtained by encrypting three rounds of images by using the Anorld cat mapping, and fig. 2(d) is a ciphertext image obtained by encrypting five rounds of images by using the Anorld cat mapping.
Detailed Description
The present invention will be described in detail below with reference to the accompanying drawings and specific embodiments.
The invention provides an image encryption effect evaluation method based on gap detection, which is used for evaluating the effect of image encryption and comprises the following steps:
the method comprises the following steps: reading in the encrypted image file to obtain a two-dimensional image data matrix, wherein the rows and columns of the matrix correspond to the width and height of the image size, and the elements in the matrix correspond to the pixel points of the image, and the value range is [0, 2]L-1]Where L is the pixel grayscale depth.
Step two: dividing the two-dimensional image data matrix into non-overlapping small blocks according to a certain rule; scanning element values in a two-dimensional image data matrix by using the same rule in each small block, wherein the scanning can be performed by line-by-line, column-by-column, Z-shaped or clip-shaped needle type scanning, and the scanning can keep neighborhood information of a local area of an image; the scanning results in the small blocks are connected in sequence to form a long one-dimensional vector, so that the two-dimensional image data matrix is converted into a one-dimensional image data vector, and the value range of elements in the one-dimensional image data vector is [0, 2]L-1]Is an integer of (1).
Step three: the element values in the one-dimensional image data are uniformly quantized into N levels, for example, 10 levels, and the element with the value a becomes 10a/2 after quantizationLA rounded up value; thus, the one-dimensional image data is converted to an element value of [1,10]]A one-dimensional vector of integers within the interval.
Step four: inputting an integer threshold value t in the range of [1,10], binarizing element values in the one-dimensional vector, wherein the element values larger than t are binarized to be 1, and 0 is taken when the element values smaller than or equal to t are binarized; thus, a binary vector with the element value in the set {0,1} can be obtained;
step five: and (4) regarding 0 in the binary vector as a gap between 1, counting the frequency of the gaps with different lengths in the whole binary vector, and calculating the probability, namely the gap observation probability. Assuming that a gap of length j occurs together cjSecond, if the longest gap value is J, then the observed probability of a gap with length J is
Figure BDA0001372190780000061
Then all o are arranged in ascending order of gap length jjObtaining an observation probability vector O ═ O1,o2,...,oj,...oJ];
Step six: calculating prior probability e of gaps with different lengths in ideal randomly distributed binary vectorsjAnd arranging according to the gap length j in an ascending order to obtain a prior probability vector. In the case where N is 10, the calculation formula is:
ej=(0.1t)j(1-0.1t)2
wherein ejThe prior probability of a gap with the length of j is shown, t is a threshold value selected during binarization, and j is the gap length. Arranging all e in ascending order of gap length jjObtaining a prior probability vector E ═ E1,e2,...,ej,...eJ];
Step seven: and calculating the chi-square distance between the observation probability vector obtained in the fifth step and the prior probability vector obtained in the sixth step to serve as an encryption effect evaluation result of the quantized image. Is calculated by the formula
Figure BDA0001372190780000062
The present invention will be described in further detail with reference to fig. 2(a) to 2(d) and specific examples:
firstly, the ciphertext image is read in to obtain a two-dimensional image data matrix, all of the ciphertext images in fig. 2(a) to 2(d) are 124 × 124, and the depth L is 8, so that the number of rows and columns of the two-dimensional image data matrix is 124 × 124, and the range of values of elements is an integer in [0,255 ].
And secondly, converting the two-dimensional image data matrix into a one-dimensional image data vector by utilizing block scanning. Here, 8 by 8 patches are used, and local neighborhood information of the image is maintained within each patch using column-by-column scanning. If the size of the two-dimensional image data matrix is not divisible by the block size, zero padding may be applied after the last column and the last row.
And thirdly, uniformly quantizing the element values in the one-dimensional image data into 10 grades, and converting the element values into one-dimensional vectors of integers in the interval of [1,10 ]. For the images in fig. 2(a) to 2(d), since the depth L is 8, the element whose value is in the range of [0,25] is quantized to 1, and the element whose value is in the range of [26,52] is quantized to 2 … … and the element whose value is in the range of [231,255] is quantized to 10.
Fourthly, when the input threshold value t is 5, binarizing the element value in the one-dimensional vector, and if the element value is more than 5, obtaining a value of 1 after binarization; and if the element value is equal to or less than 5, the value is 0 after binarization. After processing, obtaining a binary vector with element values in a set {0,1 };
and fifthly, regarding 0 in the binary vector as a gap between 1, counting the occurrence times of gaps with different lengths in the whole vector, calculating the probability of the gaps, and arranging the gaps according to the ascending order of the lengths of the gaps to obtain an observation probability vector. As shown in fig. 2(a), the number of occurrences of a gap having a length of 0 is 5758, and the observation probability is 0.7998.
And sixthly, calculating prior probabilities of gaps with different lengths in the ideal randomly distributed binary vector, and arranging the prior probabilities in an ascending order according to the lengths of the gaps to obtain a prior probability vector. As in fig. 2(a), the gap prior probability of 0 is 0.25 for a length of 0.
And seventhly, calculating the chi-square distance between the two vectors obtained in the fifth step and the sixth step as the quantized image encryption effect evaluation result. As in fig. 2(a), the final quantitative assessment result is 1.2638. The closer this value is to zero, the closer the observed probability vector is to the prior probability vector, i.e., the better the encryption.
Fig. 2(a) is a meaningful plaintext image, and as the number of encryption rounds increases, the ciphertext image becomes more disordered and more appears to be similar to white noise, compared to fig. 2(b) which is obviously more regular than fig. 2(c) and fig. 2(d), fig. 2(c) is more textured than fig. 2(d), and thus the encryption effect of fig. 2(d) should be the best. With the quality evaluation method provided by the invention, the quantitative evaluation results of fig. 2(a), fig. 2(b), fig. 2(c) and fig. 2(d) are 1.2638, 0.9173, 0.2321 and 0.2017 respectively, and the encryption effects are arranged in the order of good to bad in fig. 2(d), fig. 2(c), fig. 2(b) and fig. 2(a), which are consistent with the human visual sense.
The image encryption destroys the neighborhood correlation of the image signal, and the ciphertext image is presented as a meaningless noise image as much as possible. The encryption effect evaluation method provided by the invention considers the characteristics that the huge data volume of image signals and the ciphertext image are close to the noise distribution, and does not need reference image and plaintext image information when evaluating the encryption effect. Various different types of encryption schemes can be evaluated.
The image signal is converted into a one-dimensional binary vector to count the probability distribution of voids of various lengths. In the process of converting the two-dimensional matrix into the one-dimensional vector, the block local scanning method provided by the invention considers the local neighborhood pixel distribution of the image, can store local information and is beneficial to evaluating the encryption effect of the whole image. The size of the block and the local scanning method can be flexibly selected according to actual conditions.
In the conversion process, the invention adopts twice quantization, so that more original information can be stored, and the threshold value can be set according to specific conditions during binarization.

Claims (1)

1. The image encryption effect evaluation method based on gap detection is characterized by comprising the following steps of:
the method comprises the following steps: reading in the encrypted image file to obtain a two-dimensional image data matrix, wherein the rows of the two-dimensional image data matrix correspond to the width of the size of the encrypted image, the columns correspond to the height of the size of the encrypted image, and the elements in the two-dimensional image data matrix correspond to the image of the imagePrime point with value range of [0, 2%L-1]Wherein L is the pixel grayscale depth;
step two: the method comprises the steps of converting a two-dimensional image data matrix into a one-dimensional image data vector by utilizing block scanning, converting the two-dimensional image data matrix into the one-dimensional image data vector, dividing the two-dimensional image data matrix into non-overlapping blocks, scanning element values in each block, connecting the scanning results of each block in sequence to complete the conversion from the two-dimensional image data matrix to the one-dimensional image data vector, and scanning the element values in the two-dimensional image data matrix in each block in a scanning mode of a progressive, column-by-column, Z-shaped or clip-type mode; the value range of the elements in the one-dimensional image data vector is [0, 2]L-1]L is the pixel gray level depth;
step three: uniformly quantizing element values in the one-dimensional image data into N grades, and converting the N grades into one-dimensional vectors of integers with the element values in a [1, N ] interval; wherein N is an integer greater than 1;
step four: inputting a threshold value t, and binarizing element values in the one-dimensional vector to obtain a binarized vector with element values in a set {0,1 };
step five: regarding 0 in the binary vector as a gap between 1, counting the occurrence frequency of gaps with different lengths in the whole vector, calculating the gap observation probability, and arranging the gap observation probabilities in ascending order according to the gap length j to obtain an observation probability vector; assuming that the voids have a void length of jjNext, if the longest gap value is J, the observation probability of the gap with the gap length J is:
Figure FDA0002713026790000021
then all o are arranged in ascending order of gap length jjObtaining an observation probability vector O ═ O1,o2,...,oj,...oJ];
Step six: calculating prior probabilities of gaps with different lengths in an ideal randomly distributed binary vector, and arranging the prior probabilities in ascending order according to the gap length j to obtain a prior probability vector; ideal randomly distributed binary vectorIn the method, the prior probability calculation formula of the occurrence of the gaps with different lengths is as follows:
Figure FDA0002713026790000022
wherein ejIs the prior probability of the gap with the gap length j, t is the threshold value selected during binarization, and all e are arranged according to the ascending order of the gap length jjObtaining a prior probability vector E ═ E1,e2,...,ej,...eJ];
Step seven: calculating the chi-square distance between the observation probability vector obtained in the fifth step and the prior probability vector obtained in the sixth step, taking the chi-square distance as a quantized image encryption effect evaluation result, and finishing image encryption effect evaluation based on gap detection, wherein the chi-square distance is calculated by the following formula:
Figure FDA0002713026790000023
wherein o isjIs the probability of observation of a gap with a gap length of j, ejIs the prior probability of a gap having a gap length j.
CN201710667394.XA 2017-08-07 2017-08-07 Image encryption effect evaluation method based on gap detection Active CN107392971B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710667394.XA CN107392971B (en) 2017-08-07 2017-08-07 Image encryption effect evaluation method based on gap detection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710667394.XA CN107392971B (en) 2017-08-07 2017-08-07 Image encryption effect evaluation method based on gap detection

Publications (2)

Publication Number Publication Date
CN107392971A CN107392971A (en) 2017-11-24
CN107392971B true CN107392971B (en) 2021-01-26

Family

ID=60344973

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710667394.XA Active CN107392971B (en) 2017-08-07 2017-08-07 Image encryption effect evaluation method based on gap detection

Country Status (1)

Country Link
CN (1) CN107392971B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750699A (en) * 2012-06-11 2012-10-24 华南理工大学 Method for measuring image scrambling degree based on information entropies
CN103632375A (en) * 2013-12-10 2014-03-12 三峡大学 Image scrambling evaluation method and image scrambling evaluation device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4909321B2 (en) * 2008-07-09 2012-04-04 株式会社リコー Image processing method, program, image processing apparatus, image forming apparatus, and image forming system
US8351087B2 (en) * 2009-06-15 2013-01-08 Ecole Polytechnique Federale De Lausanne (Epfl) Authentication with built-in encryption by using moire parallax effects between fixed correlated s-random layers
JP5482335B2 (en) * 2010-03-16 2014-05-07 富士通株式会社 Marker placement device, marker detection device, and program
CN103077211B (en) * 2012-12-28 2016-05-04 南京师范大学 A kind of scramble and method of reducing of GIS line of vector face figure layer data
CN103167213B (en) * 2013-02-07 2015-01-07 东北大学 Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750699A (en) * 2012-06-11 2012-10-24 华南理工大学 Method for measuring image scrambling degree based on information entropies
CN103632375A (en) * 2013-12-10 2014-03-12 三峡大学 Image scrambling evaluation method and image scrambling evaluation device

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
Image Encryption Performance Evaluation Based on Poker Test;Shanshan Li et al;《Advances in Multimedia》;20160628;第2.4、4、5.1节 *
两个新的数字图像加密效果评价准则;张雪锋等;《计算机科学》;20100228;第37卷(第2期);264-268 *
基于信息熵的图像置乱程度评价方法;张华熊等;《电路与系统学报》;20071231;第12卷(第6期);95-98 *
基于灰色关联分析的图像置乱程度评价方法;马苗等;《计算机应用研究》;20090430;第26卷(第4期);1595-1597 *

Also Published As

Publication number Publication date
CN107392971A (en) 2017-11-24

Similar Documents

Publication Publication Date Title
Lin et al. Invertible secret image sharing with steganography
Wang et al. Reversible data hiding scheme based on significant‐bit‐difference expansion
Liu et al. A simultaneous scrambling and diffusion color image encryption algorithm based on Hopfield chaotic neural network
Ahmad et al. A new algorithm of encryption and decryption of images using chaotic mapping
CN113904764B (en) Image encryption method based on multi-scale compressed sensing and Markov model
Hong Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique
CN101706946B (en) Digital image encryption method based on DNA sequence and multi-chaotic mapping
CN107094072B (en) Mixed chaotic encryption method based on generalized Henon mapping
CN111050022B (en) High-security image transmission system and method
Trivedi et al. Analysis of several image steganography techniques in spatial domain: A survey
Chai et al. A robust compressed sensing image encryption algorithm based on GAN and CNN
CN110879895A (en) Color image block encryption algorithm based on hyperchaotic system and DNA sequence
Banerjee et al. Hiding & analyzing data in image using extended PMM
Kamil et al. Enhanced flipping technique to reduce variability in image steganography
Habib et al. Enhancement using chaos of a Steganography method in DCT domain
Dong et al. Image encryption algorithm based on chaotic mapping
Masmoudi et al. A new image cryptosystem based on chaotic map and continued fractions
CN107392971B (en) Image encryption effect evaluation method based on gap detection
CN115834792A (en) Video data processing method and system based on artificial intelligence
CN116016795A (en) Image encryption method based on variable step length extraction random number and improved ZigZag conversion
Al-Tuwaijari Image encryption based on fractal geometry and chaotic map
CN110069901B (en) Space domain multi-image encryption algorithm based on chaotic system
Pan et al. Chi-square detection for PVD steganography
Alshami et al. Enhancing quality of lossy compressed images using minimum decreasing technique
CN113222829B (en) Bernstein-based digital image splitting method and image restoration method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230602

Address after: 710086 Room 222, Building W5, Fengdong Free Trade Xintiandi Cultural Innovation Block, No. 2196, Fengdong Avenue (East Section), Fengdong New Town, Xi'an, Shaanxi

Patentee after: Topworld (Xi'an) Optoelectronics Technology Co.,Ltd.

Address before: 710064 Shaanxi province Xi'an Beilin District South Second Ring Road No. 33 in the middle

Patentee before: CHANG'AN University

TR01 Transfer of patent right