CN109727294A - A kind of thresholding visual cryptography Matrix Construction Method - Google Patents

A kind of thresholding visual cryptography Matrix Construction Method Download PDF

Info

Publication number
CN109727294A
CN109727294A CN201810524916.5A CN201810524916A CN109727294A CN 109727294 A CN109727294 A CN 109727294A CN 201810524916 A CN201810524916 A CN 201810524916A CN 109727294 A CN109727294 A CN 109727294A
Authority
CN
China
Prior art keywords
matrix
subset
array
basic matrix
forb
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810524916.5A
Other languages
Chinese (zh)
Inventor
唐聃
于瀛
舒红平
高燕
范迪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu University of Information Technology
Original Assignee
Chengdu University of Information Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu University of Information Technology filed Critical Chengdu University of Information Technology
Priority to CN201810524916.5A priority Critical patent/CN109727294A/en
Publication of CN109727294A publication Critical patent/CN109727294A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of thresholding visual cryptography Matrix Construction Method, this method comprises: construct accumulative array, accumulative array is by | P | × | T | Matrix C A constitute;After determining array P, authorized subset and forbidding subset, it may be determined that F, F ΓIn set;Determine set Γ, ΓThe number of middle set is equal to ΓNumber;Structural matrix CA;The basic matrix S of accumulative array is constructed according to (n, n) threshold schemes0' and S1';The distribution situation for the position that every row Hamming weight is 1 in observation matrix CA, the row sequence where the position that Hamming weight is 1 in Matrix C A, as basic matrix S0And S1Row sequence;And so on, obtain final basic matrix S0And S1.Since the columns of the basic matrix constituted is relatively fewer, and the more few then pixel expansion of columns is smaller, so that image will not be stretched excessively and influence to decrypt effect when Restore Secret, to largely ensure that the quality of decrypted image.

Description

A kind of thresholding visual cryptography Matrix Construction Method
Technical field
The invention belongs to secret sharing and visual cryptography fields, more particularly to a kind of novel thresholding visual cryptography square Battle array building method.
Background technique
By Naor and Shamir, in 1994, European cryptography annual meeting above mentioned visual cryptography (Visual Cryptograghy) Out, it is combined privacy sharing and digital picture based on threshold secret sharing thought, forms a new research Hot spot.The principle of visual cryptography is that original image resolves into the random visual cryptography subgraph of two width, close from single vision Want that it is impossible for obtaining original image information in numeral figure.Only when two width visual cryptography subgraphs are completely coincident, original graph As can just be reproduced.
Secret-sharing algorithm in visual cryptography is that Secret Image is encoded to several by pixel to be known as shared part (Shares) in image, black, the white pixel point random distribution in part is shared, therefrom cannot get any letter about Secret Image Breath.The algorithm of Restore Secret in visual cryptography is very simple, need to only print shared part of certain amount to transparent film simultaneously It is overlapped, the vision system of people can directly recognize information.
It when the decryption principle of visual cryptography is eye-observation object, is told on and the comparison with ambient enviroment , and the vision system of the mankind can only experience one piece out there is no the color that method clearly identifies each pixel in image The average effect that region all pixels color shows.Therefore, when shared part is superimposed, as long as the gray scale difference of monochrome pixels is enough Greatly, human visual system can interpret Secret Image.Due to visual cryptography theory α coefficient and Restore Secret it is simple Property, application prospect is boundless.
With the fast development of internet, digital picture is widely used, and the safety problem of image increasingly merits attention. To protect image, the technologies such as image encryption, Information hiding and digital watermarking propose in succession, however require when the decryption of these methods It calculates.Naor and Shamir is put forward for the first time (k, n) visual cryptography scheme within 1994, and the program is by Secret Image as unit of pixel It is encrypted, obtains n and share part.Each sharing part is disorderly and unsystematic all as random noise, attacker can not directly by Individual is shared part and gets secret information.When sharing part superposition when k or more than k, secret information can be gone out by eye recognition, Without any calculating;And when sharing part superposition less than k, then it is unable to Restore Secret information.
Summary of the invention
It is an object of the invention to propose one premised on the general access structure of the Naor and Shamir model of extension Kind is used for the visual cryptography Matrix Construction Method of general access structure.
A kind of novel thresholding visual cryptography matrix construction scheme, comprising the following steps:
Step 1: construct accumulative array, accumulative array is by | P | × | T | Matrix C A constitutes, wherein array P is it is known that authorize Subset isForbidding subset is Γ=B | B ∈ ΓForb,B∪ {i}∈ΓQualTo all i ∈ P B;
Step 2: after determining array P, authorized subset and forbidding subset, it may be determined that F, F are set ΓIn subclass;
Step 3: determining set Γ, ΓThe number of middle set is equal to ΓNumber;
Step 4: structural matrix CA;
Step 5: constructing the basic matrix S of accumulative array according to (n, n) threshold schemes0' and S1';
Step 6: the distribution situation for the position that every row Hamming weight is 1 in observation matrix CA, the Hamming weight in Matrix C A For the row sequence where 1 position, as basic matrix S0And S1Row sequence;
Step 7: and so on, obtain final basic matrix S0And S1
Wherein, (ΓQualForb) indicate general access structure, general access structure be enable P={ 1 ..., n } be participate in Person's set, 2pIndicate the power set of set P, ΓQualAnd ΓForbIt is known respectively as authorized subset and forbids subset;They meet following Condition:
(2)ΓQual∩ΓForb=φ, if this access structure is healthy and strong structure, ΓQual∪ΓForb=2p
It enablesThen Γ0Referred to as Minimal authorized subset;Enable Γ =B | B ∈ ΓForb,B∪{i}∈ΓQualTo all i ∈ P B, then ΓReferred to as maximum forbids subset.
Further, method as described above, in step 5, the building method of (n, the n) threshold schemes are as follows:
Step 1: determining the n value of threshold schemes, which is the line number of formation base matrix;
Step 2: basic matrix S0It is the column by being constituted from 0 to 0/1 value that Hamming weight n is even number;
Step 3: basic matrix S1It is the column by being constituted from 0 to 0/1 value that Hamming weight n is even number;
Step 4: finally obtaining basic matrix S after Total enumeration0And S1
The utility model has the advantages that
The matrix of building method construction through the invention, since the columns of the basic matrix constituted is relatively fewer, and arranges The more few then pixel expansion of number is smaller, so that image will not be stretched excessively and influence to decrypt effect when Restore Secret, thus It largely ensure that the quality of decrypted image.In addition, building method proposed by the invention, even if it is close not grasp vision The people of code and related mathematical knowledge can also construct thresholding visual cryptography scheme, construction process by simple algebraic expression evaluation It is simple and efficient.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, the technical solution below in the present invention carries out clear Chu is fully described by, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
It is proposed that basic matrix is the core of most of scheme so far from visual cryptography.Current major part visual cryptography scheme Definition is based on (k, n) thresholding.Classical thresholding visual cryptography scheme (k, n)-VCS is using n × m Boolean matrix as element Set C0And C1Composition.When sharing white (black) pixel, at random from C0(C1) one matrix of middle selection, determine n shared parts The color of middle m sub-pixel.C0And C1Meet following two condition:
(1) as k≤P≤n,B0The obtained vector V of any P row inclusive-OR operation0Meet W (V0)≤t-α m;B1The obtained vector V of any P row inclusive-OR operation1Meet W (V1) >=t. wherein W (V) indicate V Hamming weight Amount;
(2) as 0 < p < k, if D0(D1) it is C0(C1) in all matrix i1,i2,...,ipThe matrix stack that row is constituted It closes, then D0=D1.
In above-mentioned definition, C0And C1It is basic matrix group, m is pixel expansion, and α is relative mistake.
When whether measure the building method of a certain basic matrix has universality, the aspect being considered as has two: first is that constructing Basis matrix pixel expansion it is whether sufficiently small, the sufficiently small number for meaning that original pixels and being extended to sub-pixel of m, i.e., The area of the distortion of image;Second is that whether the relative mistake as corresponding to the basic matrix constructed is sufficiently large, what α embodied is secret figure The recovery effects of picture, it is sufficiently large to mean that the image effect after restoring is more preferable.
The characteristics of visual cryptography is a kind of application of the Secret sharing techniques in digital image arts, inherits privacy sharing, There is recovery simplicity simultaneously.And in practical applications, often use 2 basis matrix S0And S1To construct (k, n) visual secret Sharing scheme, i.e. set of matrices C0And C1It is to S respectively0And S1All column all over taking various be arranged to make up.
Basic conception
General access structure be enable P={ 1 ..., n } be participant set, 2pIndicate the power set of set P, then general access Structure can use (ΓQualForb) indicate, ΓQualAnd ΓForbIt is known respectively as authorized subset and forbids subset.They meet The following conditions:
(2)ΓQual∩ΓForb=φ, if this access structure is healthy and strong structure, ΓQual∪ΓForb=2p
It enablesThen Γ0Referred to as Minimal authorized subset.Enable Γ =B | B ∈ ΓForb,B∪{i}∈ΓQualTo all i ∈ P B, then ΓReferred to as maximum forbids subset.
General access structure model is instruction (ΓQualForb) it is an access structure, then the Boolean matrix of two n × m C0And C1, define a general access structure visual cryptography (ΓQualForb, m)-VCS, and if only if existence value α (m) and SetMeet the following conditions:
(1) (comparative condition) any authorized subset X={ i1,i2,...,ip}∈ΓQualBy being superimposed their transparent Film can restore the picture shared.It is, to arbitrary M ∈ C0, the i-th of M1,i2,...,ipRow vector or operation obtain To vector V meet w (V)≤tX- α (m) m, and for arbitrary M ∈ C1, the i-th of M1,i2,...,ipRow vector or operation obtain To vector V meet w (V) >=tX
(2) (safety conditions) arbitrarily forbid subset X={ i1,i2,...,ip}∈ΓForbIt is unable to obtain about machine Close image file, it is, taking C0In each matrix i-th1,i2,...,ipRow constitutes new p × m matrix, by these matrixes Constitute p × m set of matrices D0, take C1In each matrix i-th1,i2,...,ipRow constitutes new p × m matrix, by these matrixes Constitute p × m set of matrices D1, D0And D1It include identical matrix (D with identical probability0And D1It is undistinguishable).
(n, n) threshold schemes are illustrated first below:
The constructing plan of (n, n) thresholding is equivalent to basic matrix S0And S1Building, the method is as follows: matrix S0In 1 number that each column vector is included is even number, matrix S1Each of column vector 1 number that is included all be Odd number.
Step 1: determining the n value of threshold schemes, which is the line number of formation base matrix;
Step 2: basic matrix S0It is such as n=3 by from 0 to the column that constitute of 0/1 value that Hamming weight n is even number, then S0It is the column that the Total enumeration for the various situations of 0/1 value for being 0 and 2 by Hamming weight is constituted;
Step 3: basic matrix S1It is such as n=3 by from 0 to the column that constitute of 0/1 value that Hamming weight n is even number, then S1It is the column that the Total enumeration for the various situations of 0/1 value for being 1 and 3 by Hamming weight is constituted;
Step 4: finally obtaining basic matrix S after Total enumeration0And S1
Embodiment 1:
Below according to specific embodiment that (n, the n) threshold schemes are illustrated:
If n=4, the line number of basis matrix is 4, and the construction of column is i.e. according to S0Only comprising Hamming weight be even number 0,2, 4, S1It is only carried out comprising 1,3 method that Hamming weight is odd number, two basic matrixs are as follows:
Embodiment 2:
N=2 is enabled, then the line number of basis matrix is 2, and the construction of column is i.e. according to S0It is only 0, the 2 of even number comprising Hamming weight, S1It is only carried out comprising 1 method that Hamming weight is odd number, two basic matrixs are as follows:
It is that the present invention is to provide the visual cryptography matrix construction sides of the integrating method realization arbitrary structures from array below Method.
It add up to be constructed on the basis of above-mentioned (n, n) threshold schemes from array.An accumulative total is constructed first Group, add up array construction method: construction one | P | × | T | Matrix C A, wherein | T |=| Γ|, and if only if When, CA (i, j)=1, F is set ΓMiddle subclass.
P is that the participant of visual cryptography scheme gathers, it is believed that array P is known.And T refer to forbidding subset and Gather included in authorized subset;The number for being intended to refer to element in set of set plus two vertical lines, constitutes accumulative total The line number and columns of group are the number of the number of element and element in set T in set P.Specifically, first in array P in example 3 Plain number is 4, and authorization that array T is included, to forbid the subclass number in set be 3, therefore accumulative array is 4 rows 3 column composition 's.
Assuming that S0'、S1'Be (| Γ|, | Γ|) basic matrix of scheme, S0And S1It is the basic matrix of general access structure.If The row number that element is 1 in the i-th row in accumulative array CA is ji,1,...,ji,g, then by S0'Jthi,1,...,ji,gCapable or conduct S0The i-th row, so can be obtained by the basic matrix S of general access structure0And S1
Due to being needed before constructing last basic matrix by means of first constructing accumulative array, and the basic matrix of accumulative array is just It is to be constructed according to (n, n) threshold schemes, basic matrix is S0'And S1', prime is intended merely to and " accumulating from array " side The basic matrix S finally constructed in method0And S1It distinguishes.
Step 1: construct accumulative array, accumulative array is by | P | × | T | Matrix C A constitutes, wherein array P is it is known that authorize Subset isForbidding subset is Γ=B | B ∈ ΓForb,B∪ {i}∈ΓQualTo all i ∈ P B;
Step 2: after determining array P, authorized subset and forbidding subset, it may be determined that F, F ΓIn set;Step 3: Determine set Γ, ΓThe number of middle set is equal to ΓNumber;
Step 4: structural matrix CA;
Step 5: constructing the basic matrix S of accumulative array according to (n, n) threshold schemes0'And S1'
Step 6: the distribution situation for the position that every row Hamming weight is 1 in observation matrix CA, the Hamming weight in Matrix C A For the row sequence where 1 position, as basic matrix S0And S1Row sequence;
Step 7: and so on, obtain final basic matrix S0And S1
Embodiment 3:
Matrix Construction Method of the present invention is illustrated below by way of the present embodiment:
Enable n=4, P={ 1,2,3,4 }, Γ0={ { 1,2 }, { 2,3 }, { 3,4 } }, Γ={ { 1,4 }, { 1,3 }, { 2,4 } } It can thus be concluded that F1={ Isosorbide-5-Nitrae }, F2={ 1,3 }, F3={ 2,4 }, then | T |=| Γ|=3, accumulative array is constructed first, can be obtained It arrives:
Then the basic matrix of (3,3) thresholding is constructed:
The available col1=of CA { 3 } are observed at this time, col2={ 1,2 }, col3={ 1,3 }, col4={ 2 } thus may be used It is as follows to calculate basic matrix, col1=3, therefore by S0'And S1'The 3rd row as S0And S1The first row;Col2={ 1,2 }, By S0'And S1'1,2 rows do or operation after as S0And S1The second row, therefore analogize, it is as follows that basic matrix can be obtained:
The building of the basis matrix of arbitrary structures visual cryptography may be implemented by the method for the invention.And have as one Hide with for the visual cryptography for sharing stealth technology, extremely important one in the judgment criteria of scheme quality itself, i.e., Whether the pixel expansion for the program is sufficiently small and whether relative mistake is sufficiently large.The relationship of pixel expansion and relative mistake is into Inverse ratio, pixel expansion is smaller, and relative mistake is bigger, and the effect that the program is implemented is also better.Pixel expansion is most intuitive Performance, the columns of the basic matrix exactly constituted is less as far as possible, and otherwise image excessively stretches and then can when Restore Secret Influence decryption effect.This advantage embodies in the present invention, and the columns of as basic matrix is less, this can largely be protected Demonstrate,prove the quality of image.
Visual cryptography has the outstanding advantages of simplicity, hardly needs to the application of the visual cryptography scheme constructed Password is gained knowledge, but constructing visual cryptography scheme using the typical construction methods of existing document is not a simple process. Building method proposed by the invention, can also be by simple generation even if the people for not grasping visual cryptography and related mathematical knowledge Numerical expression evaluation constructs thresholding visual cryptography scheme, and construction process is simple and efficient.Finally, it should be noted that above embodiments are only To illustrate technical solution of the present invention, rather than its limitations;Although having been carried out with reference to the foregoing embodiments to the present invention detailed Illustrate, those skilled in the art should understand that: its still can to technical solution documented by foregoing embodiments into Row modification or equivalent replacement of some of the technical features;And these are modified or replaceed, and do not make relevant art side The essence of case departs from the spirit and scope of the technical scheme of various embodiments of the present invention.

Claims (2)

1. a kind of novel thresholding visual cryptography matrix construction scheme, which comprises the following steps:
Step 1: construct accumulative array, accumulative array is by | P | × | T | Matrix C A constitute, wherein array P is it is known that authorized subset ForForbidding subset is Γ=B | B ∈ ΓForb,B∪{i}∈ ΓQualTo all i ∈ P B;
Step 2: after determining array P, authorized subset and forbidding subset, it may be determined that F, F are set ΓIn subclass;
Step 3: determining set Γ, ΓThe number of middle set is equal to ΓNumber;
Step 4: structural matrix CA;
Step 5: constructing the basic matrix S of accumulative array according to (n, n) threshold schemes0'And S1'
Step 6: the distribution situation for the position that every row Hamming weight is 1 in observation matrix CA, Hamming weight is 1 in Matrix C A Position where row sequence, as basic matrix S0And S1Row sequence;
Step 7: and so on, obtain final basic matrix S0And S1
Wherein, (ΓQualForb) indicate general access structure, general access structure be enable P={ 1 ..., n } be participant collection It closes, 2pIndicate the power set of set P, ΓQualAnd ΓForbIt is known respectively as authorized subset and forbids subset;They meet following item Part:
(1)
(2)ΓQual∩ΓForb=φ, if this access structure is healthy and strong structure, ΓQual∪ΓForb=2p
It enablesThen Γ0Referred to as Minimal authorized subset;Enable Γ=B | B∈ΓForb,B∪{i}∈ΓQualTo all i ∈ P B, then ΓReferred to as maximum forbids subset.
2. the method according to claim 1, wherein in step 5, the building method of (n, the n) threshold schemes Are as follows:
Step 1: determining the n value of threshold schemes, which is the line number of formation base matrix;
Step 2: basic matrix S0It is the column by being constituted from 0 to 0/1 value that Hamming weight n is even number;
Step 3: basic matrix S1It is the column by being constituted from 0 to 0/1 value that Hamming weight n is even number;
Step 4: finally obtaining basic matrix S after Total enumeration0And S1
CN201810524916.5A 2018-05-28 2018-05-28 A kind of thresholding visual cryptography Matrix Construction Method Pending CN109727294A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810524916.5A CN109727294A (en) 2018-05-28 2018-05-28 A kind of thresholding visual cryptography Matrix Construction Method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810524916.5A CN109727294A (en) 2018-05-28 2018-05-28 A kind of thresholding visual cryptography Matrix Construction Method

Publications (1)

Publication Number Publication Date
CN109727294A true CN109727294A (en) 2019-05-07

Family

ID=66293884

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810524916.5A Pending CN109727294A (en) 2018-05-28 2018-05-28 A kind of thresholding visual cryptography Matrix Construction Method

Country Status (1)

Country Link
CN (1) CN109727294A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111182171A (en) * 2019-12-16 2020-05-19 成都信息工程大学 Image secret sharing information processing method and system for staged decryption
CN111711456A (en) * 2020-05-21 2020-09-25 成都信息工程大学 Threshold matrix construction method, system, storage medium, program, and storage system
CN112182543A (en) * 2020-10-14 2021-01-05 桂林电子科技大学 Visual password method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1729495A (en) * 2002-12-18 2006-02-01 皇家飞利浦电子股份有限公司 Key synchronization in a visual cryptographic system
CN101751658A (en) * 2009-12-09 2010-06-23 清华大学 Image visual separate-management method with minimum pixel expansion and optimal contrast

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1729495A (en) * 2002-12-18 2006-02-01 皇家飞利浦电子股份有限公司 Key synchronization in a visual cryptographic system
CN101751658A (en) * 2009-12-09 2010-06-23 清华大学 Image visual separate-management method with minimum pixel expansion and optimal contrast

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
GIUSEPPE ATENIESE: "Visual Cryptography for General Access Structures", 《INFORMATION AND COMPUTATION》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111182171A (en) * 2019-12-16 2020-05-19 成都信息工程大学 Image secret sharing information processing method and system for staged decryption
CN111182171B (en) * 2019-12-16 2022-03-15 成都信息工程大学 Image secret sharing information processing method and system for staged decryption
CN111711456A (en) * 2020-05-21 2020-09-25 成都信息工程大学 Threshold matrix construction method, system, storage medium, program, and storage system
CN112182543A (en) * 2020-10-14 2021-01-05 桂林电子科技大学 Visual password method
CN112182543B (en) * 2020-10-14 2024-04-30 桂林电子科技大学 Visual password method

Similar Documents

Publication Publication Date Title
Zhan et al. Cross-utilizing hyperchaotic and DNA sequences for image encryption
Duan et al. New color image encryption scheme based on multi-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method
Zhang et al. Image encryption based on three-dimensional bit matrix permutation
Wu et al. Extended capabilities for XOR-based visual cryptography
Wu et al. Random grid-based visual secret sharing for general access structures with cheat-preventing ability
CN109727294A (en) A kind of thresholding visual cryptography Matrix Construction Method
CN109003218A (en) A method of construction thresholding visual cryptography matrix
CN101604439A (en) A kind of color image encrypting method based on multi-chaos system
Zhang et al. F-TPE: Flexible thumbnail-preserving encryption based on multi-pixel sum-preserving encryption
CN107592198A (en) The four-dimensional Hopfield neural network images encryption method of quantum Fourier conversion
CN105975869B (en) Adaptively selected encryption method based on salient region
Chen et al. Visual secret sharing with cheating prevention revisited
CN112417467A (en) Image encryption method based on anti-neurocryptography and SHA control chaos
CN104050617B (en) Image encryption method based on Liu chaos systems
CN108600574A (en) Secret sharing method based on Faster R-CNN &#39; s
CN115102683A (en) Method, system and equipment for encrypting and decrypting face image based on target detection technology
Yang et al. New privilege-based visual cryptography with arbitrary privilege levels
Zhu et al. Thumbnail-preserving encryption based on improved logistic system
Wei et al. Light field image encryption based on spatial-angular characteristic
Lee et al. Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique
Singh et al. Image encryption algorithm based on circular shift in pixel bit value by group modulo operation for medical images
Yang et al. MTVSS:(M) isalignment (T) olerant (V) isual (S) ecret (S) haring on resolving alignment difficulty
Yu et al. Multi-secret visual cryptography with deterministic contrast
Liang et al. Fedcip: Federated client intellectual property protection with traitor tracking
Chiu et al. An XOR-based progressive visual cryptography with meaningful shares

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190507