CN104021580A - JPEG compression image encryption method applied to smart phone - Google Patents

JPEG compression image encryption method applied to smart phone Download PDF

Info

Publication number
CN104021580A
CN104021580A CN201410279090.2A CN201410279090A CN104021580A CN 104021580 A CN104021580 A CN 104021580A CN 201410279090 A CN201410279090 A CN 201410279090A CN 104021580 A CN104021580 A CN 104021580A
Authority
CN
China
Prior art keywords
encryption
sub
image
dct
chaos
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410279090.2A
Other languages
Chinese (zh)
Other versions
CN104021580B (en
Inventor
金聪
金枢炜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huazhong Normal University
Original Assignee
Huazhong Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huazhong Normal University filed Critical Huazhong Normal University
Priority to CN201410279090.2A priority Critical patent/CN104021580B/en
Publication of CN104021580A publication Critical patent/CN104021580A/en
Application granted granted Critical
Publication of CN104021580B publication Critical patent/CN104021580B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Compression Or Coding Systems Of Tv Signals (AREA)
  • Compression Of Band Width Or Redundancy In Fax (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention relates to the field of image encryption, and provides a JPEG compression image encryption method applied to a smart phone. The method comprises the steps of partitioning a digital image processed through a JPEG compression algorithm into subblock sets with the size being 8*8, wherein the subblock sets do not overlapped; selecting corresponding 8*8 subblocks meeting the certain condition through comparison of the standard deviation of the 8*8 subblocks, and defining the selected subblocks as encryption subblocks; utilizing a chaotic system C1 for conducting the chaotic encryption operation on encryption subblocks DCT ACs for the 8*8 DCT of the encryption subblocks; utilizing a chaotic system C2 for conducting the chaotic encryption operation on all 8*8 DCT DCs; after reversion of the 8*8 DCT, partitioning the image into n1*n2 sub-images, then conducting random pairing on every two sub-images, conducting the transposition operation on the every two paired sub-images, and then conducting whole position changing. According to the JPEG compression image encryption method applied to the smart phone, JPEG compression characteristics are achieved, and image encryption under the environment of the smart phone is achieved.

Description

A kind of jpeg compressed image encryption method that is applied to smart mobile phone
Technical field
The present invention relates to image encryption field, particularly a kind of jpeg compressed image encryption method that is applied to smart mobile phone.
Background technology
Smart mobile phone is in occupation of very important status in daily life, and its range of application relates to the every aspect of the daily lifes such as communication, study, amusement, shopping and online payment.In recent years, although the user of smart mobile phone rapid growth, the information security of smart mobile phone does not obtain enough attention.The developer of smart mobile phone only pays close attention to the experience of catering to user and the safety of ignoring information, and this makes the information security of smart mobile phone be faced with huge challenge, once potential safety hazard appears in smart mobile phone, its consequence is unimaginable.
Widespread use along with the abundant and mobile Internet of smart mobile phone camera function, image has become the important component part of cellphone information, the privacy of image and safety problem become the emphasis that user is concerned about, are also one of focus directions of information security research simultaneously.
The information security technology of traditional computer reaches its maturity through the development of decades, but is limited to hardware frame-saw and the network environment of smart mobile phone, indiscriminately imitates conventional information security protection technology and is not suitable for smart mobile phone.Current, the image information safety problem being caused by smart mobile phone is of common occurrence, and the safety of protection smart mobile phone image information is extremely urgent.
In smart mobile phone, common picture format has JPEG, PNG and BMP, wherein remarkable with the compression effectiveness of PNG and two kinds of forms of JPEG again, is therefore widely used in smart mobile phone.Contrast this two kinds of forms, PNG form belongs to Lossless Compression, and jpeg format belongs to lossy compression method.Obviously, under the limited smart mobile phone condition of storage resources, JPEG compressed format has larger practical value.Meanwhile, the compression algorithm more complicated of jpeg format, the partial information of image can be lost, and this has brought difficulty to encrypting and decrypting.Therefore, the encryption of jpeg compressed image has larger using value for smart mobile phone.
Through the literature search of prior art is found, the image encryption algorithm of a kind of spatial domain and frequency domain combination has been proposed in the paper that Xiao Di and Xie Yi deliver for equal 2013 on " Acta Physica Sinica " periodical " a kind of color image encrypting method of combination JPEG compressed encoding ".First the method spreads scramble in spatial domain to 8 * 8, then utilizes edge detecting technology to find out to comprise more important of detailed information to be encrypted, and cipher round results is remarkable.Its weak point is that the method calculated amount is large, is not adapted at using on smart mobile phone.
Summary of the invention
The object of the present invention is to provide a kind of jpeg compressed image encryption method that is applied to smart mobile phone, when taking into account JPEG compression feature, realize the image encryption under smart mobile phone environment.
A kind of jpeg compressed image encryption method that is applied to smart mobile phone provided by the invention, comprises following content:
(1) overall framework that jpeg compressed image is encrypted.
(2) ac coefficient (AC) of " encryption sub-block " discrete cosine transform (DCT) carries out chaos encryption process.
The DC coefficient of (3) 8 * 8 DCT (DC) is carried out chaos encryption process.
(4) exchange process between image subblock.
(1) overall framework that jpeg compressed image is encrypted
In order to adapt to low-yield, the low-power consumption of smart mobile phone and environment cheaply, main thought of the present invention is: all the elements of digital picture are not encrypted, but the content of only part being selected is encrypted.
For original image i, suppose that the digital picture size after JPEG compression algorithm is processed is m* n, m, nbe 8 multiple, establish m= m/ 8, n= n/ 8.The overall framework that the jpeg compressed image that the present invention realizes is encrypted is realized according to following six steps:
It is 8 * 8 and the sub-block collection of non-overlapping copies that step 1. is blocked into size by the digital picture after JPEG compression algorithm is processed.These 8 * 8 sub-blocks are numbered, might as well be made as i=1,2 ..., m* n.
Step 2. is in order to select " encryption sub-block ", first calculate the standard deviation of each 8 * 8 sub-block, the maximal value of obtaining all standard deviations is designated as Max, selects all standard deviations to be more than or equal to corresponding 8 * 8 sub-blocks of (2/3) Max, and they is defined as to " encryption sub-block ".
Step 3., for 8 * 8 DCT of " encryption sub-block ", is utilized chaos system c 1aC to these " encryption sub-blocks " DCT carries out chaos encryption operation.
Step 4. is utilized hyperchaotic system c 2the DC of all 8 * 8 DCT is carried out to chaos encryption operation.
Step 5. couple all 8 * 8 anti-DCT of calculating.
Step 6. is divided into the image after step 5 is processed n 1* n 1number of sub images, then carries out random pair between two to these subimages, two number of sub images of pairing whole switch again after processing respectively.
In above-mentioned overall framework, in order to realize ciphering process, concrete operating process is as follows.
(2) AC of " encryption sub-block " DCT carries out chaos encryption process
Note " encryption sub-block " DCT is b( i, j); i, j=0,1,2 ..., 7.Read line by line from top to bottom b( i, j) element, but do not contain b(0,0), then changes into a vector.Can obtain the vector that a dimension is 63 like this, be designated as b( i).
Step 1. is the random initial value of selecting in interval [0,1] x(0).
Step 2. is for chaos system c 1
Wherein, 3.5699≤ αthe sequence generating for≤4 o'clock is chaos, and x( i) [0,1].Chaos sequence c 1length be taken as 63.
The encryption of step 3. AC is calculated as follows
Wherein, xOR computing, b new ( i) and b old ( i) be respectively the sub-block vector after " encryption sub-block " encrypts and before encrypting.Initial value x(0) with αvalue as the part of encryption system key.
Step 4. will b(0,0) with b new ( i) totally 64 numerals be again expressed as 8 * 8 sub-blocks.
The DC of (3) 8 * 8 DCT carries out chaos encryption process
Four-dimensional hyperchaotic system C2
Wherein, a, b, c, d, βit is hyperchaotic system c 2control parameter.In parameter a=35, b=3, c=12, d=7, condition under, βinterval (0.085,0.798] time system c 2show as hyperchaos motion.
The four-dimensional hyperchaotic system of step 1. c 2initial value be x 1(0), x 2(0), x 3(0), x 4(0), and interval (0.085,0.798] in provide βvalue.By hyperchaotic system c 2iteration m 1= ceil(( m* n)/2-1) inferior, wherein ceil( a) represent to be more than or equal to asmallest positive integral. x 1(0), x 2(0), x 3(0), x 4(0) as another part of encryption system key.Then produce Hyperchaotic Sequence x j ( i), j=1,2,3,4; i=0,1,2,3,4 ..., m 1.
Step 2. extracts the DC coefficient of all 8 * 8 DCT, forms moK nthe matrix of row d, and be expressed as one m* nthe vector of dimension, is designated as d( i).
Step 3. is taken out two coefficients successively d( l) and d( l+ 1) (here lfor even number, l=0,2,4,6, ...), proceed as follows:
Wherein, , .And
Here, mod ( x, y) represent xdivided by yremainder.
After step 4. will be encrypted d( i) element put back to original position, replace the DC of original 8 * 8 DCT.
(4) exchange process between image subblock
Step 1. is divided into image n 1* n 1number of sub images, to this n 1* n 1number of sub images is matched at random, and two number of sub images of pairing are carried out following operation.
Step 2. is carried out respectively matrix transpose operation by two width subimages of pairing, then this two width subimage integral body is exchanged.
Two width images of all pairings of step 3. all operate according to the method for step 2.
Step 4. obtains the image after encrypting.
In technique scheme, encrypted image is carried out to the inverse operation of above-mentioned ciphering process, can realize the deciphering of encrypted image.Realize deciphering, need to predict initial value, key of chaos system etc.As long as progressively calculate and can obtain deciphering image according to the inverse process of ciphering process.
A kind of jpeg compressed image encryption method that is applied to smart mobile phone of the present invention, simple to operate, calculated amount is little, when taking into account JPEG compression feature, realize the image encryption under smart mobile phone environment.
Accompanying drawing explanation
Fig. 1 is the encryption framework schematic diagram of jpeg compressed image of the present invention.
Fig. 2 is the image to be encrypted of example.
Fig. 3 is " encryption sub-block " region in example image.
Fig. 4 is the image after anti-DCT.
Fig. 5 is block image 1.
Fig. 6 is block image 2.
Fig. 7 is block image 3.
Fig. 8 is block image 4.
Fig. 9 is the encrypted image of example.
examples of implementation
Below with example in detail embodiment of the present invention.The example image that the present invention selects is that size is after JPEG compression algorithm is processed m* n=256 * 256 gray level image pepper, see Fig. 2.
(1) encryption method of jpeg compressed image
(1). by example image pepperbe blocked into size and be 8 * 8 and the sub-block collection of non-overlapping copies.These 32 * 32 8 * 8 sub-blocks are numbered, for i=1,2 ..., 32 * 32.
(2) AC of " encryption sub-block " DCT carries out chaos encryption process
(2). calculate the standard deviation of each 8 * 8 sub-block, obtaining maximum standard deviation is 60.4437, and 8 * 8 sub-blocks that meet standard deviation >=(2/3) * 60.4437 condition have 118, specifically referring to the region indicating in Fig. 3.
(3). in example, get chaos system c 1in α=3.80, initial value is optional in [0,1], afterwards the AC of these 118 8 * 8 DCT is carried out to chaos encryption operation.
The DC of (3) 8 * 8 DCT carries out chaos encryption process
(4). in example, hyperchaotic system c 2parameter value be taken as a=35, b=3, c=12, d=7, β=0.431, and hyperchaotic system c 2iterations m 1ceil ((32 * 32)/2-1)=511.Utilize hyperchaotic system c 2to institute's directed quantity d( i) carry out chaos encryption operation after, then d( i) each component puts back to original position, replaces original DC.
(5). to each 8 * 8 DCT, calculate respectively anti-DCT, can obtain Fig. 4.
(4) exchange process between image subblock
(6). in this example, the 4 width subimages that Fig. 4 is divided into 2 * 2, are shown in respectively Fig. 5, Fig. 6, Fig. 7, Fig. 8.
(7). this 4 width subimage random pair.In this example, select Fig. 5 and Fig. 6 pairing, Fig. 7 and Fig. 8 pairing.This four width subimage is carried out respectively to transposition, then by the Fig. 5 after transposition and the whole switch of Fig. 6, Fig. 7 and the whole switch of Fig. 8.Then four width subimages are reconfigured to the encrypted image that together will obtain exactly, see Fig. 9.
In above-mentioned example, the initial value of known chaos system, key etc., carry out the inverse operation of above-mentioned ciphering process to encrypted image, can realize the deciphering of encrypted image.As long as progressively calculate and can obtain deciphering image according to the inverse process of ciphering process.
The content that this instructions is not described in detail belongs to the known prior art of professional and technical personnel in the field.

Claims (5)

1. a jpeg compressed image encryption method that is applied to smart mobile phone, is characterized in that: for original image i, suppose that the digital picture size after JPEG compression algorithm is processed is m* n, m, nbe 8 multiple, establish m= m/ 8, n= n/ 8; The method comprises the following steps:
(1) digital picture after JPEG compression algorithm is processed being blocked into size is 8 * 8 and the sub-block collection of non-overlapping copies, and these 8 * 8 sub-blocks are numbered, and is made as i=1,2 ..., m* n;
(2) calculate the standard deviation of each 8 * 8 sub-block, the maximal value of obtaining all standard deviations is designated as Max, selects all standard deviations to be more than or equal to corresponding 8 * 8 sub-blocks of (2/3) Max, and they is defined as to " encryption sub-block ";
(3) for 8 * 8 DCT of " encryption sub-block ", utilize chaos system c 1aC to these " encryption sub-blocks " DCT carries out chaos encryption operation;
(4) utilize hyperchaotic system c 2the DC of all 8 * 8 DCT is carried out to chaos encryption operation;
(5) to all 8 * 8, calculate anti-DCT;
(6) image after step (5) is processed is divided into n 1* n 1number of sub images, then carries out random pair between two to these subimages, two number of sub images of pairing whole switch again after processing respectively.
2. the jpeg compressed image encryption method that is applied to smart mobile phone according to claim 1, is characterized in that the described AC to " encryption sub-block " DCT of step (3) carries out the detailed process of chaos encryption operation as follows:
Note " encryption sub-block " is b( i, j); i, j=0,1,2 ..., 7; Read line by line from top to bottom b( i, j) element, but do not contain b(0,0), then changes into a vector, can obtain the vector that a dimension is 63 like this, is designated as b( i);
Step 1, the random initial value of selecting in interval [0,1] x(0);
Step 2, for chaos system c 1
Wherein, 3.5699≤ αthe sequence generating for≤4 o'clock is chaos, and x( i) [0,1], chaos sequence c 1length be taken as 63;
Step 3, the encryption of AC is calculated as follows
Wherein, xOR computing, b new ( i) and b old ( i) be respectively the sub-block vector after " encryption sub-block " encrypts and before encrypting, initial value x(0) with αvalue as the part of encryption system key;
Step 4, will b(0,0) with b new ( i) totally 64 numerals be again expressed as 8 * 8 sub-blocks.
3. the jpeg compressed image encryption method that is applied to smart mobile phone according to claim 1, it is characterized in that step (4) described that the DC of 8 * 8 DCT is carried out to the detailed process of chaos encryption operation is as follows:
Four-dimensional hyperchaotic system c 2
Wherein, a, b, c, d, βit is hyperchaotic system c 2control parameter, in parameter a=35, b=3, c=12, d=7, condition under, βinterval (0.085,0.798] time system c 2show as hyperchaos motion;
Step 1, four-dimensional hyperchaotic system c 2initial value be x 1(0), x 2(0), x 3(0), x 4(0), and interval (0.085,0.798] in provide βvalue, by hyperchaotic system c 2iteration m 1= ceil(( m* n)/2-1) inferior, wherein ceil( a) represent to be more than or equal to asmallest positive integral, x 1(0), x 2(0), x 3(0), x 4(0) as another part of encryption system key; Then produce Hyperchaotic Sequence x j ( i), j=1,2,3,4; i=0,1,2,3,4 ..., m 1;
Step 2, extracts the DC coefficient of all 8 * 8 DCT, forms moK nthe matrix of row d, and be expressed as one m* nthe vector of dimension, is designated as d( i);
Step 3, takes out two coefficients successively d( l) and d( l+ 1), here lfor even number, l=0,2,4,6, ..., proceed as follows:
Wherein, , , and
Here, mod ( x, y) represent xdivided by yremainder;
Step 4, after encrypting d( i) element put back to original position, replace the DC of original 8 * 8 DCT.
4. the jpeg compressed image encryption method that is applied to smart mobile phone according to claim 1, is characterized in that the swap operation detailed process between the described image subblock of step (6) is as follows:
Step 1, is divided into image n 1* n 1number of sub images, to this n 1* n 1number of sub images is matched at random, and two number of sub images of pairing are carried out following operation;
Step 2, carries out respectively matrix transpose operation by two width subimages of pairing, then this two width subimage integral body is exchanged;
Step 3, two width subimages of all pairings all operate according to the method for step 2;
Step 4, obtains the image after encrypting.
5. the jpeg compressed image encryption method that is applied to smart mobile phone according to claim 1, it is characterized in that: image decryption process is the inverse operation to the encrypted image process of final acquisition claimed in claim 1, according to the inverse process of ciphering process, progressively calculates and can obtain deciphering image.
CN201410279090.2A 2014-06-22 2014-06-22 A kind of jpeg compressed image encryption method for being applied to smart mobile phone Expired - Fee Related CN104021580B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410279090.2A CN104021580B (en) 2014-06-22 2014-06-22 A kind of jpeg compressed image encryption method for being applied to smart mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410279090.2A CN104021580B (en) 2014-06-22 2014-06-22 A kind of jpeg compressed image encryption method for being applied to smart mobile phone

Publications (2)

Publication Number Publication Date
CN104021580A true CN104021580A (en) 2014-09-03
CN104021580B CN104021580B (en) 2017-03-15

Family

ID=51438317

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410279090.2A Expired - Fee Related CN104021580B (en) 2014-06-22 2014-06-22 A kind of jpeg compressed image encryption method for being applied to smart mobile phone

Country Status (1)

Country Link
CN (1) CN104021580B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106357408A (en) * 2016-08-29 2017-01-25 广州御银自动柜员机科技有限公司 Electronic signature encryption system
CN107862211A (en) * 2017-11-15 2018-03-30 上海大学 A kind of jpeg image encryption method for evading the filtering of social network-i i-platform image enhaucament
CN111683271A (en) * 2020-04-27 2020-09-18 中国科学院微电子研究所 Video encryption method, terminal equipment and computer storage medium
CN112035847A (en) * 2019-06-03 2020-12-04 湖北微模式科技发展有限公司 Image encryption and decryption method and device, electronic equipment and storage medium
CN114025054A (en) * 2022-01-05 2022-02-08 国网山东省电力公司无棣县供电公司 Intelligent power grid image encryption transmission method and system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102208097A (en) * 2011-05-26 2011-10-05 浙江工商大学 Network image copyright real-time distinguishing method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102208097A (en) * 2011-05-26 2011-10-05 浙江工商大学 Network image copyright real-time distinguishing method

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
CONG JIN等: "Wavelet packets-based robust blind digital watermark scheme", 《2008 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION》 *
姚磊等: "一种基于DCT中频的数字水印算法", 《计算机技术与发展》 *
彭金虎: "DCT域内的数字图像加密算法", 《煤炭技术》 *
曾庆茁: "超混沌理论在数字图像水印中的应用研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
肖迪等: "一种结合JPEG压缩编码的彩色图像加密算法", 《物理学报》 *
邱丽红: "变换域图像水印算法的研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
邱劲等: "基于混沌映射的压缩图像加密算法", 《计算机科学》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106357408A (en) * 2016-08-29 2017-01-25 广州御银自动柜员机科技有限公司 Electronic signature encryption system
CN107862211A (en) * 2017-11-15 2018-03-30 上海大学 A kind of jpeg image encryption method for evading the filtering of social network-i i-platform image enhaucament
CN112035847A (en) * 2019-06-03 2020-12-04 湖北微模式科技发展有限公司 Image encryption and decryption method and device, electronic equipment and storage medium
CN112035847B (en) * 2019-06-03 2023-10-27 湖北微模式科技发展有限公司 Image encryption and decryption methods and devices, electronic equipment and storage medium
CN111683271A (en) * 2020-04-27 2020-09-18 中国科学院微电子研究所 Video encryption method, terminal equipment and computer storage medium
CN111683271B (en) * 2020-04-27 2022-05-06 中国科学院微电子研究所 Video encryption method, terminal equipment and computer storage medium
CN114025054A (en) * 2022-01-05 2022-02-08 国网山东省电力公司无棣县供电公司 Intelligent power grid image encryption transmission method and system

Also Published As

Publication number Publication date
CN104021580B (en) 2017-03-15

Similar Documents

Publication Publication Date Title
Min et al. Arnold transform based image scrambling method
Kurihara et al. An encryption-then-compression system for jpeg standard
Lian Efficient image or video encryption based on spatiotemporal chaos system
Zhou et al. Image encryption using P-Fibonacci transform and decomposition
Yang et al. Visually meaningful encryption for color images by using Qi hyper-chaotic system and singular value decomposition in YCbCr color space
Lee et al. Digital image sharing by diverse image media
CN107078901B (en) Encoder, decoder and the method encrypted using partial data
CN104021580A (en) JPEG compression image encryption method applied to smart phone
Li et al. Joint image encryption and compression schemes based on 16× 16 DCT
Mostafa et al. A robust high capacity gray code-based double layer security scheme for secure data embedding in 3d objects
CN102801947A (en) Semantic information transmission and protection method based on H264
Wang et al. Anti-HEVC recompression video watermarking algorithm based on the all phase biorthogonal transform and SVD
CN106228504A (en) Based on plaintext and the digital image encryption method of key structure encryption parameter
CN102176759A (en) Method for encrypting video streaming information based on hyper-chaotic sequence
Yang et al. An encryption method based on computational ghost imaging with chaotic mapping and DNA encoding
Xiao et al. A joint image encryption and watermarking algorithm based on compressive sensing and chaotic map
CN110298363A (en) A kind of secret protection LBP feature extracting method on encrypted image
Wang et al. Novel self-embedding holographic watermarking image encryption protection scheme
CN114782563B (en) Secret image sharing method and system for JPEG image
CN105721873A (en) Hidden transmission method based on MPEG4/2
Abed A proposed encoding and hiding text in an image by using fractal image compression
Sun et al. A new image block encryption method based on chaotic map and DNA encoding
AlRababah Digital image encryption implementations based on AES algorithm
Zhu et al. TPE-C: Thumbnail-preserving encryption based on chaotic system
Gan et al. A visually secure image encryption scheme using newly designed 1D sinusoidal chaotic map and P-tensor product compressive sensing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170315

Termination date: 20180622