Literature DB >> 35765311

Efficient Storage and Encryption of 32-Slice CT Scan Images Using Phase Grating.

Anirban Patra1,2, Arijit Saha3, Kallol Bhattacharya2.   

Abstract

Medical images are treated as sensitive as it carries patients' confidential information and hence must be protected from unauthorized access. So, a strong encryption mechanism is a primary criterion to transmit these images over the internet to protect them from intruders. In many existing algorithms, noise affection in the extracted images is high, hence not suitable for medical data encryption. Here, we present a new method using phase grating to multiplex as well as encrypting 32 cross-sectional CT scan images (slices) in a single canvas for optimization of storage space and improvement of security. The entire process is divided into a few steps. Before transmission, the main canvas is encrypted with the help of a random phase matrix. The main canvas is further encrypted by the transposition method to enhance security. After decryption, inverse Fourier transform is applied at the proper location of the decrypted canvas to extract the images from the spectra. Quality is measured with peak-signal-to-noise ratio and correlation coefficient methods. Here, it is greater than 38 and the correlation coefficient is close to 1 for all images, thereby indicating of good quality of extracted images. The effect of three common cyber-attacks (viz. known-plaintext attack, chosen-plaintext attack, and chosen-ciphertext attack) is also presented here. The correlation coefficient during cyber-attacks is found to be close to zero, which implies the robustness of the algorithm against cyber-attacks. Finally, a comparison with existing techniques shows the effectiveness of the proposed method. © King Fahd University of Petroleum & Minerals 2022.

Entities:  

Keywords:  CT scan image; Cyber attack; Inverse Fourier transform; Phase grating; Random phase matrix

Year:  2022        PMID: 35765311      PMCID: PMC9226269          DOI: 10.1007/s13369-022-06986-0

Source DB:  PubMed          Journal:  Arab J Sci Eng        ISSN: 2191-4281            Impact factor:   2.807


Introduction

In the medical field, the use of digital images is increasing day by day. Hence, large storage space is required to save these images for processing and future use. In addition, images must be protected from different cyber-attacks during transmission. So, to optimize storage space and protect medical images, it is necessary to compress and encrypt them. The challenge is therefore to transmit and store medical information without satisfactory security and fidelity [1]. A well-known diagnostic tool used to analyze several diseases is the computed tomography (CT) scan which uses X-ray measurement from multiple angles to generate cross-section images (slices) [2, 3]. In other medical imaging processes, the movement of organs due to respiration is a critical issue. CT scan images eliminate this drawback and provide a better output [4-6]. Recently, CT scan images are also widely used to diagnose the patient affected by a coronavirus [7]. Different approaches have been proposed for the multiplexing of images as well as holograms. In a recently proposed method, the images are multiplexed by phase grating with variable frequency and orientation angle. Due to modulation at a fixed orientation, multiple spectral bands are generated where only three visible spectral spots are taken into consideration (for each image). Variation of grating frequency and orientation angle create more than one spatial frequency spectrum plane which is added together to form a single package before transmission. During reconstruction, inverse Fourier transform (FT) in addition to low-pass filter (LPF) is applied at selected spots [8]. They also utilized this system to multiplex medical and remote sensing images by replacing phase grating with amplitude grating with reduced efficiency [9, 10]. Apart from amplitude and phase gratings, a few other grating systems are also used for the multiplexing of images due to their special properties. The reflective grating has minimized the number of required optical components in multiplexing [11]. Grating along with optical 2f system is applied to multiplex as well as compress low-resolution images. Here, each modulated image is added together to create a single element before reconstruction [12]. Color images are multiplexed by modulating with blazed gratings, where three planes of each image (red, green, and blue) are modulated separately by blazed grating and superposed into a phase-only hologram wherefrom the images are reconstructed. In this system, 256 color images can be multiplexed into 512 × 512 pixel holograms [13]. J E Harvey et.al. discussed the characteristics of different gratings and their applications in image multiplexing [14]. Apart from the grating, some well-known optical processes like wavelength-based systems [15], orthogonal phase encoding [16], angular phase encoding process, etc. [17, 18], are also used to multiplex and encrypt images and holograms. In a wavelength-based system, initially, images are modulated by the double phase encoding method before encryption. By maintaining a minimum separation of multiplexing wavelengths, storage capacity can be increased. An orthogonal phase encoding system is proposed to store and encrypt 3D images as well as holograms with a binary mask. Though the phase encoding system enhances storage capacity, it suffers from spatial phase fluctuations which increase cross-correlation noise. Sequential and non-sequential ray-tracing techniques in addition to couple wave methods of aperiodic gratings are applied to multiplex volume holograms in volume holographic imaging systems (VHIS). This can be easily implemented into commercial packages [19]. Using theta modulation, Lohman-type holograms are modulated individually, followed by the addition of modulated output to generate a single hologram [20]. The major drawbacks of these systems are noise affection, limitation to low-resolution images, and comparatively long reconstruction time. In the encryption process, the grating has also taken a major role in the last few years. Encryption with random phase matrix [8], laterally translated phase grating [20], optical double-image cryptography [21], diffraction imaging with interference superposition [22] are recently proposed by researchers. In laterally translated phase grating, a series of random phase masks is placed in the optical path which generates encrypted messages when they are laterally translated by phase grating. Cyphertexts are decrypted in an interference superposition system utilizing the properties of grating diffraction in an optical 4f system. Apart from the grating, other popular methods of image encryption are joint transform correlate [23], iterative algorithm process [24], use of chaotic system [25, 26], optical interference [27] etc. In an optical interference system, images are encrypted using optical interference and two-phase plates. This simple system doesn’t require any iterative algorithm for decryption. To improve this system and to eliminate the contour problem, a three-phase plate technique is proposed by researchers. [28] Fractional Fourier transform is also widely used for image encryption for many years [29, 30]. Use of Krawtchouk polynomials [31], Meixner polynomials [32], Hahn polynomials [33] and Charlier polynomials [34] are being recently used by researchers nowadays for feature extraction from images. In many existing works, the quality of output images is poor due to noise affection. Moreover, nowhere a proper discussion regarding the effect of cyber-attacks on medical images is reported. So, in this research paper, we proposed a novel technique of medical image compression as well as encryption using phase grating to efficiently store and encrypt the images. Here, 32 numbers of CT scan images are compressed and encrypted with the help of phase grating and random phase matrix. The entire operation is done in the frequency domain. In general, most of the attacking tools or software are designed on the basis of spatial domain encryption algorithms. Hence, frequency domain systems provide better security in cyber-attack spatial domain algorithms. It is well known that the efficiency of the amplitude grating at + 1 order is only 6.25% since the remaining light energy is lost due to the absorption by the grating. Hence the phase grating has been preferred due to its low power loss and better transmission contrast compared to amplitude grating [14]. Initially, CT scan images are modulated one by one using high-frequency grating along the x-axis. As a result of modulation, three spectral spots are generated for each image. Each spectral spot contains image information; hence we have selected only one spot for further processing. The selected 32 spectral spots are sequentially placed into the main canvas for multiplexing. Before transmission, the canvas which contains all spectra are multiplied by a random phase matrix for encryption. To enhance security, it is further encrypted by the transposition method. At the receiving end, after decryption processes, inverse Fourier transform is applied at selected zones for retrieval of images. To evaluate the quality of the extracted images, peak-signal-to-noise ratio (PSNR) and correlation coefficient methods are used here. The correlation coefficient is used also to measure the security of the cyber-attacked (known-plaintext attack, chosen-plaintext attack, and chosen-ciphertext attack) images. The mathematical analysis and a brief discussion of the methodology used are presented here. In the Results and Discussion section, a comparative study with some previous methods and the result of the three above-mentioned cyber-attacks have been discussed. The following section deals with the methodology, where detailed process is explained using the numerical equation, flowchart, diagram, and pseudocode. In Sect. 3, the results have been shown and discussion on the quality of output images is given, including a comparative study with existing works. The effects of different cyber-attacks have been discussed in Sect. 4. Finally, the conclusion has been drawn in Sect. 5.

Methodology

Theory

Here the entire methodology is presented using mathematical equations, diagrams and flowchart. Flowchart is used to provide a basic idea of the process, and the process of practical implementation is illustrated with a bit of pseudocode. In this section, we have discussed the process part by part and provided detail information of them. Initially, the reason of high frequency selection for modulation is explained, followed by discussion of modulation process with numerical equations. In the next part, we have illustrated the extraction process and then quality detection of extracted images is discussed. At last, pseudo coding is provided for detail explanation.

Frequency Selection

In order to avoid aliasing problem high grating frequency is selected. Each CT scan image is modulated by a phase grating at 0° orientation angle (along the x-axis). Resultant spectra consist of multiple spots where the FT of the image exists. The selected frequency is 1000 lines per mm (which is sufficient to overcome the aliasing problem).

Modulation Process

Let us assume that the selected image is modulated by phase gratings of the form where is the grating frequency and m is the phase contrast. The modulated object may be expressed as [35] By applying convolution theorem, the FT of this modulated object is given by and ‘q’ is the diffraction order. The diffraction pattern, as given by Eq. 2, is a series of diffraction spots each containing the object spectrum. Considering the zero-order and the first two orders of the spatial frequency spectrum, Eq. 2 may be represented by Figure 1 represents spatial frequency spectrum of modulated image . The higher-order spots in the generated spatial frequency spectra are the replica of each other; hence, we have chosen only one spectral spot from each modulated image. The lower spectrum (marked by arrow Sign) of all image is selected here which is shown in Fig. 2.
Fig. 1

Generated spatial frequency spectrum of modulated image 1

Fig. 2

Selected spot out of three spectral spots

Generated spatial frequency spectrum of modulated image 1 Selected spot out of three spectral spots

Encryption of Filtered Spatial Frequency Spectrum

Selected spatial frequency spectrum which is shown in Fig. 2 is automatically placed in the main canvas (size 4100 × 2050) by maintaining a sequence (here 32 spectra are automatically arranged in 8 rows and 4 columns). After completion of this process, main canvas (where 32 spectra are placed) is multiplied by random phase matrix (R) for 1st phase of encryption. Since one of our primary objectives is to optimize storage space, a large canvas is not considered. Figure 3a illustrates the canvas after sequential placing of spectra, whereas Fig. 3b shows the encrypted canvas after first stage of encryption.
Fig. 3

a Canvas after sequential placement of selected spectra (marked with the spatial frequency spectrum of particular images); b first stage of encrypted canvas after multiplication with random phase matrix

a Canvas after sequential placement of selected spectra (marked with the spatial frequency spectrum of particular images); b first stage of encrypted canvas after multiplication with random phase matrix Figure 3a represents the full canvas where 32 spectra are stored in 4-column and 8-row series. The number in the canvas indicates the selected spatial frequency spectrum of the particular image. After sequential placing of all selected spectra, it is multiplied by the random phase matrix which is shown in Fig. 3b. To enhance the security of the system, the encrypted images in the canvas are further encrypted by the transposition method which is shown in Fig. 4.
Fig. 4

Second stage of encrypted canvas after transposition

Second stage of encrypted canvas after transposition

Retrieval of Images from Encrypted Canvas

In this process, transmitted main canvas consists of 32 spectra containing information of all images. Automatic placement of spectra is done by selecting number of rows, columns as well as sequential cell no in the program. This is performed in the transmitter side before encryption. Individual encryption of every spatial frequency spectrum reduces the security as it is easy to isolate the image position as well as total number. Hence, we have encrypted the whole canvas to enhance security. After receiving the encrypted canvas, 32 spectra have been retrieved by decryption process. As encryption is done is two phases, two-phase decryption is performed here. In the first phase of decryption, reverse transposition process is done followed by division of 1st phase decrypted canvas by random phase matrix. To get the information of all images from spectra, inverse Fourier transform (FT) is executed in the next process. This part may be done in two ways: The first one is automatic application of inverse FT in the sequential way at spectra of decrypted canvas, and the second one is application of inverse FT at maximum intensity areas in addition with low-pass filter (LPF). In the second process, initially a pixel intensity graph of each row or column must be calculated before inverse FT application. We have selected the first process to minimize the time requirement. Decrypted canvas is illustrated in Fig. 5.
Fig. 5

Decrypted canvas marked with the spatial frequency spectrum of particular images

Decrypted canvas marked with the spatial frequency spectrum of particular images The selected spots of decrypted canvas are marked as 1 to 32. Size (pixel resolution) of each marked spot is 480 × 480 here, whereas the pixel resolution of total canvas is 4100 × 2050.

Flowchart of the System

A general view of the important steps is shown in the flowchart. Flowchart and diagram of the entire process in both transmitter and receiver sections are illustrated in the Figs. 6 and 7, respectively.
Fig. 6

Fundamental steps of our proposed method indicated in the flowchart

Fig. 7

Schematic diagram of the entire process of the proposed method

Fundamental steps of our proposed method indicated in the flowchart Schematic diagram of the entire process of the proposed method

Quality Checking of Output Image

In this section, quality checking of the extracted images using PSNR and correlation coefficient is explained in detail. To check the quality of output images, two methods are used: (i) conventional PSNR method and (ii) correlation coefficient method. For the last few years, PSNR and correlation coefficient methods are used as quality checking parameter in many image processing techniques [36-40] (i) PSNR method: This is measured with the help of mean square error (MSE). In general, a PSNR value of the reconstructed image greater than 35 is considered as a good-quality image [41-44]. Mean square error (MSE) can be represented aswhere are the original image and the retrieved image, respectively; (ii) Correlation coefficient: This measures the dependency of two adjacent pixels which are closely correlated in all directions. If the two values are closely related, the correlation coefficient is close to one; otherwise, its value is close to zero. where r indicates the correlation coefficient; x and y are the intensity values of the ith pixel of original and output images; and x and y represent the average intensity values of original and extracted images.

Pseudo Code of the Entire Process

Main function a. Select grating frequency = 1000 for modulation b. Define Grating function c. Define a 1 × 30 array for the reading of 30 CT scan high-resolution images d. Create a canvas for storing spectra and split it into 30 divisions e. Create a loop for i = 1: 30 i. Modulate image1 with Grating Equation ii. Fourier transform of the modulated output iii. Create spectra of image 1 iv. Select a spectrum (LSB) v. Place it at jth location of canvas vi. Call next image (i = 2) vii. Repeat process i to v viii. Place it (j + 1) location of canvas ix. Continue up to i = 30 x. End f. Create random phase matrix g. Multiply canvas with random phase matrix h. Decrypt the encrypted canvas (dividing by random phase matrix) i. Inverse Fourier transform at selected zones j. Calculate PSNR and correlation coefficient For Cyber Attack a. Decrypt encrypted canvas (g) using different methods b. Calculate PSNR and correlation coefficient c. End

Results and Discussion

We have used 32 high-resolution CT scan images (shown in Fig. 8) of pixel size 677 × 598. Entire work is done using MATLAB simulation software, 16 GB RAM and Intel Core i5 Processor. No optical hardware is used in our research work. CT scan images are collected from the website of National Institute of Health which is freely available for research work.
Fig. 8

32-Slice CT scan images used as input

32-Slice CT scan images used as input 32-Slice CT scan images are displayed in Fig. 8. During the retrieval process, inverse Fourier transform is applied at selected areas of the canvas where the spots exist. Extracted images are displayed in Fig. 9.
Fig. 9

Extracted CT scan images

Extracted CT scan images PSNR values and correlation coefficients of output images are tabulated in Table 1. PSNR value is used to highlight the visual quality of the images, whereas correlation coefficients are calculated to measure similarity with the original images.
Table 1

Quality check result

Image no.PSNRCorr. CoefImage no.PSNRCorr. Coef.
139.20.9971739.10.997
238.80.9961838.80.996
339.20.9971938.80.996
439.10.9972038.90.996
538.90.9962139.30.998
6390.9972239.10.997
738.80.9962338.90.996
838.80.9962439.20.997
938.90.9962538.90.997
1039.20.9972639.30.998
1138.90.9962738.90.997
1238.90.99728390.996
1338.90.9972938.90.996
1439.10.9973039.20.997
1539.20.9973138.90.996
1638.90.9963238.80.996
Quality check result The size of all selected images is 677 × 598. To save storage space, we have transmitted only a part of the entire spectrum. The compression ratio is shown in Table 2.
Table 2

Calculation of storage space

The original size of each image(pixel resolution)Total no. of imagesTotal size of original images(pixel resolution)Total spatial frequency spectrum size(pixel resolution)Ratio of storage space saved(original spatial frequency spectrum size/transmitted spatial frequency spectrum size)
677 × 59832677 × 598 × 32 = 1,29,55,0724100 × 2050 = 84,05,0001.34: 1
Calculation of storage space Size of each image = 677 × 598 = 364.2 kB. Size of 32 images = 11.3 MB. Size of transmitted spatial frequency spectrum = 8.41 MB. In medical image processing, images carry a lot of information. Hence during compression of images loss of information should be as minimum as possible. Therefore, many existing algorithms are not suitable for medical image compression. In our proposed algorithm, compression ratio is not so high. Moreover, PSNR value is greater than 38 in all cases and correlation coefficient is also close to 1. Each one indicates the good quality standard of output images, and hence this system is acceptable for medical image compression.

Comparison with Previous Methods

Table 3 highlights the comparison between our proposed method and that of few existing techniques already reported. However, effects of different cyber-attacks on medical images have not been reported in any scholarly articles.
Table 3

Comparison table

ReferencesLimitationsOur proposed scheme
[8, 9]

PSNR < 32

A limited no. of images (only 10 images) are used

PSNR > 38

32 images are used

[36]Correlation coefficient = 0.946Correlation coefficient > 0.99
[37]Correlation coefficient (0.72 – 0.96)Correlation coefficient > 0.99
[38]Correlation coefficient (0.98)Correlation coefficient > 0.99
[39]

Correlation coefficient (0.95 – 0.99)

Only Lena image is used

Correlation coefficient > 0.99

32 number of images are used

[40]PSNR < 29PSNR > 38
Comparison table PSNR < 32 A limited no. of images (only 10 images) are used PSNR > 38 32 images are used Correlation coefficient (0.95 – 0.99) Only Lena image is used Correlation coefficient > 0.99 32 number of images are used Table 3 shows the limitations of some existing methods. The main drawbacks of the existing systems are low PSNR (< 32), correlation coefficient not close to one, limited for few images, etc. Our algorithm overcomes these limitations which are clearly shown in the table.

Result and Analysis of Possible Attacks

To evaluate the security of the proposed method, correlation coefficients in cyber-attacks have been calculated. In this method, exact decryption is impossible without knowledge of the proper algorithm as well as the key selection and zonal position of images. Some spatial domain attacks are not effective in this method as it is performed in the frequency domain. We have analyzed our result for three cyber-attacks: (a) known-plaintext attack, (b) chosen-plaintext attack and (c) chosen-ciphertext attack, respectively. In each possible attack, correlation coefficients are calculated and the result is illustrated in Table 4.
Table 4

Correlation coefficients

Case NoKnown-plaintext attackChosen-plaintext attackChosen-ciphertext attackCase noKnown-plaintext attackChosen-plaintext attackChosen-ciphertext attack
10.0610.0260.00870.1960.0110.159
20.0780.0140.00380.1410.0230.008
30.0320.0170.24190.0280.2380.233
40.3810.0490.267100.2550.3880.068
50.3440.0730.235110.0840.0620.337
60.3090.0420.272120.2720.0270.094
Correlation coefficients

Known-Plaintext Attack

In a known-plaintext attack, the intruder has information about at least one message of both the plaintext as well as the ciphertext. The primary objective of the attacker is to guess about the secret key or algorithm which helps to decrypt any further messages. We have tried with different keys and algorithms, and the output result is displayed in Fig. 10a–l, respectively.
Fig. 10

a–l Recovered known-plaintext-attacked images

a–l Recovered known-plaintext-attacked images

Chosen-Plaintext Attack

In a chosen-plaintext attack, an attacker can select arbitrary plaintext images which are to be encrypted and generates corresponding ciphertexts. By this method, the attacker tends to know the secret key as well as the algorithm of the system. Without any knowledge of the secret key, the attacker tries to get information about the secret key to generate an algorithm that allows him to decrypt any encrypted messages. By this method, the attacker is able to analyze the system characteristic using any type of input data. Alternately we can say that in a chosen-plaintext attack, an attacker chooses any plaintext data to be encrypted and then tries to analyze the secret encryption key or algorithm after receiving the corresponding ciphertext. Here the main objective of the attacker is to know the key or algorithm by which the attacker can decrypt any message. Our experimental result is shown in Fig. 11 a–l, and it indicates the ruggedness of the proposed method. Like a known-plaintext attack, here also, the correlation coefficient is used to measure the security.
Fig. 11

a–l Recovered chosen-plaintext attacked images

a–l Recovered chosen-plaintext attacked images

Chosen-Ciphertext Attack

In chosen-ciphertext attack, an attacker tries to analyze the secret key or algorithm using any chosen ciphertext together with corresponding plaintexts. Primary objective of the attacker is to get more information about the secret key or algorithm of the system. The intruder has capability to create the victim (person knows the key) decipher any ciphertext and send him back the result. By analyzing the chosen ciphertext and also the corresponding received plaintext, the intruder tries to guess the secret key that has been employed by the victim. During the chosen-ciphertext attack, an attacker analyzes any chosen ciphertexts with their corresponding plaintexts. The main aim is to get knowledge regarding the secret key or algorithm. Our experimental result is shown in Fig. 12a–l, respectively.
Fig. 12

a–l Recovered Chosen-ciphertext attacked images

a–l Recovered Chosen-ciphertext attacked images The effect of three commonly known cyber-attacks has been discussed. Output in each case is displayed, and correlation coefficient values are placed in Table 4. From Table 4, it is clear that in maximum cases, correlation coefficients values are close to zero which implies that our proposed system is highly secured. Table 4 displays the effect of three commonly known cyber-attacks. We have examined its robustness with the help of correlation coefficient value. In all cases, the value is far away from one which proves that there is no similarity with the original images. Hence this system is prone to cyber-attack.

Conclusion

In cryptography, encryption of medical images is considered one of the most predominant areas of application. This encryption is required to enhance confidentiality as well as to protect the images from intruders. In this communication, we have presented an encryption technique along with the multiplexing process of medical images with the help of phase grating and random phase matrix to optimize storage space and enhance security level. To maintain a better quality of output images, the compression ratio is kept low here. PSNR is nearly 39, and the correlation coefficient is 0.997 for each image which implies that the quality of the output images is really good. During different cyber-attack, correlation coefficients are also close to zero, which indicates the high security of our proposed scheme. This method shows the applicability of phase grating for information storage. Here, we have worked with 32 CT scan images (grayscale). In the case of color images, spatial frequency spectra for three different color channels will be required to multiplex the same number of images, and hence more storage space is required to save them. So, compression of color images for storage space optimization using this algorithm is a challenging task.
  15 in total

1.  Optical double-image cryptography based on diffractive imaging with a laterally-translated phase grating.

Authors:  Wen Chen; Xudong Chen; Colin J R Sheppard
Journal:  Appl Opt       Date:  2011-10-10       Impact factor: 1.980

2.  Optical smart packaging to reduce transmitted information.

Authors:  Luisa Cabezas; Myrian Tebaldi; John Fredy Barrera; Néstor Bolognini; Roberto Torroba
Journal:  Opt Express       Date:  2012-01-02       Impact factor: 3.894

3.  Optical image hiding with silhouette removal based on the optical interference principle.

Authors:  Xiaogang Wang; Daomu Zhao
Journal:  Appl Opt       Date:  2012-02-20       Impact factor: 1.980

4.  Optical image encryption based on interference.

Authors:  Yan Zhang; Bo Wang
Journal:  Opt Lett       Date:  2008-11-01       Impact factor: 3.776

Review 5.  Computed tomography: revolutionizing the practice of medicine for 40 years.

Authors:  Geoffrey D Rubin
Journal:  Radiology       Date:  2014-11       Impact factor: 11.105

6.  Information encryption based on the customized data container under the framework of computational ghost imaging.

Authors:  Sui Liansheng; Du Cong; Xu Minjie; Tian Ailing; Asundi Anand
Journal:  Opt Express       Date:  2019-06-10       Impact factor: 3.894

7.  Simulations and experiments of aperiodic and multiplexed gratings in volume holographic imaging systems.

Authors:  Yuan Luo; Jose Castro; Jennifer K Barton; Raymond K Kostuk; George Barbastathis
Journal:  Opt Express       Date:  2010-08-30       Impact factor: 3.894

8.  Acute appendicitis: meta-analysis of diagnostic performance of CT and graded compression US related to prevalence of disease.

Authors:  Adrienne van Randen; Shandra Bipat; Aeilko H Zwinderman; Dirk T Ubbink; Jaap Stoker; Marja A Boermeester
Journal:  Radiology       Date:  2008-08-05       Impact factor: 11.105

Review 9.  Three-dimensional imaging techniques: A literature review.

Authors:  Orhan Hakki Karatas; Ebubekir Toy
Journal:  Eur J Dent       Date:  2014-01
View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.