A Neural-Network Approach for Visual Cryptography - PowerPoint PPT Presentation

1 / 52
About This Presentation
Title:

A Neural-Network Approach for Visual Cryptography

Description:

A Neural-Network Approach for Visual Cryptography Content Overview The Q tron NN Model The Q tron NN Approach for Visual ... – PowerPoint PPT presentation

Number of Views:106
Avg rating:3.0/5.0
Slides: 53
Provided by: TaiWe9
Category:

less

Transcript and Presenter's Notes

Title: A Neural-Network Approach for Visual Cryptography


1
A Neural-Network Approach for Visual Cryptography
  • ???

???????
2
Content
  • Overview
  • The Qtron NN Model
  • The Qtron NN Approach for
  • Visual Cryptography
  • Visual Authorization
  • Semipublic Encryption
  • General Access Scheme
  • Conclusion

3
A Neural-Network Approach for Visual Cryptography
  • Overview

???????
4
What isVisual Cryptography and Authorization?
  • Visual Cryptography (VC)
  • Encrypts secrete into a set of images (shares).
  • Decrypts secrete using eyes.
  • Visual Authorization (VA)
  • An application of visual cryptography.
  • Assign different access rights to users.
  • Authorizing using eyes.

5
What is Semipublic Encryption?
  • Visual Cryptography (VC)
  • Encrypts secrete into a set of images (shares).
  • Decrypts secrete using eyes.
  • Semipublic Encryption (SE)
  • An application of visual cryptography.
  • Hide only secret parts in documents
  • Right information is available if and only if a
    right key is provided

6
The Basic Concept of VC
The (2, 2) access scheme.
Share 1
Target Image (The Secret)
Share 2
7
The Shares Produced by NN
We get shares after the NN settles down.
Neural Network
Share 1
Target Image (The Secret)
Share 2
8
Decrypting Using Eyes
Share 1
Share 2
9
Example (2, 2)
Plane shares are used
Share image1
Share image2
Target image
10
Traditional Approach
  • Naor and Shamir (2,2)

The Code Book
White Pixels
Black Pixels
11
The VA Scheme
Very Important Person.
user shares (resource 1)

user shares (resource 2)
key share

12
The SE Scheme
??????????? ??? Key ??? AB ??? CD ???
XY ??? UV
13
The SE Scheme
public share (database in lab)
user shares
??
??
??
??
AB
CD
XY
UV
keys
14
A Neural-Network Approach for Visual Cryptography
  • The Qtron
  • NN Model

???????
15
The Qtron
Quantum Neuron
?i (ai )
16
The Qtron
Free-Mode Qtron
External Stimulus
Ii?R
?i (ai )
Ni
Noise
17
The Qtron
Clamp-Mode Qtron
External Stimulus
Ii?R
. . .
?i (ai )
qi?1
0
1
2
Ni
Noise
18
Input Stimulus
?i (ai )
Noise
Noise
Internal Stimulus
Noise Free Term
External Stimulus
19
Level Transition
?i (ai )
Running Asynchronously
20
Energy Function
Monotonically Nonincreasing
Interaction Among Qtrons
Constant
Interaction with External Stimuli
21
The Qtron NN
22
Interface/Hidden Qtrons
Interface Qtrons
23
Question-Answering
Feed a question by clamping some interface
Qtrons.
24
Question-Answering
Read answer when all interface Qtrons settle
down.
25
A Neural-Network Approach for Visual Cryptography
  • The Qtron NNs for
  • Visual Cryptography
  • Visual Authorization
  • Semipublic Encryption

???????
26
Energy Function for VC
Visual Cryptography
Image Halftoning
Image Stacking

27
Image Halftoning
Graytone image ? halftone image can be formulated
as to minimize the energy function of a Qtron NN.
Halftoning
28
Image Halftoning
Graytone image ? halftone image can be formulated
as to minimize the energy function of a Qtron NN.
Halftoning
29
The Qtron NN for Image Halftoning
Plane-G (Graytone image)
Plane-H (Halftone image)
30
Image Halftoning
Plane-G (Graytone image)
Clamp-mode
Question
Answer
Free-mode
Plane-H (Halftone image)
31
Image Restoration
Plane-G (Graytone image)
Free-mode
Answer
Question
Clamp-mode
Plane-H (Halftone image)
32
Stacking Rule
The satisfaction of stacking rule can also be
formulated as to minimize the energy function of
a Qtron NN.
33
Stacking Rule
The satisfaction of stacking rule can also be
formulated as to minimize the energy function of
a Qtron NN.
See the paper for the detail.
34
The Total Energy
Total Energy
Image Halftoning
Stacking Rule
Share 1
Share 2
Share 1
Target
Target
Share 2
35
The Qtron NN for VC/VA
36
Application ? Visual Cryptography
Clamp-Mode
Free-Mode
Free-Mode
Free-Mode
Clamp-Mode
Clamp-Mode
37
Application ? Visual Authorization
Key Share
User Share
Authority
VIP
IP
P
Key Share
User Share
38
Application ? Visual Authorization
Producing key Share the first user share.
Key Share
User Share
Authority
Clamp-Mode
VIP
IP
P
Plane-GT
Free-Mode
Plane-HT
Free-Mode
Free-Mode
Plane-HS2
Plane-GS2
Clamp-Mode
Clamp-Mode
Key Share
User Share
39
Application ? Visual Authorization
Producing other user shares.
Key Share
User Share
Authority
Clamp-Mode
VIP
IP
P
Plane-GT
Some are clamped and some are free.
Plane-HT
Clamp-Mode
Free-Mode
Plane-HS2
Plane-HS1
Plane-GS2
Plane-GS1
Clamp-Mode
Key Share
User Share
40
Application ? Visual Authorization
Producing other user shares.
Key Share
User Share
Authority
Clamp-Mode
VIP
IP
P
Plane-GT
Some are clamped and some are free.
Plane-HT
Clamp-Mode
Free-Mode
Plane-HS2
Plane-HS1
Plane-GS2
Plane-GS1
Clamp-Mode
Key Share
User Share
41
Application ? Visual Authorization
Key Share
User Share
Authority
Clamp-Mode
VIP
IP
P
Plane-GT
Some are clamped and some are free.
Plane-HT
Clamp-Mode
Free-Mode
Plane-HS2
Plane-HS1
Plane-GS2
Plane-GS1
Clamp-Mode
Key Share
User Share
42
User Share
VIP
IP
User Share
Key Share
User Share
P
43
A Neural-Network Approach for Visual Cryptography
  • General
  • Access Scheme

???????
44
Full Access Scheme ? 3 Shares
???????
Shares
45
Full Access Scheme ? 3 Shares
???????
Shares
Theoretically, unrealizable. We did it in
practical sense.
46
Full Access Scheme ? 3 Shares
S1
S2
S3
S1S2
S1S3
S2S3
S1S2S3
47
Access Schemewith Forbidden Subset(s)
Anyone knows what is it?
48
Access Schemewith Forbidden Subset(s)
??????
Shares
Theoretically, realizable.
49
Access Schemewith Forbidden Subset(s)
S1
S2
S3
S1S2
S1S3
S2S3
S1S2S3
50
A Neural-Network Approach for Visual Cryptography
  • Conclusion

???????
51
Conclusion
  • Different from traditional approaches
  • No codebook needed.
  • Operating on gray images directly.
  • Complex access scheme capable.
  • http//www.suchen.idv.tw/

52
Thanks for Attention
??
Write a Comment
User Comments (0)
About PowerShow.com