Title: A Neural-Network Approach for Visual Cryptography
1A Neural-Network Approach for Visual Cryptography
???????
2Content
- Overview
- The Qtron NN Model
- The Qtron NN Approach for
- Visual Cryptography
- Visual Authorization
- Semipublic Encryption
- General Access Scheme
- Conclusion
3A Neural-Network Approach for Visual Cryptography
???????
4What isVisual Cryptography and Authorization?
- Visual Cryptography (VC)
- Encrypts secrete into a set of images (shares).
- Decrypts secrete using eyes.
- Visual Authorization (VA)
- An application of visual cryptography.
- Assign different access rights to users.
- Authorizing using eyes.
5What is Semipublic Encryption?
- Visual Cryptography (VC)
- Encrypts secrete into a set of images (shares).
- Decrypts secrete using eyes.
- Semipublic Encryption (SE)
- An application of visual cryptography.
- Hide only secret parts in documents
- Right information is available if and only if a
right key is provided
6The Basic Concept of VC
The (2, 2) access scheme.
Share 1
Target Image (The Secret)
Share 2
7The Shares Produced by NN
We get shares after the NN settles down.
Neural Network
Share 1
Target Image (The Secret)
Share 2
8Decrypting Using Eyes
Share 1
Share 2
9Example (2, 2)
Plane shares are used
Share image1
Share image2
Target image
10Traditional Approach
The Code Book
White Pixels
Black Pixels
11The VA Scheme
Very Important Person.
user shares (resource 1)
user shares (resource 2)
key share
12The SE Scheme
??????????? ??? Key ??? AB ??? CD ???
XY ??? UV
13The SE Scheme
public share (database in lab)
user shares
??
??
??
??
AB
CD
XY
UV
keys
14A Neural-Network Approach for Visual Cryptography
???????
15The Qtron
Quantum Neuron
?i (ai )
16The Qtron
Free-Mode Qtron
External Stimulus
Ii?R
?i (ai )
Ni
Noise
17The Qtron
Clamp-Mode Qtron
External Stimulus
Ii?R
. . .
?i (ai )
qi?1
0
1
2
Ni
Noise
18Input Stimulus
?i (ai )
Noise
Noise
Internal Stimulus
Noise Free Term
External Stimulus
19Level Transition
?i (ai )
Running Asynchronously
20Energy Function
Monotonically Nonincreasing
Interaction Among Qtrons
Constant
Interaction with External Stimuli
21The Qtron NN
22Interface/Hidden Qtrons
Interface Qtrons
23Question-Answering
Feed a question by clamping some interface
Qtrons.
24Question-Answering
Read answer when all interface Qtrons settle
down.
25A Neural-Network Approach for Visual Cryptography
- The Qtron NNs for
- Visual Cryptography
- Visual Authorization
- Semipublic Encryption
???????
26Energy Function for VC
Visual Cryptography
Image Halftoning
Image Stacking
27Image Halftoning
Graytone image ? halftone image can be formulated
as to minimize the energy function of a Qtron NN.
Halftoning
28Image Halftoning
Graytone image ? halftone image can be formulated
as to minimize the energy function of a Qtron NN.
Halftoning
29The Qtron NN for Image Halftoning
Plane-G (Graytone image)
Plane-H (Halftone image)
30Image Halftoning
Plane-G (Graytone image)
Clamp-mode
Question
Answer
Free-mode
Plane-H (Halftone image)
31Image Restoration
Plane-G (Graytone image)
Free-mode
Answer
Question
Clamp-mode
Plane-H (Halftone image)
32Stacking Rule
The satisfaction of stacking rule can also be
formulated as to minimize the energy function of
a Qtron NN.
33Stacking Rule
The satisfaction of stacking rule can also be
formulated as to minimize the energy function of
a Qtron NN.
See the paper for the detail.
34The Total Energy
Total Energy
Image Halftoning
Stacking Rule
Share 1
Share 2
Share 1
Target
Target
Share 2
35The Qtron NN for VC/VA
36Application ? Visual Cryptography
Clamp-Mode
Free-Mode
Free-Mode
Free-Mode
Clamp-Mode
Clamp-Mode
37Application ? Visual Authorization
Key Share
User Share
Authority
VIP
IP
P
Key Share
User Share
38Application ? Visual Authorization
Producing key Share the first user share.
Key Share
User Share
Authority
Clamp-Mode
VIP
IP
P
Plane-GT
Free-Mode
Plane-HT
Free-Mode
Free-Mode
Plane-HS2
Plane-GS2
Clamp-Mode
Clamp-Mode
Key Share
User Share
39Application ? Visual Authorization
Producing other user shares.
Key Share
User Share
Authority
Clamp-Mode
VIP
IP
P
Plane-GT
Some are clamped and some are free.
Plane-HT
Clamp-Mode
Free-Mode
Plane-HS2
Plane-HS1
Plane-GS2
Plane-GS1
Clamp-Mode
Key Share
User Share
40Application ? Visual Authorization
Producing other user shares.
Key Share
User Share
Authority
Clamp-Mode
VIP
IP
P
Plane-GT
Some are clamped and some are free.
Plane-HT
Clamp-Mode
Free-Mode
Plane-HS2
Plane-HS1
Plane-GS2
Plane-GS1
Clamp-Mode
Key Share
User Share
41Application ? Visual Authorization
Key Share
User Share
Authority
Clamp-Mode
VIP
IP
P
Plane-GT
Some are clamped and some are free.
Plane-HT
Clamp-Mode
Free-Mode
Plane-HS2
Plane-HS1
Plane-GS2
Plane-GS1
Clamp-Mode
Key Share
User Share
42User Share
VIP
IP
User Share
Key Share
User Share
P
43A Neural-Network Approach for Visual Cryptography
???????
44Full Access Scheme ? 3 Shares
???????
Shares
45Full Access Scheme ? 3 Shares
???????
Shares
Theoretically, unrealizable. We did it in
practical sense.
46Full Access Scheme ? 3 Shares
S1
S2
S3
S1S2
S1S3
S2S3
S1S2S3
47Access Schemewith Forbidden Subset(s)
Anyone knows what is it?
48Access Schemewith Forbidden Subset(s)
??????
Shares
Theoretically, realizable.
49Access Schemewith Forbidden Subset(s)
S1
S2
S3
S1S2
S1S3
S2S3
S1S2S3
50A Neural-Network Approach for Visual Cryptography
???????
51Conclusion
- Different from traditional approaches
- No codebook needed.
- Operating on gray images directly.
- Complex access scheme capable.
- http//www.suchen.idv.tw/
52Thanks for Attention
??