1 / 52

A Neural-Network Approach for Visual Cryptography

A Neural-Network Approach for Visual Cryptography. 虞台文. 大同大學資工所. Content. Overview The Q’tron NN Model The Q’tron NN Approach for Visual Cryptography Visual Authorization Semipublic Encryption General Access Scheme Conclusion. A Neural-Network Approach for Visual Cryptography.

Télécharger la présentation

A Neural-Network Approach for Visual Cryptography

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

  2. Content • Overview • The Q’tron NN Model • The Q’tron NN Approach for • Visual Cryptography • Visual Authorization • Semipublic Encryption • General Access Scheme • Conclusion

  3. A Neural-Network Approach for Visual Cryptography Overview 大同大學資工所

  4. What isVisual Cryptography and Authorization? • Visual Cryptography (VC) • Encrypts secrete into a set of images (shares). • Decrypts secrete using eyes. • Visual Authorization (VA) • An application of visual cryptography. • Assign different access rights to users. • Authorizing using eyes.

  5. What is Semipublic Encryption? • Visual Cryptography (VC) • Encrypts secrete into a set of images (shares). • Decrypts secrete using eyes. • Semipublic Encryption (SE) • An application of visual cryptography. • Hideonlysecret parts in documents • Right information is available if and only if a right key is provided

  6. Access Scheme The (2, 2) access scheme. The Basic Concept of VC Share 1 Target Image (The Secret) Share 2

  7. We get shares after the NN settles down. The Shares Produced by NN Neural Network Share 1 Target Image (The Secret) Share 2

  8. Decrypting Using Eyes Share 1 Share 2

  9. Plane shares are used Example: (2, 2) Share image1 Share image2 Target image

  10. Naor and Shamir (2,2) Shares #1 #2 Superposition of the two shares Pixel Probability Traditional Approach The Code Book White Pixels Black Pixels

  11. P IP VIP … stacking stacking P IP VIP … Very Important Person. The VA Scheme user shares (resource 1) … user shares (resource 2) key share …

  12. The SE Scheme 智慧型系統實驗室資料庫 使用者Key 江素貞 AB 陳美靜 CD 張循鋰 XY 李作中 UV

  13. stacking The SE Scheme public share (database in lab) user shares 循鋰 美靜 作中 素貞 AB CD XY UV keys

  14. A Neural-Network Approach for Visual Cryptography The Q’tron NN Model 大同大學資工所

  15. aiQi Active value External Stimulus Qi{0, 1, …, qi1} IiR . . . qi1 0 1 2 Internal Stimulus Ni Noise Quantum Neuron The Q’tron i (ai )

  16. aiQi Active value Qi{0, 1, …, qi1} . . . qi1 0 1 2 Internal Stimulus Free-Mode Q’tron The Q’tron External Stimulus IiR i (ai ) Ni Noise

  17. aiQi Active value Qi{0, 1, …, qi1} Internal Stimulus Clamp-Mode Q’tron The Q’tron External Stimulus IiR . . . i (ai ) qi1 0 1 2 Ni Noise

  18. . . . Input Stimulus i (ai ) Noise Noise Internal Stimulus Noise Free Term External Stimulus

  19. . . . Level Transition i (ai ) Running Asynchronously

  20. Energy Function Monotonically Nonincreasing Interaction Among Q’trons Constant Interaction with External Stimuli

  21. The Q’tron NN

  22. clamp-mode free-mode free mode  Hidden Q’trons Interface/Hidden Q’trons Interface Q’trons

  23. clamp-mode Interface Q’trons free-mode free mode  Hidden Q’trons Feed a question by clamping some interface Q’trons. Question-Answering

  24. clamp-mode Interface Q’trons free-mode free mode  Hidden Q’trons Read answer when all interface Q’trons settle down. Question-Answering

  25. A Neural-Network Approach for Visual Cryptography The Q’tron NNs for Visual Cryptography Visual Authorization Semipublic Encryption 大同大學資工所

  26. Energy Function for VC Visual Cryptography Image Halftoning Image Stacking +

  27. Graytone Image Halftone Image 0 0 (Transparent) 255 1 Graytone imagehalftone image can be formulated as to minimize the energy function of a Q’tron NN. Image Halftoning Halftoning

  28. In ideal case, each pair of corresponding small areas has the `same’ average graylevel. Graytone Image Halftone Image 0 0 (Transparent) 255 1 Graytone imagehalftone image can be formulated as to minimize the energy function of a Q’tron NN. Image Halftoning Halftoning

  29. The Q’tron NN for Image Halftoning Plane-G (Graytone image) Plane-H (Halftone image)

  30. Halftoning Image Halftoning Plane-G (Graytone image) Clamp-mode Question Answer Free-mode Plane-H (Halftone image)

  31. Restoration Image Restoration Plane-G (Graytone image) Free-mode Answer Question Clamp-mode Plane-H (Halftone image)

  32. + + + + The satisfaction of stacking rule can also be formulated as to minimize the energy function of a Q’tron NN. Stacking Rule

  33. The energy function for the stacking rule. + + + + The satisfaction of stacking rule can also be formulated as to minimize the energy function of a Q’tron NN. Stacking Rule See the paper for the detail.

  34. + The Total Energy Total Energy Image Halftoning Stacking Rule Share 1 Share 2 Share 1 Share 2 Target Target

  35. Target Plane-GT Plane-HT Plane-HS2 Plane-HS1 Plane-GS2 Plane-GS1 Share 1 Share 2 The Q’tron NN for VC/VA

  36. Target Plane-GT Plane-HT Plane-HS2 Plane-HS1 Plane-GS2 Plane-GS1 Share 1 Share 2 Application Visual Cryptography Clamp-Mode Free-Mode Free-Mode Free-Mode Clamp-Mode Clamp-Mode

  37. Plane-GT Plane-HT Plane-HS2 Plane-HS1 Plane-GS2 Plane-GS1 Key Share Application Visual Authorization User Share Authority VIP IP P Key Share User Share

  38. Producing key Share & the firstuser share. Plane-HS1 Plane-GS1 Key Share Application Visual Authorization User Share Authority Clamp-Mode VIP IP P Plane-GT Free-Mode Plane-HT Free-Mode Free-Mode Plane-HS2 Plane-GS2 Clamp-Mode Clamp-Mode Key Share User Share

  39. Producing other user shares. Key Share Application Visual Authorization User Share Authority Clamp-Mode VIP IP P Plane-GT Some are clamped and some are free. Plane-HT Clamp-Mode Free-Mode Plane-HS2 Plane-HS1 Plane-GS2 Plane-GS1 Clamp-Mode Key Share User Share

  40. Producing other user shares. Key Share Application Visual Authorization User Share Authority Clamp-Mode VIP IP P Plane-GT Some are clamped and some are free. Plane-HT Clamp-Mode Free-Mode Plane-HS2 Plane-HS1 Plane-GS2 Plane-GS1 Clamp-Mode Key Share User Share

  41. Key Share Application Visual Authorization User Share Authority Clamp-Mode VIP IP P Plane-GT Some are clamped and some are free. Plane-HT Clamp-Mode Free-Mode Plane-HS2 Plane-HS1 Plane-GS2 Plane-GS1 Clamp-Mode Key Share User Share

  42. User Share VIP IP User Share Key Share User Share P

  43. A Neural-Network Approach for Visual Cryptography General Access Scheme 大同大學資工所

  44. 朝 辭 白 帝 彩 雲 Full Access Scheme  3 Shares 朝辭白帝彩雲間 Shares

  45. 朝 辭 白 帝 彩 雲 Full Access Scheme  3 Shares 朝辭白帝彩雲間 Shares Theoretically, unrealizable. We did it in practical sense.

  46. Full Access Scheme  3 Shares S1 S2 S3 S1+S2 S1+S3 S2+S3 S1+S2+S3

  47. Access Schemewith Forbidden Subset(s) Anyone knows what is it?

  48. 人 之 初 X 性 本 Access Schemewith Forbidden Subset(s) 人之初性本善 Shares Theoretically, realizable.

  49. Access Schemewith Forbidden Subset(s) S1 S2 S3 S1+S2 S1+S3 S2+S3 S1+S2+S3

  50. A Neural-Network Approach for Visual Cryptography Conclusion 大同大學資工所

More Related