Title: A NeuralNetwork Approach for Visual Cryptography and Authorization
1A Neural-Network Approach for Visual Cryptography
and Authorization
Tatung University Taiwan
2Content
- Overview
- The Qtron NN Model
- The Qtron NN Approach for
- Visual Cryptography
- Visual Authorization
- Conclusion
3A Neural-Network Approach for Visual Cryptography
and Authorization
Tatung University Taiwan
4What isVisual Cryptography and Authorization?
- Visual Cryptography (VC)
- Encrypts secrete into a set of images (shares).
- Decrypts secrete using eyes.
- Visual Authorization (VA)
- An application of visual cryptography.
- Assign different access rights to users.
- Authorizing using eyes.
5The Basic Concept of VC
The (2, 2) access scheme.
Share 1
Target Image (The Secret)
Share 2
6The Shares Produced by NN
We get shares after the NN settles down.
Neural Network
Share 1
Target Image (The Secret)
Share 2
7Decrypting Using Eyes
Share 1
Share 2
8The VA Scheme
Very Important Person.
user shares (resource 1)
user shares (resource 2)
key share
9A Neural-Network Approach for Visual Cryptography
and Authorization
Tatung University Taiwan
10The Qtron
Quantum Neuron
?i (ai )
11The Qtron
Free-Mode Qtron
External Stimulus
Ii?R
?i (ai )
Ni
Noise
12The Qtron
Clamp-Mode Qtron
External Stimulus
Ii?R
. . .
?i (ai )
qi?1
0
1
2
Ni
Noise
13Input Stimulus
?i (ai )
Noise
Noise
Internal Stimulus
Noise Free Term
External Stimulus
14Level Transition
?i (ai )
Running Asynchronously
15Energy Function
Monotonically Nonincreasing
Interaction Among Qtrons
Constant
Interaction with External Stimuli
16The Qtron NN
17Interface/Hidden Qtrons
Interface Qtrons
18Question-Answering
Feed a question by clamping some interface
Qtrons.
19Question-Answering
Read answer when all interface Qtrons settle
down.
20A Neural-Network Approach for Visual Cryptography
and Authorization
- The Qtron NNs for
- Visual Cryptography
- Visual Authorization
Tatung University Taiwan
21Energy Function for VC
Visual Cryptography
Image Halftoning
Image Stacking
22Image Halftoning
Graytone image ? halftone image can be formulated
as to minimize the energy function of a Qtron NN.
Halftoning
23Image Halftoning
Graytone image ? halftone image can be formulated
as to minimize the energy function of a Qtron NN.
Halftoning
24The Qtron NN for Image Halftoning
Plane-G (Graytone image)
Plane-H (Halftone image)
25Image Halftoning
Plane-G (Graytone image)
Clamp-mode
Question
Answer
Free-mode
Plane-H (Halftone image)
26Image Restoration
Plane-G (Graytone image)
Free-mode
Answer
Question
Clamp-mode
Plane-H (Halftone image)
27Stacking Rule
The satisfaction of stacking rule can also be
formulated as to minimize the energy function of
a Qtron NN.
28Stacking Rule
The satisfaction of stacking rule can also be
formulated as to minimize the energy function of
a Qtron NN.
See the paper for the detail.
29The Total Energy
Total Energy
Image Halftoning
Stacking Rule
Share 1
Share 2
Share 1
Target
Target
Share 2
30The Qtron NN for VC/VA
31Application ? Visual Cryptography
Clamp-Mode
Free-Mode
Free-Mode
Free-Mode
Clamp-Mode
Clamp-Mode
32Application ? Visual Authorization
Key Share
User Share
Authority
VIP
IP
P
Key Share
User Share
33Application ? Visual Authorization
Producing key Share the first user share.
Key Share
User Share
Authority
Clamp-Mode
VIP
IP
P
Plane-GT
Free-Mode
Plane-HT
Free-Mode
Free-Mode
Plane-HS2
Plane-GS2
Clamp-Mode
Clamp-Mode
Key Share
User Share
34Application ? Visual Authorization
Producing other user shares.
Key Share
User Share
Authority
Clamp-Mode
VIP
IP
P
Plane-GT
Some are clamped and some are free.
Plane-HT
Clamp-Mode
Free-Mode
Plane-HS2
Plane-HS1
Plane-GS2
Plane-GS1
Clamp-Mode
Key Share
User Share
35Application ? Visual Authorization
Producing other user shares.
Key Share
User Share
Authority
Clamp-Mode
VIP
IP
P
Plane-GT
Some are clamped and some are free.
Plane-HT
Clamp-Mode
Free-Mode
Plane-HS2
Plane-HS1
Plane-GS2
Plane-GS1
Clamp-Mode
Key Share
User Share
36Application ? Visual Authorization
Key Share
User Share
Authority
Clamp-Mode
VIP
IP
P
Plane-GT
Some are clamped and some are free.
Plane-HT
Clamp-Mode
Free-Mode
Plane-HS2
Plane-HS1
Plane-GS2
Plane-GS1
Clamp-Mode
Key Share
User Share
37User Share
VIP
IP
User Share
Key Share
User Share
P
38A Neural-Network Approach for Visual Cryptography
and Authorization
Tatung University Taiwan
39Conclusion
- Different from traditional approaches
- No codebook needed.
- Operating on gray images directly.
- Complex access scheme capable.
- http//www.suchen.idv.tw/
40Thanks for Attention
??