A NeuralNetwork Approach for Visual Cryptography and Authorization

1 / 40
About This Presentation
Title:

A NeuralNetwork Approach for Visual Cryptography and Authorization

Description:

In ideal case, each pair of corresponding small areas has the `same' average graylevel. ... VIP. IP. P. Producing key Share & the first user share. Application ... –

Number of Views:324
Avg rating:3.0/5.0
Slides: 41
Provided by: taiwe
Category:

less

Transcript and Presenter's Notes

Title: A NeuralNetwork Approach for Visual Cryptography and Authorization


1
A Neural-Network Approach for Visual Cryptography
and Authorization
  • Yue, Tai-Wen

Tatung University Taiwan
2
Content
  • Overview
  • The Qtron NN Model
  • The Qtron NN Approach for
  • Visual Cryptography
  • Visual Authorization
  • Conclusion

3
A Neural-Network Approach for Visual Cryptography
and Authorization
  • Overview

Tatung University Taiwan
4
What isVisual Cryptography and Authorization?
  • Visual Cryptography (VC)
  • Encrypts secrete into a set of images (shares).
  • Decrypts secrete using eyes.
  • Visual Authorization (VA)
  • An application of visual cryptography.
  • Assign different access rights to users.
  • Authorizing using eyes.

5
The Basic Concept of VC
The (2, 2) access scheme.
Share 1
Target Image (The Secret)
Share 2
6
The Shares Produced by NN
We get shares after the NN settles down.
Neural Network
Share 1
Target Image (The Secret)
Share 2
7
Decrypting Using Eyes
Share 1
Share 2
8
The VA Scheme
Very Important Person.
user shares (resource 1)

user shares (resource 2)
key share

9
A Neural-Network Approach for Visual Cryptography
and Authorization
  • The Qtron
  • NN Model

Tatung University Taiwan
10
The Qtron
Quantum Neuron
?i (ai )
11
The Qtron
Free-Mode Qtron
External Stimulus
Ii?R
?i (ai )
Ni
Noise
12
The Qtron
Clamp-Mode Qtron
External Stimulus
Ii?R
. . .
?i (ai )
qi?1
0
1
2
Ni
Noise
13
Input Stimulus
?i (ai )
Noise
Noise
Internal Stimulus
Noise Free Term
External Stimulus
14
Level Transition
?i (ai )
Running Asynchronously
15
Energy Function
Monotonically Nonincreasing
Interaction Among Qtrons
Constant
Interaction with External Stimuli
16
The Qtron NN
17
Interface/Hidden Qtrons
Interface Qtrons
18
Question-Answering
Feed a question by clamping some interface
Qtrons.
19
Question-Answering
Read answer when all interface Qtrons settle
down.
20
A Neural-Network Approach for Visual Cryptography
and Authorization
  • The Qtron NNs for
  • Visual Cryptography
  • Visual Authorization

Tatung University Taiwan
21
Energy Function for VC
Visual Cryptography
Image Halftoning
Image Stacking

22
Image Halftoning
Graytone image ? halftone image can be formulated
as to minimize the energy function of a Qtron NN.
Halftoning
23
Image Halftoning
Graytone image ? halftone image can be formulated
as to minimize the energy function of a Qtron NN.
Halftoning
24
The Qtron NN for Image Halftoning
Plane-G (Graytone image)
Plane-H (Halftone image)
25
Image Halftoning
Plane-G (Graytone image)
Clamp-mode
Question
Answer
Free-mode
Plane-H (Halftone image)
26
Image Restoration
Plane-G (Graytone image)
Free-mode
Answer
Question
Clamp-mode
Plane-H (Halftone image)
27
Stacking Rule
The satisfaction of stacking rule can also be
formulated as to minimize the energy function of
a Qtron NN.
28
Stacking Rule
The satisfaction of stacking rule can also be
formulated as to minimize the energy function of
a Qtron NN.
See the paper for the detail.
29
The Total Energy
Total Energy
Image Halftoning
Stacking Rule
Share 1
Share 2
Share 1
Target
Target
Share 2
30
The Qtron NN for VC/VA
31
Application ? Visual Cryptography
Clamp-Mode
Free-Mode
Free-Mode
Free-Mode
Clamp-Mode
Clamp-Mode
32
Application ? Visual Authorization
Key Share
User Share
Authority
VIP
IP
P
Key Share
User Share
33
Application ? Visual Authorization
Producing key Share the first user share.
Key Share
User Share
Authority
Clamp-Mode
VIP
IP
P
Plane-GT
Free-Mode
Plane-HT
Free-Mode
Free-Mode
Plane-HS2
Plane-GS2
Clamp-Mode
Clamp-Mode
Key Share
User Share
34
Application ? Visual Authorization
Producing other user shares.
Key Share
User Share
Authority
Clamp-Mode
VIP
IP
P
Plane-GT
Some are clamped and some are free.
Plane-HT
Clamp-Mode
Free-Mode
Plane-HS2
Plane-HS1
Plane-GS2
Plane-GS1
Clamp-Mode
Key Share
User Share
35
Application ? Visual Authorization
Producing other user shares.
Key Share
User Share
Authority
Clamp-Mode
VIP
IP
P
Plane-GT
Some are clamped and some are free.
Plane-HT
Clamp-Mode
Free-Mode
Plane-HS2
Plane-HS1
Plane-GS2
Plane-GS1
Clamp-Mode
Key Share
User Share
36
Application ? Visual Authorization
Key Share
User Share
Authority
Clamp-Mode
VIP
IP
P
Plane-GT
Some are clamped and some are free.
Plane-HT
Clamp-Mode
Free-Mode
Plane-HS2
Plane-HS1
Plane-GS2
Plane-GS1
Clamp-Mode
Key Share
User Share
37
User Share
VIP
IP
User Share
Key Share
User Share
P
38
A Neural-Network Approach for Visual Cryptography
and Authorization
  • Conclusion

Tatung University Taiwan
39
Conclusion
  • Different from traditional approaches
  • No codebook needed.
  • Operating on gray images directly.
  • Complex access scheme capable.
  • http//www.suchen.idv.tw/

40
Thanks for Attention
??
Write a Comment
User Comments (0)
About PowerShow.com