A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.
-
Upload
frank-moody -
Category
Documents
-
view
277 -
download
1
description
Transcript of A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.
![Page 1: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/1.jpg)
A Neural-Network Approach for Visual Cryptography
虞台文大同大學資工所
![Page 2: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/2.jpg)
Content Overview The Q’tron NN Model The Q’tron NN Approach for
– Visual Cryptography– Visual Authorization– Semipublic Encryption
General Access Scheme Conclusion
![Page 3: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/3.jpg)
A Neural-Network Approach for Visual Cryptography
Overview
大同大學資工所
![Page 4: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/4.jpg)
What isVisual Cryptography and Authorization?
Visual Cryptography (VC)– Encrypts secrete into a set of images (shares).– Decrypts secrete using eyes.
Visual Authorization (VA)– An application of visual cryptography.– Assign different access rights to users.– Authorizing using eyes.
![Page 5: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/5.jpg)
What is Semipublic Encryption?
Visual Cryptography (VC)– Encrypts secrete into a set of images
(shares).– Decrypts secrete using eyes.
Semipublic Encryption (SE)– An application of visual cryptography.– Hide only secret parts in documents – Right information is available if and only if a
right key is provided
![Page 6: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/6.jpg)
The Basic Concept of VC
Target Image(The Secret)
Share 2
Share 1AccessScheme
The (2, 2) access scheme.
![Page 7: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/7.jpg)
The Shares Produced by NN
Target Image(The Secret)
Share 2
Share 1NeuralNetwork
We get shares after the NN settles down.
![Page 8: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/8.jpg)
Decrypting Using Eyes
Share 2
Share 1
![Page 9: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/9.jpg)
Example: (2, 2)
Target image
Share image2
Share image1
Plane shares are used
![Page 10: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/10.jpg)
Traditional Approach Naor and Shamir (2,2)
Pixel Probability Shares#1 #2
Superposition ofthe two shares
5.0p
5.0p
5.0p
5.0p
WhitePixels
BlackPixels
The Code Book
![Page 11: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/11.jpg)
The VA Scheme
keyshare
user shares(resource 2)
user shares(resource 1)
stacking
stacking
…
…VIP IP P
…VIP IP P
Very Important Person.
…
![Page 12: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/12.jpg)
The SE Scheme
智慧型系統實驗室資料庫使用者 Key江素貞 AB陳美靜 CD張循鋰 XY李作中 UV
![Page 13: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/13.jpg)
public share(database in lab)
AB CD XY UV
stacking
usershares
keys
素貞
The SE Scheme
循鋰 美靜 作中
智慧型系統實驗室資料庫
使用者 Key江素貞 AB陳美靜 CD張循鋰 XY李作中 UV
智慧型系統實驗室資料庫
使用者 Key江素貞 AB陳美靜 CD張循鋰 XY李作中 UV
![Page 14: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/14.jpg)
A Neural-Network Approach for Visual Cryptography
The Q’tron NN Model
大同大學資工所
![Page 15: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/15.jpg)
The Q’tron
i
(ai )
. . .
0 1 2 qi1
aiQiActive value
Qi{0, 1, …, qi1}IiRExternal Stimulus
( )ij j jj
T a QInternal Stimulus
Ni
Noise
Quantum Neuron
![Page 16: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/16.jpg)
The Q’tron
i
(ai )
. . .
0 1 2 qi1
aiQiActive value
Qi{0, 1, …, qi1}IiRExternal Stimulus
( )ij j jj
T a QInternal Stimulus
Ni
Noise
Free-Mode Q’tron
![Page 17: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/17.jpg)
The Q’tron
i
(ai )
. . .
0 1 2 qi1
aiQiActive value
Qi{0, 1, …, qi1}IiRExternal Stimulus
( )ij j jj
T a QInternal Stimulus
Ni
Noise
Clamp-Mode Q’tron
![Page 18: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/18.jpg)
Input Stimulus
InternalStimulus
ExternalStimulus
Noise
NoiseFreeTerm
i
(ai )
. . .
Noise
![Page 19: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/19.jpg)
Level Transition
Running Asynchronously
i
(ai )
. . .
![Page 20: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/20.jpg)
Energy Function
InteractionAmong Q’tronsInteraction
withExternal Stimuli
ConstantMonotonically Nonincreasing
![Page 21: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/21.jpg)
The Q’tron NN
![Page 22: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/22.jpg)
Interface/Hidden Q’trons clamp-modefree-modefree mode Hidden Q’trons
Interface Q’trons
![Page 23: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/23.jpg)
Question-Answering
Feed a question by clamping some interface Q’trons.
clamp-modefree-modefree mode Hidden Q’trons
Interface Q’trons
![Page 24: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/24.jpg)
Question-AnsweringRead answer when all interface Q’trons settle down.
clamp-modefree-modefree mode Hidden Q’trons
Interface Q’trons
![Page 25: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/25.jpg)
A Neural-Network Approach for Visual Cryptography
The Q’tron NNs for Visual Cryptography Visual Authorization Semipublic Encryption
大同大學資工所
![Page 26: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/26.jpg)
Energy Function for VC
Visual CryptographyImage Halftoning Image
Stacking
+
![Page 27: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/27.jpg)
Image HalftoningGraytone Image
Halftoning
0
255
Halftone Image
0 (Transparent)
1
Graytone image halftone image can be formulated as to minimize the energy function of a Q’tron NN.
![Page 28: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/28.jpg)
Image HalftoningGraytone Image
Halftoning
0
255
Halftone Image
0 (Transparent)
1
Graytone image halftone image can be formulated as to minimize the energy function of a Q’tron NN.
In ideal case, each pair of corresponding small areas has the `same’ average graylevel.
![Page 29: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/29.jpg)
The Q’tron NN for Image Halftoning
Plane-G (Graytone image)
Plane-H (Halftone image)
![Page 30: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/30.jpg)
Image Halftoning
HalftoningClamp-mode
Free-mode
Plane-G (Graytone image)
Plane-H (Halftone image)
Question
Answer
![Page 31: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/31.jpg)
Image RestorationPlane-G (Graytone image)
Plane-H (Halftone image)
Restoration
Clamp-mode
Free-mode
Question
Answer
![Page 32: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/32.jpg)
Stacking Rule
+ + + +
The satisfaction of stacking rule can also be formulated as to minimize the energy function of a Q’tron NN.
![Page 33: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/33.jpg)
Stacking Rule
+ + + +
The satisfaction of stacking rule can also be formulated as to minimize the energy function of a Q’tron NN.
The energy function for the stacking rule.
See the paper for the detail.
![Page 34: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/34.jpg)
The Total Energy
+
Share 1 Target
Share 1
Share 2
TargetShare 2
TotalEnergy
Image Halftoning Stacking Rule
![Page 35: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/35.jpg)
The Q’tron NN for VC/VA
Plane-GS1
Plane-HS1
Share 1
Plane-HS2
Plane-GS2
Share 2
Plane-GT
Plane-HT
Target
![Page 36: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/36.jpg)
Application Visual Cryptography
Plane-GS1
Plane-HS1
Share 1
Plane-HS2
Plane-GS2
Share 2
Plane-GT
Plane-HT
Target
Clamp-Mode
Clamp-Mode
Clamp-Mode
Free-Mode Free-Mode
Free-Mode
![Page 37: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/37.jpg)
Application Visual Authorization
Plane-GS1
Plane-HS1
User Share
Authority
Plane-HS2
Plane-GS2
Plane-GT
Plane-HT
Key Share
Key Share
User Share
VIP IP P
![Page 38: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/38.jpg)
Application Visual Authorization
Plane-GS1
Plane-HS1
User Share
Authority
Clamp-Mode
Free-ModePlane-HS2
Plane-GS2Clamp-Mode
Free-Mode
Plane-GT
Plane-HT
Clamp-Mode
Free-Mode
Key Share
Key Share
User Share
VIP IP P
Producing key Share & the first user share.
![Page 39: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/39.jpg)
Application Visual Authorization
Plane-GS1
Plane-HS1
User Share
Authority
Clamp-ModePlane-HS2
Plane-GS2Clamp-Mode
Free-Mode
Plane-GT
Plane-HT
Clamp-Mode
Some are clamped and some are free.
Key Share
Key Share
User Share
VIP IP P
Producing other user shares.
![Page 40: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/40.jpg)
Application Visual Authorization
Plane-GS1
Plane-HS1
User Share
Authority
Clamp-ModePlane-HS2
Plane-GS2Clamp-Mode
Free-Mode
Plane-GT
Plane-HT
Clamp-Mode
Some are clamped and some are free.
Key Share
Key Share
User Share
VIP IP P
Producing other user shares.
![Page 41: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/41.jpg)
Application Visual Authorization
Plane-GS1
Plane-HS1
User Share
Authority
Clamp-ModePlane-HS2
Plane-GS2Clamp-Mode
Free-Mode
Plane-GT
Plane-HT
Clamp-Mode
Some are clamped and some are free.
Key Share
Key Share
User Share
VIP IP P
![Page 42: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/42.jpg)
Key Share
User Shar
e
User Shar
e
User Shar
e
VIP
IP
P
![Page 43: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/43.jpg)
A Neural-Network Approach for Visual Cryptography
GeneralAccess Scheme
大同大學資工所
![Page 44: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/44.jpg)
Full Access Scheme 3 Shares
朝辭白帝彩雲間朝 辭 白
帝 彩 雲
間Shares
![Page 45: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/45.jpg)
Full Access Scheme 3 Shares
朝辭白帝彩雲間朝 辭 白
帝 彩 雲
間Shares
Theoretically,
unrealizable.
We did it in
practical sense.
![Page 46: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/46.jpg)
Full Access Scheme 3 Shares
S1 S2 S3
S1+S2 S1+S3 S2+S3 S1+S2+S3
![Page 47: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/47.jpg)
Access Schemewith Forbidden Subset(s)
Anyone knows what is it?
![Page 48: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/48.jpg)
Access Schemewith Forbidden Subset(s)
人之初性本善人 之 初
性 本 X
善
Theoretically,
realizable.
Shares
![Page 49: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/49.jpg)
Access Schemewith Forbidden Subset(s)
S1 S2 S3
S1+S2 S1+S3 S2+S3 S1+S2+S3
![Page 50: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/50.jpg)
A Neural-Network Approach for Visual Cryptography
Conclusion
大同大學資工所
![Page 51: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/51.jpg)
Conclusion Different from traditional approaches:
– No codebook needed.– Operating on gray images directly.
Complex access scheme capable. http://www.suchen.idv.tw/
![Page 52: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.](https://reader036.fdocuments.net/reader036/viewer/2022082205/5a4d1b1a7f8b9ab05999334e/html5/thumbnails/52.jpg)
謝謝謝謝