52
A Neural-Network Approach for Visual Cryptography 虞虞虞 虞虞虞虞虞虞虞

A Neural-Network Approach for Visual Cryptography

Embed Size (px)

DESCRIPTION

A Neural-Network Approach for Visual Cryptography. 虞台文. 大同大學資工所. Content. Overview The Q’tron NN Model The Q’tron NN Approach for Visual Cryptography Visual Authorization Semipublic Encryption General Access Scheme Conclusion. A Neural-Network Approach for Visual Cryptography. - PowerPoint PPT Presentation

Citation preview

Page 1: A Neural-Network Approach for Visual Cryptography

A Neural-Network Approach for Visual Cryptography

虞台文大同大學資工所

Page 2: A Neural-Network Approach for Visual Cryptography

Content

Overview The Q’tron NN Model The Q’tron NN Approach for

– Visual Cryptography– Visual Authorization– Semipublic Encryption

General Access Scheme Conclusion

Page 3: A Neural-Network Approach for Visual Cryptography

A Neural-Network Approach for Visual Cryptography

Overview

大同大學資工所

Page 4: A Neural-Network Approach for Visual Cryptography

What isVisual Cryptography and Authorization?

Visual Cryptography (VC)– Encrypts secrete into a set of images

(shares).– Decrypts secrete using eyes.

Visual Authorization (VA)– An application of visual cryptography.– Assign different access rights to users.– Authorizing using eyes.

Page 5: A Neural-Network Approach for Visual Cryptography

What is Semipublic Encryption?

Visual Cryptography (VC)– Encrypts secrete into a set of images

(shares).– Decrypts secrete using eyes.

Semipublic Encryption (SE)– An application of visual cryptography.– Hide only secret parts in documents – Right information is available if and only if a

right key is provided

Page 6: A Neural-Network Approach for Visual Cryptography

The Basic Concept of VC

Target Image(The Secret)

Share 2

Share 1AccessScheme

AccessScheme

The (2, 2) access scheme.

Page 7: A Neural-Network Approach for Visual Cryptography

The Shares Produced by NN

Target Image(The Secret)

Share 2

Share 1Neural

Network

NeuralNetwork

We get shares after the NN settles down.

Page 8: A Neural-Network Approach for Visual Cryptography

Decrypting Using Eyes

Share 2

Share 1

Page 9: A Neural-Network Approach for Visual Cryptography

Example: (2, 2)

Target image

Share image2

Share image1

Plane shares are used

Page 10: A Neural-Network Approach for Visual Cryptography

Traditional Approach

Naor and Shamir (2,2)

Pixel ProbabilityShares

#1 #2Superposition ofthe two shares

5.0p

5.0p

5.0p

5.0p

WhitePixels

BlackPixels

The Code Book

Page 11: A Neural-Network Approach for Visual Cryptography

The VA Scheme

keyshare

user shares(resource 2)

user shares(resource 1)

stacking

stacking

…VIP IP P

…VIP IP P

Very Important

Person.

Page 12: A Neural-Network Approach for Visual Cryptography

The SE Scheme

智慧型系統實驗室資料庫

使用者 Key江素貞 AB陳美靜 CD張循鋰 XY李作中 UV

智慧型系統實驗室資料庫

使用者 Key江素貞 AB陳美靜 CD張循鋰 XY李作中 UV

Page 13: A Neural-Network Approach for Visual Cryptography

public share(database in lab)

AB CD XY UV

stacking

usershares

keys

素貞

The SE Scheme

循鋰 美靜 作中

智慧型系統實驗室資料庫

使用者 Key江素貞 AB陳美靜 CD張循鋰 XY李作中 UV

智慧型系統實驗室資料庫

使用者 Key江素貞 AB陳美靜 CD張循鋰 XY李作中 UV

Page 14: A Neural-Network Approach for Visual Cryptography

A Neural-Network Approach for Visual Cryptography

The Q’tron

NN Model

大同大學資工所

Page 15: A Neural-Network Approach for Visual Cryptography

The Q’tron

i

(ai )

i

(ai )

. . .

0 1 2 qi1

aiQiActive value

Qi{0, 1, …, qi1}IiR

External Stimulus

( )ij j jj

T a QInternal Stimulus

Ni

Noise

Quantum Neuron

Page 16: A Neural-Network Approach for Visual Cryptography

The Q’tron

i

(ai )

i

(ai )

. . .

0 1 2 qi1

aiQiActive value

Qi{0, 1, …, qi1}IiR

External Stimulus

( )ij j jj

T a QInternal Stimulus

Ni

Noise

Free-Mode Q’tron

Page 17: A Neural-Network Approach for Visual Cryptography

The Q’tron

i

(ai )

i

(ai )

. . .

0 1 2 qi1

aiQiActive value

Qi{0, 1, …, qi1}IiR

External Stimulus

( )ij j jj

T a QInternal Stimulus

Ni

Noise

Clamp-Mode Q’tron

Page 18: A Neural-Network Approach for Visual Cryptography

Input Stimulus

InternalStimulus

ExternalStimulus

Noise

NoiseFreeTerm

i

(ai )

i

(ai )

. . .

Noise

Page 19: A Neural-Network Approach for Visual Cryptography

Level Transition

Running AsynchronouslyRunning Asynchronously

i

(ai )

i

(ai )

. . .

Page 20: A Neural-Network Approach for Visual Cryptography

Energy Function

InteractionAmong Q’trons

Interactionwith

External Stimuli

Constant

Monotonically NonincreasingMonotonically Nonincreasing

Page 21: A Neural-Network Approach for Visual Cryptography

The Q’tron NN

Page 22: A Neural-Network Approach for Visual Cryptography

Interface/Hidden Q’trons

clamp-modefree-modefree mode Hidden Q’trons

Interface Q’trons

Page 23: A Neural-Network Approach for Visual Cryptography

Question-Answering

Feed a question by clamping some interface Q’trons.

clamp-modefree-modefree mode Hidden Q’trons

Interface Q’trons

Page 24: A Neural-Network Approach for Visual Cryptography

Question-Answering

Read answer when all interface Q’trons settle down.

clamp-modefree-modefree mode Hidden Q’trons

Interface Q’trons

Page 25: A Neural-Network Approach for Visual Cryptography

A Neural-Network Approach for Visual Cryptography

The Q’tron NNs for Visual Cryptography Visual Authorization Semipublic Encryption

大同大學資工所

Page 26: A Neural-Network Approach for Visual Cryptography

Energy Function for VC

Visual Cryptography

Image Halftoning

Image Stacking

+

Page 27: A Neural-Network Approach for Visual Cryptography

Image Halftoning

Graytone Image

Halftoning

0

255

Halftone Image

0 (Transparent)

1

Graytone image halftone image can be formulated as to minimize the energy function of a Q’tron NN.

Page 28: A Neural-Network Approach for Visual Cryptography

Image Halftoning

Graytone Image

Halftoning

0

255

Halftone Image

0 (Transparent)

1

Graytone image halftone image can be formulated as to minimize the energy function of a Q’tron NN.

In ideal case, each pair of corresponding small areas has the `same’ average graylevel.

Page 29: A Neural-Network Approach for Visual Cryptography

The Q’tron NN for Image Halftoning

Plane-G (Graytone image)

Plane-H (Halftone image)

Page 30: A Neural-Network Approach for Visual Cryptography

Image Halftoning

Halftoning

Clamp-mode

Free-mode

Plane-G (Graytone image)

Plane-H (Halftone image)

Question

Answer

Page 31: A Neural-Network Approach for Visual Cryptography

Image Restoration

Plane-G (Graytone image)

Plane-H (Halftone image)

Restoration

Clamp-mode

Free-mode

Question

Answer

Page 32: A Neural-Network Approach for Visual Cryptography

Stacking Rule

+ + + +

The satisfaction of stacking rule can also be formulated as to minimize the energy function of a Q’tron NN.

Page 33: A Neural-Network Approach for Visual Cryptography

Stacking Rule

+ + + +

The satisfaction of stacking rule can also be formulated as to minimize the energy function of a Q’tron NN.

The energy function for the stacking rule.

See the paper for the detail.

Page 34: A Neural-Network Approach for Visual Cryptography

The Total Energy

+

Share 1 Target

Share 1

Share 2

TargetShare 2

TotalEnergy

Image Halftoning

Stacking Rule

Page 35: A Neural-Network Approach for Visual Cryptography

The Q’tron NN for VC/VA

Plane-GS1

Plane-HS1

Share 1

Plane-HS2

Plane-GS2

Share 2

Plane-GT

Plane-HT

Target

Page 36: A Neural-Network Approach for Visual Cryptography

Application Visual Cryptography

Plane-GS1

Plane-HS1

Share 1

Plane-HS2

Plane-GS2

Share 2

Plane-GT

Plane-HT

Target

Clamp-Mode

Clamp-Mode

Clamp-Mode

Free-Mode Free-Mode

Free-Mode

Page 37: A Neural-Network Approach for Visual Cryptography

Application Visual Authorization

Plane-GS1

Plane-HS1

User Share

Authority

Plane-HS2

Plane-GS2

Plane-GT

Plane-HT

Key Share

Key Share

User Share

VIP IP P

Page 38: A Neural-Network Approach for Visual Cryptography

Application Visual Authorization

Plane-GS1

Plane-HS1

User Share

Authority

Clamp-Mode

Free-Mode

Plane-HS2

Plane-GS2

Clamp-Mode

Free-Mode

Plane-GT

Plane-HT

Clamp-Mode

Free-Mode

Key Share

Key Share

User Share

VIP IP P

Producing key Share & the first user share.

Page 39: A Neural-Network Approach for Visual Cryptography

Application Visual Authorization

Plane-GS1

Plane-HS1

User Share

Authority

Clamp-Mode

Plane-HS2

Plane-GS2

Clamp-Mode

Free-Mode

Plane-GT

Plane-HT

Clamp-Mode

Some are clamped and some are free.

Key Share

Key Share

User Share

VIP IP P

Producing other user shares.

Page 40: A Neural-Network Approach for Visual Cryptography

Application Visual Authorization

Plane-GS1

Plane-HS1

User Share

Authority

Clamp-Mode

Plane-HS2

Plane-GS2

Clamp-Mode

Free-Mode

Plane-GT

Plane-HT

Clamp-Mode

Some are clamped and some are free.

Key Share

Key Share

User Share

VIP IP P

Producing other user shares.

Page 41: A Neural-Network Approach for Visual Cryptography

Application Visual Authorization

Plane-GS1

Plane-HS1

User Share

Authority

Clamp-Mode

Plane-HS2

Plane-GS2

Clamp-Mode

Free-Mode

Plane-GT

Plane-HT

Clamp-Mode

Some are clamped and some are free.

Key Share

Key Share

User Share

VIP IP P

Page 42: A Neural-Network Approach for Visual Cryptography

Key Share

User Shar

e

User Shar

e

User Shar

e

VIP

IP

P

Page 43: A Neural-Network Approach for Visual Cryptography

A Neural-Network Approach for Visual Cryptography

General

Access Scheme

大同大學資工所

Page 44: A Neural-Network Approach for Visual Cryptography

Full Access Scheme 3 Shares

朝辭白帝彩雲間朝辭白帝彩雲間

朝 辭 白

帝 彩 雲

Shares

Page 45: A Neural-Network Approach for Visual Cryptography

Full Access Scheme 3 Shares

朝辭白帝彩雲間朝辭白帝彩雲間

朝 辭 白

帝 彩 雲

SharesTheoretically,

unrealizable.

We did it in

practical sense.

Theoretically,

unrealizable.

We did it in

practical sense.

Page 46: A Neural-Network Approach for Visual Cryptography

Full Access Scheme 3 Shares

S1 S2 S3

S1+S2 S1+S3 S2+S3 S1+S2+S3

Page 47: A Neural-Network Approach for Visual Cryptography

Access Schemewith Forbidden Subset(s)

Anyone knows what is it?Anyone knows what is it?

Page 48: A Neural-Network Approach for Visual Cryptography

Access Schemewith Forbidden Subset(s)

人之初性本善人之初性本善

人 之 初

性 本 X

Theoretically,

realizable.Theoretically,

realizable.

Shares

Page 49: A Neural-Network Approach for Visual Cryptography

Access Schemewith Forbidden Subset(s)

S1 S2 S3

S1+S2 S1+S3 S2+S3 S1+S2+S3

Page 50: A Neural-Network Approach for Visual Cryptography

A Neural-Network Approach for Visual Cryptography

Conclusion

大同大學資工所

Page 51: A Neural-Network Approach for Visual Cryptography

Conclusion

Different from traditional approaches:– No codebook needed.– Operating on gray images directly.

Complex access scheme capable.

http://www.suchen.idv.tw/

Page 52: A Neural-Network Approach for Visual Cryptography

謝謝謝謝