Top Banner
Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE- 2000
61

Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Jan 05, 2016

Download

Documents

Myra Wilcox
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes

Tatung University, TaiwanPresenter: Tai-Wen Yue

CAINE-2000

Page 2: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Outline Introduction Neural Network Model --- Q’tron NN Q’tron NN for Visual Cryptography Experimental Results

Conclusions and Feature Works

Page 3: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Introduction

Page 4: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

What is visual cryptography?(n, k)-scheme: k out of n

Decompose a secret image into a set of n shadow images called shares.

A share carries meaningless information.

Stacking k or more shares, printed on transparencies, reveals the secrete.

Decrypting using eyes

Page 5: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Example

Target image

Share image2

Share image1

Page 6: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Applications Key Management Message Concealment Authorization Authentication Identification Entertainment

Page 7: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Access Schemes

A A

A A A

A

E F G

CB D

AA A

A A A

A

A A AA A A

A

E F G

CB D

A

E F GE F G

CB DCB DShares

Stackingall shares

Stackingtwo shares

(2, 2) (3, 2) Full

Page 8: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Traditional Approach Using codebooks An Example codebook: (2, 2)

Pixel ProbabilityShares

#1 #2Superposition ofthe two shares

5.0p

5.0p

5.0p

5.0p

WhitePixels

BlackPixels

Page 9: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Our Approaches No codebook required Inputs are gray images

Target Image(s) Share Images

Outputs are halftone images that mimic the corresponding gray images

Applicable to complex access schemes

Page 10: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Neural Network Model

Q’tron NN

Page 11: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Q’tronActive value

iiQa

1iq0 i

i

a

• Weighted and multilevelled• Each Q’tron represents a quantity --- aiQi

Page 12: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Q’tronActive value

Internal stimulus

n

jjjij QaT

1

ii

a

iiT

• Input due to Q’trons’ Interactions• Tii usually is nonzero and negative

Page 13: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Q’tronActive value

Internal stimulus i

i

a

iI

External stimulus

• External input serves as bias

Page 14: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Q’tronActive value

Internal stimulus i

i

a

External stimulus

• Escape local-minima• Persistent noise --- no holiday

iN

Page 15: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Q’tron

iIExternal stimulus

iN

Active value

Internal stimulus

n

jjjij QaT

1

ii

a

iiT iiQa

1iq0

Page 16: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

State Transition Rule

iI

iN

n

jjjij QaT

1

ii

a

iiT iiQa

1iq0

Q’tron’s Input

InternalStimulus

ExternalStimulus

Noise

NoiseFree

Page 17: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

State Transition Rule

State Updating Rule:

Running AsynchronouslyRunning Asynchronously

Page 18: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Q’tron NN vs. Hopfield NN

Running AsynchronouslyRunning Asynchronously

Noise Free Tii=0 qi=2

Noise Free Tii=0 qi=2

Q’tron NN = Hopfiled NN

Page 19: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Energy Function

InteractionAmong Q’trons

Interactionwith

External Stimuli

Constant

Monotonically Nonincreasing

Page 20: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Problem SolvingUsing a Q’tron NN

A given problemA given problem

A optimization problemA optimization problemReformulation

Cost FunctionCost Function

Energy FunctionEnergy Function

Build Q’tron NNBuild Q’tron NN

Mapping

Page 21: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Operation modes

iIExternal stimulus

iN

Active value

Internal stimulus

n

jjjij QaT

1

ii

a

iiT iiQa

1iq0

Clamp-mode

Page 22: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Operation modes

iIExternal stimulus

iN

Active value

Internal stimulus

n

jjjij QaT

1

ii

a

iiT iiQa

1iq0

free-mode

Page 23: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Why operation modes?

Unstable

Stable

Page 24: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Why operation modes?

ClampedFree

Page 25: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Why operation modes?

Clamped Free

Page 26: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Q’tron NN forVisual Cryptography

Highlight the main concept by(2, 2)

Page 27: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

The Q’tron NN for (2, 2)Plane-G

Plane-S1 (Share 1 )

Plane-H

Plane-S2 (Share 2 )

Page 28: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

The Q’tron NN for (2, 2)Plane-G

Plane-S1 (Share 1 )

Plane-H

Plane-S2 (Share 2 )

Target ImageClamped

Page 29: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

The Q’tron NN for (2, 2)Plane-G

Plane-S1 (Share 1 )

Plane-H

Plane-S2 (Share 2 )

Target ImageClamped

Share 1+

Share 2

Share 2Share 1

Page 30: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

The Q’tron NN for (2, 2)Plane-G

Plane-S1 (Share 1 )

Plane-H

Plane-S2 (Share 2 )

Target ImageClamped

Share 1+

Share 2

Share 2Share 1

Halftoning

Stacking Rule

Page 31: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Halftoning + Stacking Rules Halftoning

Gray Images Binary Images Gray Images: Target and Shares

Stacking Rules Fulfill the Access Scheme

Page 32: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

HalftoningGraytone Image Halftone Image

Halftoning

How?To make the average luminances of each cell-pair as close as possible.

Page 33: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

HalftoningGray Image Halftone Image

Halftoning

May have many solutions

Page 34: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Stacking RulesGray Image Halftone Image

Halftoning

Share Images

Stacking Rule

One or more pixels black

Black

Page 35: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Energy function --- Halftoning

A 3 3 halftone cellA 3 3 graytone cell

The luminance difference(squared error)

Page 36: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Stacking Rules (The magic)

s1 s2

0

0

1

1

0

1

0

1

h

0

1

1

1

E2

0

0.25

0.25

0.25

0

0

1

1

0

1

0

1

1

0

0

0

2.25

1

1

1

s1 s2 h E2

Feasible Infeasible

+ =s1 s2 h

Page 37: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Stacking Rules (The magic)

s1 s2

0

0

1

1

0

1

0

1

h

0

1

1

1

E2

0

0.25

0.25

0.25

0

0

1

1

0

1

0

1

1

0

0

0

2.25

1

1

1

s1 s2 h E2

Feasible Infeasible

+ =s1 s2 h

Low High

Page 38: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Energy function --- Stacking Rules

Minimizing this term tends to satisfy the stacking rules

Page 39: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Share Image Assignment For simplicity, shares are plain images

S1 S2

Mean Gray level K1K2

Result

Page 40: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Energy Function---Share Image Assignment

Page 41: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Total Energy

HalftoningHalftoning StackingRules

StackingRules

ShareImagesShare

Images

Page 42: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Q’tron NN Construction

Mapping

Page 43: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Experimental Results

Page 44: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Histogram Reallocation Needed

+

+

HistogramReallocation

Page 45: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

The ProcedurePlane-G

Plane-S1 (Share 1 )

Plane-H

Plane-S2 (Share 2 )

The original taget image

Page 46: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

The ProcedurePlane-G

Plane-S1 (Share 1 )

Plane-H

Plane-S2 (Share 2 )

The original taget image

HistogramReallocation

Clamped

Page 47: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

The ProcedurePlane-G

Plane-S1 (Share 1 )

Plane-H

Plane-S2 (Share 2 )

The original taget image

HistogramReallocation

Clamped

Free

Page 48: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Experimental Result --- (2, 2)

Share 1 Share 2TargetImage

Share 1+

Share 2

Page 49: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Generalized Access Scheme

Experimental Results

Page 50: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Full Access Scheme --- 3 Shares

朝辭白帝彩雲間朝辭白帝彩雲間

朝 辭 白

帝 彩 雲

Shares

Page 51: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Full Access Scheme --- 3 Shares

朝辭白帝彩雲間朝辭白帝彩雲間

朝 辭 白

帝 彩 雲

Shares

Theoretically, unrealizable.

We did it in practical sense.

Page 52: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Full Access Scheme --- 3 Shares

S1 S2 S3

S1+S2 S1+S3 S2+S3 S1+S2+S3

Page 53: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Access Schemewith Forbidden Subset(s)

人之初性本善人之初性本善

人 之 初

性 本 X

Theoretically,realizable.

Shares

Page 54: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Access Schemewith Forbidden Subset(s)

S1 S2 S3

S1+S2 S1+S3 S2+S3 S1+S2+S3

Page 55: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Access Schemefor Access Control

S1 S2 S3

S4 S1+S4 S2+S4 S3+S4

Page 56: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Target and Shares are Gray Images

S1

Armored knight

Page 57: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Target and Shares are Gray Images

S2

Man

Page 58: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Target and Shares are Gray Images

S1 + S2

Armored Knight + Man

= Lina

Page 59: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Conclusions and Future works

Page 60: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Conclusions How? NNs for visual cryptography No codebook. Uniform math for access schemes. Target images and share images are

graylevelled ones Share image size = Target image size

Page 61: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Future Works Design language to specify an access s

cheme. Auto generation of the Q’tron NNs Histogram Reallocation is a nontrivial

task.

Extend to color images