A Neural Network Approach for Visual Cryptography Tai-Wen Yue and Suchen Chiang IEEE 2000.

Slides:



Advertisements
Similar presentations
Artificial Neural Network For Automated Prediction of Popularity of Digitized Images David Oranchak
Advertisements

Visual Cryptography Moni Naor Adi Shamir Presented By:
NEURAL NETWORKS Backpropagation Algorithm
Introduction to Neural Networks Computing
Perceptron Learning Rule
1 Using ANN to solve the Navier Stoke Equations Motivation: Solving the complete Navier Stokes equations using direct numerical simulation is computationally.
Computing Gradient Vector and Jacobian Matrix in Arbitrarily Connected Neural Networks Author : Bogdan M. Wilamowski, Fellow, IEEE, Nicholas J. Cotton,
DATA-MINING Artificial Neural Networks Alexey Minin, Jass 2006.
Maximizing Strength of Digital Watermarks Using Neural Network Presented by Bin-Cheng Tzeng 5/ Kenneth J.Davis; Kayvan Najarian International Conference.
EE 7730 Image Segmentation.
Simple Neural Nets For Pattern Classification
Neural network (II) — HNN Hopfield Neural Network Date : 2002/09/24 Present by John Chen
The back-propagation training algorithm
Correlation Matrix Memory CS/CMPE 333 – Neural Networks.
Introduction to Neural Networks John Paxton Montana State University Summer 2003.
1 Abstract This paper presents a novel modification to the classical Competitive Learning (CL) by adding a dynamic branching mechanism to neural networks.
Multi Layer Perceptrons (MLP) Course website: The back-propagation algorithm Following Hertz chapter 6.
Data Mining with Neural Networks (HK: Chapter 7.5)
Bit-level based secret sharing for image encryption Rastislav Lukac, Konstantinos N. Plataniotis Presented by Du-Shiau Tsai Pattern Recognition 38 (2005)
CS 484 – Artificial Intelligence
Image Compression Using Neural Networks Vishal Agrawal (Y6541) Nandan Dubey (Y6279)
Convolutional Neural Networks for Image Processing with Applications in Mobile Robotics By, Sruthi Moola.
Dr. Hala Moushir Ebied Faculty of Computers & Information Sciences
Review – Backpropagation
Artificial Neural Networks (ANN). Output Y is 1 if at least two of the three inputs are equal to 1.
CZ5225: Modeling and Simulation in Biology Lecture 5: Clustering Analysis for Microarray Data III Prof. Chen Yu Zong Tel:
1 Artificial Neural Networks Sanun Srisuk EECP0720 Expert Systems – Artificial Neural Networks.
Shading. What is Shading? Assigning of a color to a pixel in the final image. So, everything in shading is about how to select and combine colors to get.
COMPARISON OF IMAGE ANALYSIS FOR THAI HANDWRITTEN CHARACTER RECOGNITION Olarik Surinta, chatklaw Jareanpon Department of Management Information System.
Back Propagation and Representation in PDP Networks Psychology 209 February 6, 2013.
110/19/2015CS360 AI & Robotics AI Application Areas  Neural Networks and Genetic Algorithms  These model the structure of neurons in the brain  Humans.
Computer Vision, Robert Pless
Activations, attractors, and associators Jaap Murre Universiteit van Amsterdam
Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.
Quantum Neural Networks Introduction & Applications 虞台文.
Neural Networks and Backpropagation Sebastian Thrun , Fall 2000.
Introduction to Neural Networks. Biological neural activity –Each neuron has a body, an axon, and many dendrites Can be in one of the two states: firing.
ADALINE (ADAptive LInear NEuron) Network and
1 Lecture 6 Neural Network Training. 2 Neural Network Training Network training is basic to establishing the functional relationship between the inputs.
LUT Method For Inverse Halftone 資工四 林丞蔚 林耿賢. Outline Introduction Methods for Halftoning LUT Inverse Halftone Tree Structured LUT Conclusion.
Supervised learning network G.Anuradha. Learning objectives The basic networks in supervised learning Perceptron networks better than Hebb rule Single.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Adaptive FIR Neural Model for Centroid Learning in Self-Organizing.
A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.
NEURAL NETWORKS LECTURE 1 dr Zoran Ševarac FON, 2015.
Halftone Visual Cryptography
July 23, BSA, a Fast and Accurate Spike Train Encoding Scheme Benjamin Schrauwen.
Lecture 9 Model of Hopfield
Bab 5 Classification: Alternative Techniques Part 4 Artificial Neural Networks Based Classifer.
Deep Learning Overview Sources: workshop-tutorial-final.pdf
Data Mining: Concepts and Techniques1 Prediction Prediction vs. classification Classification predicts categorical class label Prediction predicts continuous-valued.
Pattern Recognition Lecture 20: Neural Networks 3 Dr. Richard Spillman Pacific Lutheran University.
ベーテ自由エネルギーに対するCCCPアルゴリズムの拡張
出處: 2004 IEEE International Conference on Multimedia and Expo 作者: Chuan-Yu Chan A Contextual-based Hopfield Neural Network for Medical Image Edge Detection.
Adavanced Numerical Computation 2008, AM NDHU
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
Ranga Rodrigo February 8, 2014
CSE 473 Introduction to Artificial Intelligence Neural Networks
Classification with Perceptrons Reading:
The Recent Developments in Visual Cryptography
School of Electrical and
Dr. Unnikrishnan P.C. Professor, EEE
Data Mining with Neural Networks (HK: Chapter 7.5)
Chapter 5 Image Restoration.
CSC 578 Neural Networks and Deep Learning
Source: Signal Processing 109 (2015) 317–333
Neural Network - 2 Mayank Vatsa
The New Developments in Visual Cryptography
A Neural-Network Approach for Visual Cryptography
Random Neural Network Texture Model
Outline Announcement Neural networks Perceptrons - continued
Presentation transcript:

A Neural Network Approach for Visual Cryptography Tai-Wen Yue and Suchen Chiang IEEE 2000

What is Visual Cryptography? Target image Share image2 Share image1

The Procedure Plane-G Plane-S1 (Share 1 ) Plane-H Plane-S2 (Share 2 ) The original taget image Halftone Plain Shadow Image

Image Halftoning Error Aggregated Scan-Line Algorithm e0E0 e0e1E1 e0e1e2E2

The Q ’ tron(Quantum) NN for (2, 2) Plane-G Plane-S1 (Share 1 ) Plane-H Plane-S2 (Share 2 )

Q ’ tron---Q-State Neuron External stimulus Active value Internal stimulus

Q ’ tron---Q-State Neuron Q ’ tron ’ s Input Internal Stimulus External Stimulus Noise

Q ’ tron---Q-State Neuron State Updating Rule:

The Q ’ tron(Quantum) NN Plane-G Plane-S1 (Share 1 ) Plane-H Plane-S2 (Share 2 ) halftoning restoration +

Image Halftoning Energy Function: Sum of graylevel in a 3×3 area for graytone image Sum of halftone in a 3×3 area for halftone image  Minimizing the error square corresponds to halftoning -

Image Restoration Energy Function: - (i,j) i j r=3

s1s1 s2s h E2E s1s1 s2s2 h E2E2 FeasibleInfeasible LowHigh Cost Function

Stacking Rule Satisfaction Energy Function: _ Minimizing this term tends to satisfy the stacking rules

Share Image Assignment For simplicity, shares are plain images S1 S2 Mean Gray level K 1 K2K2 Result

Build Plain Shadow Images Energy Function: [g low,g high ] : K 1 =K 2 ≦ g low <g high ≦ min(2K,255) 例如 : [135,235] ; K1=K2=

Total Energy Halftoning Restoration Share Images Cost Function

Conclusions Share images size = target image size. Code book is free.

Future Works Design language to specify an access scheme. Extend to color images