Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Slides:



Advertisements
Similar presentations
Applications of one-class classification
Advertisements

5th Intensive Course on Soil Micromorphology Naples th - 14th September Image Analysis Lecture 5 Thresholding/Segmentation.
5th Intensive Course on Soil Micromorphology Naples th - 14th September Image Analysis Lecture 5 Thresholding/Segmentation.
Visual Cryptography Moni Naor Adi Shamir Presented By:
Introduction to Neural Networks Computing
Principal Component Analysis Based on L1-Norm Maximization Nojun Kwak IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008.
CSC321: 2011 Introduction to Neural Networks and Machine Learning Lecture 7: Learning in recurrent networks Geoffrey Hinton.
Computational Biology, Part 23 Biological Imaging II Robert F. Murphy Copyright  1996, 1999, All rights reserved.
國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
IEEE TRANSACTIONS ON IMAGE PROCESSING,2007 指導老師:李南逸 報告者:黃資真 Cheating Prevention in Visual Cryptography 1.
CS 678 –Boltzmann Machines1 Boltzmann Machine Relaxation net with visible and hidden units Learning algorithm Avoids local minima (and speeds up learning)
 Image Characteristics  Image Digitization Spatial domain Intensity domain 1.
Artificial Neural Networks - Introduction -
Mining for High Complexity Regions Using Entropy and Box Counting Dimension Quad-Trees Rosanne Vetro, Wei Ding, Dan A. Simovici Computer Science Department.
1 Minimum Ratio Contours For Meshes Andrew Clements Hao Zhang gruvi graphics + usability + visualization.
1 Neural networks 3. 2 Hopfield network (HN) model A Hopfield network is a form of recurrent artificial neural network invented by John Hopfield in 1982.
Image Enhancement To process an image so that the result is more suitable than the original image for a specific application. Spatial domain methods and.
1 Part I Artificial Neural Networks Sofia Nikitaki.
1 Learning to Detect Objects in Images via a Sparse, Part-Based Representation S. Agarwal, A. Awan and D. Roth IEEE Transactions on Pattern Analysis and.
1 視覺密碼學 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University ( 清華大學 ) National Chung Cheng University ( 中正大學 ) Feng Chia University (
A Neural Network Approach for Visual Cryptography Tai-Wen Yue and Suchen Chiang IEEE 2000.
Hypercubes and Neural Networks bill wolfe 10/23/2005.
Image Denoising and Inpainting with Deep Neural Networks Junyuan Xie, Linli Xu, Enhong Chen School of Computer Science and Technology University of Science.
Neural Optimization of Evolutionary Algorithm Strategy Parameters Hiral Patel.
Ensembles of Classifiers Evgueni Smirnov
Convolutional Neural Networks for Image Processing with Applications in Mobile Robotics By, Sruthi Moola.
Review – Backpropagation
MobSched: An Optimizable Scheduler for Mobile Cloud Computing S. SindiaS. GaoB. Black A.LimV. D. AgrawalP. Agrawal Auburn University, Auburn, AL 45 th.
IDL GUI for Digital Halftoning Final Project for SIMG-726 Computing For Imaging Science Changmeng Liu
Hierarchical Distributed Genetic Algorithm for Image Segmentation Hanchuan Peng, Fuhui Long*, Zheru Chi, and Wanshi Siu {fhlong, phc,
1 Lucia Maddalena and Alfredo Petrosino, Senior Member, IEEE A Self-Organizing Approach to Background Subtraction for Visual Surveillance Applications.
COMPARISON OF IMAGE ANALYSIS FOR THAI HANDWRITTEN CHARACTER RECOGNITION Olarik Surinta, chatklaw Jareanpon Department of Management Information System.
IE 585 Associative Network. 2 Associative Memory NN Single-layer net in which the weights are determined in such a way that the net can store a set of.
September 5, 2013Computer Vision Lecture 2: Digital Images 1 Computer Vision A simple two-stage model of computer vision: Image processing Scene analysis.
Image Compression – Fundamentals and Lossless Compression Techniques
Visual Cryptography Advanced Information Security March 11, 2010 Presenter: Semin Kim.
Optimization with Neural Networks Presented by: Mahmood Khademi Babak Bashiri Instructor: Dr. Bagheri Sharif University of Technology April 2007.
Visual Cryptography Hossein Hajiabolhassan Department of Mathematical Sciences Shahid Beheshti University Tehran, Iran.
S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti.
Quantum Neural Networks Introduction & Applications 虞台文.
LUT Method For Inverse Halftone 資工四 林丞蔚 林耿賢. Outline Introduction Methods for Halftoning LUT Inverse Halftone Tree Structured LUT Conclusion.
Introduction to Visual Cryptography
Timo Ahonen, Abdenour Hadid, and Matti Pietikainen
Supervised learning network G.Anuradha. Learning objectives The basic networks in supervised learning Perceptron networks better than Hebb rule Single.
Digital Image Processing
Visual Cryptography for Gray-Level Images by Dithering Techniques
1 End-to-End Learning for Automatic Cell Phenotyping Paolo Emilio Barbano, Koray Kavukcuoglu, Marco Scoffier, Yann LeCun April 26, 2006.
A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所.
Hopfield Neural Networks for Optimization 虞台文 大同大學資工所 智慧型多媒體研究室.
A New Approach for Visual Cryptography Wen-Guey Tzeng and Chi-Ming Hu Designs, codes and cryptography, 27, ,2002 Reporter: 李惠龍.
 劉庭瑋 Electronic Medical Report Security Using Visual Secret Sharing Scheme.
Neural Networks The Elements of Statistical Learning, Chapter 12 Presented by Nick Rizzolo.
Deep Learning Overview Sources: workshop-tutorial-final.pdf
1 Double-Patterning Aware DSA Template Guided Cut Redistribution for Advanced 1-D Gridded Designs Zhi-Wen Lin and Yao-Wen Chang National Taiwan University.
Visual Cryptography Given By: Moni Naor Adi Shamir Presented By: Anil Vishnoi (2005H103017)
Zurich University, 11 April  A secret sharing scheme is a method of dividing a secret S among a finite set of participants.  only certain pre-specified.
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
The Recent Developments in Visual Cryptography
Final Year Project Presentation --- Magic Paint Face
Content-Sensitive Screening in Black and White
Recurrent Neural Networks
1.2 Design of Periodic, Clustered-Dot Screens
Source: Signal Processing 109 (2015) 317–333
The Recent Developments in Visual Secret Sharing
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
The New Developments in Visual Cryptography
Design Of Experiment Eng. Ibrahim Kuhail.
Hiding Multiple Watermarks in Transparencies of Visual Cryptography
A Neural-Network Approach for Visual Cryptography
Random Neural Network Texture Model
Presentation transcript:

Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Outline Introduction Neural Network Model --- Q ’ tron NN Q ’ tron NN for Visual Cryptography Experimental Results Conclusions and Feature Works

Introduction

What is visual cryptography? ( n, k )-scheme: k out of n Decompose a secret image into a set of n shadow images called shares. A share carries meaningless information. Stacking k or more shares, printed on transparencies, reveals the secrete. Decrypting using eyes

Example Target image Share image2 Share image1

Applications Key Management Message Concealment Authorization Authentication Identification Entertainment

Access Schemes Shares Stacking all shares Stacking two shares (2, 2)(3, 2)Full

Traditional Approach Using codebooks An Example codebook: (2, 2) PixelProbability Shares #1 #2 Superposition of the two shares White Pixels Black Pixels

Our Approaches No codebook required Inputs are gray images Target Image(s) Share Images Outputs are halftone images that mimic the corresponding gray images Applicable to complex access schemes

Neural Network Model Q ’ tron NN

Q ’ tron Active value Weighted and multilevelled Each Q ’ tron represents a quantity --- a i Q i

Q ’ tron Active value Internal stimulus Input due to Q ’ trons ’ Interactions T ii usually is nonzero and negative

Q ’ tron Active value Internal stimulus External stimulus External input serves as bias

Q ’ tron Active value Internal stimulus External stimulus Escape local-minima Persistent noise --- no holiday

Q ’ tron External stimulus Active value Internal stimulus

State Transition Rule Q ’ tron ’ s Input Internal Stimulus External Stimulus Noise Free

State Transition Rule State Updating Rule: Running Asynchronously

Q ’ tron NN vs. Hopfield NN Running Asynchronously Noise Free T ii =0 q i =2 Noise Free T ii =0 q i =2 Q ’ tron NN = Hopfiled NN

Energy Function Interaction Among Q’trons Interaction with External Stimuli Constant Monotonically Nonincreasing

Problem Solving Using a Q ’ tron NN A given problem A optimization problem Reformulation Cost Function Energy Function Build Q’tron NN Mapping

Operation modes External stimulus Active value Internal stimulus Clamp-mode

Operation modes External stimulus Active value Internal stimulus free-mode

Why operation modes? Unstable Stable

Why operation modes? Clamped Free

Why operation modes? Clamped Free

Q ’ tron NN for Visual Cryptography Highlight the main concept by (2, 2)

The Q ’ tron NN for (2, 2) Plane-G Plane-S1 (Share 1 ) Plane-H Plane-S2 (Share 2 )

The Q ’ tron NN for (2, 2) Plane-G Plane-S1 (Share 1 ) Plane-H Plane-S2 (Share 2 ) Target Image Clamped

The Q ’ tron NN for (2, 2) Plane-G Plane-S1 (Share 1 ) Plane-H Plane-S2 (Share 2 ) Target Image Clamped Share 1 + Share 2 Share 1

The Q ’ tron NN for (2, 2) Plane-G Plane-S1 (Share 1 ) Plane-H Plane-S2 (Share 2 ) Target Image Clamped Share 1 + Share 2 Share 1 Halftoning Stacking Rule

Halftoning + Stacking Rules Halftoning Gray Images  Binary Images Gray Images: Target and Shares Stacking Rules Fulfill the Access Scheme

Halftoning Graytone Image Halftone Image Halftoning How? To make the average luminances of each cell-pair as close as possible.

Halftoning Gray Image Halftone Image Halftoning May have many solutions

Stacking Rules Gray Image Halftone Image Halftoning Share Images Stacking Rule One or more pixels black  Black

Energy function --- Halftoning A 3  3 halftone cell A 3  3 graytone cell The luminance difference (squared error)

Stacking Rules (The magic) s1s1 s2s h E2E s1s1 s2s2 h E2E2 Feasible Infeasible + = s1s1 s2s2 h

Stacking Rules (The magic) s1s1 s2s h E2E s1s1 s2s2 h E2E2 Feasible Infeasible + = s1s1 s2s2 h LowHigh

Energy function --- Stacking Rules Minimizing this term tends to satisfy the stacking rules

Share Image Assignment For simplicity, shares are plain images S1 S2 Mean Gray level K 1 K2K2 Result

Energy Function--- Share Image Assignment

Total Energy Halftoning Stacking Rules Stacking Rules Share Images Share Images

Q ’ tron NN Construction Mapping

Experimental Results

Histogram Reallocation Needed + + Histogram Reallocation

The Procedure Plane-G Plane-S1 (Share 1 ) Plane-H Plane-S2 (Share 2 ) The original taget image

The Procedure Plane-G Plane-S1 (Share 1 ) Plane-H Plane-S2 (Share 2 ) The original taget image Histogram Reallocation Clamped

The Procedure Plane-G Plane-S1 (Share 1 ) Plane-H Plane-S2 (Share 2 ) The original taget image Histogram Reallocation Clamped Free

Experimental Result --- (2, 2) Share 1Share 2 Target Image Share 1 + Share 2

Generalized Access Scheme Experimental Results

Full Access Scheme Shares 朝辭白帝彩雲間 朝 辭 白 帝彩雲 間 Shares

Full Access Scheme Shares 朝辭白帝彩雲間 朝 辭 白 帝彩雲 間 Shares Theoretically, unrealizable. We did it in practical sense.

Full Access Scheme Shares S1S2S3 S1+S2S1+S3S2+S3S1+S2+S3

Access Scheme with Forbidden Subset(s) 人之初性本善 人 之 初 性本 X 善 Theoretically, realizable. Shares

Access Scheme with Forbidden Subset(s) S1S2S3 S1+S2S1+S3S2+S3S1+S2+S3

Access Scheme for Access Control S1S2S3 S4S1+S4S2+S4S3+S4

Target and Shares are Gray Images S1 Armored knight

Target and Shares are Gray Images S2 Man

Target and Shares are Gray Images S1 + S2 Armored Knight + Man = Lina

Conclusions and Future works

Conclusions How? NNs for visual cryptography No codebook. Uniform math for access schemes. Target images and share images are graylevelled ones Share image size = Target image size

Future Works Design language to specify an access scheme. Auto generation of the Q ’ tron NNs Histogram Reallocation is a nontrivial task. Extend to color images