Download presentation
Presentation is loading. Please wait.
Published byMyra Wilcox Modified over 9 years ago
1
Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000
2
Outline Introduction Neural Network Model --- Q ’ tron NN Q ’ tron NN for Visual Cryptography Experimental Results Conclusions and Feature Works
3
Introduction
4
What is visual cryptography? ( n, k )-scheme: k out of n Decompose a secret image into a set of n shadow images called shares. A share carries meaningless information. Stacking k or more shares, printed on transparencies, reveals the secrete. Decrypting using eyes
5
Example Target image Share image2 Share image1
6
Applications Key Management Message Concealment Authorization Authentication Identification Entertainment
7
Access Schemes Shares Stacking all shares Stacking two shares (2, 2)(3, 2)Full
8
Traditional Approach Using codebooks An Example codebook: (2, 2) PixelProbability Shares #1 #2 Superposition of the two shares White Pixels Black Pixels
9
Our Approaches No codebook required Inputs are gray images Target Image(s) Share Images Outputs are halftone images that mimic the corresponding gray images Applicable to complex access schemes
10
Neural Network Model Q ’ tron NN
11
Q ’ tron Active value Weighted and multilevelled Each Q ’ tron represents a quantity --- a i Q i
12
Q ’ tron Active value Internal stimulus Input due to Q ’ trons ’ Interactions T ii usually is nonzero and negative
13
Q ’ tron Active value Internal stimulus External stimulus External input serves as bias
14
Q ’ tron Active value Internal stimulus External stimulus Escape local-minima Persistent noise --- no holiday
15
Q ’ tron External stimulus Active value Internal stimulus
16
State Transition Rule Q ’ tron ’ s Input Internal Stimulus External Stimulus Noise Free
17
State Transition Rule State Updating Rule: Running Asynchronously
18
Q ’ tron NN vs. Hopfield NN Running Asynchronously Noise Free T ii =0 q i =2 Noise Free T ii =0 q i =2 Q ’ tron NN = Hopfiled NN
19
Energy Function Interaction Among Q’trons Interaction with External Stimuli Constant Monotonically Nonincreasing
20
Problem Solving Using a Q ’ tron NN A given problem A optimization problem Reformulation Cost Function Energy Function Build Q’tron NN Mapping
21
Operation modes External stimulus Active value Internal stimulus Clamp-mode
22
Operation modes External stimulus Active value Internal stimulus free-mode
23
Why operation modes? Unstable Stable
24
Why operation modes? Clamped Free
25
Why operation modes? Clamped Free
26
Q ’ tron NN for Visual Cryptography Highlight the main concept by (2, 2)
27
The Q ’ tron NN for (2, 2) Plane-G Plane-S1 (Share 1 ) Plane-H Plane-S2 (Share 2 )
28
The Q ’ tron NN for (2, 2) Plane-G Plane-S1 (Share 1 ) Plane-H Plane-S2 (Share 2 ) Target Image Clamped
29
The Q ’ tron NN for (2, 2) Plane-G Plane-S1 (Share 1 ) Plane-H Plane-S2 (Share 2 ) Target Image Clamped Share 1 + Share 2 Share 1
30
The Q ’ tron NN for (2, 2) Plane-G Plane-S1 (Share 1 ) Plane-H Plane-S2 (Share 2 ) Target Image Clamped Share 1 + Share 2 Share 1 Halftoning Stacking Rule
31
Halftoning + Stacking Rules Halftoning Gray Images Binary Images Gray Images: Target and Shares Stacking Rules Fulfill the Access Scheme
32
Halftoning Graytone Image Halftone Image Halftoning How? To make the average luminances of each cell-pair as close as possible.
33
Halftoning Gray Image Halftone Image Halftoning May have many solutions
34
Stacking Rules Gray Image Halftone Image Halftoning Share Images Stacking Rule One or more pixels black Black
35
Energy function --- Halftoning A 3 3 halftone cell A 3 3 graytone cell The luminance difference (squared error)
36
Stacking Rules (The magic) s1s1 s2s2 0 0 1 1 0 1 0 1 h 0 1 1 1 E2E2 0 0.25 0 0 1 1 0 1 0 1 1 0 0 0 2.25 1 1 1 s1s1 s2s2 h E2E2 Feasible Infeasible + = s1s1 s2s2 h
37
Stacking Rules (The magic) s1s1 s2s2 0 0 1 1 0 1 0 1 h 0 1 1 1 E2E2 0 0.25 0 0 1 1 0 1 0 1 1 0 0 0 2.25 1 1 1 s1s1 s2s2 h E2E2 Feasible Infeasible + = s1s1 s2s2 h LowHigh
38
Energy function --- Stacking Rules Minimizing this term tends to satisfy the stacking rules
39
Share Image Assignment For simplicity, shares are plain images S1 S2 Mean Gray level K 1 K2K2 Result
40
Energy Function--- Share Image Assignment
41
Total Energy Halftoning Stacking Rules Stacking Rules Share Images Share Images
42
Q ’ tron NN Construction Mapping
43
Experimental Results
44
Histogram Reallocation Needed + + Histogram Reallocation
45
The Procedure Plane-G Plane-S1 (Share 1 ) Plane-H Plane-S2 (Share 2 ) The original taget image
46
The Procedure Plane-G Plane-S1 (Share 1 ) Plane-H Plane-S2 (Share 2 ) The original taget image Histogram Reallocation Clamped
47
The Procedure Plane-G Plane-S1 (Share 1 ) Plane-H Plane-S2 (Share 2 ) The original taget image Histogram Reallocation Clamped Free
48
Experimental Result --- (2, 2) Share 1Share 2 Target Image Share 1 + Share 2
49
Generalized Access Scheme Experimental Results
50
Full Access Scheme --- 3 Shares 朝辭白帝彩雲間 朝 辭 白 帝彩雲 間 Shares
51
Full Access Scheme --- 3 Shares 朝辭白帝彩雲間 朝 辭 白 帝彩雲 間 Shares Theoretically, unrealizable. We did it in practical sense.
52
Full Access Scheme --- 3 Shares S1S2S3 S1+S2S1+S3S2+S3S1+S2+S3
53
Access Scheme with Forbidden Subset(s) 人之初性本善 人 之 初 性本 X 善 Theoretically, realizable. Shares
54
Access Scheme with Forbidden Subset(s) S1S2S3 S1+S2S1+S3S2+S3S1+S2+S3
55
Access Scheme for Access Control S1S2S3 S4S1+S4S2+S4S3+S4
56
Target and Shares are Gray Images S1 Armored knight
57
Target and Shares are Gray Images S2 Man
58
Target and Shares are Gray Images S1 + S2 Armored Knight + Man = Lina
59
Conclusions and Future works
60
Conclusions How? NNs for visual cryptography No codebook. Uniform math for access schemes. Target images and share images are graylevelled ones Share image size = Target image size
61
Future Works Design language to specify an access scheme. Auto generation of the Q ’ tron NNs Histogram Reallocation is a nontrivial task. Extend to color images
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.