neural networks for visual cryptography --- with examples for complex access schemes tatung...
TRANSCRIPT
![Page 1: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/1.jpg)
Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes
Tatung University, TaiwanPresenter: Tai-Wen Yue
CAINE-2000
![Page 2: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/2.jpg)
Outline Introduction Neural Network Model --- Q’tron NN Q’tron NN for Visual Cryptography Experimental Results
Conclusions and Feature Works
![Page 3: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/3.jpg)
Introduction
![Page 4: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/4.jpg)
What is visual cryptography?(n, k)-scheme: k out of n
Decompose a secret image into a set of n shadow images called shares.
A share carries meaningless information.
Stacking k or more shares, printed on transparencies, reveals the secrete.
Decrypting using eyes
![Page 5: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/5.jpg)
Example
Target image
Share image2
Share image1
![Page 6: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/6.jpg)
Applications Key Management Message Concealment Authorization Authentication Identification Entertainment
![Page 7: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/7.jpg)
Access Schemes
A A
A A A
A
E F G
CB D
AA A
A A A
A
A A AA A A
A
E F G
CB D
A
E F GE F G
CB DCB DShares
Stackingall shares
Stackingtwo shares
(2, 2) (3, 2) Full
![Page 8: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/8.jpg)
Traditional Approach Using codebooks An Example codebook: (2, 2)
Pixel ProbabilityShares
#1 #2Superposition ofthe two shares
5.0p
5.0p
5.0p
5.0p
WhitePixels
BlackPixels
![Page 9: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/9.jpg)
Our Approaches No codebook required Inputs are gray images
Target Image(s) Share Images
Outputs are halftone images that mimic the corresponding gray images
Applicable to complex access schemes
![Page 10: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/10.jpg)
Neural Network Model
Q’tron NN
![Page 11: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/11.jpg)
Q’tronActive value
iiQa
1iq0 i
i
a
• Weighted and multilevelled• Each Q’tron represents a quantity --- aiQi
![Page 12: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/12.jpg)
Q’tronActive value
Internal stimulus
n
jjjij QaT
1
ii
a
iiT
• Input due to Q’trons’ Interactions• Tii usually is nonzero and negative
![Page 13: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/13.jpg)
Q’tronActive value
Internal stimulus i
i
a
iI
External stimulus
• External input serves as bias
![Page 14: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/14.jpg)
Q’tronActive value
Internal stimulus i
i
a
External stimulus
• Escape local-minima• Persistent noise --- no holiday
iN
![Page 15: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/15.jpg)
Q’tron
iIExternal stimulus
iN
Active value
Internal stimulus
n
jjjij QaT
1
ii
a
iiT iiQa
1iq0
![Page 16: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/16.jpg)
State Transition Rule
iI
iN
n
jjjij QaT
1
ii
a
iiT iiQa
1iq0
Q’tron’s Input
InternalStimulus
ExternalStimulus
Noise
NoiseFree
![Page 17: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/17.jpg)
State Transition Rule
State Updating Rule:
Running AsynchronouslyRunning Asynchronously
![Page 18: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/18.jpg)
Q’tron NN vs. Hopfield NN
Running AsynchronouslyRunning Asynchronously
Noise Free Tii=0 qi=2
Noise Free Tii=0 qi=2
Q’tron NN = Hopfiled NN
![Page 19: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/19.jpg)
Energy Function
InteractionAmong Q’trons
Interactionwith
External Stimuli
Constant
Monotonically Nonincreasing
![Page 20: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/20.jpg)
Problem SolvingUsing a Q’tron NN
A given problemA given problem
A optimization problemA optimization problemReformulation
Cost FunctionCost Function
Energy FunctionEnergy Function
Build Q’tron NNBuild Q’tron NN
Mapping
![Page 21: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/21.jpg)
Operation modes
iIExternal stimulus
iN
Active value
Internal stimulus
n
jjjij QaT
1
ii
a
iiT iiQa
1iq0
Clamp-mode
![Page 22: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/22.jpg)
Operation modes
iIExternal stimulus
iN
Active value
Internal stimulus
n
jjjij QaT
1
ii
a
iiT iiQa
1iq0
free-mode
![Page 23: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/23.jpg)
Why operation modes?
Unstable
Stable
![Page 24: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/24.jpg)
Why operation modes?
ClampedFree
![Page 25: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/25.jpg)
Why operation modes?
Clamped Free
![Page 26: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/26.jpg)
Q’tron NN forVisual Cryptography
Highlight the main concept by(2, 2)
![Page 27: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/27.jpg)
The Q’tron NN for (2, 2)Plane-G
Plane-S1 (Share 1 )
Plane-H
Plane-S2 (Share 2 )
![Page 28: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/28.jpg)
The Q’tron NN for (2, 2)Plane-G
Plane-S1 (Share 1 )
Plane-H
Plane-S2 (Share 2 )
Target ImageClamped
![Page 29: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/29.jpg)
The Q’tron NN for (2, 2)Plane-G
Plane-S1 (Share 1 )
Plane-H
Plane-S2 (Share 2 )
Target ImageClamped
Share 1+
Share 2
Share 2Share 1
![Page 30: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/30.jpg)
The Q’tron NN for (2, 2)Plane-G
Plane-S1 (Share 1 )
Plane-H
Plane-S2 (Share 2 )
Target ImageClamped
Share 1+
Share 2
Share 2Share 1
Halftoning
Stacking Rule
![Page 31: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/31.jpg)
Halftoning + Stacking Rules Halftoning
Gray Images Binary Images Gray Images: Target and Shares
Stacking Rules Fulfill the Access Scheme
![Page 32: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/32.jpg)
HalftoningGraytone Image Halftone Image
Halftoning
How?To make the average luminances of each cell-pair as close as possible.
![Page 33: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/33.jpg)
HalftoningGray Image Halftone Image
Halftoning
May have many solutions
![Page 34: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/34.jpg)
Stacking RulesGray Image Halftone Image
Halftoning
Share Images
Stacking Rule
One or more pixels black
Black
![Page 35: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/35.jpg)
Energy function --- Halftoning
A 3 3 halftone cellA 3 3 graytone cell
The luminance difference(squared error)
![Page 36: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/36.jpg)
Stacking Rules (The magic)
s1 s2
0
0
1
1
0
1
0
1
h
0
1
1
1
E2
0
0.25
0.25
0.25
0
0
1
1
0
1
0
1
1
0
0
0
2.25
1
1
1
s1 s2 h E2
Feasible Infeasible
+ =s1 s2 h
![Page 37: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/37.jpg)
Stacking Rules (The magic)
s1 s2
0
0
1
1
0
1
0
1
h
0
1
1
1
E2
0
0.25
0.25
0.25
0
0
1
1
0
1
0
1
1
0
0
0
2.25
1
1
1
s1 s2 h E2
Feasible Infeasible
+ =s1 s2 h
Low High
![Page 38: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/38.jpg)
Energy function --- Stacking Rules
Minimizing this term tends to satisfy the stacking rules
![Page 39: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/39.jpg)
Share Image Assignment For simplicity, shares are plain images
S1 S2
Mean Gray level K1K2
Result
![Page 40: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/40.jpg)
Energy Function---Share Image Assignment
![Page 41: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/41.jpg)
Total Energy
HalftoningHalftoning StackingRules
StackingRules
ShareImagesShare
Images
![Page 42: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/42.jpg)
Q’tron NN Construction
Mapping
![Page 43: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/43.jpg)
Experimental Results
![Page 44: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/44.jpg)
Histogram Reallocation Needed
+
+
HistogramReallocation
![Page 45: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/45.jpg)
The ProcedurePlane-G
Plane-S1 (Share 1 )
Plane-H
Plane-S2 (Share 2 )
The original taget image
![Page 46: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/46.jpg)
The ProcedurePlane-G
Plane-S1 (Share 1 )
Plane-H
Plane-S2 (Share 2 )
The original taget image
HistogramReallocation
Clamped
![Page 47: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/47.jpg)
The ProcedurePlane-G
Plane-S1 (Share 1 )
Plane-H
Plane-S2 (Share 2 )
The original taget image
HistogramReallocation
Clamped
Free
![Page 48: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/48.jpg)
Experimental Result --- (2, 2)
Share 1 Share 2TargetImage
Share 1+
Share 2
![Page 49: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/49.jpg)
Generalized Access Scheme
Experimental Results
![Page 50: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/50.jpg)
Full Access Scheme --- 3 Shares
朝辭白帝彩雲間朝辭白帝彩雲間
朝 辭 白
帝 彩 雲
間
Shares
![Page 51: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/51.jpg)
Full Access Scheme --- 3 Shares
朝辭白帝彩雲間朝辭白帝彩雲間
朝 辭 白
帝 彩 雲
間
Shares
Theoretically, unrealizable.
We did it in practical sense.
![Page 52: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/52.jpg)
Full Access Scheme --- 3 Shares
S1 S2 S3
S1+S2 S1+S3 S2+S3 S1+S2+S3
![Page 53: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/53.jpg)
Access Schemewith Forbidden Subset(s)
人之初性本善人之初性本善
人 之 初
性 本 X
善
Theoretically,realizable.
Shares
![Page 54: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/54.jpg)
Access Schemewith Forbidden Subset(s)
S1 S2 S3
S1+S2 S1+S3 S2+S3 S1+S2+S3
![Page 55: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/55.jpg)
Access Schemefor Access Control
S1 S2 S3
S4 S1+S4 S2+S4 S3+S4
![Page 56: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/56.jpg)
Target and Shares are Gray Images
S1
Armored knight
![Page 57: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/57.jpg)
Target and Shares are Gray Images
S2
Man
![Page 58: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/58.jpg)
Target and Shares are Gray Images
S1 + S2
Armored Knight + Man
= Lina
![Page 59: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/59.jpg)
Conclusions and Future works
![Page 60: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/60.jpg)
Conclusions How? NNs for visual cryptography No codebook. Uniform math for access schemes. Target images and share images are
graylevelled ones Share image size = Target image size
![Page 61: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000](https://reader035.vdocuments.site/reader035/viewer/2022062217/56649f275503460f94c3f98d/html5/thumbnails/61.jpg)
Future Works Design language to specify an access s
cheme. Auto generation of the Q’tron NNs Histogram Reallocation is a nontrivial
task.
Extend to color images