neural networks for visual cryptography --- with examples for complex access schemes tatung...

61
Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE- 2000

Upload: myra-wilcox

Post on 05-Jan-2016

233 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes

Tatung University, TaiwanPresenter: Tai-Wen Yue

CAINE-2000

Page 2: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Outline Introduction Neural Network Model --- Q’tron NN Q’tron NN for Visual Cryptography Experimental Results

Conclusions and Feature Works

Page 3: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Introduction

Page 4: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

What is visual cryptography?(n, k)-scheme: k out of n

Decompose a secret image into a set of n shadow images called shares.

A share carries meaningless information.

Stacking k or more shares, printed on transparencies, reveals the secrete.

Decrypting using eyes

Page 5: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Example

Target image

Share image2

Share image1

Page 6: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Applications Key Management Message Concealment Authorization Authentication Identification Entertainment

Page 7: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Access Schemes

A A

A A A

A

E F G

CB D

AA A

A A A

A

A A AA A A

A

E F G

CB D

A

E F GE F G

CB DCB DShares

Stackingall shares

Stackingtwo shares

(2, 2) (3, 2) Full

Page 8: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Traditional Approach Using codebooks An Example codebook: (2, 2)

Pixel ProbabilityShares

#1 #2Superposition ofthe two shares

5.0p

5.0p

5.0p

5.0p

WhitePixels

BlackPixels

Page 9: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Our Approaches No codebook required Inputs are gray images

Target Image(s) Share Images

Outputs are halftone images that mimic the corresponding gray images

Applicable to complex access schemes

Page 10: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Neural Network Model

Q’tron NN

Page 11: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Q’tronActive value

iiQa

1iq0 i

i

a

• Weighted and multilevelled• Each Q’tron represents a quantity --- aiQi

Page 12: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Q’tronActive value

Internal stimulus

n

jjjij QaT

1

ii

a

iiT

• Input due to Q’trons’ Interactions• Tii usually is nonzero and negative

Page 13: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Q’tronActive value

Internal stimulus i

i

a

iI

External stimulus

• External input serves as bias

Page 14: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Q’tronActive value

Internal stimulus i

i

a

External stimulus

• Escape local-minima• Persistent noise --- no holiday

iN

Page 15: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Q’tron

iIExternal stimulus

iN

Active value

Internal stimulus

n

jjjij QaT

1

ii

a

iiT iiQa

1iq0

Page 16: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

State Transition Rule

iI

iN

n

jjjij QaT

1

ii

a

iiT iiQa

1iq0

Q’tron’s Input

InternalStimulus

ExternalStimulus

Noise

NoiseFree

Page 17: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

State Transition Rule

State Updating Rule:

Running AsynchronouslyRunning Asynchronously

Page 18: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Q’tron NN vs. Hopfield NN

Running AsynchronouslyRunning Asynchronously

Noise Free Tii=0 qi=2

Noise Free Tii=0 qi=2

Q’tron NN = Hopfiled NN

Page 19: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Energy Function

InteractionAmong Q’trons

Interactionwith

External Stimuli

Constant

Monotonically Nonincreasing

Page 20: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Problem SolvingUsing a Q’tron NN

A given problemA given problem

A optimization problemA optimization problemReformulation

Cost FunctionCost Function

Energy FunctionEnergy Function

Build Q’tron NNBuild Q’tron NN

Mapping

Page 21: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Operation modes

iIExternal stimulus

iN

Active value

Internal stimulus

n

jjjij QaT

1

ii

a

iiT iiQa

1iq0

Clamp-mode

Page 22: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Operation modes

iIExternal stimulus

iN

Active value

Internal stimulus

n

jjjij QaT

1

ii

a

iiT iiQa

1iq0

free-mode

Page 23: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Why operation modes?

Unstable

Stable

Page 24: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Why operation modes?

ClampedFree

Page 25: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Why operation modes?

Clamped Free

Page 26: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Q’tron NN forVisual Cryptography

Highlight the main concept by(2, 2)

Page 27: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

The Q’tron NN for (2, 2)Plane-G

Plane-S1 (Share 1 )

Plane-H

Plane-S2 (Share 2 )

Page 28: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

The Q’tron NN for (2, 2)Plane-G

Plane-S1 (Share 1 )

Plane-H

Plane-S2 (Share 2 )

Target ImageClamped

Page 29: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

The Q’tron NN for (2, 2)Plane-G

Plane-S1 (Share 1 )

Plane-H

Plane-S2 (Share 2 )

Target ImageClamped

Share 1+

Share 2

Share 2Share 1

Page 30: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

The Q’tron NN for (2, 2)Plane-G

Plane-S1 (Share 1 )

Plane-H

Plane-S2 (Share 2 )

Target ImageClamped

Share 1+

Share 2

Share 2Share 1

Halftoning

Stacking Rule

Page 31: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Halftoning + Stacking Rules Halftoning

Gray Images Binary Images Gray Images: Target and Shares

Stacking Rules Fulfill the Access Scheme

Page 32: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

HalftoningGraytone Image Halftone Image

Halftoning

How?To make the average luminances of each cell-pair as close as possible.

Page 33: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

HalftoningGray Image Halftone Image

Halftoning

May have many solutions

Page 34: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Stacking RulesGray Image Halftone Image

Halftoning

Share Images

Stacking Rule

One or more pixels black

Black

Page 35: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Energy function --- Halftoning

A 3 3 halftone cellA 3 3 graytone cell

The luminance difference(squared error)

Page 36: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Stacking Rules (The magic)

s1 s2

0

0

1

1

0

1

0

1

h

0

1

1

1

E2

0

0.25

0.25

0.25

0

0

1

1

0

1

0

1

1

0

0

0

2.25

1

1

1

s1 s2 h E2

Feasible Infeasible

+ =s1 s2 h

Page 37: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Stacking Rules (The magic)

s1 s2

0

0

1

1

0

1

0

1

h

0

1

1

1

E2

0

0.25

0.25

0.25

0

0

1

1

0

1

0

1

1

0

0

0

2.25

1

1

1

s1 s2 h E2

Feasible Infeasible

+ =s1 s2 h

Low High

Page 38: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Energy function --- Stacking Rules

Minimizing this term tends to satisfy the stacking rules

Page 39: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Share Image Assignment For simplicity, shares are plain images

S1 S2

Mean Gray level K1K2

Result

Page 40: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Energy Function---Share Image Assignment

Page 41: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Total Energy

HalftoningHalftoning StackingRules

StackingRules

ShareImagesShare

Images

Page 42: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Q’tron NN Construction

Mapping

Page 43: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Experimental Results

Page 44: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Histogram Reallocation Needed

+

+

HistogramReallocation

Page 45: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

The ProcedurePlane-G

Plane-S1 (Share 1 )

Plane-H

Plane-S2 (Share 2 )

The original taget image

Page 46: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

The ProcedurePlane-G

Plane-S1 (Share 1 )

Plane-H

Plane-S2 (Share 2 )

The original taget image

HistogramReallocation

Clamped

Page 47: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

The ProcedurePlane-G

Plane-S1 (Share 1 )

Plane-H

Plane-S2 (Share 2 )

The original taget image

HistogramReallocation

Clamped

Free

Page 48: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Experimental Result --- (2, 2)

Share 1 Share 2TargetImage

Share 1+

Share 2

Page 49: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Generalized Access Scheme

Experimental Results

Page 50: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Full Access Scheme --- 3 Shares

朝辭白帝彩雲間朝辭白帝彩雲間

朝 辭 白

帝 彩 雲

Shares

Page 51: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Full Access Scheme --- 3 Shares

朝辭白帝彩雲間朝辭白帝彩雲間

朝 辭 白

帝 彩 雲

Shares

Theoretically, unrealizable.

We did it in practical sense.

Page 52: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Full Access Scheme --- 3 Shares

S1 S2 S3

S1+S2 S1+S3 S2+S3 S1+S2+S3

Page 53: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Access Schemewith Forbidden Subset(s)

人之初性本善人之初性本善

人 之 初

性 本 X

Theoretically,realizable.

Shares

Page 54: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Access Schemewith Forbidden Subset(s)

S1 S2 S3

S1+S2 S1+S3 S2+S3 S1+S2+S3

Page 55: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Access Schemefor Access Control

S1 S2 S3

S4 S1+S4 S2+S4 S3+S4

Page 56: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Target and Shares are Gray Images

S1

Armored knight

Page 57: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Target and Shares are Gray Images

S2

Man

Page 58: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Target and Shares are Gray Images

S1 + S2

Armored Knight + Man

= Lina

Page 59: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Conclusions and Future works

Page 60: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Conclusions How? NNs for visual cryptography No codebook. Uniform math for access schemes. Target images and share images are

graylevelled ones Share image size = Target image size

Page 61: Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

Future Works Design language to specify an access s

cheme. Auto generation of the Q’tron NNs Histogram Reallocation is a nontrivial

task.

Extend to color images