Presentation is loading. Please wait.

Presentation is loading. Please wait.

Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000.

Similar presentations


Presentation on theme: "Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000."— Presentation transcript:

1 Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000

2 Outline Introduction Neural Network Model --- Q ’ tron NN Q ’ tron NN for Visual Cryptography Experimental Results Conclusions and Feature Works

3 Introduction

4 What is visual cryptography? ( n, k )-scheme: k out of n Decompose a secret image into a set of n shadow images called shares. A share carries meaningless information. Stacking k or more shares, printed on transparencies, reveals the secrete. Decrypting using eyes

5 Example Target image Share image2 Share image1

6 Applications Key Management Message Concealment Authorization Authentication Identification Entertainment

7 Access Schemes Shares Stacking all shares Stacking two shares (2, 2)(3, 2)Full

8 Traditional Approach Using codebooks An Example codebook: (2, 2) PixelProbability Shares #1 #2 Superposition of the two shares White Pixels Black Pixels

9 Our Approaches No codebook required Inputs are gray images Target Image(s) Share Images Outputs are halftone images that mimic the corresponding gray images Applicable to complex access schemes

10 Neural Network Model Q ’ tron NN

11 Q ’ tron Active value Weighted and multilevelled Each Q ’ tron represents a quantity --- a i Q i

12 Q ’ tron Active value Internal stimulus Input due to Q ’ trons ’ Interactions T ii usually is nonzero and negative

13 Q ’ tron Active value Internal stimulus External stimulus External input serves as bias

14 Q ’ tron Active value Internal stimulus External stimulus Escape local-minima Persistent noise --- no holiday

15 Q ’ tron External stimulus Active value Internal stimulus

16 State Transition Rule Q ’ tron ’ s Input Internal Stimulus External Stimulus Noise Free

17 State Transition Rule State Updating Rule: Running Asynchronously

18 Q ’ tron NN vs. Hopfield NN Running Asynchronously Noise Free T ii =0 q i =2 Noise Free T ii =0 q i =2 Q ’ tron NN = Hopfiled NN

19 Energy Function Interaction Among Q’trons Interaction with External Stimuli Constant Monotonically Nonincreasing

20 Problem Solving Using a Q ’ tron NN A given problem A optimization problem Reformulation Cost Function Energy Function Build Q’tron NN Mapping

21 Operation modes External stimulus Active value Internal stimulus Clamp-mode

22 Operation modes External stimulus Active value Internal stimulus free-mode

23 Why operation modes? Unstable Stable

24 Why operation modes? Clamped Free

25 Why operation modes? Clamped Free

26 Q ’ tron NN for Visual Cryptography Highlight the main concept by (2, 2)

27 The Q ’ tron NN for (2, 2) Plane-G Plane-S1 (Share 1 ) Plane-H Plane-S2 (Share 2 )

28 The Q ’ tron NN for (2, 2) Plane-G Plane-S1 (Share 1 ) Plane-H Plane-S2 (Share 2 ) Target Image Clamped

29 The Q ’ tron NN for (2, 2) Plane-G Plane-S1 (Share 1 ) Plane-H Plane-S2 (Share 2 ) Target Image Clamped Share 1 + Share 2 Share 1

30 The Q ’ tron NN for (2, 2) Plane-G Plane-S1 (Share 1 ) Plane-H Plane-S2 (Share 2 ) Target Image Clamped Share 1 + Share 2 Share 1 Halftoning Stacking Rule

31 Halftoning + Stacking Rules Halftoning Gray Images  Binary Images Gray Images: Target and Shares Stacking Rules Fulfill the Access Scheme

32 Halftoning Graytone Image Halftone Image Halftoning How? To make the average luminances of each cell-pair as close as possible.

33 Halftoning Gray Image Halftone Image Halftoning May have many solutions

34 Stacking Rules Gray Image Halftone Image Halftoning Share Images Stacking Rule One or more pixels black  Black

35 Energy function --- Halftoning A 3  3 halftone cell A 3  3 graytone cell The luminance difference (squared error)

36 Stacking Rules (The magic) s1s1 s2s2 0 0 1 1 0 1 0 1 h 0 1 1 1 E2E2 0 0.25 0 0 1 1 0 1 0 1 1 0 0 0 2.25 1 1 1 s1s1 s2s2 h E2E2 Feasible Infeasible + = s1s1 s2s2 h

37 Stacking Rules (The magic) s1s1 s2s2 0 0 1 1 0 1 0 1 h 0 1 1 1 E2E2 0 0.25 0 0 1 1 0 1 0 1 1 0 0 0 2.25 1 1 1 s1s1 s2s2 h E2E2 Feasible Infeasible + = s1s1 s2s2 h LowHigh

38 Energy function --- Stacking Rules Minimizing this term tends to satisfy the stacking rules

39 Share Image Assignment For simplicity, shares are plain images S1 S2 Mean Gray level K 1 K2K2 Result

40 Energy Function--- Share Image Assignment

41 Total Energy Halftoning Stacking Rules Stacking Rules Share Images Share Images

42 Q ’ tron NN Construction Mapping

43 Experimental Results

44 Histogram Reallocation Needed + + Histogram Reallocation

45 The Procedure Plane-G Plane-S1 (Share 1 ) Plane-H Plane-S2 (Share 2 ) The original taget image

46 The Procedure Plane-G Plane-S1 (Share 1 ) Plane-H Plane-S2 (Share 2 ) The original taget image Histogram Reallocation Clamped

47 The Procedure Plane-G Plane-S1 (Share 1 ) Plane-H Plane-S2 (Share 2 ) The original taget image Histogram Reallocation Clamped Free

48 Experimental Result --- (2, 2) Share 1Share 2 Target Image Share 1 + Share 2

49 Generalized Access Scheme Experimental Results

50 Full Access Scheme --- 3 Shares 朝辭白帝彩雲間 朝 辭 白 帝彩雲 間 Shares

51 Full Access Scheme --- 3 Shares 朝辭白帝彩雲間 朝 辭 白 帝彩雲 間 Shares Theoretically, unrealizable. We did it in practical sense.

52 Full Access Scheme --- 3 Shares S1S2S3 S1+S2S1+S3S2+S3S1+S2+S3

53 Access Scheme with Forbidden Subset(s) 人之初性本善 人 之 初 性本 X 善 Theoretically, realizable. Shares

54 Access Scheme with Forbidden Subset(s) S1S2S3 S1+S2S1+S3S2+S3S1+S2+S3

55 Access Scheme for Access Control S1S2S3 S4S1+S4S2+S4S3+S4

56 Target and Shares are Gray Images S1 Armored knight

57 Target and Shares are Gray Images S2 Man

58 Target and Shares are Gray Images S1 + S2 Armored Knight + Man = Lina

59 Conclusions and Future works

60 Conclusions How? NNs for visual cryptography No codebook. Uniform math for access schemes. Target images and share images are graylevelled ones Share image size = Target image size

61 Future Works Design language to specify an access scheme. Auto generation of the Q ’ tron NNs Histogram Reallocation is a nontrivial task. Extend to color images


Download ppt "Neural Networks for Visual Cryptography --- with Examples for Complex Access Schemes Tatung University, Taiwan Presenter: Tai-Wen Yue CAINE-2000."

Similar presentations


Ads by Google