a neural-network approach for visual cryptography 虞台文 大同大學資工所

52
A Neural-Network Approach for Visual Cryptography 虞虞虞 虞虞虞虞虞虞虞

Upload: frank-moody

Post on 17-Jan-2018

270 views

Category:

Documents


1 download

DESCRIPTION

A Neural-Network Approach for Visual Cryptography Overview 大同大學資工所

TRANSCRIPT

Page 1: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

A Neural-Network Approach for Visual Cryptography

虞台文大同大學資工所

Page 2: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Content Overview The Q’tron NN Model The Q’tron NN Approach for

– Visual Cryptography– Visual Authorization– Semipublic Encryption

General Access Scheme Conclusion

Page 3: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

A Neural-Network Approach for Visual Cryptography

Overview

大同大學資工所

Page 4: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

What isVisual Cryptography and Authorization?

Visual Cryptography (VC)– Encrypts secrete into a set of images (shares).– Decrypts secrete using eyes.

Visual Authorization (VA)– An application of visual cryptography.– Assign different access rights to users.– Authorizing using eyes.

Page 5: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

What is Semipublic Encryption?

Visual Cryptography (VC)– Encrypts secrete into a set of images

(shares).– Decrypts secrete using eyes.

Semipublic Encryption (SE)– An application of visual cryptography.– Hide only secret parts in documents – Right information is available if and only if a

right key is provided

Page 6: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

The Basic Concept of VC

Target Image(The Secret)

Share 2

Share 1AccessScheme

The (2, 2) access scheme.

Page 7: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

The Shares Produced by NN

Target Image(The Secret)

Share 2

Share 1NeuralNetwork

We get shares after the NN settles down.

Page 8: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Decrypting Using Eyes

Share 2

Share 1

Page 9: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Example: (2, 2)

Target image

Share image2

Share image1

Plane shares are used

Page 10: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Traditional Approach Naor and Shamir (2,2)

Pixel Probability Shares#1 #2

Superposition ofthe two shares

5.0p

5.0p

5.0p

5.0p

WhitePixels

BlackPixels

The Code Book

Page 11: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

The VA Scheme

keyshare

user shares(resource 2)

user shares(resource 1)

stacking

stacking

…VIP IP P

…VIP IP P

Very Important Person.

Page 12: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

The SE Scheme

智慧型系統實驗室資料庫使用者 Key江素貞 AB陳美靜 CD張循鋰 XY李作中 UV

Page 13: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

public share(database in lab)

AB CD XY UV

stacking

usershares

keys

素貞

The SE Scheme

循鋰 美靜 作中

智慧型系統實驗室資料庫

使用者 Key江素貞 AB陳美靜 CD張循鋰 XY李作中 UV

智慧型系統實驗室資料庫

使用者 Key江素貞 AB陳美靜 CD張循鋰 XY李作中 UV

Page 14: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

A Neural-Network Approach for Visual Cryptography

The Q’tron NN Model

大同大學資工所

Page 15: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

The Q’tron

i

(ai )

. . .

0 1 2 qi1

aiQiActive value

Qi{0, 1, …, qi1}IiRExternal Stimulus

( )ij j jj

T a QInternal Stimulus

Ni

Noise

Quantum Neuron

Page 16: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

The Q’tron

i

(ai )

. . .

0 1 2 qi1

aiQiActive value

Qi{0, 1, …, qi1}IiRExternal Stimulus

( )ij j jj

T a QInternal Stimulus

Ni

Noise

Free-Mode Q’tron

Page 17: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

The Q’tron

i

(ai )

. . .

0 1 2 qi1

aiQiActive value

Qi{0, 1, …, qi1}IiRExternal Stimulus

( )ij j jj

T a QInternal Stimulus

Ni

Noise

Clamp-Mode Q’tron

Page 18: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Input Stimulus

InternalStimulus

ExternalStimulus

Noise

NoiseFreeTerm

i

(ai )

. . .

Noise

Page 19: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Level Transition

Running Asynchronously

i

(ai )

. . .

Page 20: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Energy Function

InteractionAmong Q’tronsInteraction

withExternal Stimuli

ConstantMonotonically Nonincreasing

Page 21: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

The Q’tron NN

Page 22: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Interface/Hidden Q’trons clamp-modefree-modefree mode Hidden Q’trons

Interface Q’trons

Page 23: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Question-Answering

Feed a question by clamping some interface Q’trons.

clamp-modefree-modefree mode Hidden Q’trons

Interface Q’trons

Page 24: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Question-AnsweringRead answer when all interface Q’trons settle down.

clamp-modefree-modefree mode Hidden Q’trons

Interface Q’trons

Page 25: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

A Neural-Network Approach for Visual Cryptography

The Q’tron NNs for Visual Cryptography Visual Authorization Semipublic Encryption

大同大學資工所

Page 26: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Energy Function for VC

Visual CryptographyImage Halftoning Image

Stacking

+

Page 27: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Image HalftoningGraytone Image

Halftoning

0

255

Halftone Image

0 (Transparent)

1

Graytone image halftone image can be formulated as to minimize the energy function of a Q’tron NN.

Page 28: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Image HalftoningGraytone Image

Halftoning

0

255

Halftone Image

0 (Transparent)

1

Graytone image halftone image can be formulated as to minimize the energy function of a Q’tron NN.

In ideal case, each pair of corresponding small areas has the `same’ average graylevel.

Page 29: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

The Q’tron NN for Image Halftoning

Plane-G (Graytone image)

Plane-H (Halftone image)

Page 30: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Image Halftoning

HalftoningClamp-mode

Free-mode

Plane-G (Graytone image)

Plane-H (Halftone image)

Question

Answer

Page 31: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Image RestorationPlane-G (Graytone image)

Plane-H (Halftone image)

Restoration

Clamp-mode

Free-mode

Question

Answer

Page 32: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Stacking Rule

+ + + +

The satisfaction of stacking rule can also be formulated as to minimize the energy function of a Q’tron NN.

Page 33: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Stacking Rule

+ + + +

The satisfaction of stacking rule can also be formulated as to minimize the energy function of a Q’tron NN.

The energy function for the stacking rule.

See the paper for the detail.

Page 34: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

The Total Energy

+

Share 1 Target

Share 1

Share 2

TargetShare 2

TotalEnergy

Image Halftoning Stacking Rule

Page 35: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

The Q’tron NN for VC/VA

Plane-GS1

Plane-HS1

Share 1

Plane-HS2

Plane-GS2

Share 2

Plane-GT

Plane-HT

Target

Page 36: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Application Visual Cryptography

Plane-GS1

Plane-HS1

Share 1

Plane-HS2

Plane-GS2

Share 2

Plane-GT

Plane-HT

Target

Clamp-Mode

Clamp-Mode

Clamp-Mode

Free-Mode Free-Mode

Free-Mode

Page 37: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Application Visual Authorization

Plane-GS1

Plane-HS1

User Share

Authority

Plane-HS2

Plane-GS2

Plane-GT

Plane-HT

Key Share

Key Share

User Share

VIP IP P

Page 38: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Application Visual Authorization

Plane-GS1

Plane-HS1

User Share

Authority

Clamp-Mode

Free-ModePlane-HS2

Plane-GS2Clamp-Mode

Free-Mode

Plane-GT

Plane-HT

Clamp-Mode

Free-Mode

Key Share

Key Share

User Share

VIP IP P

Producing key Share & the first user share.

Page 39: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Application Visual Authorization

Plane-GS1

Plane-HS1

User Share

Authority

Clamp-ModePlane-HS2

Plane-GS2Clamp-Mode

Free-Mode

Plane-GT

Plane-HT

Clamp-Mode

Some are clamped and some are free.

Key Share

Key Share

User Share

VIP IP P

Producing other user shares.

Page 40: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Application Visual Authorization

Plane-GS1

Plane-HS1

User Share

Authority

Clamp-ModePlane-HS2

Plane-GS2Clamp-Mode

Free-Mode

Plane-GT

Plane-HT

Clamp-Mode

Some are clamped and some are free.

Key Share

Key Share

User Share

VIP IP P

Producing other user shares.

Page 41: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Application Visual Authorization

Plane-GS1

Plane-HS1

User Share

Authority

Clamp-ModePlane-HS2

Plane-GS2Clamp-Mode

Free-Mode

Plane-GT

Plane-HT

Clamp-Mode

Some are clamped and some are free.

Key Share

Key Share

User Share

VIP IP P

Page 42: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Key Share

User Shar

e

User Shar

e

User Shar

e

VIP

IP

P

Page 43: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

A Neural-Network Approach for Visual Cryptography

GeneralAccess Scheme

大同大學資工所

Page 44: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Full Access Scheme 3 Shares

朝辭白帝彩雲間朝 辭 白

帝 彩 雲

間Shares

Page 45: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Full Access Scheme 3 Shares

朝辭白帝彩雲間朝 辭 白

帝 彩 雲

間Shares

Theoretically,

unrealizable.

We did it in

practical sense.

Page 46: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Full Access Scheme 3 Shares

S1 S2 S3

S1+S2 S1+S3 S2+S3 S1+S2+S3

Page 47: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Access Schemewith Forbidden Subset(s)

Anyone knows what is it?

Page 48: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Access Schemewith Forbidden Subset(s)

人之初性本善人 之 初

性 本 X

Theoretically,

realizable.

Shares

Page 49: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Access Schemewith Forbidden Subset(s)

S1 S2 S3

S1+S2 S1+S3 S2+S3 S1+S2+S3

Page 50: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

A Neural-Network Approach for Visual Cryptography

Conclusion

大同大學資工所

Page 51: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

Conclusion Different from traditional approaches:

– No codebook needed.– Operating on gray images directly.

Complex access scheme capable. http://www.suchen.idv.tw/

Page 52: A Neural-Network Approach for Visual Cryptography 虞台文 大同大學資工所

謝謝謝謝