- 1、本文档共81页,可阅读全部内容。
- 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
类神经网路於视觉密码学之应用
類神經網路於視覺密碼學之應用 Reporter : 劉益成 Advisor : 虞台文 Contents Overview The Surveys Neural Network Model Visual Cryptography Using Neural Networks Histogram Allocation Problems Conclusion and Future Works Overview What is Visual Cryptography? To achieve visual secret sharing. Shares Binary image printed in transparencies. Target Image --- Message concealment Decryptor --- Eyes Example Applications Key management Message concealment Authorization Identification Entertainment Our Approach Using the Q’tron NN Model. The Surveys on Visual Cryptography The Evolution Visual Cryptography(1994): Monni Naor and Adi Shamir. Extension (1998): Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis and Douglas R. Stinson. Concept Naor and Shamir (2,2) Concept Naor and Shamir Disadvantages Pixel Expansion --- image size enlarged Participants are all binary images? How to find code books for complex access scheme, e.g., (k,n )? Very difficult Is an access scheme realizable? ? Is a code book existent? Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis and Douglas R. Stinson. Neural Network Model Q’tron---Q-State Neuron Q’tron’s Input State Updating Rule: Q’tron Neural Network System Energy Visual Cryptography Using Qtron Neural Networks Main Concept (2, 2) Access Scheme Image Halftoning Image Halftoning Stacking Rule Satisfaction Stacking Rule Satisfaction Experimental Results Experimental Results Experimental Results Experimental Results Experimental Results Conclusion and Future Works Conclusion Target images and share images use graytone images. Share images size= target images size. Code book is free. Future Works Extend to color images. Neural chip Complete theories for access schemes. 若我們希望,share1的平均gray level值驅於k1,而share2的平均gray level值驅於k2,因此可寫成如下一張的energy finction 為簡化,且share重疊就可decode,因此在此略過 因此,total energy就是分別由halftoning 及stacking rile和使之驅於plain image之三部份所組成 並且對應到tow-dimensional Q‘tron NN 手首先讓我們來討論一個簡單的問題, 如兩張太亮的投影片,不可能合成,全黑, 只有較暗,才有可能 同理,我們在作visual cr
文档评论(0)