The semipublic encryption for visual cryptography using Q'tron neural networks

被引:3
|
作者
Yue, Tai-Wen [1 ]
Chiang, Suchen [1 ]
机构
[1] Tatung Univ, Tatung, Taiwan
关键词
visual cryptography; semipublic encryption/decryption; halftone; Q'tron neural networks;
D O I
10.1016/j.jnca.2005.08.003
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The paper proposes the semipublic encrypting scheme for visual cryptography using the Q'tron neural-network (Q'tron NN) model. This encrypting scheme hides only the true secret from the public. That is, the pictorial meaning appearing in a public share describes the public information of a document while leaving its confidential part undisclosed. A piece of confidential information is retrievable if and only if a right user share is available. The principle to construct the Q'tron NN to fulfill the aforementioned scheme will be thoroughly discussed. An application that uses the scheme for key distribution in a public area will be demonstrated. (C) 2005 Elsevier Ltd. All rights reserved.
引用
收藏
页码:24 / 41
页数:18
相关论文
共 50 条
  • [1] The semipublic encryption for visual cryptography using Q'tron neural networks
    Yue, TW
    Chiang, SC
    AI 2004: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2004, 3339 : 1253 - 1261
  • [2] Multiple Information Hiding in General Access Structure Visual Cryptography Using Q'tron Neural Network
    Gurung, Sandeep
    Chakravorty, Mrinaldeep
    ADVANCED COMPUTATIONAL AND COMMUNICATION PARADIGMS, VOL 2, 2018, 706 : 385 - 394
  • [3] Q'tron neural networks for constraint satisfaction
    Yue, TW
    Chen, MC
    HIS'04: FOURTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, PROCEEDINGS, 2005, : 398 - 403
  • [4] Sudoku Solver by Q'tron Neural Networks
    Yue, Tai-Wen
    Lee, Zou-Chung
    INTELLIGENT COMPUTING, PART I: INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, ICIC 2006, PART I, 2006, 4113 : 943 - 952
  • [5] A Verifiable Visual Cryptography Scheme Using Neural Networks
    Deng Yuqiao
    Song Ge
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 113 - 116
  • [6] Security Enhancement in Image Steganography Using Neural Networks and Visual Cryptography
    Seethalakshmi, K. S.
    Usha, B. A.
    Sangeetha, K. N.
    2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 396 - 402
  • [7] Visual Cryptography Scheme Using Pi-sigma Neural Networks
    Song, Ge
    Peng, Changgen
    Miao, Xuelan
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 2, 2008, : 679 - +
  • [8] Evaluation of correlation in optical encryption by using visual cryptography
    Yi, SY
    Ryu, CS
    Ryu, DH
    Lee, SH
    OPTICAL PATTERN RECOGNITION XII, 2001, 4387 : 238 - 246
  • [9] Encryption of optical image using BCGH and visual cryptography
    Yi, SY
    Ryu, CS
    Kim, DG
    Lee, SH
    18TH CONGRESS OF THE INTERNATIONAL COMMISSION FOR OPTICS: OPTICS FOR THE NEXT MILLENNIUM, TECHNICAL DIGEST, 1999, 3749 : 276 - 277
  • [10] Encryption Based on Neural Cryptography
    Pattanayak, Sayantica
    Ludwig, Simone A.
    HYBRID INTELLIGENT SYSTEMS, HIS 2017, 2018, 734 : 321 - 330