A Verifiable Visual Cryptography Scheme Using Neural Networks

被引:0
|
作者
Deng Yuqiao [1 ]
Song Ge [2 ]
机构
[1] Guangdong Univ Business Studies, Math & Comp Sci Coll, Guangzhou, Guangdong, Peoples R China
[2] Harbin Inst Technol, Shenzhen Grad Sch, Shenzhen, Peoples R China
关键词
Pi-sigma neural networks; visual cryptography; general access structure; GENERAL ACCESS STRUCTURES;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper proposes a new verifiable visual cryptography scheme for general access structures using pisigma neural networks (VVCSPSN), which is based on probabilistic signature scheme (PSS), which is considered as security and effective verification method. Compared to other high-order networks, PSN has a highly regular structure, needs a much smaller number of weights and less training time. Using PSN's capability of large-scale parallel classification, VCSPSN reduces the information communication rate greatly, makes best known upper bound polynomial, and distinguishes the deferent information in secret image.
引用
收藏
页码:113 / 116
页数:4
相关论文
共 50 条
  • [1] A verifiable visual cryptography scheme
    Han, Yan-Yan
    Wang, Su-Ying
    Hu, Yu-Pu
    He, Wen-Cai
    Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2009, 31 (01): : 86 - 89
  • [2] A Verifiable Visual Cryptography Scheme
    Yu, Bin
    Fang, Liguo
    Xu, Xiaohui
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 908 - 911
  • [3] Visual Cryptography Scheme Using Pi-sigma Neural Networks
    Song, Ge
    Peng, Changgen
    Miao, Xuelan
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 2, 2008, : 679 - +
  • [4] A Verifiable Visual Cryptography Scheme Based on XOR Algorithm
    Han, Yanyan
    Dong, Haocong
    He, Wencai
    Liu, Juan
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 673 - 677
  • [5] Verifiable Visual Cryptography
    Hsu, Shuo-Fang
    Chang, Yu-Jie
    Wang, Ran-Zan
    Lee, Yeuan-Kuen
    Huang, Shih-Yu
    2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC), 2012, : 464 - 467
  • [6] VPVC: verifiable progressive visual cryptography
    Shivendra Shivani
    Suneeta Agarwal
    Pattern Analysis and Applications, 2018, 21 : 139 - 166
  • [7] VPVC: verifiable progressive visual cryptography
    Shivani, Shivendra
    Agarwal, Suneeta
    PATTERN ANALYSIS AND APPLICATIONS, 2018, 21 (01) : 139 - 166
  • [8] The semipublic encryption for visual cryptography using Q'tron neural networks
    Yue, Tai-Wen
    Chiang, Suchen
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) : 24 - 41
  • [9] Security Enhancement in Image Steganography Using Neural Networks and Visual Cryptography
    Seethalakshmi, K. S.
    Usha, B. A.
    Sangeetha, K. N.
    2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 396 - 402
  • [10] The semipublic encryption for visual cryptography using Q'tron neural networks
    Yue, TW
    Chiang, SC
    AI 2004: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2004, 3339 : 1253 - 1261