A Verifiable Visual Cryptography Scheme Using Neural Networks

被引:0
|
作者
Deng Yuqiao [1 ]
Song Ge [2 ]
机构
[1] Guangdong Univ Business Studies, Math & Comp Sci Coll, Guangzhou, Guangdong, Peoples R China
[2] Harbin Inst Technol, Shenzhen Grad Sch, Shenzhen, Peoples R China
关键词
Pi-sigma neural networks; visual cryptography; general access structure; GENERAL ACCESS STRUCTURES;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper proposes a new verifiable visual cryptography scheme for general access structures using pisigma neural networks (VVCSPSN), which is based on probabilistic signature scheme (PSS), which is considered as security and effective verification method. Compared to other high-order networks, PSN has a highly regular structure, needs a much smaller number of weights and less training time. Using PSN's capability of large-scale parallel classification, VCSPSN reduces the information communication rate greatly, makes best known upper bound polynomial, and distinguishes the deferent information in secret image.
引用
收藏
页码:113 / 116
页数:4
相关论文
共 50 条
  • [21] On the randomness of visual cryptography scheme
    Guo, Teng
    Liu, Feng
    Wu, ChuanKun
    Ren, YaWei
    Wang, Wen
    2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, : 391 - 394
  • [22] Nested visual cryptography scheme
    Yuan Zhonglan
    Xia Guangsheng
    Du Ye
    CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (03): : 459 - 463
  • [23] Evaluation Criteria for Visual Cryptography Schemes via Neural Networks
    Wang, Yunchao
    Li, Yunfa
    Lu, Xiao-Nan
    2020 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW 2020), 2020, : 289 - 292
  • [24] Color visual cryptography scheme
    Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
    Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao, 2006, 11 (1770-1775): : 1770 - 1775
  • [25] Visual Cryptography Scheme with Autostereogram
    Wang, Dao-Shun
    Yi, Feng
    Yang, Ching-Nung
    DIGITAL-FORENSICS AND WATERMARKING, IWDW 2014, 2015, 9023 : 364 - 375
  • [26] An Image Based Authentication Technique Using Visual Cryptography Scheme
    Dais, Annie, V
    Joe, Vijesh C.
    Sugi, Sidney Swarna S.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 124 - 129
  • [27] An Optimized Halftone Visual Cryptography Scheme Using Error Diffusion
    Mahmoud E. Hodeish
    Vikas T. Humbe
    Multimedia Tools and Applications, 2018, 77 : 24937 - 24953
  • [28] Cheating prevention visual cryptography scheme using Latin square
    Ren, Yawei
    Liu, Feng
    Guo, Teng
    Feng, Rongquan
    Lin, Dongdai
    IET INFORMATION SECURITY, 2017, 11 (04) : 211 - 219
  • [29] Protecting Medical Images in Cloud Using Visual Cryptography Scheme
    Marwan, Mbarek
    Kartit, Ali
    Ouahmane, Hassan
    PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2017, : 39 - 44
  • [30] An Optimized Halftone Visual Cryptography Scheme Using Error Diffusion
    Hodeish, Mahmoud E.
    Humbe, Vikas T.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (19) : 24937 - 24953