A Verifiable Visual Cryptography Scheme Using Neural Networks

被引:0
|
作者
Deng Yuqiao [1 ]
Song Ge [2 ]
机构
[1] Guangdong Univ Business Studies, Math & Comp Sci Coll, Guangzhou, Guangdong, Peoples R China
[2] Harbin Inst Technol, Shenzhen Grad Sch, Shenzhen, Peoples R China
关键词
Pi-sigma neural networks; visual cryptography; general access structure; GENERAL ACCESS STRUCTURES;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper proposes a new verifiable visual cryptography scheme for general access structures using pisigma neural networks (VVCSPSN), which is based on probabilistic signature scheme (PSS), which is considered as security and effective verification method. Compared to other high-order networks, PSN has a highly regular structure, needs a much smaller number of weights and less training time. Using PSN's capability of large-scale parallel classification, VCSPSN reduces the information communication rate greatly, makes best known upper bound polynomial, and distinguishes the deferent information in secret image.
引用
收藏
页码:113 / 116
页数:4
相关论文
共 50 条
  • [31] A Verifiable Multi-Secret Sharing Scheme with Elliptic Curve Cryptography
    Chattopadhyay, Arup Kumar
    Maitra, Paramita
    Nag, Amitava
    Saha, Himadri Nath
    2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2018, : 1374 - 1379
  • [32] Single secret image sharing scheme using neural cryptography
    Mayank Gupta
    Manu Gupta
    Maroti Deshmukh
    Multimedia Tools and Applications, 2020, 79 : 12183 - 12204
  • [33] Single secret image sharing scheme using neural cryptography
    Gupta, Mayank
    Gupta, Manu
    Deshmukh, Maroti
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (17-18) : 12183 - 12204
  • [34] Research on Rotation Visual Cryptography Scheme
    Fu, Zhengxin
    Yu, Bin
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 533 - 536
  • [35] Visual Cryptography Scheme with Essential Participants
    Li, Peng
    Yin, Liping
    Ma, Jianfeng
    MATHEMATICS, 2020, 8 (05)
  • [36] Digital watermarking scheme with visual cryptography
    Hsu, Ching-Sheng
    Tu, Shu-Fen
    IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 659 - 662
  • [37] Optimization of XOR Visual Cryptography Scheme
    Shi, Lin
    Yu, Bin
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 297 - 301
  • [38] Cheating immune visual cryptography scheme
    Liu, F.
    Wu, C.
    Lin, X.
    IET INFORMATION SECURITY, 2011, 5 (01) : 51 - 59
  • [39] A Lossless Tagged Visual Cryptography Scheme
    Wang, Xiang
    Pei, Qingqi
    Li, Hui
    IEEE SIGNAL PROCESSING LETTERS, 2014, 21 (07) : 853 - 856
  • [40] On (k, n)*-visual cryptography scheme
    Arumugam, S.
    Lakshmanan, R.
    Nagar, Atulya K.
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 71 (01) : 153 - 162