A Verifiable Visual Cryptography Scheme Using Neural Networks

被引:0
|
作者
Deng Yuqiao [1 ]
Song Ge [2 ]
机构
[1] Guangdong Univ Business Studies, Math & Comp Sci Coll, Guangzhou, Guangdong, Peoples R China
[2] Harbin Inst Technol, Shenzhen Grad Sch, Shenzhen, Peoples R China
关键词
Pi-sigma neural networks; visual cryptography; general access structure; GENERAL ACCESS STRUCTURES;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper proposes a new verifiable visual cryptography scheme for general access structures using pisigma neural networks (VVCSPSN), which is based on probabilistic signature scheme (PSS), which is considered as security and effective verification method. Compared to other high-order networks, PSN has a highly regular structure, needs a much smaller number of weights and less training time. Using PSN's capability of large-scale parallel classification, VCSPSN reduces the information communication rate greatly, makes best known upper bound polynomial, and distinguishes the deferent information in secret image.
引用
收藏
页码:113 / 116
页数:4
相关论文
共 50 条
  • [41] On (k, n)*-visual cryptography scheme
    S. Arumugam
    R. Lakshmanan
    Atulya K. Nagar
    Designs, Codes and Cryptography, 2014, 71 : 153 - 162
  • [42] A New Visual Cryptography Scheme with Perfect Contrast using Galois Fields
    Paul, Debolina
    Chakraborty, Saptarshi
    2019 3RD INTERNATIONAL CONFERENCE ON RECENT DEVELOPMENTS IN CONTROL, AUTOMATION & POWER ENGINEERING (RDCAPE), 2019, : 7 - 11
  • [43] Improved Extended Progressive Visual Cryptography Scheme Using Pixel Harmonization
    Bhagate, Suhas
    Kulkarni, Prakash J.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2021, 15 (02) : 196 - 216
  • [44] General Construction for Extended Visual Cryptography Scheme Using QR Codes
    Cheng, Yuqiao
    Fu, Zhengxin
    Yu, Bin
    Shen, Gang
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2019, 11 (01) : 1 - 17
  • [45] A copyright protection scheme for digital images using visual cryptography technique
    Lou, Der-Chyuan
    Tso, Hao-Kuan
    Liu, Jiang-Lung
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 125 - 131
  • [46] Copyright protection scheme for color images using extended visual cryptography
    Kukreja, Sonal
    Kasana, Geeta
    Kasana, Singara Singh
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 91
  • [47] A Visual Cryptography Scheme for Secret Hiding using Pre-Processing
    Verma, Nitin
    Nayak, Pinki
    Singh, Pooja
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 784 - 787
  • [48] Design of Visual Cryptography Scheme Using C(m, w) Combinations
    Biswas, Anindya Kr.
    Mukhopadhyay, S.
    Biswas, G. P.
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, (FICTA 2016), VOL 2, 2017, 516 : 447 - 455
  • [49] A Novel Model for Encryption of Telugu Text Using Visual Cryptography Scheme
    Lakshmeeswari, G.
    Lakshmi, D. Rajya
    Srinivas, Y.
    Bindu, G. Hima
    ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY, VOL 2, 2013, 177 : 511 - 520
  • [50] Video Encryption by Using Visual Cryptography Based on Wang's Scheme
    Munir, Rinaldi
    Harlili
    2018 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND SYSTEM ENGINEERING (ICEESE), 2018, : 17 - 22