The semipublic encryption for visual cryptography using Q'tron neural networks

被引:0
|
作者
Yue, TW
Chiang, SC
机构
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper proposes the semipublic encrypting scheme for visual cryptography using the Q'tron neural-network (Q'tron NN) model. This encrypting scheme hides only the true secret from the public. That is, the pictorial meaning appearing in a public share describes the public information in a document while leaving its confidential part undisclosed. A piece of confidential information is retrievable if and only if a right user share is available. The method to construct the Q'tron NN to fulfill the aforementioned scheme will be investigated. An application that uses the scheme for key distribution in a public area will be demonstrated.
引用
收藏
页码:1253 / 1261
页数:9
相关论文
共 50 条
  • [1] The semipublic encryption for visual cryptography using Q'tron neural networks
    Yue, Tai-Wen
    Chiang, Suchen
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) : 24 - 41
  • [2] Multiple Information Hiding in General Access Structure Visual Cryptography Using Q'tron Neural Network
    Gurung, Sandeep
    Chakravorty, Mrinaldeep
    [J]. ADVANCED COMPUTATIONAL AND COMMUNICATION PARADIGMS, VOL 2, 2018, 706 : 385 - 394
  • [3] Q'tron neural networks for constraint satisfaction
    Yue, TW
    Chen, MC
    [J]. HIS'04: FOURTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, PROCEEDINGS, 2005, : 398 - 403
  • [4] Sudoku Solver by Q'tron Neural Networks
    Yue, Tai-Wen
    Lee, Zou-Chung
    [J]. INTELLIGENT COMPUTING, PART I: INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, ICIC 2006, PART I, 2006, 4113 : 943 - 952
  • [5] A Verifiable Visual Cryptography Scheme Using Neural Networks
    Deng Yuqiao
    Song Ge
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 113 - 116
  • [6] Security Enhancement in Image Steganography Using Neural Networks and Visual Cryptography
    Seethalakshmi, K. S.
    Usha, B. A.
    Sangeetha, K. N.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 396 - 402
  • [7] Visual Cryptography Scheme Using Pi-sigma Neural Networks
    Song, Ge
    Peng, Changgen
    Miao, Xuelan
    [J]. ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 2, 2008, : 679 - +
  • [8] Evaluation of correlation in optical encryption by using visual cryptography
    Yi, SY
    Ryu, CS
    Ryu, DH
    Lee, SH
    [J]. OPTICAL PATTERN RECOGNITION XII, 2001, 4387 : 238 - 246
  • [9] Encryption of optical image using BCGH and visual cryptography
    Yi, SY
    Ryu, CS
    Kim, DG
    Lee, SH
    [J]. 18TH CONGRESS OF THE INTERNATIONAL COMMISSION FOR OPTICS: OPTICS FOR THE NEXT MILLENNIUM, TECHNICAL DIGEST, 1999, 3749 : 276 - 277
  • [10] Encryption Based on Neural Cryptography
    Pattanayak, Sayantica
    Ludwig, Simone A.
    [J]. HYBRID INTELLIGENT SYSTEMS, HIS 2017, 2018, 734 : 321 - 330