Abstract
This paper proposes the general paradigm to build Q’tron neural networks (NNs) for visual cryptography. Given a visual encryption scheme, usually described using an access structure, it was formulated as a optimization problem of integer programming by which the a Q’tron NN with the so-called integer-programming-type energy function is, then, built to fulfill that scheme. Remarkably, this type of energy function has the so-called known-energy property, which allows us to inject bounded noises persistently into Q’trons in the NN to escape local minima. The so-built Q’tron NN, as a result, will settle down onto a solution state if and only if the instance of the given encryption scheme is realizable.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
G. Ateniese, C. Blundo, A. D. Santis, D. R. Stinson, “Visual Cryptography for General Access Structures”, Information and Computation 129(2), 86–106 (1996)
G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, “Extended Scheme for Visual Cryptography,” submitted to Theoretical Computer Science, http://cacr.math.uwaterloo.ca/~dstinson/visual.html.
Harry R. Lewis, Christos H. Papadimitriou, Elements of The Theory of Computation, pp.275–351, Prentice Hall International Editions, 1998.
J. J. Hopfield, “Neural Networks and Physical Systems with Emergent Collective Computational Abilities,” Proc. Natl. Acad. Sci. USA, Vol. 79, 2554–2558, April 1982.
J. J. Hopfield and D. W. Tank, “Neural Computation of Decisions in Optimization Problems,” Biological Cybernetics, 52, pp.141–152,1985.
M. Naor, B. Pinkas, “Visual Authentication and Identification,” CRYPTO 1997, pp. 322–336.
M. Naor and A. Shamir, “Visual Cryptography,” in Advances Cryptology-Eurocrypt’ 94, A. DeSantis Ed. Vol. 950 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, pp. 1–12, 1995.
Tai-Wen Yue, A Goal-Driven Neural Network Approach for Combinatorial Optimization and Invariant Pattern Recognition, Phd’s Thesis, Department of Computer Engineering, National Taiwan University, Taiwan, 1992.
Tai-Wen Yue and Li-Cheng Fu, “A Local-Minima-Free Neural Network Approach for Building A/D Converters and associative Adders”, IEEE IJCNN-91-Seattle, Vol. 2, pp. 976, 1991.
Tai-Wen Yue and Li-Cheng Fu, “A Complete Neural Network Approach to Solving a Class of Combinatorial Problems”, IEEE IJCNN-91-Seattle, Vol. 2, pp. 978, 1991.
Tai-Wen Yue, Suchen Chiang, “A Neural Network Approach for Visual Cryptography, ” Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks, Vol. 5, pp. 494–499, July 2000.
Suchen Chiang, Tai-Wen Yue, “Neural Networks for Visual Cryptography-with Examples for Complex Access Schemes,” Proceedings of the ISCA 13th International Conference on Computer Applications in Industry and Engineering, pp. 281–286, November 2000.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yue, TW., Chiang, S. (2001). The General Neural-Network Paradigm for Visual Cryptography. In: Mira, J., Prieto, A. (eds) Connectionist Models of Neurons, Learning Processes, and Artificial Intelligence. IWANN 2001. Lecture Notes in Computer Science, vol 2084. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45720-8_23
Download citation
DOI: https://doi.org/10.1007/3-540-45720-8_23
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42235-8
Online ISBN: 978-3-540-45720-6
eBook Packages: Springer Book Archive