A Verifiable Visual Cryptography Scheme Using Neural Networks

Article Preview

Abstract:

This paper proposes a new verifiable visual cryptography scheme for general access structures using pi-sigma neural networks (VVCSPSN), which is based on probabilistic signature scheme (PSS), which is considered as security and effective verification method. Compared to other high-order networks, PSN has a highly regular structure, needs a much smaller number of weights and less training time. Using PSNs capability of large-scale parallel classification, VCSPSN reduces the information communication rate greatly, makes best known upper bound polynomial, and distinguishes the deferent information in secret image.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

1361-1365

Citation:

Online since:

September 2013

Authors:

Export:

Price:

[1] Naor M and Shamir A, Visual cryptography, " Proceedings of Advances in Cryptology-Eurocrypt, 94, Berlin, Spinger, pp.179-196, (1995).

Google Scholar

[2] Ateniese G, Blundo C, De Santis A and Stinson D.R., Visual cryptography for general access structures, Information and Computation, vol. 129(2), pp.86-106, (1996).

DOI: 10.1006/inco.1996.0076

Google Scholar

[3] Verheul E R and Van Tilborg H C A, Constructions and properties of k out of n visual secret sharing schemes, Designs, Codes and Cryptography, vol. 11, pp.179-196, (1997).

DOI: 10.1023/a:1008280705142

Google Scholar

[4] Feng YI, WANG D S, LUO P, et al, Multi secret image color visual cryptography schemes for general access structures, Progress in Natural Science, vol. 16(4), pp.431-436, (2006).

DOI: 10.1080/10020070612330015

Google Scholar

[5] Chor, B. Goldwasser, S. Micali, et al, Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults,. Proc. 26th IEEE Symposium. On Foundations of Computer Science, pp.372-382, (1985).

DOI: 10.1109/sfcs.1985.64

Google Scholar

[6] P. Feldman, a Practical Scheme for Non-interactive Verifiable Secret Sharing,. Proc. 28th IEEE Symposium on Foundation of Computer Science, IEEE Computer Society, pp.427-437, (1987).

DOI: 10.1109/sfcs.1987.4

Google Scholar

[7] T.P. Pedersen, Distributed Provers and Verifiable Secret Sharing Based on Discrete Logarithm Problem,. PhD Thesis, Aarhus University, Computer Science Department, Aarhus, Denmark, (1992).

DOI: 10.7146/dpb.v21i388.6621

Google Scholar

[8] T.P. Pedersen, Non-interactive and information-theoretic secure verifiable secret sharing". Advances in Cryptology-CRYPTO, 91, Lecture Notes in Computer Science, vol. 576, pp.129-140, (1992).

DOI: 10.1007/3-540-46766-1_9

Google Scholar

[9] Theodore M. Wong, Chenxi Wang, Jeannette M. Wing, Verifiable secret Redistribution for Threshold Sharing Schemes,. Carnegie Mellon University Technical Report CMU-CS-02-114, February (2002).

DOI: 10.21236/ada461227

Google Scholar

[10] C.L. Hsu, T.C. Wu. Authenticated Encryption Scheme with (t, n) Shared Verification,. IEE. Proc. Computer. digit. tech, vol. 145(2), pp.117-120, (1998).

DOI: 10.1049/ip-cdt:19981905

Google Scholar

[11] Talal Mousa Alkharobi, Secret sharing using artificial neural networks, Texas A&M University. pp.51-60, (2004).

Google Scholar

[12] Ghosh J and Shin Y, Efficient higher-order neural networks for classification and function approximation, Int J Neural Syst, vol. 4(3), pp.323-350, (1992).

DOI: 10.1142/s0129065792000255

Google Scholar

[13] Duch W and Jankowski N, Survey of neural of neural transfer function, Neural Comput Surv, vol. 2(1), pp.163-212, (1992).

Google Scholar

[14] Schmitt M, On the complexity of computing and learning with multiplicative neurous, Neural Comput, vol. 14(2), pp.241-301, (2002).

Google Scholar

[15] M. Bellare, P. Rogaway, the Exact Security of Digital Signatures—How to Sign with RSA and Rabin". In U. Maurer, editor, Advances in Cryptology—Proceedings of EUROCRYPT, 96, Lecture Notes in Computer Science 1070, pp.199-416, (1996).

DOI: 10.1007/3-540-68339-9_34

Google Scholar

[16] Gonzalez R.C. and Woods R.E. Digital Image Processing(Second Edition). BeiJing: Publishing House of Electronics Industry, (2007).

Google Scholar

[17] Song Ge, Peng Changgen. Visual Cryptography Scheme Using Pi-sigma Neural Networks. 2008 International Symposium on Computer Science and Computational Technology proceedings (ISCSCT2008),pp.679-682.

DOI: 10.1109/isise.2008.208

Google Scholar