Skip to main content
Top

2018 | OriginalPaper | Chapter

Multiple Information Hiding in General Access Structure Visual Cryptography Using Q’tron Neural Network

Authors : Sandeep Gurung, Mrinaldeep Chakravorty

Published in: Advanced Computational and Communication Paradigms

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the advent of the widespread use of Internet for communication, there is an increase in exchange of personal secured information via the Internet wherein a large variety of sensitive information is exchanged between the end users which affect the privacy and safety of the data during storage and communication. Visual cryptography, an example of a secret sharing scheme encrypts the secret digital information into a number of shares wherein the decryption is performed by overlaying the shares generated and by utilizing the HVS (Human Visual System). General access structures efficiently hides the data by defining an access structure of qualified sets which only can produce the hidden information. Since no transmission is noise free, quantum neural network is used to extract the original information even when the information is not clearly visible to the human eye. The paper proposes a methodology to conceal multiple secret in a pair of shares and the Q’tron network to improve the security of information systems.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology Eurocrypt (1995) Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology Eurocrypt (1995)
2.
go back to reference Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. (1987) Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. (1987)
3.
go back to reference Kumar, S., Sharma, R.K.: Secret image sharing for general access structures using random grids. IJCA 83(7) (2013). ISSN 0975-8887CrossRef Kumar, S., Sharma, R.K.: Secret image sharing for general access structures using random grids. IJCA 83(7) (2013). ISSN 0975-8887CrossRef
4.
go back to reference Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129, 86–106 (1996)MathSciNetCrossRef Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129, 86–106 (1996)MathSciNetCrossRef
5.
go back to reference Shyu, S.J.: Image encryption by multiple random grids. Pattern Recogn. 42, 1582–1596 (2009)CrossRef Shyu, S.J.: Image encryption by multiple random grids. Pattern Recogn. 42, 1582–1596 (2009)CrossRef
6.
go back to reference Chen, J., Chen, T.-S., Hsu, H.-C., Chen, H.-W.: New visual cryptography system based on circular shadow image and fixed angle segmentation. J. Electron. Image 14(3), 033018 (2005)CrossRef Chen, J., Chen, T.-S., Hsu, H.-C., Chen, H.-W.: New visual cryptography system based on circular shadow image and fixed angle segmentation. J. Electron. Image 14(3), 033018 (2005)CrossRef
7.
go back to reference Chiang, S.C., Yue, T.-W.: Visual cryptography using Q’tron neural networks. Ph.D. Dissertation, Department of Computer Science Chiang, S.C., Yue, T.-W.: Visual cryptography using Q’tron neural networks. Ph.D. Dissertation, Department of Computer Science
8.
go back to reference Chen, T.H., Tsao, K.H., Wei, K.C.: Multiple-image encryption by rotating random grids. In: Proceedings of the 8th International Conference on Intelligent System Design and Applications (2008) Chen, T.H., Tsao, K.H., Wei, K.C.: Multiple-image encryption by rotating random grids. In: Proceedings of the 8th International Conference on Intelligent System Design and Applications (2008)
9.
go back to reference Hsu, H.C., Chen, J., Chen, T.S., Lin, Y.H.: Special type of circular visual cryptography for multiple secret hiding. Imaging Sci. J. 55(3), 175–179 (2007)CrossRef Hsu, H.C., Chen, J., Chen, T.S., Lin, Y.H.: Special type of circular visual cryptography for multiple secret hiding. Imaging Sci. J. 55(3), 175–179 (2007)CrossRef
10.
go back to reference Gurung, S., Chakravorty, M., Agarwal, A., Ghose, M.K.: Multiple information hiding using circular random grids. Conference Organized by Inderscience Institute of Management and Technology, Bhubaneswar, Odisha, India. Procedia Comput. Sci. 48, 65–72 (2015)CrossRef Gurung, S., Chakravorty, M., Agarwal, A., Ghose, M.K.: Multiple information hiding using circular random grids. Conference Organized by Inderscience Institute of Management and Technology, Bhubaneswar, Odisha, India. Procedia Comput. Sci. 48, 65–72 (2015)CrossRef
11.
go back to reference Wu, H.-C., Chang, C.-C.: Sharing visual multi-secrets using circle shares. Comput. Stan. Interfaces 28 123–135 (2005)MathSciNetCrossRef Wu, H.-C., Chang, C.-C.: Sharing visual multi-secrets using circle shares. Comput. Stan. Interfaces 28 123–135 (2005)MathSciNetCrossRef
12.
go back to reference Guo, C., Chang, C.C.: A construction for secret sharing scheme with general access structure. J. Inf. Hiding Multimedia Signal Proc. 4(1), (2013). ISSN 2073-4212 Guo, C., Chang, C.C.: A construction for secret sharing scheme with general access structure. J. Inf. Hiding Multimedia Signal Proc. 4(1), (2013). ISSN 2073-4212
13.
go back to reference Adhikari, A., Dutta, T.K., Roy. B.: A new black and white visual cryptographic scheme for general access structures. In: INDOCRYPT’04. LNCS, vol. 3348, pp. 399–413. Springer (2004)CrossRef Adhikari, A., Dutta, T.K., Roy. B.: A new black and white visual cryptographic scheme for general access structures. In: INDOCRYPT’04. LNCS, vol. 3348, pp. 399–413. Springer (2004)CrossRef
14.
go back to reference Fausett, L.: Fundamental of Neural Networks—Architectures, Algorithms, and Applications. Pearson Education (2008) Fausett, L.: Fundamental of Neural Networks—Architectures, Algorithms, and Applications. Pearson Education (2008)
15.
go back to reference Feng, B., Wu, H.C., Tsai, C.S., Chu, Y.P.: A new multi-secret images sharing scheme using Lagrange’s interpolation. J. Syst. Softw. 76(3), 327–339 (2005)CrossRef Feng, B., Wu, H.C., Tsai, C.S., Chu, Y.P.: A new multi-secret images sharing scheme using Lagrange’s interpolation. J. Syst. Softw. 76(3), 327–339 (2005)CrossRef
16.
go back to reference Shyu, S.J.: Visual cryptograms of random grids for general access structures. IEEE Trans. Circuits Syst. Video Technol. 23(3) (2013)CrossRef Shyu, S.J.: Visual cryptograms of random grids for general access structures. IEEE Trans. Circuits Syst. Video Technol. 23(3) (2013)CrossRef
17.
go back to reference Chen, T.-H., Li, K.-C.: Multi-image encryption by circular random grids. Department of Computer Science and Information Engineering, National Chiayi University, Chiayi City 60004, Taiwan (2011) Chen, T.-H., Li, K.-C.: Multi-image encryption by circular random grids. Department of Computer Science and Information Engineering, National Chiayi University, Chiayi City 60004, Taiwan (2011)
Metadata
Title
Multiple Information Hiding in General Access Structure Visual Cryptography Using Q’tron Neural Network
Authors
Sandeep Gurung
Mrinaldeep Chakravorty
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8237-5_37