350 rub
Journal Neurocomputers №4 for 2010 г.
Article in number:
Neurolike threshold scheme for secret image sharing
Authors:
N. I. Chervyakov, A. A. Yevdokimov, D.A. Sharov
Abstract:
The neural network realizing threshold sharing of the image is considered. As against a classical method of image sharing the considered neural network can realize the general access scheme and the access scheme with exception. Neurolike threshold scheme does not demand memory with big capacity.
Pages: 34-41
References
  1. Naor, M. and Shamir, A., Visual Cryptography // Advances Cryptology Eurocrypt-94, A. DeSantis Ed. of Lecture Notes in Computer Science Springer-Verlag, Berlin, 1995. V. 950. P. 1-12.
  2. Naor, M. and Pinkas, B., Visual Authentication and Identification // CRYPTO. 1997. P. 322-336.
  3. Tai-Wen Yue, Suchen Chiang, A Neural Network Approach for Visual Cryptography // Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks, July 2000. V. 5. P. 494-499.
  4. Suchen Chiang, Tai-Wen Yue, Neural Networks for Visual Cryptography - with Examples for Complex Access Schemes // Proceedings of the ISCA 13th International Conference on Computer Applications in Industry and Engineering, November 2000. P. 281-286.
  5. Ateniese, G., Blundo, C., Santis, A. D., and Stinson, D. R., Visual Cryptography forGeneral Access Structures // Information and Computation 129(2), 86-106 (1996).
  6. Ateniese, G., Blundo, C., Santis, A. D., Stinson, D. R.,Extended Scheme for Visual Cryptography, submitted to Theoretical Computer Science, http://cacr.math.uwaterloo.ca/-dstinson/visual.html.
  7. Hopfield, J. J., Neural Networks and Physical Systems with Emergent Collective Computational Abilities // Proc. Natl. Acad. Sci. USA,1982. V. 79, P. 2554-2558.
  8. Hopfield, J. J. and Tank, D. W., Neural Computation of Decisions in Optimization Problems // Biological Cybernetics,52. 1985. P.141-152.