2014 IEEE Information Theory Workshop (ITW 2014) 2014
DOI: 10.1109/itw.2014.6970826
|View full text |Cite
|
Sign up to set email alerts
|

Reliable, deniable and hidable communication: A quick survey

Abstract: We survey here recent work pertaining to "deniable" communicationi.e., talking without being detected. We first highlight connections to other related notions (anonymity and secrecy). We then contrast the notions of deniability and secrecy. We highlight similarities and distinctions of deniability with a variety of related notions (LPD communications, stealth, channel resolvability) extant in the literature.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 20 publications
(13 citation statements)
references
References 33 publications
(39 reference statements)
0
13
0
Order By: Relevance
“…A length-n sequenceX = Π 2 (Π 1 (X)) is obtained after the two permutations. Note that to guarantee covertness, the parameter d, which determines the length ofC, cannot 10 Note that K 2 may or may not be uniformly distributed from James' perspective , (1 − d )-covertness can be guaranteed. In the following let's focus on the selected d √ n locations corresponding toX.…”
Section: Definitionmentioning
confidence: 99%
See 1 more Smart Citation
“…A length-n sequenceX = Π 2 (Π 1 (X)) is obtained after the two permutations. Note that to guarantee covertness, the parameter d, which determines the length ofC, cannot 10 Note that K 2 may or may not be uniformly distributed from James' perspective , (1 − d )-covertness can be guaranteed. In the following let's focus on the selected d √ n locations corresponding toX.…”
Section: Definitionmentioning
confidence: 99%
“…However, the number of (K 1 , K 2 ) pairs satisfying this equation is exactly n 3 , and each pair contains a distinct K 1 , hence from James' perspective the first part of the key, K 1 , is still uniformly distributed. 10 Alice's transmission pair (m, h) is consistent with the shared key K by default. For any message-hash pair (m , h ) = (m, h), the probability that (m , h ) is consistent with the common randomness K equals…”
mentioning
confidence: 99%
“…(13) 1 We note that λ = 1 is due to the unknown or equal a priori probabilities, i.e., P 0 and P 1 are unknown or equal, where P 0 is the a priori probability that H 0 is true, P 1 is the a priori probability that H 1 is true, and P 0 + P 1 = 1. If both P 0 and P 1 are known, the total error rate is reformulated as ξ = P 0 P F + P 1 P M and the optimal test that minimizes this reformulated ξ is the likelihood ratio test with λ = P 1 /P 0 .…”
Section: Binary Hypothesis Testing At Williementioning
confidence: 99%
“…This is due to the fact that (for example) the exposure of this transmission may disclose the user's location information, which probably violates the privacy of the user. Therefore, covert communication is attracting an increasing amount of research interests recently (e.g., [1][2][3]). In covert communication, a transmitter (Alice) intends to communicate with a legitimate receiver (Bob) without being detected by a warden (Willie), who is observing this communication.…”
Section: Introductionmentioning
confidence: 99%
“…The intuition behind the covert schemes first presented in [13] and elaborated on in other works such as [2], [14], [16]- [20], [22], [30] is that most reasonable noise processes have, with non-zero probability, "some deviation" in the "noise intensity". For instance, a length-n Bernoulli(q) sequence (corresponding to the additive noise sequence in a BSC(q) -a Binary Symmetric Channel with crossover probability q -the channel from the transmitter Alice to the eavesdropper Willie) has expected value nq, but has standard deviation nq (1 − q).…”
Section: A Challengesmentioning
confidence: 99%