Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Slides:



Advertisements
Similar presentations
Locally Decodable Codes from Nice Subsets of Finite Fields and Prime Factors of Mersenne Numbers Kiran Kedlaya Sergey Yekhanin MIT Microsoft Research.
Advertisements

Prakshep Mehta ( ) Guided By: Prof. R.K. Shevgaonkar
Qiwen Wang, Sidharth Jaggi, Shuo-Yen Robert Li Institute of Network Coding (INC) The Chinese University of Hong Kong October 19, 2011 IEEE Information.
OFDM Modulated Cooperative Multiple-Access Channel With Network-Channel Coding.
Secrecy Capacity Scaling of Large-Scale Cognitive Networks Yitao Chen 1, Jinbei Zhang 1, Xinbing Wang 1, Xiaohua Tian 1, Weijie Wu 1, Fan Fu 2, Chee Wei.
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Information Theory for Secrecy and Control.
Noisy Group Testing (Quick and Efficient) Sheng Cai, Mayank Bakshi, Sidharth Jaggi The Chinese University of Hong Kong Mohammad Jahangoshahi Sharif University.
Poorvi Vora/CTO/IPG/HP 01/03 1 The channel coding theorem and the security of binary randomization Poorvi Vora Hewlett-Packard Co.
UCB Claude Shannon – In Memoriam Jean Walrand U.C. Berkeley
Lihua Weng Dept. of EECS, Univ. of Michigan Error Exponent Regions for Multi-User Channels.
Chinese University of Hong Kong Department of Information Engineering A Capacity Estimate Technique for JPEG-to-JPEG Image Watermarking Peter Hon Wah Wong.
The 1’st annual (?) workshop. 2 Communication under Channel Uncertainty: Oblivious channels Michael Langberg California Institute of Technology.
Resilient Network Coding in the presence of Byzantine Adversaries Michelle Effros Michael Langberg Tracey Ho Sachin Katti Muriel Médard Dina Katabi Sidharth.
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Tracey Ho Sidharth Jaggi Tsinghua University Hongyi Yao California Institute of Technology Theodoros Dikaliotis California Institute of Technology Chinese.
Lattices for Distributed Source Coding - Reconstruction of a Linear function of Jointly Gaussian Sources -D. Krithivasan and S. Sandeep Pradhan - University.
A Graph-based Framework for Transmission of Correlated Sources over Multiuser Channels Suhan Choi May 2006.
Xiaohua (Edward) Li1 and E. Paul Ratazzi2
Generalized Communication System: Error Control Coding Occurs In Right Column. 6.
林茂昭 教授 台大電機系 個人專長 錯誤更正碼 數位通訊
Boulat A. Bash Dennis Goeckel Don Towsley LPD Communication when the Warden Does Not Know When.
Network Coding and Information Security Raymond W. Yeung The Chinese University of Hong Kong Joint work with Ning Cai, Xidian University.
When rate of interferer’s codebook small Does not place burden for destination to decode interference When rate of interferer’s codebook large Treating.
Channel Capacity
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Delay-Throughput Tradeoff with Correlated Mobility in Ad-Hoc Networks Shuochao Yao*, Xinbing Wang*, Xiaohua Tian* ‡, Qian Zhang † *Department of Electronic.
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Secure Communication for Distributed Systems Paul Cuff Electrical Engineering Princeton University.
Resilient Network Coding in the Presence of Eavesdropping Byzantine Adversaries Michael Langberg Sidharth Jaggi Open University of Israel ISIT 2007 Tsinghua.
Toward a Secure Data-Rate Theorem Paul Cuff. Control Setting Controller Encoder System (Plant) Sensors Rate R UiUi XiXi YiYi.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Wireless Communication Elec 534 Set I September 9, 2007 Behnaam Aazhang.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Introduction to Coding Theory. p2. Outline [1] Introduction [2] Basic assumptions [3] Correcting and detecting error patterns [4] Information rate [5]
Stochastic Threshold Group Testing Chun Lam Chan, Sheng Cai, Mayank Bakshi, Sidharth Jaggi The Chinese University of Hong Kong Venkatesh Saligrama Boston.
Error Correction and Partial Information Rewriting for Flash Memories Yue Li joint work with Anxiao (Andrew) Jiang and Jehoshua Bruck.
Communication System A communication system can be represented as in Figure. A message W, drawn from the index set {1, 2,..., M}, results in the signal.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Coding Theory Efficient and Reliable Transfer of Information
1 Private codes or Succinct random codes that are (almost) perfect Michael Langberg California Institute of Technology.
University of Massachusetts Amherst · Department of Computer Science Square Root Law for Communication with Low Probability of Detection on AWGN Channels.
Superposition encoding A distorted version of is is encoded into the inner codebook Receiver 2 decodes using received signal and its side information Decoding.
The Classically Enhanced Father Protocol
CHAPTER 5 SIGNAL SPACE ANALYSIS
1 Undetectable Stegosystem Based on Noisy Channels V. Korzhik, G. Morales Luna, K. Loban Singapor, NTU, 2010.
Name Iterative Source- and Channel Decoding Speaker: Inga Trusova Advisor: Joachim Hagenauer.
Optimal Trading of Classical Communication, Quantum Communication, and Entanglement Mark M. Wilde arXiv: ERATO-SORST Min-Hsiu Hsieh 4 th Workshop.
Reliable Deniable Communication: Hiding Messages in Noise The Chinese University of Hong Kong The Institute of Network Coding Pak Hou Che Mayank Bakshi.
Reliable Deniable Communication: Hiding Messages from Noise Pak Hou Che Joint Work with Sidharth Jaggi, Mayank Bakshi and Madhi Jafari Siavoshani Institute.
RELIABLE COMMUNICATION 1 IN THE PRESENCE OFLIMITEDADVERSARIES.
ON AVCS WITH QUADRATIC CONSTRAINTS Farzin Haddadpour Joint work with Madhi Jafari Siavoshani, Mayank Bakshi and Sidharth Jaggi Sharif University of Technology,
1 Space-Time Transmissions for Wireless Secret-Key Agreement with Information-Theoretic Secrecy Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2.
Secure Error-Correcting (SEC) Network Codes Raymond W. Yeung Institute of Network Coding & Department of Information Engineering The Chinese University.
Dennis Goeckel Electrical and Computer Engineering (ECE) University of Massachusetts at Amherst Fundamental Limits of Covert Communications Joint work.
Chapter 4: Information Theory. Learning Objectives LO 4.1 – Understand discrete and continuous messages, message sources, amount of information and its.
Codes for Symbol-Pair Read Channels Yuval Cassuto EPFL – ALGO Formerly: Hitachi GST Research November 3, 2010 IPG Seminar.
Refinement of Two Fundamental Tools in Information Theory Raymond W. Yeung Institute of Network Coding The Chinese University of Hong Kong Joint work with.
RELIABLE COMMUNICATION
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Source: IEEE Transactions on Circuits and Systems for Video Technology Vol.26.
Reliable Deniable Communication: Hiding Messages in Noise
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Effcient quantum protocols for XOR functions
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Logarithms (2) Laws of logarithms.
The Capacity of Wireless Networks
Using Secret Key to Foil an Eavesdropper
An AWGN Multiaccess Channel*
Information-Theoretic Security
Data hiding based Hamming code
Lihua Weng Dept. of EECS, Univ. of Michigan
Presentation transcript:

Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The Institute of Network Coding Pak Hou (Howard) Che

Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The Institute of Network Coding Pak Hou (Howard) Che

Alice Reliability Bob

Willie (the Warden) Reliability Deniability Alice Bob

Willie-sky Reliability Deniability Alice Bob

M T Alice’s Encoder

M T BSC(p b ) Alice’s Encoder Bob’s Decoder

M T BSC(p b ) Alice’s Encoder Bob’s Decoder BSC(p w ) Willie’s (Best) Estimator

Bash, Goeckel & Towsley [1] Shared secret [1] B. A. Bash, D. Goeckel and D. Towsley, “Square root law for communication with low probability of detection on AWGN channels,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT), 2012, pp. 448–452. AWGN channels But capacity only

This work No shared secret BSC(p b ) BSC(p w ) p b < p w

Wicked Willie(s)Base-station Bob Aerial Alice Directional antenna

Steganography: Other work

Other work: “Common” model Shared secret key Capacity O(n) message bits Information-theoretically tight characterization (Gel’fand-Pinsker/Dirty paper coding) O(n.log(n)) bits (not optimized) [2] Y. Wang and P. Moulin, "Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions," IEEE Trans. on Information Theory, special issue on Information Theoretic Security, June 2008 Stegotext(covertext,message,key) Message, Covertext No noise d(stegotext,covertext) “small”

Other work: Square-root “law” (“empirical”) “Steganographic capacity is a loosely-defined concept, indicating the size of payload which may securely be embedded in a cover object using a particular embedding method. What constitutes “secure” embedding is a matter for debate, but we will argue that capacity should grow only as the square root of the cover size under a wide range of definitions of security.” [3] “Thanks to the Central Limit Theorem, the more covertext we give the warden, the better he will be able to estimate its statistics, and so the smaller the rate at which [the steganographer] will be able to tweak bits safely.” [4] [3] A. Ker, T. Pevny`, J. Kodovsky`, and J. Fridrich, “The square root law of steganographic capacity,” in Proceedings of the 10th ACM workshop on Multimedia and security. ACM, 2008, pp. 107–116. [4] R. Anderson, “Stretching the limits of steganography,” in Information Hiding, 1996, pp. 39–48. “[T]he reference to the Central Limit Theorem... suggests that a square root relationship should be considered. “ [3]

M T BSC(p b ) Alice’s Encoder Bob’s Decoder BSC(p w ) Willie’s (Best) Estimator

Hypothesis Testing Willie’s Estimate Alice’s Transmission Status

Hypothesis Testing Willie’s Estimate Alice’s Transmission Status

Hypothesis Testing Willie’s Estimate Alice’s Transmission Status

Hypothesis Testing Willie’s Estimate Alice’s Transmission Status

Intuition

Theorem 1 (Wt(c.w.)) (high deniability => low weight codewords)

Theorems 2 & 3 (Converse & achievability for reliable & deniable comm.)

Theorems 2 & 3 0 1/2 p b >p w

Theorems 2 & 3 0 1/2 (Symmetrizability)

Theorems 2 & 3 0 1/2 p w =1/2

Theorems 2 & 3 0 1/2 (BSC(p b ))

Theorems 2 & 3 0 1/2 p b =0

Theorems 2 & 3 0 1/2

Theorems 2 & 3 0 1/2 p w >p b

Theorems 2 & 3 0 1/2 “Standard” IT inequalities + Wt(“most codewords”)<√n (Thm 1)

Theorems 2 & 3 0 1/2 Main thm:

0n logarithm of # codewords

0 n log(# codewords)

0 n

Theorem 3 – Reliability proof sketch 0n Noise magnitude >> Codeword weight!!!

Theorem 3 – Reliability proof sketch Random code 2 O(√n) codewords Weight O(√n)

Theorem 3 – Reliability proof sketch E(Intersection of 2 codewords) = O(1) Weight O(√n) Pr(d min (x) < c√n) < 2 -O(√n) “Most” codewords “well-isolated”

Theorem 3 – d min decoding Pr(x decoded to x’) < 2 -O(√n) +O(√n) x x’

Theorem 3 – Deniability proof sketch

Theorem 4 – unexpected detour 0n logarithm of # codewords

0n logarithm of # codewords Too few codewords => Not deniable Theorem 4 – unexpected detour

0 n log(# codewords)

Theorem 3 – Deniability proof sketch

0 n log(# codewords) Theorem 3 – Deniability proof sketch

0n logarithm of # codewords Theorem 3 – Deniability proof sketch

0n logarithm of # codewords Theorem 3 – Deniability proof sketch

Summary

0 1/2