Encryption of Covert Information into Multiple Statistical Distributions
نویسنده
چکیده
A novel strategy to encrypt covert information (code) via unitary projections into the null spaces of ill-conditioned eigenstructures of multiple host statistical distributions, inferred from incomplete constraints, is presented. The host pdf ’s are inferred using the maximum entropy principle. The projection of the covert information is dependent upon the pdf ’s of the host statistical distributions. The security of the encryption/decryption strategy is based on the extreme instability of the encoding process. A self-consistent procedure to derive keys for both symmetric and asymmetric cryptography is presented. The advantages of using a multiple pdf model to achieve encryption of covert information are briefly highlighted. Numerical simulations exemplify the efficacy of the model.
منابع مشابه
A Review on Covert Timing Channels & their Applications
Covert network timing channels control time between transmissions of packets in overt network communication and transmits hidden messages. This paper presents an overview of different concepts of covert timing channels such as types, features and properties. There is range of terms used for security of information such as encryption, covert channels, network steganography or information hiding ...
متن کاملA novel covert channel based on the IP header record route option
In this paper we propose a novel covert channel for exchanging secret information, based on the IP header record route options. Instead of encrypting a secret message or embedding it into a multimedia object, as in traditional steganography, we process the entire message and generate several IP packets with different types to carry the secret information. Thereby we foil an eavesdropper who is ...
متن کاملCovert Channels in the IP Time To Live Field
Covert channels are used for the secret transfer of information. Unlike encryption, which only protects the information from unauthorised observers, covert channels aim to hide the very existence of the communication. The huge amount of data and vast number of different network protocols in the Internet makes it an ideal high-capacity vehicle for covert communication. Covert channels pose a ser...
متن کاملOn Classification of Bivariate Distributions Based on Mutual Information
Among all measures of independence between random variables, mutual information is the only one that is based on information theory. Mutual information takes into account of all kinds of dependencies between variables, i.e., both the linear and non-linear dependencies. In this paper we have classified some well-known bivariate distributions into two classes of distributions based on their mutua...
متن کاملCovert Communications through Hiding FM Waveforms in an Image
In this paper, we propose information encryption using two-dimensional (2-D) frequency modulated (FM) signals. The hidden information is embedded into a picture using the phase information of a 2-D FM prototype. The parameters of the 2-D FM prototype are optimized in order to achieve no or low bit error rate (BER) in detection. The cover image is partitioned into several blocks. In each block, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/cond-mat/0607454 شماره
صفحات -
تاریخ انتشار 2006