Reliable Deniable Communication: Hiding Messages in Noise The Chinese University of Hong Kong The Institute of Network Coding Pak Hou Che Mayank Bakshi.

Slides:



Advertisements
Similar presentations
1+eps-Approximate Sparse Recovery Eric Price MIT David Woodruff IBM Almaden.
Advertisements

II. Modulation & Coding. © Tallal Elshabrawy Design Goals of Communication Systems 1.Maximize transmission bit rate 2.Minimize bit error probability 3.Minimize.
Cyclic Code.
Applied Algorithmics - week7
Locally Decodable Codes from Nice Subsets of Finite Fields and Prime Factors of Mersenne Numbers Kiran Kedlaya Sergey Yekhanin MIT Microsoft Research.
Chapter 10 Shannon’s Theorem. Shannon’s Theorems First theorem:H(S) ≤ L n (S n )/n < H(S) + 1/n where L n is the length of a certain code. Second theorem:
Qiwen Wang, Sidharth Jaggi, Shuo-Yen Robert Li Institute of Network Coding (INC) The Chinese University of Hong Kong October 19, 2011 IEEE Information.
Enhancing Secrecy With Channel Knowledge
Information Theory Introduction to Channel Coding Jalal Al Roumy.
Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.
Noisy Group Testing (Quick and Efficient) Sheng Cai, Mayank Bakshi, Sidharth Jaggi The Chinese University of Hong Kong Mohammad Jahangoshahi Sharif University.
Achilleas Anastasopoulos (joint work with Lihua Weng and Sandeep Pradhan) April A Framework for Heterogeneous Quality-of-Service Guarantees in.
Poorvi Vora/CTO/IPG/HP 01/03 1 The channel coding theorem and the security of binary randomization Poorvi Vora Hewlett-Packard Co.
Amplify-and-Forward in Wireless Relay Networks Samar Agnihotri, Sidharth Jaggi, Minghua Chen Institute of Network Coding The Chinese University of Hong.
Lihua Weng Dept. of EECS, Univ. of Michigan Error Exponent Regions for Multi-User Channels.
The 1’st annual (?) workshop. 2 Communication under Channel Uncertainty: Oblivious channels Michael Langberg California Institute of Technology.
Resilient Network Coding in the presence of Byzantine Adversaries Michelle Effros Michael Langberg Tracey Ho Sachin Katti Muriel Médard Dina Katabi Sidharth.
ECE 776 Information Theory Capacity of Fading Channels with Channel Side Information Andrea J. Goldsmith and Pravin P. Varaiya, Professor Name: Dr. Osvaldo.
Tracey Ho Sidharth Jaggi Tsinghua University Hongyi Yao California Institute of Technology Theodoros Dikaliotis California Institute of Technology Chinese.
Lattices for Distributed Source Coding - Reconstruction of a Linear function of Jointly Gaussian Sources -D. Krithivasan and S. Sandeep Pradhan - University.
1 Chapter 1 Introduction. 2 Outline 1.1 A Very Abstract Summary 1.2 History 1.3 Model of the Signaling System 1.4 Information Source 1.5 Encoding a Source.
A Graph-based Framework for Transmission of Correlated Sources over Multiuser Channels Suhan Choi May 2006.
Generalized Communication System: Error Control Coding Occurs In Right Column. 6.
15-853Page :Algorithms in the Real World Error Correcting Codes I – Overview – Hamming Codes – Linear Codes.
Non-adaptive probabilistic group testing with noisy measurements: Near-optimal bounds with efficient algorithms Chun Lam Chan, Pak Hou Che and Sidharth.
Noise, Information Theory, and Entropy
林茂昭 教授 台大電機系 個人專長 錯誤更正碼 數位通訊
SUPER: Sparse signals with Unknown Phases Efficiently Recovered Sheng Cai, Mayank Bakshi, Sidharth Jaggi and Minghua Chen The Chinese University of Hong.
Boulat A. Bash Dennis Goeckel Don Towsley LPD Communication when the Warden Does Not Know When.
Channel Coding Part 1: Block Coding
When rate of interferer’s codebook small Does not place burden for destination to decode interference When rate of interferer’s codebook large Treating.
Channel Capacity
Extremal Problems of Information Combining Alexei Ashikhmin  Information Combining: formulation of the problem  Mutual Information Function for the Single.
Uncorrectable Errors of Weight Half the Minimum Distance for Binary Linear Codes Kenji Yasunaga * Toru Fujiwara + * Kwansei Gakuin University, Japan +
A Continuity Theory of Source Coding over Networks WeiHsin Gu, Michelle Effros, Mayank Bakshi, and Tracey Ho FLoWS PI Meeting, Washington DC, September.
Resilient Network Coding in the Presence of Eavesdropping Byzantine Adversaries Michael Langberg Sidharth Jaggi Open University of Israel ISIT 2007 Tsinghua.
Toward a Secure Data-Rate Theorem Paul Cuff. Control Setting Controller Encoder System (Plant) Sensors Rate R UiUi XiXi YiYi.
Introduction to Coding Theory. p2. Outline [1] Introduction [2] Basic assumptions [3] Correcting and detecting error patterns [4] Information rate [5]
Correction of Adversarial Errors in Networks Sidharth Jaggi Michael Langberg Tracey Ho Michelle Effros Submitted to ISIT 2005.
Stochastic Threshold Group Testing Chun Lam Chan, Sheng Cai, Mayank Bakshi, Sidharth Jaggi The Chinese University of Hong Kong Venkatesh Saligrama Boston.
Error Correction and Partial Information Rewriting for Flash Memories Yue Li joint work with Anxiao (Andrew) Jiang and Jehoshua Bruck.
Cooperative Communication in Sensor Networks: Relay Channels with Correlated Sources Brian Smith and Sriram Vishwanath University of Texas at Austin October.
Coding Theory. 2 Communication System Channel encoder Source encoder Modulator Demodulator Channel Voice Image Data CRC encoder Interleaver Deinterleaver.
Coding Theory Efficient and Reliable Transfer of Information
1 Private codes or Succinct random codes that are (almost) perfect Michael Langberg California Institute of Technology.
University of Massachusetts Amherst · Department of Computer Science Square Root Law for Communication with Low Probability of Detection on AWGN Channels.
Name Iterative Source- and Channel Decoding Speaker: Inga Trusova Advisor: Joachim Hagenauer.
Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems Computer Networks Volume: 44, Issue: 2, February.
On Coding for Real-Time Streaming under Packet Erasures Derek Leong *#, Asma Qureshi *, and Tracey Ho * * California Institute of Technology, Pasadena,
Some Computation Problems in Coding Theory
Reliable Deniable Communication: Hiding Messages from Noise Pak Hou Che Joint Work with Sidharth Jaggi, Mayank Bakshi and Madhi Jafari Siavoshani Institute.
RELIABLE COMMUNICATION 1 IN THE PRESENCE OFLIMITEDADVERSARIES.
Source Encoder Channel Encoder Noisy channel Source Decoder Channel Decoder Figure 1.1. A communication system: source and channel coding.
ON AVCS WITH QUADRATIC CONSTRAINTS Farzin Haddadpour Joint work with Madhi Jafari Siavoshani, Mayank Bakshi and Sidharth Jaggi Sharif University of Technology,
1 Reliability-Based SD Decoding Not applicable to only graph-based codes May even help with some algebraic structure SD alternative to trellis decoding.
Secure Error-Correcting (SEC) Network Codes Raymond W. Yeung Institute of Network Coding & Department of Information Engineering The Chinese University.
Progress Report for the UCLA OCDMA Project UCLA Graduate School of Engineering - Electrical Engineering Program Communication Systems Laboratory Miguel.
Dennis Goeckel Electrical and Computer Engineering (ECE) University of Massachusetts at Amherst Fundamental Limits of Covert Communications Joint work.
Institute for Experimental Mathematics Ellernstrasse Essen - Germany DATA COMMUNICATION introduction A.J. Han Vinck May 10, 2003.
Codes for Symbol-Pair Read Channels Yuval Cassuto EPFL – ALGO Formerly: Hitachi GST Research November 3, 2010 IPG Seminar.
The Concavity of the Auxiliary Function for Classical-Quantum Channels Speaker: Hao-Chung Cheng Co-work: Min-Hsiu Hsieh Date: 01/09/
RELIABLE COMMUNICATION
Reliable Deniable Communication: Hiding Messages in Noise
Effcient quantum protocols for XOR functions
Logarithms (2) Laws of logarithms.
II. Modulation & Coding.
An AWGN Multiaccess Channel*
Information-Theoretic Security
tUAN THANH NGUYEN Nanyang Technological University (NTU), Singapore
Lihua Weng Dept. of EECS, Univ. of Michigan
Presentation transcript:

Reliable Deniable Communication: Hiding Messages in Noise The Chinese University of Hong Kong The Institute of Network Coding Pak Hou Che Mayank Bakshi Sidharth Jaggi

Alice Reliability Bob

Willie (the Warden) Reliability Deniability Alice Bob

M T Alice’s Encoder

M T BSC(p b ) Alice’s Encoder Bob’s Decoder

M T BSC(p b ) Alice’s Encoder Bob’s Decoder BSC(p w ) Willie’s (Best) Estimator

Hypothesis Testing Willie’s Estimate Alice’s Transmission Status

Hypothesis Testing Willie’s Estimate Alice’s Transmission Status

Hypothesis Testing Willie’s Estimate Alice’s Transmission Status

Hypothesis Testing Willie’s Estimate Alice’s Transmission Status

Bash, Goeckel & Towsley [1] Shared secret [1] B. A. Bash, D. Goeckel and D. Towsley, “Square root law for communication with low probability of detection on AWGN channels,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT), 2012, pp. 448–452. AWGN channels

This work No shared secret BSC(p b ) BSC(p w ) p b < p w

Intuition

Main Theorems Theorem 1 – Deniability  low weight codewords Theorem 2 – Converse of reliability Theorem 3 – Achievability (reliability & deniability) Theorem 4 – Trade-off between deniability & size of codebook

Theorem 1 (wt(c.w.)) (high deniability => low weight codewords)

Theorem 2 (Converse)

Theorems 2 & 3 (Converse & achievability for reliable & deniable comm.)

Theorems 2 & 3 0 1/2 p b >p w

Theorems 2 & 3 0 1/2

Theorems 2 & 3 0 1/2 p w =1/2

Theorems 2 & 3 0 1/2 (BSC(p b ))

Theorems 2 & 3 0 1/2 p b =0

Theorems 2 & 3 0 1/2

Theorems 2 & 3 0 1/2 p w >p b

Theorems 2 & 3 0 1/2

Theorems 2 & 3 0 1/2 Main thm:

Theorem 3 – Reliability

Theorem 3 – Reliability proof sketch Random code

Theorem 3 – Reliability proof sketch

Theorem 3 – Reliability proof sketch E(Intersection of 2 codewords) = O(1) “Most” codewords “well-isolated”

Theorem 3 – d min decoding + x x’

0n logarithm of # binary vectors

0 n log(# vectors)

log(# codewords)

0 n log(# vectors)

Theorem 3 – Deniability proof sketch

0 n log(# vectors) Theorem 3 – Deniability proof sketch

0n logarithm of # codewords Theorem 3 – Deniability proof sketch

0n logarithm of # vectors Theorem 3 – Deniability proof sketch

0n logarithm of # vectors Theorem 3 – Deniability proof sketch

Theorem 4 0n logarithm of # codewords

0n logarithm of # codewords Too few codewords => Not deniable Theorem 4

Summary 0 1/2 Thm 1 & 2 Converse (Upper Bound) Thm 3 Achievability Thm 4 Lower Bound

Summary