Loading…
Wiretap Channel with Information Embedding on Actions
Information embedding on actions is a new channel model in which a specific decoder is used to observe the actions taken by the encoder and retrieve part of the message intended for the receiver. We revisit this model and consider a different scenario where a secrecy constraint is imposed. By adding...
Saved in:
Published in: | Entropy (Basel, Switzerland) Switzerland), 2014-04, Vol.16 (4), p.2105-2130 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c424t-27b5ccbeeca5ca0719b06211e7a8915e4359eddbacf55ed24218b6d19cdde8423 |
---|---|
cites | cdi_FETCH-LOGICAL-c424t-27b5ccbeeca5ca0719b06211e7a8915e4359eddbacf55ed24218b6d19cdde8423 |
container_end_page | 2130 |
container_issue | 4 |
container_start_page | 2105 |
container_title | Entropy (Basel, Switzerland) |
container_volume | 16 |
creator | Yin, Xinxing Xue, Zhi |
description | Information embedding on actions is a new channel model in which a specific decoder is used to observe the actions taken by the encoder and retrieve part of the message intended for the receiver. We revisit this model and consider a different scenario where a secrecy constraint is imposed. By adding a wiretapper in the model, we aim to send the confidential message to the receiver and keep it secret from the wiretapper as much as possible. We characterize the inner and outer bounds on the capacity-equivocation region of such a channel with noncausal (and causal) channel state information. Furthermore, the lower and upper bounds on the sum secrecy capacity are also obtained. Besides, by eliminating the specific decoder, we get a new outer bound on the capacity-equivocation region of the wiretap channel with action-dependent states and prove it is tighter than the existing outer bound. A binary example is presented to illustrate the tradeoff between the sum secrecy rate and the information embedding rate under the secrecy constraint. We find that the secrecy constraint and the communication requirements of information embedding have a negative impact on improving the secrecy transmission rate of the given communication link. |
doi_str_mv | 10.3390/e16042105 |
format | article |
fullrecord | <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_de742bdbf75f49c2b70e17055a24b080</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><doaj_id>oai_doaj_org_article_de742bdbf75f49c2b70e17055a24b080</doaj_id><sourcerecordid>3340735281</sourcerecordid><originalsourceid>FETCH-LOGICAL-c424t-27b5ccbeeca5ca0719b06211e7a8915e4359eddbacf55ed24218b6d19cdde8423</originalsourceid><addsrcrecordid>eNqNkU9LAzEQxYMoqNWD32DBix6qk2yy2RxLqVoQvCgeQ_7M1i3bTU22iN_e1EoRT57ezPDj8WaGkAsKN2Wp4BZpBZxREAfkhIJSY14CHP6qj8lpSksAVjJanRDx2kYczLqYvpm-x674aIe3Yt43Ia7M0Ia-mK0set_2iyI3E7edpTNy1Jgu4fmPjsjL3ex5-jB-fLqfTyePY8cZH8ZMWuGcRXRGOAOSKgsVoxSlqRUVyEuhsrc1rhECPcvBa1t5qpz3WHNWjsh85-uDWep1bFcmfupgWv09CHGhTRxa16H2KDmz3jZSNFw5ZiUglSCEYdxCDdnraue1juF9g2nQqzY57DrTY9gkTSvFcp7qP6gQSrJaUJXRyz_oMmxin4-SqVLWtYSsI3K9o1wMKUVs9rtQ0Nu_6f3fyi_hNYeT</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1537887015</pqid></control><display><type>article</type><title>Wiretap Channel with Information Embedding on Actions</title><source>Publicly Available Content Database (Proquest) (PQ_SDU_P3)</source><creator>Yin, Xinxing ; Xue, Zhi</creator><creatorcontrib>Yin, Xinxing ; Xue, Zhi</creatorcontrib><description>Information embedding on actions is a new channel model in which a specific decoder is used to observe the actions taken by the encoder and retrieve part of the message intended for the receiver. We revisit this model and consider a different scenario where a secrecy constraint is imposed. By adding a wiretapper in the model, we aim to send the confidential message to the receiver and keep it secret from the wiretapper as much as possible. We characterize the inner and outer bounds on the capacity-equivocation region of such a channel with noncausal (and causal) channel state information. Furthermore, the lower and upper bounds on the sum secrecy capacity are also obtained. Besides, by eliminating the specific decoder, we get a new outer bound on the capacity-equivocation region of the wiretap channel with action-dependent states and prove it is tighter than the existing outer bound. A binary example is presented to illustrate the tradeoff between the sum secrecy rate and the information embedding rate under the secrecy constraint. We find that the secrecy constraint and the communication requirements of information embedding have a negative impact on improving the secrecy transmission rate of the given communication link.</description><identifier>ISSN: 1099-4300</identifier><identifier>EISSN: 1099-4300</identifier><identifier>DOI: 10.3390/e16042105</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>action-dependent states ; Channels ; Decoders ; Encoders ; Entropy ; information embedding ; Links ; Messages ; Receivers ; sum secrecy capacity ; Upper bounds ; wiretap channel</subject><ispartof>Entropy (Basel, Switzerland), 2014-04, Vol.16 (4), p.2105-2130</ispartof><rights>Copyright MDPI AG 2014</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c424t-27b5ccbeeca5ca0719b06211e7a8915e4359eddbacf55ed24218b6d19cdde8423</citedby><cites>FETCH-LOGICAL-c424t-27b5ccbeeca5ca0719b06211e7a8915e4359eddbacf55ed24218b6d19cdde8423</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/1537887015/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/1537887015?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,25753,27924,27925,37012,37013,44590,74998</link.rule.ids></links><search><creatorcontrib>Yin, Xinxing</creatorcontrib><creatorcontrib>Xue, Zhi</creatorcontrib><title>Wiretap Channel with Information Embedding on Actions</title><title>Entropy (Basel, Switzerland)</title><description>Information embedding on actions is a new channel model in which a specific decoder is used to observe the actions taken by the encoder and retrieve part of the message intended for the receiver. We revisit this model and consider a different scenario where a secrecy constraint is imposed. By adding a wiretapper in the model, we aim to send the confidential message to the receiver and keep it secret from the wiretapper as much as possible. We characterize the inner and outer bounds on the capacity-equivocation region of such a channel with noncausal (and causal) channel state information. Furthermore, the lower and upper bounds on the sum secrecy capacity are also obtained. Besides, by eliminating the specific decoder, we get a new outer bound on the capacity-equivocation region of the wiretap channel with action-dependent states and prove it is tighter than the existing outer bound. A binary example is presented to illustrate the tradeoff between the sum secrecy rate and the information embedding rate under the secrecy constraint. We find that the secrecy constraint and the communication requirements of information embedding have a negative impact on improving the secrecy transmission rate of the given communication link.</description><subject>action-dependent states</subject><subject>Channels</subject><subject>Decoders</subject><subject>Encoders</subject><subject>Entropy</subject><subject>information embedding</subject><subject>Links</subject><subject>Messages</subject><subject>Receivers</subject><subject>sum secrecy capacity</subject><subject>Upper bounds</subject><subject>wiretap channel</subject><issn>1099-4300</issn><issn>1099-4300</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNqNkU9LAzEQxYMoqNWD32DBix6qk2yy2RxLqVoQvCgeQ_7M1i3bTU22iN_e1EoRT57ezPDj8WaGkAsKN2Wp4BZpBZxREAfkhIJSY14CHP6qj8lpSksAVjJanRDx2kYczLqYvpm-x674aIe3Yt43Ia7M0Ia-mK0set_2iyI3E7edpTNy1Jgu4fmPjsjL3ex5-jB-fLqfTyePY8cZH8ZMWuGcRXRGOAOSKgsVoxSlqRUVyEuhsrc1rhECPcvBa1t5qpz3WHNWjsh85-uDWep1bFcmfupgWv09CHGhTRxa16H2KDmz3jZSNFw5ZiUglSCEYdxCDdnraue1juF9g2nQqzY57DrTY9gkTSvFcp7qP6gQSrJaUJXRyz_oMmxin4-SqVLWtYSsI3K9o1wMKUVs9rtQ0Nu_6f3fyi_hNYeT</recordid><startdate>20140401</startdate><enddate>20140401</enddate><creator>Yin, Xinxing</creator><creator>Xue, Zhi</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7TB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FR3</scope><scope>HCIFZ</scope><scope>KR7</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>DOA</scope></search><sort><creationdate>20140401</creationdate><title>Wiretap Channel with Information Embedding on Actions</title><author>Yin, Xinxing ; Xue, Zhi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c424t-27b5ccbeeca5ca0719b06211e7a8915e4359eddbacf55ed24218b6d19cdde8423</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>action-dependent states</topic><topic>Channels</topic><topic>Decoders</topic><topic>Encoders</topic><topic>Entropy</topic><topic>information embedding</topic><topic>Links</topic><topic>Messages</topic><topic>Receivers</topic><topic>sum secrecy capacity</topic><topic>Upper bounds</topic><topic>wiretap channel</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yin, Xinxing</creatorcontrib><creatorcontrib>Xue, Zhi</creatorcontrib><collection>CrossRef</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Engineering Research Database</collection><collection>SciTech Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>Civil Engineering Abstracts</collection><collection>ProQuest Engineering Collection</collection><collection>ProQuest Engineering Database</collection><collection>Publicly Available Content Database (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>DOAJÂ Directory of Open Access Journals</collection><jtitle>Entropy (Basel, Switzerland)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yin, Xinxing</au><au>Xue, Zhi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Wiretap Channel with Information Embedding on Actions</atitle><jtitle>Entropy (Basel, Switzerland)</jtitle><date>2014-04-01</date><risdate>2014</risdate><volume>16</volume><issue>4</issue><spage>2105</spage><epage>2130</epage><pages>2105-2130</pages><issn>1099-4300</issn><eissn>1099-4300</eissn><abstract>Information embedding on actions is a new channel model in which a specific decoder is used to observe the actions taken by the encoder and retrieve part of the message intended for the receiver. We revisit this model and consider a different scenario where a secrecy constraint is imposed. By adding a wiretapper in the model, we aim to send the confidential message to the receiver and keep it secret from the wiretapper as much as possible. We characterize the inner and outer bounds on the capacity-equivocation region of such a channel with noncausal (and causal) channel state information. Furthermore, the lower and upper bounds on the sum secrecy capacity are also obtained. Besides, by eliminating the specific decoder, we get a new outer bound on the capacity-equivocation region of the wiretap channel with action-dependent states and prove it is tighter than the existing outer bound. A binary example is presented to illustrate the tradeoff between the sum secrecy rate and the information embedding rate under the secrecy constraint. We find that the secrecy constraint and the communication requirements of information embedding have a negative impact on improving the secrecy transmission rate of the given communication link.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/e16042105</doi><tpages>26</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1099-4300 |
ispartof | Entropy (Basel, Switzerland), 2014-04, Vol.16 (4), p.2105-2130 |
issn | 1099-4300 1099-4300 |
language | eng |
recordid | cdi_doaj_primary_oai_doaj_org_article_de742bdbf75f49c2b70e17055a24b080 |
source | Publicly Available Content Database (Proquest) (PQ_SDU_P3) |
subjects | action-dependent states Channels Decoders Encoders Entropy information embedding Links Messages Receivers sum secrecy capacity Upper bounds wiretap channel |
title | Wiretap Channel with Information Embedding on Actions |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T20%3A19%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Wiretap%20Channel%20with%20Information%20Embedding%20on%20Actions&rft.jtitle=Entropy%20(Basel,%20Switzerland)&rft.au=Yin,%20Xinxing&rft.date=2014-04-01&rft.volume=16&rft.issue=4&rft.spage=2105&rft.epage=2130&rft.pages=2105-2130&rft.issn=1099-4300&rft.eissn=1099-4300&rft_id=info:doi/10.3390/e16042105&rft_dat=%3Cproquest_doaj_%3E3340735281%3C/proquest_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c424t-27b5ccbeeca5ca0719b06211e7a8915e4359eddbacf55ed24218b6d19cdde8423%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1537887015&rft_id=info:pmid/&rfr_iscdi=true |