Loading…

Wiretap Channel with Information Embedding on Actions

Information embedding on actions is a new channel model in which a specific decoder is used to observe the actions taken by the encoder and retrieve part of the message intended for the receiver. We revisit this model and consider a different scenario where a secrecy constraint is imposed. By adding...

Full description

Saved in:
Bibliographic Details
Published in:Entropy (Basel, Switzerland) Switzerland), 2014-04, Vol.16 (4), p.2105-2130
Main Authors: Yin, Xinxing, Xue, Zhi
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c424t-27b5ccbeeca5ca0719b06211e7a8915e4359eddbacf55ed24218b6d19cdde8423
cites cdi_FETCH-LOGICAL-c424t-27b5ccbeeca5ca0719b06211e7a8915e4359eddbacf55ed24218b6d19cdde8423
container_end_page 2130
container_issue 4
container_start_page 2105
container_title Entropy (Basel, Switzerland)
container_volume 16
creator Yin, Xinxing
Xue, Zhi
description Information embedding on actions is a new channel model in which a specific decoder is used to observe the actions taken by the encoder and retrieve part of the message intended for the receiver. We revisit this model and consider a different scenario where a secrecy constraint is imposed. By adding a wiretapper in the model, we aim to send the confidential message to the receiver and keep it secret from the wiretapper as much as possible. We characterize the inner and outer bounds on the capacity-equivocation region of such a channel with noncausal (and causal) channel state information. Furthermore, the lower and upper bounds on the sum secrecy capacity are also obtained. Besides, by eliminating the specific decoder, we get a new outer bound on the capacity-equivocation region of the wiretap channel with action-dependent states and prove it is tighter than the existing outer bound. A binary example is presented to illustrate the tradeoff between the sum secrecy rate and the information embedding rate under the secrecy constraint. We find that the secrecy constraint and the communication requirements of information embedding have a negative impact on improving the secrecy transmission rate of the given communication link.
doi_str_mv 10.3390/e16042105
format article
fullrecord <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_de742bdbf75f49c2b70e17055a24b080</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><doaj_id>oai_doaj_org_article_de742bdbf75f49c2b70e17055a24b080</doaj_id><sourcerecordid>3340735281</sourcerecordid><originalsourceid>FETCH-LOGICAL-c424t-27b5ccbeeca5ca0719b06211e7a8915e4359eddbacf55ed24218b6d19cdde8423</originalsourceid><addsrcrecordid>eNqNkU9LAzEQxYMoqNWD32DBix6qk2yy2RxLqVoQvCgeQ_7M1i3bTU22iN_e1EoRT57ezPDj8WaGkAsKN2Wp4BZpBZxREAfkhIJSY14CHP6qj8lpSksAVjJanRDx2kYczLqYvpm-x674aIe3Yt43Ia7M0Ia-mK0set_2iyI3E7edpTNy1Jgu4fmPjsjL3ex5-jB-fLqfTyePY8cZH8ZMWuGcRXRGOAOSKgsVoxSlqRUVyEuhsrc1rhECPcvBa1t5qpz3WHNWjsh85-uDWep1bFcmfupgWv09CHGhTRxa16H2KDmz3jZSNFw5ZiUglSCEYdxCDdnraue1juF9g2nQqzY57DrTY9gkTSvFcp7qP6gQSrJaUJXRyz_oMmxin4-SqVLWtYSsI3K9o1wMKUVs9rtQ0Nu_6f3fyi_hNYeT</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1537887015</pqid></control><display><type>article</type><title>Wiretap Channel with Information Embedding on Actions</title><source>Publicly Available Content Database (Proquest) (PQ_SDU_P3)</source><creator>Yin, Xinxing ; Xue, Zhi</creator><creatorcontrib>Yin, Xinxing ; Xue, Zhi</creatorcontrib><description>Information embedding on actions is a new channel model in which a specific decoder is used to observe the actions taken by the encoder and retrieve part of the message intended for the receiver. We revisit this model and consider a different scenario where a secrecy constraint is imposed. By adding a wiretapper in the model, we aim to send the confidential message to the receiver and keep it secret from the wiretapper as much as possible. We characterize the inner and outer bounds on the capacity-equivocation region of such a channel with noncausal (and causal) channel state information. Furthermore, the lower and upper bounds on the sum secrecy capacity are also obtained. Besides, by eliminating the specific decoder, we get a new outer bound on the capacity-equivocation region of the wiretap channel with action-dependent states and prove it is tighter than the existing outer bound. A binary example is presented to illustrate the tradeoff between the sum secrecy rate and the information embedding rate under the secrecy constraint. We find that the secrecy constraint and the communication requirements of information embedding have a negative impact on improving the secrecy transmission rate of the given communication link.</description><identifier>ISSN: 1099-4300</identifier><identifier>EISSN: 1099-4300</identifier><identifier>DOI: 10.3390/e16042105</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>action-dependent states ; Channels ; Decoders ; Encoders ; Entropy ; information embedding ; Links ; Messages ; Receivers ; sum secrecy capacity ; Upper bounds ; wiretap channel</subject><ispartof>Entropy (Basel, Switzerland), 2014-04, Vol.16 (4), p.2105-2130</ispartof><rights>Copyright MDPI AG 2014</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c424t-27b5ccbeeca5ca0719b06211e7a8915e4359eddbacf55ed24218b6d19cdde8423</citedby><cites>FETCH-LOGICAL-c424t-27b5ccbeeca5ca0719b06211e7a8915e4359eddbacf55ed24218b6d19cdde8423</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/1537887015/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/1537887015?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,25753,27924,27925,37012,37013,44590,74998</link.rule.ids></links><search><creatorcontrib>Yin, Xinxing</creatorcontrib><creatorcontrib>Xue, Zhi</creatorcontrib><title>Wiretap Channel with Information Embedding on Actions</title><title>Entropy (Basel, Switzerland)</title><description>Information embedding on actions is a new channel model in which a specific decoder is used to observe the actions taken by the encoder and retrieve part of the message intended for the receiver. We revisit this model and consider a different scenario where a secrecy constraint is imposed. By adding a wiretapper in the model, we aim to send the confidential message to the receiver and keep it secret from the wiretapper as much as possible. We characterize the inner and outer bounds on the capacity-equivocation region of such a channel with noncausal (and causal) channel state information. Furthermore, the lower and upper bounds on the sum secrecy capacity are also obtained. Besides, by eliminating the specific decoder, we get a new outer bound on the capacity-equivocation region of the wiretap channel with action-dependent states and prove it is tighter than the existing outer bound. A binary example is presented to illustrate the tradeoff between the sum secrecy rate and the information embedding rate under the secrecy constraint. We find that the secrecy constraint and the communication requirements of information embedding have a negative impact on improving the secrecy transmission rate of the given communication link.</description><subject>action-dependent states</subject><subject>Channels</subject><subject>Decoders</subject><subject>Encoders</subject><subject>Entropy</subject><subject>information embedding</subject><subject>Links</subject><subject>Messages</subject><subject>Receivers</subject><subject>sum secrecy capacity</subject><subject>Upper bounds</subject><subject>wiretap channel</subject><issn>1099-4300</issn><issn>1099-4300</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><sourceid>DOA</sourceid><recordid>eNqNkU9LAzEQxYMoqNWD32DBix6qk2yy2RxLqVoQvCgeQ_7M1i3bTU22iN_e1EoRT57ezPDj8WaGkAsKN2Wp4BZpBZxREAfkhIJSY14CHP6qj8lpSksAVjJanRDx2kYczLqYvpm-x674aIe3Yt43Ia7M0Ia-mK0set_2iyI3E7edpTNy1Jgu4fmPjsjL3ex5-jB-fLqfTyePY8cZH8ZMWuGcRXRGOAOSKgsVoxSlqRUVyEuhsrc1rhECPcvBa1t5qpz3WHNWjsh85-uDWep1bFcmfupgWv09CHGhTRxa16H2KDmz3jZSNFw5ZiUglSCEYdxCDdnraue1juF9g2nQqzY57DrTY9gkTSvFcp7qP6gQSrJaUJXRyz_oMmxin4-SqVLWtYSsI3K9o1wMKUVs9rtQ0Nu_6f3fyi_hNYeT</recordid><startdate>20140401</startdate><enddate>20140401</enddate><creator>Yin, Xinxing</creator><creator>Xue, Zhi</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7TB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FR3</scope><scope>HCIFZ</scope><scope>KR7</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>DOA</scope></search><sort><creationdate>20140401</creationdate><title>Wiretap Channel with Information Embedding on Actions</title><author>Yin, Xinxing ; Xue, Zhi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c424t-27b5ccbeeca5ca0719b06211e7a8915e4359eddbacf55ed24218b6d19cdde8423</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>action-dependent states</topic><topic>Channels</topic><topic>Decoders</topic><topic>Encoders</topic><topic>Entropy</topic><topic>information embedding</topic><topic>Links</topic><topic>Messages</topic><topic>Receivers</topic><topic>sum secrecy capacity</topic><topic>Upper bounds</topic><topic>wiretap channel</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yin, Xinxing</creatorcontrib><creatorcontrib>Xue, Zhi</creatorcontrib><collection>CrossRef</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Engineering Research Database</collection><collection>SciTech Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>Civil Engineering Abstracts</collection><collection>ProQuest Engineering Collection</collection><collection>ProQuest Engineering Database</collection><collection>Publicly Available Content Database (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>Entropy (Basel, Switzerland)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yin, Xinxing</au><au>Xue, Zhi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Wiretap Channel with Information Embedding on Actions</atitle><jtitle>Entropy (Basel, Switzerland)</jtitle><date>2014-04-01</date><risdate>2014</risdate><volume>16</volume><issue>4</issue><spage>2105</spage><epage>2130</epage><pages>2105-2130</pages><issn>1099-4300</issn><eissn>1099-4300</eissn><abstract>Information embedding on actions is a new channel model in which a specific decoder is used to observe the actions taken by the encoder and retrieve part of the message intended for the receiver. We revisit this model and consider a different scenario where a secrecy constraint is imposed. By adding a wiretapper in the model, we aim to send the confidential message to the receiver and keep it secret from the wiretapper as much as possible. We characterize the inner and outer bounds on the capacity-equivocation region of such a channel with noncausal (and causal) channel state information. Furthermore, the lower and upper bounds on the sum secrecy capacity are also obtained. Besides, by eliminating the specific decoder, we get a new outer bound on the capacity-equivocation region of the wiretap channel with action-dependent states and prove it is tighter than the existing outer bound. A binary example is presented to illustrate the tradeoff between the sum secrecy rate and the information embedding rate under the secrecy constraint. We find that the secrecy constraint and the communication requirements of information embedding have a negative impact on improving the secrecy transmission rate of the given communication link.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/e16042105</doi><tpages>26</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1099-4300
ispartof Entropy (Basel, Switzerland), 2014-04, Vol.16 (4), p.2105-2130
issn 1099-4300
1099-4300
language eng
recordid cdi_doaj_primary_oai_doaj_org_article_de742bdbf75f49c2b70e17055a24b080
source Publicly Available Content Database (Proquest) (PQ_SDU_P3)
subjects action-dependent states
Channels
Decoders
Encoders
Entropy
information embedding
Links
Messages
Receivers
sum secrecy capacity
Upper bounds
wiretap channel
title Wiretap Channel with Information Embedding on Actions
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T20%3A19%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Wiretap%20Channel%20with%20Information%20Embedding%20on%20Actions&rft.jtitle=Entropy%20(Basel,%20Switzerland)&rft.au=Yin,%20Xinxing&rft.date=2014-04-01&rft.volume=16&rft.issue=4&rft.spage=2105&rft.epage=2130&rft.pages=2105-2130&rft.issn=1099-4300&rft.eissn=1099-4300&rft_id=info:doi/10.3390/e16042105&rft_dat=%3Cproquest_doaj_%3E3340735281%3C/proquest_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c424t-27b5ccbeeca5ca0719b06211e7a8915e4359eddbacf55ed24218b6d19cdde8423%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1537887015&rft_id=info:pmid/&rfr_iscdi=true