메뉴 건너뛰기




Volumn 62, Issue 5, 2016, Pages 2334-2354

Covert Communication over Noisy Channels: A Resolvability Perspective

Author keywords

Covert communications; low probability of detection; physical layer security; Shannon theory

Indexed keywords

CHANNEL CAPACITY; CODES (SYMBOLS); NETWORK LAYERS; TRANSMITTERS;

EID: 84968724672     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2016.2530089     Document Type: Conference Paper
Times cited : (414)

References (33)
  • 1
    • 84969822817 scopus 로고    scopus 로고
    • A channel resolvability perspective on stealth communications
    • Jun.
    • M. Bloch, "A channel resolvability perspective on stealth communications," in Proc. IEEE Int. Symp. Inf. Theory, Hong Kong, Jun. 2015, pp. 2535-2539.
    • (2015) Proc IEEE Int. Symp. Inf. Theory, Hong Kong , pp. 2535-2539
    • Bloch, M.1
  • 2
    • 84883395039 scopus 로고    scopus 로고
    • Limits of reliable communication with low probability of detection on AWGN channels
    • Sep.
    • B. A. Bash, D. Goeckel, D. Towsley, "Limits of reliable communication with low probability of detection on AWGN channels," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1921-1930, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 1921-1930
    • Bash, B.A.1    Goeckel, D.2    Towsley, D.3
  • 3
    • 84945231932 scopus 로고    scopus 로고
    • Quantum-secure covert communication on bosonic channels
    • Oct.
    • B. A. Bash et al., "Quantum-secure covert communication on bosonic channels," Nature Commun., vol. 6, p. 8626, Oct. 2015.
    • (2015) Nature Commun. , vol.6 , pp. 8626
    • Bash, B.A.1
  • 4
    • 84969750122 scopus 로고    scopus 로고
    • Limits of low-probabilityof-detection communication over a discrete memoryless channel
    • Jun.
    • L. Wang, G. W. Wornell, L. Zheng, "Limits of low-probabilityof-detection communication over a discrete memoryless channel," in Proc. IEEE Int. Symp. Inf. Theory, Hong Kong, Jun. 2015, pp. 2525-2529.
    • (2015) Proc IEEE Int. Symp. Inf. Theory, Hong Kong , pp. 2525-2529
    • Wang, L.1    Wornell, G.W.2    Zheng, L.3
  • 6
    • 34547881527 scopus 로고    scopus 로고
    • A capacity result for batch steganography
    • Aug.
    • A. D. Ker, "A capacity result for batch steganography," IEEE Signal Process. Lett., vol. 14, no. 8, pp. 525-528, Aug. 2007.
    • (2007) IEEE Signal Process. Lett. , vol.14 , Issue.8 , pp. 525-528
    • Ker, A.D.1
  • 11
    • 84906993920 scopus 로고    scopus 로고
    • Achieving positive rate with undetectable communication over AWGN and Rayleigh channels
    • Jun.
    • S. Lee and R. J. Baxley, "Achieving positive rate with undetectable communication over AWGN and Rayleigh channels," in Proc. IEEE Int. Conf. Commun., Sydney, NSW, Australia, Jun. 2014, pp. 780-785.
    • (2014) Proc IEEE Int. Conf. Commun., Sydney, NSW, Australia , pp. 780-785
    • Lee, S.1    Baxley, R.J.2
  • 14
    • 84959322658 scopus 로고    scopus 로고
    • Covert communications when the warden does not know the background noise power
    • Feb.
    • D. Goeckel, B. Bash, S. Guha, D. Towsley, "Covert communications when the warden does not know the background noise power," IEEE Commun. Lett., vol. 20, no. 2, pp. 236-239, Feb. 2016.
    • (2016) IEEE Commun. Lett. , vol.20 , Issue.2 , pp. 236-239
    • Goeckel, D.1    Bash, B.2    Guha, S.3    Towsley, D.4
  • 16
    • 84889587094 scopus 로고    scopus 로고
    • Strong secrecy from channel resolvability
    • Dec.
    • M. R. Bloch and J. N. Laneman, "Strong secrecy from channel resolvability," IEEE Trans. Inf. Theory, vol. 59, no. 12, pp. 8077-8098, Dec. 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.12 , pp. 8077-8098
    • Bloch, M.R.1    Laneman, J.N.2
  • 18
    • 84961773142 scopus 로고    scopus 로고
    • Hiding information in noise: Fundamental limits of covert wireless communication
    • Dec.
    • B. A. Bash, D. Goeckel, D. Towsley, S. Guha, "Hiding information in noise: Fundamental limits of covert wireless communication," IEEE Commun. Mag., vol. 53, no. 12, pp. 26-31, Dec. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.12 , pp. 26-31
    • Bash, B.A.1    Goeckel, D.2    Towsley, D.3    Guha, S.4
  • 19
    • 0347337828 scopus 로고    scopus 로고
    • Secure space-time communication
    • Dec.
    • A. O. Hero, "Secure space-time communication," IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235-3249, Dec. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.12 , pp. 3235-3249
    • Hero, A.O.1
  • 20
    • 0027602480 scopus 로고
    • Approximation theory of output statistics
    • May
    • T. S. Han and S. Verdú, "Approximation theory of output statistics," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 752-772, May 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 752-772
    • Han, T.S.1    Verdú, S.2
  • 25
    • 0028461972 scopus 로고
    • A general formula for channel capacity
    • Jul.
    • S. Verdú and T. S. Han, "A general formula for channel capacity," IEEE Trans. Inf. Theory, vol. 40, no. 4, pp. 1147-1157, Jul. 1994.
    • (1994) IEEE Trans. Inf. Theory , vol.40 , Issue.4 , pp. 1147-1157
    • Verdú, S.1    Han, T.S.2
  • 26
    • 84886646972 scopus 로고    scopus 로고
    • Distributed channel synthesis
    • Nov.
    • P. Cuff, "Distributed channel synthesis," IEEE Trans. Inf. Theory, vol. 59, no. 11, pp. 7071-7096, Nov. 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.11 , pp. 7071-7096
    • Cuff, P.1
  • 27
    • 84968931973 scopus 로고    scopus 로고
    • Ph.D. dissertation Faculty Electrotech. Informationstech., Technische Univ. München, Munich, Germany
    • J. Hou, "Coding for relay networks and effective secrecy for wiretap channels," Ph.D. dissertation, Faculty Electrotech. Informationstech., Technische Univ. München, Munich, Germany, 2014.
    • (2014) Coding for Relay Networks and Effective Secrecy for Wiretap Channels
    • Hou, J.1
  • 28
    • 84865478919 scopus 로고    scopus 로고
    • Semantic security for the wiretap channel
    • R. Safavi-Naini and R. Canetti, Eds. Berlin, Germany: Springer
    • M. Bellare, S. Tessaro, A. Vardy, "Semantic security for the wiretap channel," in Advances in Cryptology (Lecture Notes in Computer Science), R. Safavi-Naini and R. Canetti, Eds., vol. 7417. Berlin, Germany: Springer, 2012, pp. 294-311.
    • (2012) Advances in Cryptology (Lecture Notes in Computer Science) , vol.7417 , pp. 294-311
    • Bellare, M.1    Tessaro, S.2    Vardy, A.3
  • 29
    • 84908252542 scopus 로고    scopus 로고
    • Reliability and secrecy functions of the wiretap channel under cost constraint
    • Nov.
    • T. S. Han, H. Endo, M. Sasaki, "Reliability and secrecy functions of the wiretap channel under cost constraint," IEEE Trans. Inf. Theory, vol. 60, no. 11, pp. 6819-6843, Nov. 2014.
    • (2014) IEEE Trans. Inf. Theory , vol.60 , Issue.11 , pp. 6819-6843
    • Han, T.S.1    Endo, H.2    Sasaki, M.3
  • 30
    • 81255188964 scopus 로고    scopus 로고
    • Noisy channel coding via privacy amplification and information reconciliation
    • Nov.
    • J. M. Renes and R. Renner, "Noisy channel coding via privacy amplification and information reconciliation," IEEE Trans. Inf. Theory, vol. 57, no. 11, pp. 7377-7385, Nov. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.11 , pp. 7377-7385
    • Renes, J.M.1    Renner, R.2
  • 31
    • 3042519430 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • Jul.
    • C. Cachin, "An information-theoretic model for steganography," Inf. Comput., vol. 192, no. 1, pp. 41-56, Jul. 2004.
    • (2004) Inf. Comput. , vol.192 , Issue.1 , pp. 41-56
    • Cachin, C.1
  • 32
    • 0025952277 scopus 로고
    • Divergence measures based on the Shannon entropy
    • Jan.
    • J. Lin, "Divergence measures based on the Shannon entropy," IEEE Trans. Inf. Theory, vol. 37, no. 1, pp. 145-151, Jan. 1991.
    • (1991) IEEE Trans. Inf. Theory , vol.37 , Issue.1 , pp. 145-151
    • Lin, J.1
  • 33
    • 77951624674 scopus 로고    scopus 로고
    • Channel coding rate in the finite blocklength regime
    • May
    • Y. Polyanskiy, H. V. Poor, S. Verdú, "Channel coding rate in the finite blocklength regime," IEEE Trans. Inf. Theory, vol. 56, no. 5, pp. 2307-2359, May 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.5 , pp. 2307-2359
    • Polyanskiy, Y.1    Poor, H.V.2    Verdú, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.