+ All Categories
Home > Documents > Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME...

Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME...

Date post: 17-Dec-2015
Category:
Upload: samuel-higgins
View: 219 times
Download: 4 times
Share this document with a friend
61
Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The Institute of Network Coding Pak Hou (Howard) Che
Transcript
Page 1: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Reliable Deniable Communication: Hiding Messages in Noise

Mayank Bakshi Mahdi Jafari Siavoshani

ME

Sidharth Jaggi

The Chinese University of Hong Kong

The Institute of Network Coding

Pak Hou (Howard) Che

Page 2: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Alice

Reliability

Bob

Page 3: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Willie(the Warden)

Reliability

Deniability

AliceBob

Page 4: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Willie-sky

Reliability

Deniability

AliceBob

Page 5: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

M

T

t

๏ฟฝโƒ‘๏ฟฝ

Aliceโ€™s Encoder

๐‘=2๐œƒ (โˆš๐‘›)

Page 6: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

M

T

Message Trans. Status

BSC(pb) ๏ฟฝฬ‚๏ฟฝ=๐ท๐‘’๐‘ (๏ฟฝโƒ‘๏ฟฝ๐‘)๏ฟฝโƒ‘๏ฟฝ๐‘๏ฟฝโƒ‘๏ฟฝ

Aliceโ€™s Encoder

Bobโ€™s Decoder

๐‘=2๐œƒ (โˆš๐‘›)

๏ฟฝฬ‚๏ฟฝ

Page 7: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

M

T

Message Trans. Status

BSC(pb) ๏ฟฝฬ‚๏ฟฝ=๐ท๐‘’๐‘ (๏ฟฝโƒ‘๏ฟฝ๐‘)๏ฟฝโƒ‘๏ฟฝ๐‘๏ฟฝโƒ‘๏ฟฝ

Aliceโ€™s Encoder

Bobโ€™s Decoder

BSC(pw)

๏ฟฝฬ‚๏ฟฝ=๐ท๐‘’๐‘ (๏ฟฝโƒ‘๏ฟฝ๐‘ค)

๏ฟฝโƒ‘๏ฟฝ๐‘ค

๐‘=2๐œƒ (โˆš๐‘›)

Willieโ€™s (Best) Estimator

๏ฟฝฬ‚๏ฟฝ

๏ฟฝฬ‚๏ฟฝ

Page 8: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Bash, Goeckel & Towsley [1]Shared secret

[1] B. A. Bash, D. Goeckel and D. Towsley, โ€œSquare root law for communication with low probability of detection on AWGN channels,โ€ in Proceedings of the IEEE International Symposium on Information Theory (ISIT), 2012, pp. 448โ€“452.

โ‚ฌ

O n .log(n)( ) bits

AWGN channels

But capacity only

โ‚ฌ

O n( ) bits!

Page 9: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

This workNo shared secret

BSC(pb)

BSC(pw)

pb < pw

Page 10: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Wicked Willie(s) Base-station Bob

Aerial Alice

Directional antenna

Page 11: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Steganography: Other work

Page 12: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Steganography: Other work

Page 13: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Other work: โ€œCommonโ€ modelShared secret key

Capacity O(n) message bitsInformation-theoretically tight characterization(Gelโ€™fand-Pinsker/Dirty paper coding)

O(n.log(n)) bits (not optimized)

[2] Y. Wang and P. Moulin, "Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions," IEEE Trans. on Information Theory, special issue on Information Theoretic Security, June 2008

Stegotext(covertext,message,key)

Message,Covertext

No noise

d(stegotext,covertext) โ€œsmallโ€

Page 14: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Other work: Square-root โ€œlawโ€(โ€œempiricalโ€)

โ€ขโ€œSteganographic capacity is a loosely-defined concept, indicating the size of payload whichmay securely be embedded in a cover object using a particular embedding method. What constitutes โ€œsecureโ€ embedding is a matter for debate, but we will argue that capacity should grow only as the square root of the cover size under a wide range of definitions of security.โ€ [3]

โ€ขโ€œThanks to the Central Limit Theorem, the more covertext we give the warden, the better he will be able to estimate its statistics, and so the smaller the rate at which [the steganographer] will be able to tweak bits safely.โ€ [4]

[3] A. Ker, T. Pevny`, J. Kodovsky`, and J. Fridrich, โ€œThe square root law of steganographic capacity,โ€ in Proceedings of the 10th ACM workshop on Multimedia and security. ACM, 2008, pp. 107โ€“116.[4] R. Anderson, โ€œStretching the limits of steganography,โ€ in Information Hiding, 1996, pp. 39โ€“48.

โ€ขโ€œ[T]he reference to the Central Limit Theorem... suggests that a square root relationship should be considered. โ€œ [3]

Page 15: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

M

T

Message Trans. Status

BSC(pb) ๏ฟฝฬ‚๏ฟฝ=๐ท๐‘’๐‘ (๏ฟฝโƒ‘๏ฟฝ๐‘)๏ฟฝโƒ‘๏ฟฝ๐‘๏ฟฝโƒ‘๏ฟฝ

Aliceโ€™s Encoder

Bobโ€™s Decoder

BSC(pw)

๏ฟฝฬ‚๏ฟฝ=๐ท๐‘’๐‘ (๏ฟฝโƒ‘๏ฟฝ๐‘ค)

๏ฟฝโƒ‘๏ฟฝ๐‘ค

๐‘=2๐œƒ (โˆš๐‘›)

Willieโ€™s (Best) Estimator

๏ฟฝฬ‚๏ฟฝ

๏ฟฝฬ‚๏ฟฝ

Page 16: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Hypothesis Testing Willieโ€™s Estimate

Aliceโ€™s Transmission

Status

๐›ผ=Pr ( ๏ฟฝฬ‚๏ฟฝ=1|๐“=0 ) , ๐›ฝ=Pr ( ๏ฟฝฬ‚๏ฟฝ=0|๐“=1 )

Page 17: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Hypothesis Testing Willieโ€™s Estimate

Aliceโ€™s Transmission

Status

Page 18: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Hypothesis Testing Willieโ€™s Estimate

Aliceโ€™s Transmission

Status

Page 19: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Hypothesis Testing Willieโ€™s Estimate

Aliceโ€™s Transmission

Status

Page 20: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Intuition

๐“=0 , ๐ฒ๐‘ค=๏ฟฝโƒ‘๏ฟฝ๐‘ค Binomial(๐‘› ,๐‘๐‘ค)

Page 21: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Intuition

Page 22: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Theorem 1 (Wt(c.w.))(high deniability => low weight codewords)

Too   many   codewords   with   weight  โ€œmuch โ€ greater   than๐‘ โˆš๐‘› , h๐‘ก ๐‘’๐‘› h๐‘ก ๐‘’๐‘ ๐‘ฆ๐‘ ๐‘ก๐‘’๐‘š๐‘–๐‘    โ€œnot   veryโ€   deniable

Page 23: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Theorems 2 & 3(Converse & achievability for reliable & deniable comm.)

Page 24: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Theorems 2 & 3

๐‘๐‘

๐‘๐‘ค

0 1/2

1/2

pb>pw

Page 25: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Theorems 2 & 3

๐‘๐‘

๐‘๐‘ค

0 1/2

1/2

๐‘=0

(Symmetrizability)

Page 26: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Theorems 2 & 3

๐‘๐‘

๐‘๐‘ค

0 1/2

1/2pw=1/2

Page 27: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Theorems 2 & 3

๐‘๐‘

๐‘๐‘ค

0 1/2

1/2

โ‚ฌ

N โ‰ˆ 2(1โˆ’H (pb ))n

(BSC(pb))

Page 28: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Theorems 2 & 3

๐‘๐‘

๐‘๐‘ค

0 1/2

1/2

pb=0

Page 29: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Theorems 2 & 3

๐‘๐‘

๐‘๐‘ค

0 1/2

1/2

๐‘=2๐‘‚ (โˆš๐‘› log๐‘›) ,( ๐‘›โˆš๐‘›)=2๐‘‚ (โˆš๐‘› log๐‘›)

Page 30: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Theorems 2 & 3

๐‘๐‘

๐‘๐‘ค

0 1/2

1/2

pw>pb

Page 31: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Theorems 2 & 3

๐‘๐‘

๐‘๐‘ค

0 1/2

1/2๐‘=2๐‘‚ (โˆš๐‘›)

โ€œStandardโ€ IT inequalities+

Wt(โ€œmost codewordsโ€)<โˆšn(Thm 1)

Page 32: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Theorems 2 & 3

๐‘๐‘

๐‘๐‘ค

0 1/2

1/2

Main thm:

Page 33: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

๐‘ค๐‘ก๐ป (๐’š๐‘ค )

0 n

logarithm of# codewords

log ( ๐‘›๐‘›/2)โ‰ˆ๐‘›

Page 34: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

๐‘ค๐‘ก๐ป (๐ฒ๐‘ค)0 n๐‘๐‘ค๐‘›+๐‘‚ (โˆš๐‘›)๐‘๐‘ค๐‘›

log(# codewords)

Pr๏ฟฝโƒ‘๏ฟฝ๐‘ค

(๐‘ค๐‘ก๐ป (๐ฒ๐‘ค ))

๐‘‚ (1/โˆš๐‘›)

๐‘›๐ป (๐‘๐‘ค )

๐ฑ=0โƒ—

Page 35: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

๐‘ค๐‘ก๐ป (๐ฒ๐‘ค)0 n

(๐‘ยฟยฟ๐‘คโˆ—๐œŒ)๐‘›+๐‘‚(โˆš๐‘›)ยฟ(๐‘ยฟยฟ๐‘คโˆ—๐œŒ)๐‘›ยฟ(๐‘ยฟยฟ๐‘คโˆ—๐œŒ)๐‘›โˆ’๐‘‚(โˆš๐‘›)ยฟ

log(# codewords)

Pr๐Œ ,๐™๐‘ค

(๐‘ค๐‘ก๐ป (๐ฒ๐‘ค ))

๐‘›๐ป (๐‘๐‘คโˆ—๐œŒ)

๐‘ โˆš๐‘›

๐‘‚ (1/โˆš๐‘›)

Page 36: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.
Page 37: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Theorem 3 โ€“ Reliability proof sketch

0 n

Noise magnitude >> Codeword weight!!!

Page 38: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Theorem 3 โ€“ Reliability proof sketch

.

.

.

1000001000000000100100000010000000100

0001000000100000010000000010000000001

0010000100000001010010000000100010011

0000100000010000000000010000000010000

Random code

2O(โˆšn) codewords

Weight O(โˆšn)

Page 39: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Theorem 3 โ€“ Reliability proof sketch

.

.

.

1000001000010000100100000010000000100

0001000000100000010000000010000000001

0010000100000001010010000000100010011

0000100000010000000000010000000010000

โ€ขE(Intersection of 2 codewords) = O(1)

Weight O(โˆšn)

โ€ขPr(dmin(x) < cโˆšn) < 2-O(โˆšn)

โ€ขโ€œMostโ€ codewords โ€œwell-isolatedโ€

Page 40: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Theorem 3 โ€“ dmin decoding

โ€ขPr(x decoded to xโ€™) < 2-O(โˆšn)

+ O(โˆšn)

x

xโ€™

Page 41: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

โ€ข Recall: want to show

Theorem 3 โ€“ Deniability proof sketch

Page 42: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Theorem 4 โ€“ unexpected detour

๐‘ค๐‘ก๐ป (๐’š๐‘ค )

0 n

logarithm of# codewords

Page 43: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

๐‘ค๐‘ก๐ป (๐’š๐‘ค )

0 n

logarithm of# codewords

Too few codewords=> Not deniable

Theorem 4 โ€“ unexpected detour

Page 44: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

๐‘ค๐‘ก๐ป (๐ฒ๐‘ค)0 n

(๐‘ยฟยฟ๐‘คโˆ—๐œŒ)๐‘›+๐‘‚(โˆš๐‘›)ยฟ(๐‘ยฟยฟ๐‘คโˆ—๐œŒ)๐‘›ยฟ(๐‘ยฟยฟ๐‘คโˆ—๐œŒ)๐‘›โˆ’๐‘‚(โˆš๐‘›)ยฟ

log(# codewords)

Pr๐Œ ,๐™๐‘ค

(๐‘ค๐‘ก๐ป (๐ฒ๐‘ค ))

๐‘›๐ป (๐‘๐‘คโˆ—๐œŒ)

๐‘ โˆš๐‘›

๐‘‚ (1/โˆš๐‘›)

Page 45: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

โ€ข Recall: want to show

๐0 ๐1

Theorem 3 โ€“ Deniability proof sketch

Page 46: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

0 n

log(# codewords)

๐‘›๐ป (๐‘๐‘ค )

Theorem 3 โ€“ Deniability proof sketch

Page 47: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

๐‘ค๐‘ก๐ป (๐’š๐‘ค )

0 n

logarithm of# codewords

Theorem 3 โ€“ Deniability proof sketch

Page 48: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

๐0 ๐1

!!!

Theorem 3 โ€“ Deniability proof sketch

Page 49: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

๐0 ๐1

!!!

Theorem 3 โ€“ Deniability proof sketch

Page 50: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

๐1๐‘ฌ๐‘ช(๐ยฟยฟ1)ยฟ

Theorem 3 โ€“ Deniability proof sketch

Page 51: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

๐‘ค๐‘ก๐ป (๐’š๐‘ค )

0 n๐‘๐‘ค๐‘›+๐‘‚ (โˆš๐‘›)๐‘๐‘ค๐‘›

logarithm of# codewords

Theorem 3 โ€“ Deniability proof sketch

Page 52: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

# codewords of โ€œtypeโ€

๐‘‡ 1๐‘‡ 2

๐‘‡ 3

Theorem 3 โ€“ Deniability proof sketch

Page 53: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Theorem 3 โ€“ Deniability proof sketch

Page 54: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Theorem 3 โ€“ Deniability proof sketch

Page 55: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.
Page 56: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Theorem 3 โ€“ Deniability proof sketch

Page 57: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

โ€ข w.p.

Theorem 3 โ€“ Deniability proof sketch

Page 58: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

โ€ข w.p.

Theorem 3 โ€“ Deniability proof sketch

Page 59: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

โ€ข w.p. โ€ข close to w.p.

Theorem 3 โ€“ Deniability proof sketch

Page 60: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

โ€ข w.p. โ€ข close to w.p. โ€ข , w.h.p.

Theorem 3 โ€“ Deniability proof sketch

Page 61: Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.

Summary


Recommended