Open Access System for Information Sharing

Login Library

 

Article
Cited 38 time in webofscience Cited 42 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.authorTan, Vincent Y. F.-
dc.contributor.authorLee, Si-Hyeon-
dc.date.accessioned2019-04-07T14:56:20Z-
dc.date.available2019-04-07T14:56:20Z-
dc.date.created2019-02-26-
dc.date.issued2019-05-
dc.identifier.issn1556-6013-
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/95246-
dc.description.abstractWe consider a covert communication scenario where a transmitter wishes to communicate simultaneously to two legitimate receivers while ensuring that the communication is not detected by an adversary, the warden. The legitimate receivers and the adversary observe the transmission from the transmitter via a three-user discrete or Gaussian memoryless broadcast channel. We focus on the case where the "no-input" symbol is not redundant, i.e., the output distribution at the warden induced by the no-input symbol is not a mixture of the output distributions induced by other input symbols, so that the covert communication is governed by the square root law, i.e., at most Theta(root n) bits can be transmitted over n channel uses. We show that for such a setting, a simple time-division strategy achieves the optimal throughputs for a non-trivial class of broadcast channels; this is not true for communicating over broadcast channels without the covert communication constraint. Our result implies that a code that uses two separate optimal point-to-point codes each designed for the constituent channels and each used for a fraction of the time is optimal in the sense that it achieves the best constants of the root n-scaling for the throughputs. Our proof strategy combines several elements in the network information theory literature, including concave envelope representations of the capacity regions of broadcast channels and El Gamal's outer bound for more capable broadcast channels.-
dc.languageEnglish-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.relation.isPartOfIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY-
dc.titleTime-Division is Optimal for Covert Communication Over Some Broadcast-
dc.typeArticle-
dc.identifier.doi10.1109/TIFS.2018.2878398-
dc.type.rimsART-
dc.identifier.bibliographicCitationIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.14, no.5, pp.1377 - 1389-
dc.identifier.wosid000457798900004-
dc.citation.endPage1389-
dc.citation.number5-
dc.citation.startPage1377-
dc.citation.titleIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY-
dc.citation.volume14-
dc.contributor.affiliatedAuthorLee, Si-Hyeon-
dc.identifier.scopusid2-s2.0-85055674721-
dc.description.journalClass1-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.type.docTypeArticle-
dc.subject.keywordPlusINFORMATION-
dc.subject.keywordPlusLIMITS-
dc.subject.keywordAuthorCovert communication-
dc.subject.keywordAuthorlow probability of detection-
dc.subject.keywordAuthorbroadcast channels-
dc.subject.keywordAuthortime-division-
dc.subject.keywordAuthorconcave envelopes-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

이시현LEE, SI HYEON
Dept of Electrical Enginrg
Read more

Views & Downloads

Browse