Statistical distribution, host for encrypted information

Physica A: Statistical Mechanics and its Applications (Impact Factor: 1.73). 05/2005; 359(1). DOI: 10.1016/j.physa.2005.04.044
Source: arXiv

ABSTRACT The statistical distribution, when determined from an incomplete set of
constraints, is shown to be suitable as host for encrypted information. We
design an encoding/decoding scheme to embed such a distribution with hidden
information. The encryption security is based on the extreme instability of the
encoding procedure. The essential feature of the proposed system lies in the
fact that the key for retrieving the code is generated by random perturbations
of {\em {very small value}}. The security of the proposed encryption relies on
the security to interchange the secret key. Hence, it appears as a good
complement to the quantum key distribution protocol.

Download full-text


Available from: A. Plastino, Jan 15, 2013
8 Reads
  • Source
    • "The success of employing multiple pdf 's to enhance the security of the covert information, is critically contingent upon the encryption/decryption strategy being dependent upon the pdf 's of the statistical hosts. This feature permits the pdf dependent statistical encryption/decryption strategy to possess immense qualitative flexibility, as compared with pdf independent models [7] [8]. Numerical simulations demonstrate impressive quantitative performance in securing covert information. "
    [Show abstract] [Hide abstract]
    ABSTRACT: A novel strategy to encrypt covert information (code) via unitary projections into the null spaces of ill-conditioned eigenstructures of multiple host statistical distributions, inferred from incomplete constraints, is presented. The host pdf's are inferred using the maximum entropy principle. The projection of the covert information is dependent upon the pdf's of the host statistical distributions. The security of the encryption/decryption strategy is based on the extreme instability of the encoding process. A self-consistent procedure to derive keys for both symmetric and asymmetric cryptography is presented. The advantages of using a multiple pdf model to achieve encryption of covert information are briefly highlighted. Numerical simulations exemplify the efficacy of the model. Comment: 18 pages, 4 figures. Three sentences expanded to emphasize detail. Typos corrected
    Physics Letters A 07/2006; 370(5-6). DOI:10.1016/j.physleta.2007.05.117 · 1.68 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: Securing covert information has immense ramifications in a variety of strategi-cally important disciplines. A novel and promising method for encrypting covert information in a host distribution is presented here. This is based upon the use of Fisher information, in particular its quantum mechanical connotations. This use of Fisher information nicely supplements its use in other chapters of the book, where it is shown how Fisher information can be used to discover scientific knowledge. Here we show how to use Fisher information to secure that knowledge.
    Exploratory Data Analysis Using Fisher Information, 05/2010: pages 181-216;
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: The recently introduced approach for Encrypted Image Folding is generalized to make it self-contained. The goal is achieved by enlarging the folded image so as to embed all the necessary information for the image recovery. The need for extra size is somewhat compensated by considering a transformation with higher folding capacity. Numerical examples show that the size of the resulting cipher image may be significantly smaller than the plain text one. The implementation of the approach is further extended to deal also with color images.
    Physica A: Statistical Mechanics and its Applications 12/2012; 391(23):5858–5870. DOI:10.1016/j.physa.2012.06.042 · 1.73 Impact Factor