Article

Statistical distribution, host for encrypted information

Physica A: Statistical Mechanics and its Applications (Impact Factor: 1.68). 05/2005; DOI: 10.1016/j.physa.2005.04.044
Source: arXiv

ABSTRACT The statistical distribution, when determined from an incomplete set of constraints, is shown to be suitable as host for encrypted information. We design an encoding/decoding scheme to embed such a distribution with hidden information. The encryption security is based on the extreme instability of the encoding procedure. The essential feature of the proposed system lies in the fact that the key for retrieving the code is generated by random perturbations of {\em {very small value}}. The security of the proposed encryption relies on the security to interchange the secret key. Hence, it appears as a good complement to the quantum key distribution protocol.

0 Bookmarks
 · 
50 Views
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: The recently introduced approach for Encrypted Image Folding is generalized to make it self-contained. The goal is achieved by enlarging the folded image so as to embed all the necessary information for the image recovery. The need for extra size is somewhat compensated by considering a transformation with higher folding capacity. Numerical examples show that the size of the resulting cipher image may be significantly smaller than the plain text one. The implementation of the approach is further extended to deal also with color images.
    Physica A: Statistical Mechanics and its Applications 12/2012; 391(23):5858–5870. · 1.68 Impact Factor
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: A novel strategy to encrypt covert information (code) via unitary projections into the null spaces of ill-conditioned eigenstructures of multiple host statistical distributions, inferred from incomplete constraints, is presented. The host pdf's are inferred using the maximum entropy principle. The projection of the covert information is dependent upon the pdf's of the host statistical distributions. The security of the encryption/decryption strategy is based on the extreme instability of the encoding process. A self-consistent procedure to derive keys for both symmetric and asymmetric cryptography is presented. The advantages of using a multiple pdf model to achieve encryption of covert information are briefly highlighted. Numerical simulations exemplify the efficacy of the model. Comment: 18 pages, 4 figures. Three sentences expanded to emphasize detail. Typos corrected
    Physics Letters A 07/2006; · 1.77 Impact Factor

Full-text (2 Sources)

View
28 Downloads
Available from
May 31, 2014