Covert Communication With Polynomial Computational Complexity

This paper develops a concatenated coding scheme with polynomial computational complexity for covert communication over Binary Symmetric Channels (BSCs) and binary-input Discrete Memoryless Channels (DMCs). Our setting is as follows — a transmitter Alice wishes to potentially reliably transmit a message to a receiver Bob, while ensuring that the transmission taking place is covert with respect to a warden Willie (who hears Alice’s transmission over another independent channel). Prior works showed that Alice can reliably and covertly transmit <inline-formula> <tex-math notation="LaTeX">$\mathcal {O}(\sqrt {{n}})$ </tex-math></inline-formula> message bits over <italic>n</italic> channel uses, but one drawback is that the computational complexity of the codes designed scales as <inline-formula> <tex-math notation="LaTeX">$2^{\Theta (\sqrt {{n}})}$ </tex-math></inline-formula>. In this work we provide a capacity-achiveing coding scheme with provable guarantees on both reliability and covertness, and its computational complexity grows polynomially in the blocklength <italic>n</italic>.

[1]  Mayank Bakshi,et al.  Reliable, deniable and hidable communication: A quick survey , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).

[2]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[3]  Robert J. Baxley,et al.  Achieving positive rate with undetectable communication over AWGN and Rayleigh channels , 2014, 2014 IEEE International Conference on Communications (ICC).

[4]  Saikat Guha,et al.  Quantum-secure covert communication on bosonic channels , 2015, Nature Communications.

[5]  H. Chernoff A Measure of Asymptotic Efficiency for Tests of a Hypothesis Based on the sum of Observations , 1952 .

[6]  F. Preparata,et al.  Computational Complexity of Fourier Transforms over Finite Fields , 1977 .

[7]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[8]  Xin-She Yang,et al.  Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.

[9]  U. Maurer A Uniied and Generalized Treatment of Authentication Theory , 1996 .

[10]  Robert J. Baxley,et al.  Achieving positive rate with undetectable communication Over MIMO rayleigh channels , 2014, 2014 IEEE 8th Sensor Array and Multichannel Signal Processing Workshop (SAM).

[11]  Matthieu R. Bloch,et al.  Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.

[12]  Matthieu R. Bloch,et al.  Polar codes for covert communications over asynchronous Discrete Memoryless Channels , 2017, 2017 51st Annual Conference on Information Sciences and Systems (CISS).

[13]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[14]  Mayank Bakshi,et al.  Computationally efficient deniable communication , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[15]  Matthieu R. Bloch,et al.  First- and Second-Order Asymptotics in Covert Communication , 2017, IEEE Transactions on Information Theory.

[16]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[17]  Donald F. Towsley,et al.  Quantum noise limited optical communication with low probability of detection , 2013, 2013 IEEE International Symposium on Information Theory.

[18]  Donald F. Towsley,et al.  LPD communication when the warden does not know when , 2014, 2014 IEEE International Symposium on Information Theory.

[19]  Matthieu R. Bloch,et al.  Multilevel-Coded Pulse-Position Modulation for Covert Communications Over Binary-Input Discrete Memoryless Channels , 2018, IEEE Transactions on Information Theory.

[20]  Daniel Berend,et al.  A Reverse Pinsker Inequality , 2012, ArXiv.

[21]  Luke Deshotels,et al.  Inaudible Sound as a Covert Channel in Mobile Devices , 2014, WOOT.

[22]  Boulat A. Bash,et al.  Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.

[23]  G. David Forney,et al.  Concatenated codes , 2009, Scholarpedia.

[24]  E. Lehmann,et al.  Testing Statistical Hypothesis. , 1960 .

[25]  Ying Wang,et al.  Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions , 2007, IEEE Transactions on Information Theory.

[26]  Lizhong Zheng,et al.  Fundamental Limits of Communication With Low Probability of Detection , 2015, IEEE Transactions on Information Theory.

[27]  Ueli Maurer A Unified and Generalized Treatment of Authentification Theory , 1996, STACS.

[28]  Mayank Bakshi,et al.  Reliable deniable communication with channel uncertainty , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).

[29]  Mayank Bakshi,et al.  Reliable, deniable and hidable communication , 2014, 2014 Information Theory and Applications Workshop (ITA).

[30]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[31]  Feller William,et al.  An Introduction To Probability Theory And Its Applications , 1950 .

[32]  Carlisle M. Adams,et al.  On Characterizing and Measuring Out-of-Band Covert Channels , 2015, IH&MMSec.

[33]  Thorsten Dickhaus,et al.  Testing a Statistical Hypothesis , 2015 .

[34]  Gerhard Kramer,et al.  Effective secrecy: Reliability, confusion and stealth , 2013, 2014 IEEE International Symposium on Information Theory.

[35]  S. Wicker Error Control Systems for Digital Communication and Storage , 1994 .

[36]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[37]  Matthias Hollick,et al.  Practical covert channels for WiFi systems , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[38]  Donald F. Towsley,et al.  Square root law for communication with low probability of detection on AWGN channels , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[39]  Mayank Bakshi,et al.  Reliable deniable communication: Hiding messages in noise , 2013, 2013 IEEE International Symposium on Information Theory.