May 25, 2016, Sidharth Jaggi (CUHK)

Wednesday, May 25, 2016, 3-4 pm
15 St. Mary’s Street, Room 105
Refreshments at 2:45 pm

jaggi

Sidharth Jaggi
Chinese University, Hong Kong

 

 

Deniable/Covert/Stealthy/LPD communication

The urge to communicate, to speak and be heard, is a fundamental human need. However, embedded within our increasingly sophisticated communication networks, Big Brother is often watching. There are situations where even the fact that communication is happening (not just the content of that communication), can have real-world consequences. For instance, if you are a politically active citizen in an authoritarian society with broad censorship powers, the mere fact that you are communicating with the outside world can be construed by those authorities as sufficient justification for reprisals. 

There has been a flurry of recent work in the information theory community dealing with this problem. In general, this problem encompasses models of communication with dual goals. Firstly, all communication from the source (Alice) to the destination (Bob) should be reliable, i.e., the communication protocol should be resilient to random noise, and perhaps even active jamming. Secondly, if the communication is overheard by a third party (Eve), it should be deniable from Eve. That is, not only should Eve should not learn anything about the source’s message, in fact Eve should not even be able to reliably decide whether or not the source is indeed communicating to Bob. To be able to instantiate such deniability in communication, there need to be asymmetries that might exist between Bob and Eve (for instance, perhaps the noise on the channel to Eve is higher than the noise on the channel to Bob, or perhaps Eve observes only a subset of the transmissions that Bob does). 

The tools used are typically information-theoretic and/or coding-theoretic in nature. Typically, deniability is formally defined in terms of a hypothesis-testing metric, and then one demands that the communication protocol that is reliable to Bob also have “high deniability”, regardless of Eve’s estimation strategy. Recently, in various communication settings (wired, wireless and quantum channels/networks), fundamental bounds on optimal rates for deniable communication, and also complementary schemes that are close to optimal. 

This talk will be a survey of some of this recent work by a variety of groups (Jie Hou and Gerhard Kramer; Boulat Bash, Dennis Goeckel, and Don Towsley; Matthieu Bloch; Ligong Wang, Greg Wornell and Lizhong Zheng) and by myself and collaborators (Pak Hou Che, Mayank Bakshi, Swanand Kadhe, Alex Sprintson). 

Sidharth Jaggi: Research interests: Network coding and network error-correcting algorithms, coding theory, steganography, group testing, compressive sensing. B.Tech. (’00), EE, IIT Bombay, MS/Ph.D. (’05) EE, CalTech, Postdoctoral Associate (’06) LIDS, MIT, Currently Associate Professor, Dept. of Information Engineering, The Chinese University of Hong Kong.

Faculty Host: Bobak Nazer