Skip to main content

Encryption of Covert Information Through a Fisher Game

  • Chapter
Exploratory Data Analysis Using Fisher Information

Abstract

Securing covert information has immense ramifications in a variety of strategi-cally important disciplines. A novel and promising method for encrypting covert information in a host distribution is presented here. This is based upon the use of Fisher information, in particular its quantum mechanical connotations. This use of Fisher information nicely supplements its use in other chapters of the book, where it is shown how Fisher information can be used to discover scientific knowledge. Here we show how to use Fisher information to secure that knowledge.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. B.R. Frieden. Science from Fisher Information: A Unification. Cambridge University Press, Cambridge, UK, 2004.

    Book  MATH  Google Scholar 

  2. S.-I. Amari and N. Nagaoka. Methods of Information Geometry. Oxford University Press, Oxford, 2000.

    MATH  Google Scholar 

  3. S.L. Braunsten and C.M. Caves. Phys. Rev. Lett. 72, 3439 (1994).

    Article  MathSciNet  Google Scholar 

  4. A.R. Plastino and A. Plastino. Phys. Lett. A 181, 446 (1993).

    Article  MathSciNet  Google Scholar 

  5. O. Morgenstern and J. von Neuman. Theory of Games and Economic Behavior. Princeton University Press, Princeton, NJ, 1947.

    Google Scholar 

  6. A.J. Stam. Inform. Control 2, 101 (1959).

    Article  MATH  MathSciNet  Google Scholar 

  7. L. Brillouin. Science and Information Theory. Academic Press, New York, 1956.

    MATH  Google Scholar 

  8. P.J. Hüber. Robust Statistics. Wiley, New York, 1981.

    Book  Google Scholar 

  9. L.D. Landau and E.M. Lifshitz. Quantum Mechanics, 3rd edn. Pergamon Press, Oxford, 1977.

    Google Scholar 

  10. T. Cover and J. Thomas. Elements of Information Theory. Wiley, New York, 1991.

    Book  MATH  Google Scholar 

  11. E.T. Jaynes. Probability Theory, the Logic of Science. Cambridge University Press, Cambridge, UK, 2003.

    MATH  Google Scholar 

  12. D. Horn and A. Gottlieb. Phys. Rev. Lett. 88, 018702 (2002).

    Article  Google Scholar 

  13. R.C. Venkatesan. In K.L. Priddy (ed.), Proceedings of SPIE Symposium on Defense and Security. Intelligent Computing: Theory and Applications II, vol. 5421. SPIE Press, Bellingham, WA, 2004, p. 48.

    Google Scholar 

  14. P.E. Hydon and E.L. Mansfield. Found. Comp. Math. 2, 187 (2004).

    Article  MathSciNet  Google Scholar 

  15. T.D. Lee. J. Stat. Phys. 46, 843 (1987).

    Google Scholar 

  16. I.B. Rumer and M.S. Ryvkin. Thermodynamics, Statistical Physics and Kinetics. Mir Publishers, Moscow, 1980.

    Google Scholar 

  17. E.T. Jaynes. Phys. Rev. 106(4), 620 (1957).

    Article  MathSciNet  Google Scholar 

  18. E.T. Jaynes. Phys. Rev. 108(2), 171 (1957).

    Article  MathSciNet  Google Scholar 

  19. M. Casas, A. Plastino, and A. Puente. Phys. Lett. A 248, 161 (1998).

    Article  Google Scholar 

  20. S. Katzenbeisser and F. A. Petitcolas. Information Hiding: Techniques for Steganography and Digital Watermarking. Artech House, Norwood, MA, 2000.

    Google Scholar 

  21. J.A. Buchmann. Introduction to Cryptography. Springer, London, 2004.

    Google Scholar 

  22. H. Delfs and H. Knebel. Introduction to Cryptography: Principles and applications. Springer, Berlin, 2002.

    MATH  Google Scholar 

  23. B. Schneier. Applied Cryptography, 2nd edn. Wiley, New York, 1996.

    Google Scholar 

  24. C. Cachin. Inform. Comput. 192(1), 41 (2004).

    MATH  MathSciNet  Google Scholar 

  25. P. Moulin and A. Ivanovic. The Fisher information game for optimal design of synchronization patterns in blind watermarking. In Proceedings of IEEE International Conference on Image Processing, vol. 2. IEEE Press, Piscataway, NJ, 2001, p. 550.

    Google Scholar 

  26. L. Rebollo-Neira and A. Plastino. Physica A 359, 213 (2006).

    Article  MathSciNet  Google Scholar 

  27. G. Sapiro. Geometric Partial Differential Equations and Image Processing. Cambridge University Press, Cambridge, UK, 2001.

    Book  Google Scholar 

  28. M.A. Nielsen and I.L. Chuang. Quantum Computation and Quantum Information. Cambridge University Press, Cambridge, UK, 2000.

    MATH  Google Scholar 

  29. C. Bennett and G. Brassard. In Proceedings of IEEE International Conference on Computers, Systems and Signal Processing. Bangalore, India. IEEE Press, New York, 1984, p. 175.

    Google Scholar 

  30. D. Bowmeester, D. Ekert, K. Artur, and A. Zellinger (eds.). The Physics of Quantum Information: Quantum Cryptography, Quantum Teleportation, Quantum Computation. Springer, Berlin, 2000.

    Google Scholar 

  31. H.-K. Lo, T. Spiller, and S. Popescu (eds.) Introduction to Quantum Computation and Information, World Scientific, Singapore, 1998.

    Google Scholar 

  32. G.H. Golub and C.F. van Loan. Matrix Computations, 3rd edn. Johns Hopkins University Press, Baltimore, MD, 1995.

    Google Scholar 

  33. P.A.M. Disac. Principles of Quantum Mechanics (The International Series of Monographs on Physics) Oxford University Press, Oxford, 1982.

    Google Scholar 

  34. G. Arfken and H. Weber. Mathematical Methods for Physicists, Academic Press, San Diego, CA, 1995.

    Google Scholar 

  35. A.F.J. Levi. Applied Quantum Mechanics. Cambridge University, Press, Cambridge, UK, 2003.

    Google Scholar 

  36. B.R. Frieden, A. Plastino, A.R. Plastino, and B.H. Soffer. Phys. Rev. E 60(1), 48 (1999).

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag London Limited

About this chapter

Cite this chapter

Venkatesan, R.C. (2007). Encryption of Covert Information Through a Fisher Game. In: Frieden, B.R., Gatenby, R.A. (eds) Exploratory Data Analysis Using Fisher Information. Springer, London. https://doi.org/10.1007/978-1-84628-777-0_6

Download citation

  • DOI: https://doi.org/10.1007/978-1-84628-777-0_6

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84628-506-6

  • Online ISBN: 978-1-84628-777-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics