Abstract
Securing covert information has immense ramifications in a variety of strategi-cally important disciplines. A novel and promising method for encrypting covert information in a host distribution is presented here. This is based upon the use of Fisher information, in particular its quantum mechanical connotations. This use of Fisher information nicely supplements its use in other chapters of the book, where it is shown how Fisher information can be used to discover scientific knowledge. Here we show how to use Fisher information to secure that knowledge.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
B.R. Frieden. Science from Fisher Information: A Unification. Cambridge University Press, Cambridge, UK, 2004.
S.-I. Amari and N. Nagaoka. Methods of Information Geometry. Oxford University Press, Oxford, 2000.
S.L. Braunsten and C.M. Caves. Phys. Rev. Lett. 72, 3439 (1994).
A.R. Plastino and A. Plastino. Phys. Lett. A 181, 446 (1993).
O. Morgenstern and J. von Neuman. Theory of Games and Economic Behavior. Princeton University Press, Princeton, NJ, 1947.
A.J. Stam. Inform. Control 2, 101 (1959).
L. Brillouin. Science and Information Theory. Academic Press, New York, 1956.
P.J. Hüber. Robust Statistics. Wiley, New York, 1981.
L.D. Landau and E.M. Lifshitz. Quantum Mechanics, 3rd edn. Pergamon Press, Oxford, 1977.
T. Cover and J. Thomas. Elements of Information Theory. Wiley, New York, 1991.
E.T. Jaynes. Probability Theory, the Logic of Science. Cambridge University Press, Cambridge, UK, 2003.
D. Horn and A. Gottlieb. Phys. Rev. Lett. 88, 018702 (2002).
R.C. Venkatesan. In K.L. Priddy (ed.), Proceedings of SPIE Symposium on Defense and Security. Intelligent Computing: Theory and Applications II, vol. 5421. SPIE Press, Bellingham, WA, 2004, p. 48.
P.E. Hydon and E.L. Mansfield. Found. Comp. Math. 2, 187 (2004).
T.D. Lee. J. Stat. Phys. 46, 843 (1987).
I.B. Rumer and M.S. Ryvkin. Thermodynamics, Statistical Physics and Kinetics. Mir Publishers, Moscow, 1980.
E.T. Jaynes. Phys. Rev. 106(4), 620 (1957).
E.T. Jaynes. Phys. Rev. 108(2), 171 (1957).
M. Casas, A. Plastino, and A. Puente. Phys. Lett. A 248, 161 (1998).
S. Katzenbeisser and F. A. Petitcolas. Information Hiding: Techniques for Steganography and Digital Watermarking. Artech House, Norwood, MA, 2000.
J.A. Buchmann. Introduction to Cryptography. Springer, London, 2004.
H. Delfs and H. Knebel. Introduction to Cryptography: Principles and applications. Springer, Berlin, 2002.
B. Schneier. Applied Cryptography, 2nd edn. Wiley, New York, 1996.
C. Cachin. Inform. Comput. 192(1), 41 (2004).
P. Moulin and A. Ivanovic. The Fisher information game for optimal design of synchronization patterns in blind watermarking. In Proceedings of IEEE International Conference on Image Processing, vol. 2. IEEE Press, Piscataway, NJ, 2001, p. 550.
L. Rebollo-Neira and A. Plastino. Physica A 359, 213 (2006).
G. Sapiro. Geometric Partial Differential Equations and Image Processing. Cambridge University Press, Cambridge, UK, 2001.
M.A. Nielsen and I.L. Chuang. Quantum Computation and Quantum Information. Cambridge University Press, Cambridge, UK, 2000.
C. Bennett and G. Brassard. In Proceedings of IEEE International Conference on Computers, Systems and Signal Processing. Bangalore, India. IEEE Press, New York, 1984, p. 175.
D. Bowmeester, D. Ekert, K. Artur, and A. Zellinger (eds.). The Physics of Quantum Information: Quantum Cryptography, Quantum Teleportation, Quantum Computation. Springer, Berlin, 2000.
H.-K. Lo, T. Spiller, and S. Popescu (eds.) Introduction to Quantum Computation and Information, World Scientific, Singapore, 1998.
G.H. Golub and C.F. van Loan. Matrix Computations, 3rd edn. Johns Hopkins University Press, Baltimore, MD, 1995.
P.A.M. Disac. Principles of Quantum Mechanics (The International Series of Monographs on Physics) Oxford University Press, Oxford, 1982.
G. Arfken and H. Weber. Mathematical Methods for Physicists, Academic Press, San Diego, CA, 1995.
A.F.J. Levi. Applied Quantum Mechanics. Cambridge University, Press, Cambridge, UK, 2003.
B.R. Frieden, A. Plastino, A.R. Plastino, and B.H. Soffer. Phys. Rev. E 60(1), 48 (1999).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag London Limited
About this chapter
Cite this chapter
Venkatesan, R.C. (2007). Encryption of Covert Information Through a Fisher Game. In: Frieden, B.R., Gatenby, R.A. (eds) Exploratory Data Analysis Using Fisher Information. Springer, London. https://doi.org/10.1007/978-1-84628-777-0_6
Download citation
DOI: https://doi.org/10.1007/978-1-84628-777-0_6
Publisher Name: Springer, London
Print ISBN: 978-1-84628-506-6
Online ISBN: 978-1-84628-777-0
eBook Packages: Computer ScienceComputer Science (R0)