Abstract:
Breaking with the traditional modular architecture in which compression and cryptography are carried out separately, we propose an analysis-by-synthesis approach that exp...Show MoreMetadata
Abstract:
Breaking with the traditional modular architecture in which compression and cryptography are carried out separately, we propose an analysis-by-synthesis approach that exploits the properties of source codes to ensure a prescribed level of protection with manageable computational complexity. To illustrate the power of this methodology, we show that carefully inducing catastrophic errors in Huffman coded streams is very effective towards confusing a passive attacker.
Published in: 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)
Date of Conference: 30 September 2009 - 02 October 2009
Date Added to IEEE Xplore: 22 January 2010
ISBN Information: