Information hiding using matroid theory

نویسندگان

چکیده

Inspired by problems in Private Information Retrieval, we consider the setting where two users need to establish a communication protocol transmit secret without revealing it external observers. This is question of how large linear code can be, when required agree with prescribed on collection coordinate sets. We show efficiency such determined derived matroid underlying code. Furthermore, provide several sufficient combinatorial conditions for no transmission possible.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Matroid theory

The comments below apply to all printings of the book dated 2005 or earlier. The table following contains more than just a list of typing errors. Some statements and proofs have been corrected, simplified, or clarified. Moreover, the current status has been given for all the unsolved problems or conjectures that appear in Chapter 14. For those changes that simply involve the insertion of extra ...

متن کامل

Fast Flux Module Detection Using Matroid Theory

Flux balance analysis (FBA) is one of the most often applied methods on genome-scale metabolic networks. Although FBA uniquely determines the optimal yield, the pathway that achieves this is usually not unique. The analysis of the optimal-yield flux space has been an open challenge. Flux variability analysis is only capturing some properties of the flux space, while elementary mode analysis is ...

متن کامل

Matroid Theory and Supergravity

In this work, we consider matroid theory. After presenting three different (but equivalent) definitions of matroids, we mention some of the most important theorems of such theory. In particular, we note that every matroid has a dual matroid and that a matroid is regular if and only if it is binary and includes no Fano matroid or its dual. We show a connection between this last theorem and octon...

متن کامل

Information Hiding Using Ant Colony Optimization Algorithm

This paper aims to find an effective and efficient information hiding method used for protecting secret information by embedding it in a cover media such as images. Finding the optimal set of the image pixel bits to be substituted by the secret message bits, such that the cover image is of high quality, is a complex process and there is an exponential number of feasible solutions. Two new ant-b...

متن کامل

Information Hiding Using Audio Steganography – a Survey

Today’s large demand of internet applications requires data to be transmitted in a secure manner. Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. So the attractive solution for this problem is Steganography, which is the art and science of writing hidden messages in such a way that no one, apart from the sender an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Advances in Applied Mathematics

سال: 2021

ISSN: ['1090-2074', '0196-8858']

DOI: https://doi.org/10.1016/j.aam.2021.102205