Skip to main content
placeholder image

Error-Correcting Codes for Authentication and Subliminal Channels

Journal Article


Abstract


  • The application of coding theory to security scenarios is studied. Authentication systems are introduced that are based on algebraic codes and provide high protection against an intruder's impersonation and substitution attacks. It is shown that a subliminal channel can be embedded into these systems and that there is a trade-off between the authentication capability, subliminal capacity and error protection capability. © 1991 IEEE

Publication Date


  • 1991

Citation


  • Safavi-Naini, R. S., & Seberry, J. R. (1991). Error-Correcting Codes for Authentication and Subliminal Channels. IEEE Transactions on Information Theory, 37(1), 13-17. doi:10.1109/18.61124

Scopus Eid


  • 2-s2.0-0026062676

Web Of Science Accession Number


Start Page


  • 13

End Page


  • 17

Volume


  • 37

Issue


  • 1

Abstract


  • The application of coding theory to security scenarios is studied. Authentication systems are introduced that are based on algebraic codes and provide high protection against an intruder's impersonation and substitution attacks. It is shown that a subliminal channel can be embedded into these systems and that there is a trade-off between the authentication capability, subliminal capacity and error protection capability. © 1991 IEEE

Publication Date


  • 1991

Citation


  • Safavi-Naini, R. S., & Seberry, J. R. (1991). Error-Correcting Codes for Authentication and Subliminal Channels. IEEE Transactions on Information Theory, 37(1), 13-17. doi:10.1109/18.61124

Scopus Eid


  • 2-s2.0-0026062676

Web Of Science Accession Number


Start Page


  • 13

End Page


  • 17

Volume


  • 37

Issue


  • 1