Skip to main content

Showing 1–7 of 7 results for author: Babaheidarian, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2004.06588  [pdf, ps, other

    cs.CR cs.IT

    Towards Scalable Security in Interference Channels With Arbitrary Number of Users

    Authors: Parisa Babaheidarian, Somayeh Salimi, Panos Papadimitratos

    Abstract: In this paper, we present an achievable security scheme for an interference channel with arbitrary number of users. In this model, each receiver should be able to decode its intended message while it cannot decode any meaningful information regarding messages intended for other receivers. Our scheme achieves individual secure rates which scale linearly with log(SNR) and achieves sum secure rates w… ▽ More

    Submitted 17 April, 2020; v1 submitted 14 April, 2020; originally announced April 2020.

    Comments: Revision 2

  2. arXiv:1901.09746  [pdf, other

    cs.CR

    Decode and Transfer: A New Steganalysis Technique via Conditional Generative Adversarial Networks

    Authors: Parisa Babaheidarian, Mark Wallace

    Abstract: Recent work (Baluja, 2017) showed that using a pair of deep encoders and decoders, embedding a full-size secret image into a container image of the same size is achieved. This method distributes the information of the secret image across all color channels of the cover image, thereby, it is difficult to discover the secret image using conventional methods. In this paper, we propose a new steganaly… ▽ More

    Submitted 28 January, 2019; originally announced January 2019.

  3. arXiv:1703.01208  [pdf, other

    cs.IT

    Preserving Confidentiality in The Gaussian Broadcast Channel Using Compute-and-Forward

    Authors: Parisa Babaheidarian, Somayeh Salimi, Panos Papadimitratos

    Abstract: We study the transmission of confidential messages across a wireless broadcast channel with K>2 receivers and K helpers. The goal is to transmit all messages reliably to their intended receivers while keeping them confidential from the unintended receivers. We design a codebook based on nested lattice structure, cooperative jamming, lattice alignment, and i.i.d. coding. Moreover, we exploit the as… ▽ More

    Submitted 3 March, 2017; originally announced March 2017.

    Comments: 6 pages, accepted to CISS 2017

  4. arXiv:1604.07386  [pdf, ps, other

    cs.IT

    Security in The Gaussian Interference Channel: Weak and Moderately Weak Interference Regimes

    Authors: Parisa Babaheidarian, Somayeh Salimi, Panos Papadimitratos

    Abstract: We consider a secure communication scenario through the two-user Gaussian interference channel: each transmitter (user) has a confidential message to send reliably to its intended receiver while keeping it secret from the other receiver. Prior work investigated the performance of two different approaches for this scenario; i.i.d. Gaussian random codes and real alignment of structured codes. While… ▽ More

    Submitted 25 April, 2016; originally announced April 2016.

    Comments: 5 pages, Accepted to be presented at ISIT 2016

  5. arXiv:1510.01258  [pdf, ps, other

    cs.IT

    Finite-SNR Regime Analysis of The Gaussian Wiretap Multiple-Access Channel

    Authors: Parisa Babaheidarian, Somayeh Salimi, Panos Papadimitratos

    Abstract: In this work, we consider a K-user Gaussian wiretap multiple-access channel (GW-MAC) in which each transmitter has an independent confidential message for the receiver. There is also an external eavesdropper who intercepts the communications. The goal is to transmit the messages reliably while keeping them confidential from the eavesdropper. To accomplish this goal, two different approaches have b… ▽ More

    Submitted 5 October, 2015; originally announced October 2015.

    Comments: 8 pages, 4 figures, accepted to Allerton 2015

  6. arXiv:1504.05862  [pdf, ps, other

    cs.CR cs.IT

    Compute-and-Forward Can Buy Secrecy Cheap

    Authors: Parisa Babaheidarian, Somayeh Salimi

    Abstract: We consider a Gaussian multiple access channel with $K$ transmitters, a (intended) receiver and an external eavesdropper. The transmitters wish to reliably communicate with the receiver while concealing their messages from the eavesdropper. This scenario has been investigated in prior works using two different coding techniques; the random i.i.d. Gaussian coding and the signal alignment coding. Al… ▽ More

    Submitted 22 April, 2015; originally announced April 2015.

    Comments: Accepted to ISIT 2015, 5 pages, 3 figures

  7. arXiv:1103.5197  [pdf

    cs.CR cs.IT

    A New Secret key Agreement Scheme in a Four-Terminal Network

    Authors: Parisa Babaheidarian, Somayeh Salimi, Mohammad Reza Aref

    Abstract: A new scenario for generating a secret key and two private keys among three Terminals in the presence of an external eavesdropper is considered. Terminals 1, 2 and 3 intend to share a common secret key concealed from the external eavesdropper (Terminal 4) and simultaneously, each of Terminals 1 and 2 intends to share a private key with Terminal 3 while keeping it concealed from each other and from… ▽ More

    Submitted 27 March, 2011; originally announced March 2011.

    Comments: 6 pages, 3 figures