1,052 research outputs found

    On cocycles with values in the group SU(2)

    Full text link
    In this paper we introduce the notion of degree for C1C^1-cocycles over irrational rotations on the circle with values in the group SU(2). It is shown that if a C1C^1-cocycle ϕ:S1SU(2)\phi:S^1\to SU(2) over an irrational rotation by α\alpha has nonzero degree, then the skew product S1×SU(2)(x,g)(x+α,gϕ(x))S1×SU(2)S^1\times SU(2)\ni(x,g)\mapsto (x+\alpha,g\phi(x))\in S^1\times SU(2) is not ergodic and the group of essential values of ϕ\phi is equal to the maximal Abelian subgroup of SU(2). Moreover, if ϕ\phi is of class C2C^2 (with some additional assumptions) the Lebesgue component in the spectrum of the skew product has countable multiplicity. Possible values of degree are discussed, too.Comment: 30 page

    Ergodic properties of infinite extensions of area-preserving flows

    Get PDF
    We consider volume-preserving flows (Φtf)tR(\Phi^f_t)_{t\in\mathbb{R}} on S×RS\times \mathbb{R}, where SS is a closed connected surface of genus g2g\geq 2 and (Φtf)tR(\Phi^f_t)_{t\in\mathbb{R}} has the form Φtf(x,y)=(ϕtx,y+0tf(ϕsx)ds)\Phi^f_t(x,y)=(\phi_tx,y+\int_0^t f(\phi_sx)ds), where (ϕt)tR(\phi_t)_{t\in\mathbb{R}} is a locally Hamiltonian flow of hyperbolic periodic type on SS and ff is a smooth real valued function on SS. We investigate ergodic properties of these infinite measure-preserving flows and prove that if ff belongs to a space of finite codimension in C2+ϵ(S)\mathscr{C}^{2+\epsilon}(S), then the following dynamical dichotomy holds: if there is a fixed point of (ϕt)tR(\phi_t)_{t\in\mathbb{R}} on which ff does not vanish, then (Φtf)tR(\Phi^f_t)_{t\in\mathbb{R}} is ergodic, otherwise, if ff vanishes on all fixed points, it is reducible, i.e. isomorphic to the trivial extension (Φt0)tR(\Phi^0_t)_{t\in\mathbb{R}}. The proof of this result exploits the reduction of (Φtf)tR(\Phi^f_t)_{t\in\mathbb{R}} to a skew product automorphism over an interval exchange transformation of periodic type. If there is a fixed point of (ϕt)tR(\phi_t)_{t\in\mathbb{R}} on which ff does not vanish, the reduction yields cocycles with symmetric logarithmic singularities, for which we prove ergodicity.Comment: 57 pages, 4 picture

    Multi-Level Steganography: Improving Hidden Communication in Networks

    Full text link
    The paper presents Multi-Level Steganography (MLS), which defines a new concept for hidden communication in telecommunication networks. In MLS, at least two steganographic methods are utilised simultaneously, in such a way that one method (called the upper-level) serves as a carrier for the second one (called the lower-level). Such a relationship between two (or more) information hiding solutions has several potential benefits. The most important is that the lower-level method steganographic bandwidth can be utilised to make the steganogram unreadable even after the detection of the upper-level method: e.g., it can carry a cryptographic key that deciphers the steganogram carried by the upper-level one. It can also be used to provide the steganogram with integrity. Another important benefit is that the lower-layer method may be used as a signalling channel in which to exchange information that affects the way that the upper-level method functions, thus possibly making the steganographic communication harder to detect. The prototype of MLS for IP networks was also developed, and the experimental results are included in this paper.Comment: 18 pages, 13 figure

    How Hidden Can Be Even More Hidden?

    Full text link
    The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform. We define five groups of techniques that can make steganogram less susceptible to detection and extraction. For each of the presented group, examples of the usage are provided based on existing network steganography methods. To authors' best knowledge presented approach is the first attempt in the state of the art to systematically describe general solutions that can make steganographic communication more hidden and steganogram extraction harder to perform.Comment: 5 pages, 8 figure
    corecore