1,052 research outputs found
On cocycles with values in the group SU(2)
In this paper we introduce the notion of degree for -cocycles over
irrational rotations on the circle with values in the group SU(2). It is shown
that if a -cocycle over an irrational rotation by
has nonzero degree, then the skew product is not ergodic and
the group of essential values of is equal to the maximal Abelian
subgroup of SU(2). Moreover, if is of class (with some additional
assumptions) the Lebesgue component in the spectrum of the skew product has
countable multiplicity. Possible values of degree are discussed, too.Comment: 30 page
Ergodic properties of infinite extensions of area-preserving flows
We consider volume-preserving flows on , where is a closed connected surface of genus and
has the form , where is a locally Hamiltonian flow
of hyperbolic periodic type on and is a smooth real valued function on
. We investigate ergodic properties of these infinite measure-preserving
flows and prove that if belongs to a space of finite codimension in
, then the following dynamical dichotomy holds: if
there is a fixed point of on which does not
vanish, then is ergodic, otherwise, if
vanishes on all fixed points, it is reducible, i.e. isomorphic to the trivial
extension . The proof of this result exploits the
reduction of to a skew product automorphism over
an interval exchange transformation of periodic type. If there is a fixed point
of on which does not vanish, the reduction
yields cocycles with symmetric logarithmic singularities, for which we prove
ergodicity.Comment: 57 pages, 4 picture
Multi-Level Steganography: Improving Hidden Communication in Networks
The paper presents Multi-Level Steganography (MLS), which defines a new
concept for hidden communication in telecommunication networks. In MLS, at
least two steganographic methods are utilised simultaneously, in such a way
that one method (called the upper-level) serves as a carrier for the second one
(called the lower-level). Such a relationship between two (or more) information
hiding solutions has several potential benefits. The most important is that the
lower-level method steganographic bandwidth can be utilised to make the
steganogram unreadable even after the detection of the upper-level method:
e.g., it can carry a cryptographic key that deciphers the steganogram carried
by the upper-level one. It can also be used to provide the steganogram with
integrity. Another important benefit is that the lower-layer method may be used
as a signalling channel in which to exchange information that affects the way
that the upper-level method functions, thus possibly making the steganographic
communication harder to detect. The prototype of MLS for IP networks was also
developed, and the experimental results are included in this paper.Comment: 18 pages, 13 figure
How Hidden Can Be Even More Hidden?
The paper presents Deep Hiding Techniques (DHTs) that define general
techniques that can be applied to every network steganography method to improve
its undetectability and make steganogram extraction harder to perform. We
define five groups of techniques that can make steganogram less susceptible to
detection and extraction. For each of the presented group, examples of the
usage are provided based on existing network steganography methods. To authors'
best knowledge presented approach is the first attempt in the state of the art
to systematically describe general solutions that can make steganographic
communication more hidden and steganogram extraction harder to perform.Comment: 5 pages, 8 figure
- …
