{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:27:06Z","timestamp":1760243226989,"version":"build-2065373602"},"reference-count":25,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2014,4,14]],"date-time":"2014-04-14T00:00:00Z","timestamp":1397433600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Information embedding on actions is a new channel model in which a specific decoder is used to observe the actions taken by the encoder and retrieve part of the message intended for the receiver. We revisit this model and consider a different scenario where a secrecy constraint is imposed. By adding a wiretapper in the model, we aim to send the confidential message to the receiver and keep it secret from the wiretapper as much as possible. We characterize the inner and outer bounds on the capacity-equivocation region of such a channel with noncausal (and causal) channel state information. Furthermore, the lower and upper bounds on the sum secrecy capacity are also obtained. Besides, by eliminating the specific decoder, we get a new outer bound on the capacity-equivocation region of the wiretap channel with action-dependent states and prove it is tighter than the existing outer bound. A binary example is presented to illustrate the tradeoff between the sum secrecy rate and the information embedding rate under the secrecy constraint. We find that the secrecy constraint and the communication requirements of information embedding have a negative impact on improving the secrecy transmission rate of the given communication link.<\/jats:p>","DOI":"10.3390\/e16042105","type":"journal-article","created":{"date-parts":[[2014,4,14]],"date-time":"2014-04-14T12:54:41Z","timestamp":1397480081000},"page":"2105-2130","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Wiretap Channel with Information Embedding on Actions"],"prefix":"10.3390","volume":"16","author":[{"given":"Xinxing","family":"Yin","sequence":"first","affiliation":[{"name":"Electronic Engineering Department, Shanghai Jiao Tong University, Dongchuan Road 800, Shanghai 200240, China"}]},{"given":"Zhi","family":"Xue","sequence":"additional","affiliation":[{"name":"Electronic Engineering Department, Shanghai Jiao Tong University, Dongchuan Road 800, Shanghai 200240, China"}]}],"member":"1968","published-online":{"date-parts":[[2014,4,14]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"5396","DOI":"10.1109\/TIT.2010.2068991","article-title":"Capacity of channels with action-dependent states","volume":"56","author":"Weissman","year":"2010","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"7317","DOI":"10.1109\/TIT.2011.2162089","article-title":"Probing capacity","volume":"57","author":"Asnani","year":"2011","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Steinberg, Y., and Weissman, T. (2012, January 1\u20136). The degraded broadcast channel with action-dependent states. Boston, MA, USA.","DOI":"10.1109\/ISIT.2012.6284261"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Steinberg, Y. (2013, January 7\u201312). The degraded broadcast channel with non-causal action-dependent side information. Istanbul, Turkey.","DOI":"10.1109\/ISIT.2013.6620769"},{"key":"ref_5","unstructured":"Ahmadi, B., and Simeone, O. On channels with action-dependent states. arXiv:1202.4438 Available online: http:\/\/arxiv.org\/abs\/1202.4438."},{"key":"ref_6","unstructured":"Asnani, H., Permuter, H., and Weissman, T. (October, January 29). To observe or not to observe the channel state. Monticello, IL, USA."},{"key":"ref_7","unstructured":"Kittichokechai, K., Oechtering, T.J., and Skoglund, M. (, January 19\u201321). Capacity of the channel with action-dependent state and reversible input. Stockholm, Swedish."},{"key":"ref_8","unstructured":"Kittichokechai, K., Oechtering, T.J., and Skoglund, M. Coding with action-dependent side information and additional reconstruction requirements. arXiv:1202.1484 Available online: http:\/\/arxiv.org\/abs\/1202.1484."},{"key":"ref_9","unstructured":"Choudhuri, C., and Mitra, U. Action dependent strictly causal state communication. arXiv:1202.0934. Available online: http:\/\/arxiv.org\/abs\/1202.0934."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Choudhuri, C., and Mitra, U. (2012, January 3\u20137). How useful is adaptive action?. Anaheim, CA, USA.","DOI":"10.1109\/GLOCOM.2012.6503450"},{"key":"ref_11","unstructured":"Ahmadi, B., Asnani, H., Simeone, O., and Permuter, H. (July, January 7\u2013). Information embedding on actions. Istanbul, Turkey."},{"key":"ref_12","unstructured":"Ahmadi, B., Asnani, H., Simeone, O., and Permuter, H. Information embedding on actions. arXiv:1207.6084 Available online: http:\/\/arxiv.org\/abs\/1207.6084."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1109\/5.771065","article-title":"Information hiding\u2014A survey","volume":"87","author":"Petitcolas","year":"1999","journal-title":"Proc. IEEE"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1109\/TIT.2002.808134","article-title":"Information-theoretic analysis of information hiding","volume":"49","author":"Moulin","year":"2003","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_15","unstructured":"O\u2019Sullivan, J.A., Moulin, P., and Ettinger, J.M. (1998, January 16\u201321). Information theoretic analysis of steganography. Cambridge, MA, USA."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/TIFS.2008.2009588","article-title":"Coding schemes for relay-assisted information embedding","volume":"4","author":"Zaidi","year":"2009","journal-title":"IEEE Trans. Inf. Forensics Secur"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"2974","DOI":"10.1109\/TSP.2007.893973","article-title":"Broadcast- and MAC-aware coding strategies for multiple user information embedding","volume":"55","author":"Zaidi","year":"2007","journal-title":"IEEE Trans. Signal Process"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"445","DOI":"10.3390\/e15020445","article-title":"Wiretap channel with action-dependent channel state information","volume":"15","author":"Dai","year":"2013","journal-title":"Entropy"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Dai, B., Vinck, A.J.H., and Luo, Y. (2013). Wiretap channel in the presence of action-dependent states and noiseless feedback. J. Appl. Math, 2013.","DOI":"10.1155\/2013\/423619"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1671","DOI":"10.3390\/e14091671","article-title":"Some new results on the wiretap channel with side information","volume":"14","author":"Dai","year":"2013","journal-title":"Entropy"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Le Treust, M., Zaidi, A., and Lasaulce, S. (2011, January 28\u201330). An achievable rate region for the broadcast wiretap channel with asymmetric side information. Monticello, IL, USA.","DOI":"10.1109\/Allerton.2011.6120151"},{"key":"ref_22","first-page":"19","article-title":"Coding for channel with random parameters","volume":"9","author":"Pinsker","year":"1980","journal-title":"Probl. Control Inf. Theory"},{"key":"ref_23","unstructured":"Cover, T.M. (1991). Elements of Information Theory, Wiley."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"El Gamal, A., and Kim, Y. (2011). Network Information Theory, Cambridge University Press.","DOI":"10.1017\/CBO9781139030687"},{"key":"ref_25","unstructured":"Csisz\u00e1r, I., and K\u00f6ner, J. (1981). Information Theory: Coding Theorems for Discrete Memoryless Systems, Academic Press."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/16\/4\/2105\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T21:10:15Z","timestamp":1760217015000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/16\/4\/2105"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,14]]},"references-count":25,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2014,4]]}},"alternative-id":["e16042105"],"URL":"https:\/\/doi.org\/10.3390\/e16042105","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2014,4,14]]}}}