We address the problem of designing optimal quantizers for distributed source coding. The generality of our formulation includes both the symmetric and asymmetric scenarios, together with a number of coding schemes, s...
详细信息
ISBN:
(纸本)0769518966
We address the problem of designing optimal quantizers for distributed source coding. The generality of our formulation includes both the symmetric and asymmetric scenarios, together with a number of coding schemes, such as the ideal coding achieving a rate equal to the joint conditional entropy of the quantized sources given the side information. We show the optimality conditions quantizers must satisfy, and generalize the Lloyd algorithm for its design. Experimental results are shown for the Gaussian scalar asymmetric case.
A complete sufficient statistic is presented in this paper for the class of all finite-state, finite-order stationary discrete Markov processes. This sufficient statistic is complete in the sense that it summarizes in...
详细信息
A complete sufficient statistic is presented in this paper for the class of all finite-state, finite-order stationary discrete Markov processes. This sufficient statistic is complete in the sense that it summarizes in entirety the whole of the relevant information supplied by any process sample. The sufficient statistic has application to source coding problems such as source matching and calculation of the rate distortion function.
We consider the remote vector source coding problem in which a vector Gaussian source is estimated from noisy linear measurements. For this problem, we derive the performance of the compress-and-estimate (CE) coding s...
详细信息
ISBN:
(纸本)9781509030972
We consider the remote vector source coding problem in which a vector Gaussian source is estimated from noisy linear measurements. For this problem, we derive the performance of the compress-and-estimate (CE) coding scheme and compare it to the optimal performance. In the CE coding scheme, the remote encoder compresses the noisy source observations so as to minimize a local distortion measure, independent from the joint distribution between the source and the observations. In reconstruction, the decoder, having full knowledge of the joint distribution of the source and observations, estimates the original source realization from the lossy-compressed noisy observations. For the CE scheme in the vector Gaussian case, we show that, if the code rate is less than a specific threshold, then the CE coding scheme attains the same performance as the optimal coding scheme. For code rates above this threshold, we introduce lower and upper bounds on the performance gap between the CE and the optimal scheme. The case of a two-dimensional Gaussian source observed through two noisy measurements is studied to illustrate the behavior of the performance gap.
Video content constitutes today a large part of the data traffic on the Internet. This is allowed by the capillary spreading of video codec technologies: nowadays, every computer, tablet and smart phone is equipped wi...
详细信息
ISBN:
(纸本)9781479908332
Video content constitutes today a large part of the data traffic on the Internet. This is allowed by the capillary spreading of video codec technologies: nowadays, every computer, tablet and smart phone is equipped with video encoding and decoding technologies. As a matter of fact, the video content often exists in different formats, that, even though they can be incompatible to each other, still have a significant mutual redundancy. The incompatibility prevents an efficient exploitation of the scalability, which on the other hand is a very important characteristic when it comes to efficient network use. An interesting alternative to classical scalable video is to use distributed video coding (DVC) for the enhancement layers. In the envisaged scenario, clients have different decoders for the base layer, adapted to the characteristics of their device. However they can share the same enhancement layer, since DVC allows encoding frames independently from the reference that will be employed at the decoder. This approach has been considered in the past in order to improve temporal and spatial scalability. In this work we review the existing approaches, improve them using more recent DVC techniques and perform a new analysis for the emerging multi-view applications.
The main focus of this paper is on the problem of noisy source coding wherein observed signals from an inaccessible source shall be compressed. To that end, rather than resorting to the conventional methods from Rate-...
详细信息
ISBN:
(纸本)9781538647271
The main focus of this paper is on the problem of noisy source coding wherein observed signals from an inaccessible source shall be compressed. To that end, rather than resorting to the conventional methods from Rate-Distortion theory, the so-called Information Bottleneck paradigm is deployed in order to obtain a highly informative representing signal w.r.t. the given source. An efficient, generic and highly flexible graph-based message passing routine for clustering, known as the Affinity Propagation is successfully applied here as a novel treatment for that purpose. The fundamental differences and the performance-wise comparison w.r.t. the state-of-the-art KL-Means-IB algorithm is provided as well.
Let finite source and reproduction alphabets X and Y and a distortion measure d : X x Y --> [0, infinity) be given. We study the minimum asymptotic rate required to describe a source distributed over X within a (gi...
详细信息
ISBN:
(纸本)0769514774
Let finite source and reproduction alphabets X and Y and a distortion measure d : X x Y --> [0, infinity) be given. We study the minimum asymptotic rate required to describe a source distributed over X within a (given) distortion threshold D at every sample. The problem is hence a min-max problem, and the distortion measure is extended to vectors as follows: for x(n) epsilon X-n, y(n) epsilon Y-n, d(x(n), y(n)) = max, d(x(i), y(i)). In the graph-theoretic formulation we introduce, a code for the problem is a dominating set of an equivalent distortion graph, We introduce a linear programming lower bound for the minimum dominating set size of an arbitrary graph, and show that this bound is also the minimum asymptotic rate required for the corresponding source. Turning then to the optimality of scalar coding, we show that scalar codes are asymptotically optimal if the underlying graph is either an interval graph or a tree.
In many classification problems of interest, it is desirable to not only classify accurately but also to have access to the "raw data" that was used to do the classification. This naturally leads to the conc...
详细信息
In this paper we study the rate distortion trade off for source coding with side information at the decoder. This problem was posed and investigated by Wyner and Ziv. We call this problem the Wyner-Ziv source coding p...
详细信息
ISBN:
(纸本)9784885522925
In this paper we study the rate distortion trade off for source coding with side information at the decoder. This problem was posed and investigated by Wyner and Ziv. We call this problem the Wyner-Ziv source coding problem. In this paper we study the Wyner-Ziv source coding problem for a class of information sources with memory. For this class of information sources we give explicit inner and outer bounds of the rate distortion region.
The problem of secure source coding with multiple terminals is extended by considering a remote source whose noisy measurements are the correlated random variables used for secure source reconstruction. The main addit...
详细信息
ISBN:
(数字)9781665483414
ISBN:
(纸本)9781665483414
The problem of secure source coding with multiple terminals is extended by considering a remote source whose noisy measurements are the correlated random variables used for secure source reconstruction. The main additions to the problem include 1) all terminals noncausally observe a noisy measurement of the remote source;2) a private key is available to all legitimate terminals;3) the public communication link between the encoder and decoder is rate-limited;and 4) the secrecy leakage to the eavesdropper is measured with respect to the encoder input, whereas the privacy leakage is measured with respect to the remote source. Exact rate regions are characterized for a lossy source coding problem with a private key, remote source, and decoder side information under security, privacy, communication, and distortion constraints. By replacing the distortion constraint with a reliability constraint, we obtain the exact rate region also for the lossless case. Furthermore, the lossy rate region for scalar discrete-time Gaussian sources and measurement channels is established.
作者:
Sato, NKoga, HUniv Tsukuba
Masters Program Sci & Engn Tsukuba Ibaraki 3058573 Japan Univ Tsukuba
Grad Sch Syst & Informat Engn Tsukuba Ibaraki 3058573 Japan
Optimistic coding is a coding in which we require the existence of reliable codes for infinitely many block length. In this letter we consider the optimistic source coding theorems for a general source Z from the info...
详细信息
Optimistic coding is a coding in which we require the existence of reliable codes for infinitely many block length. In this letter we consider the optimistic source coding theorems for a general source Z from the information-spectrum approach. We first formulate the problem to be considered clearly. We obtain the optimistic infimum achievable source coding rate T-epsilon(Z) for the case where decoding error probability epsilon(n) is asymptotically less than or equal to an arbitrarily given epsilonis an element of [0, 1). In fact, T-epsilon(Z) turns out to be expressed in a form similar to the ordinary infimum achievable source coding rate. A new expression for T-epsilon(Z) is also given. In addition. we investigate the case where epsilon(n) = 0 for infinitely many n and obtain the infimum achievable coding rate.
暂无评论