We consider the distributed source coding system for L correlated Gaussian remote sources X i , i = 1, 2,···, L, where X i , i = 1, 2, ·, L are L correlated Gaussian random variables. We deal with ...
详细信息
We consider the distributed source coding system for L correlated Gaussian remote sources X i , i = 1, 2,···, L, where X i , i = 1, 2, ·, L are L correlated Gaussian random variables. We deal with the case where each of L distributed encoders can not directly observe X i but its noisy version Y i = X i +N i . Here N i , i = 1,2,···, L are independent additive L Gaussian noises also independent of X i , i = 1, 2,···, L. On this coding system the determination problem of the rate distortion region remains open. In our previous works, we derived explicit outer and inner bounds of the rate distortion region and explicit sufficient condition for those two to match. In this paper we derive a stronger sufficient condition for the inner and outer bound to match. We further study the sum rate part of the rate distortion region when the correlation has some symmetrical property and derive a new lower bound of the sum rate part. We further derive a sufficient condition for this lower bound to be tight. The derived sufficient condition depends only on the correlation property of the sources and their observations.
We consider the design of index assignments for the distributed source coding problem in large-scale sensor networks. Using basic tools from number theory, specifically Diophantine analysis, we provide a framework for...
详细信息
We consider the design of index assignments for the distributed source coding problem in large-scale sensor networks. Using basic tools from number theory, specifically Diophantine analysis, we provide a framework for constructing cyclic index assignments that have very low complexity yet perform very close to fundamental bounds provided by rate-distortion theory.
Lossy source coding under the mean-squared error fidelity criterion is considered. The rate-distortion function can be expressed in closed form only for very special cases, including Gaussian sources. The classical up...
详细信息
Lossy source coding under the mean-squared error fidelity criterion is considered. The rate-distortion function can be expressed in closed form only for very special cases, including Gaussian sources. The classical upper and lower bounds look exactly alike, except that the upper bound has the source power (variance) whereas the lower bound has the source entropy-power. This pleasing duality of power and entropy-power extends to the case of remote source coding, i.e., the case where the encoder only gets to observe the source through a noisy channel. Bounds are presented both for the centralized and for the distributed case, often referred to as the CEO problem.
We consider the rate distortion problem with side information at the decoder posed and investigated by Wyner and Ziv. The rate distortion function indicating the trade-off between the rate on the data compression and ...
详细信息
We consider the rate distortion problem with side information at the decoder posed and investigated by Wyner and Ziv. The rate distortion function indicating the trade-off between the rate on the data compression and the quality of data obtained at the decoder was determined by Wyner and Ziv. In this paper, we study the error probability of decoding at rates below the rate distortion function. We evaluate the probability of decoding such that the estimation of source outputs by the decoder has a distortion not exceeding a prescribed distortion level. We prove that when the rate of the data compression is below the rate distortion function this probability goes to zero exponentially and derive an explicit lower bound of this exponent function. On the Wyner-Ziv source coding problem the strong converse coding theorem has not been established yet. We prove this as a simple corollary of our result.
This work investigates the problem of lossless compression of two arbitrarily correlated memoryless sources in an instance of Heegard-Berger problem with degraded reconstruction sets. Specifically, one of the sources ...
详细信息
This work investigates the problem of lossless compression of two arbitrarily correlated memoryless sources in an instance of Heegard-Berger problem with degraded reconstruction sets. Specifically, one of the sources is to be reproduced losslessly by two separate decoders, and the other one is to be reproduced losslessly by only one of the two decoders. The decoders observe side information sequences that are arbitrarily correlated among them, and with the sources. We establish a single-letter characterization of the optimal compression rate of this model. We also discuss several examples, and highlight the utility of an appropriate joint compression of the two sources for it to be optimal.
This paper addresses the problem of distributed source coding (DSC) of binary sources with unknown varying correlation statistics over erasure channels. We propose an adaptive asymmetric Slepian-Wolf (SW) decoding sch...
详细信息
This paper addresses the problem of distributed source coding (DSC) of binary sources with unknown varying correlation statistics over erasure channels. We propose an adaptive asymmetric Slepian-Wolf (SW) decoding scheme using particle-based belief propagation (BP) based on Raptor codes. We show through the experiments that the proposed algorithm can simultaneously reconstruct the compressed sources and estimate the correlation between source and side information. Moreover, compared to the conventional Raptor decoder, the proposed approach can achieve a higher compression ratio and provide stronger erasure protection under unknown varying correlation statistics. The ability to estimate the statistical correlation in the code structure makes our approach very useful for real applications.
This paper investigates analytically and experimentally the rate (transmitted bandwidth) versus signal distortion introduced by transmitting and reconstructing the signal from the quantized LMS prediction residual. Th...
详细信息
This paper investigates analytically and experimentally the rate (transmitted bandwidth) versus signal distortion introduced by transmitting and reconstructing the signal from the quantized LMS prediction residual. The contribution of this paper is the analytical determination of the received signal distortion as a function of quantizer wordlength (which determines the transmitted bit rate), LMS filter parameters and input signal correlation properties. This distortion is computable for both the transient adaptation stage and in the steady state converged stage.
We propose a method for constructing rate-adaptive low-density parity check (LDPC) codes with large girth by syndrome merging with progressive-edge-growth (PEG) algorithm. Proposed scheme has a different structure fro...
详细信息
We propose a method for constructing rate-adaptive low-density parity check (LDPC) codes with large girth by syndrome merging with progressive-edge-growth (PEG) algorithm. Proposed scheme has a different structure from LDPC accumulate (LDPCA) codes. As a result, the new construction method turns the girth up for each specific code, and eliminates error floor.
Consider a source, {X-i, Y-i}(i=1)(infinity) producing independent copies of a pair of jointly distributed random variables (RVs). The {X-i} part of the process is observed at some location, say A, and is supposed to ...
详细信息
Consider a source, {X-i, Y-i}(i=1)(infinity) producing independent copies of a pair of jointly distributed random variables (RVs). The {X-i} part of the process is observed at some location, say A, and is supposed to be reproduced at a different location, say B, where the {Y-i} part of the process is observed. Similarly, {Y-i} should be reproduced at location A. The communication between the two locations is carried out across two memoryless channels in K iterative bi-directional rounds. In each round, the source components are reconstructed at the other locations based on the information exchanged in all previous rounds and the source component known at that location, and it is desired to find the amount of information that should be exchanged between the two locations in each round, so that the distortions incurred (in each round) will not exceed given thresholds. Our setting extends the results of Steinberg and Merhav as well as Kaspi, combining the notion of successive refinement with this of two-way interactive communication. We first derive a single-letter characterization of achievable rates for a pure source-coding problem with successive refinement. Then, for a joint source-channel coding setting, we prove a separation theorem, asserting that in the limit of long blocks, no optimality is lost by first applying lossy (two-way) successive-refinement source coding, regardless of the channels, and then applying good channel codes to each one of the resulting bitstreams, regardless of the source.
Digital data hiding is a technology being developed for multimedia services, where significant amounts of secure data is invisibly hidden inside a host data source by the owner for retrieval only by those authorized. ...
详细信息
Digital data hiding is a technology being developed for multimedia services, where significant amounts of secure data is invisibly hidden inside a host data source by the owner for retrieval only by those authorized. The hidden data should be recoverable even after the host has undergone standard transformations, such as compression. In this paper, we present a source and channel coding framework for data hiding, allowing any tradeoff between the visibility of distortions introduced, the amount of data embedded, and the degree of robustness to noise, The secure data is source coded by vector quantization, and the indices obtained in the process are embedded in the host video using orthogonal transform domain vector perturbations, Transform coefficients of the host are grouped into vectors and perturbed using noise-resilient channel codes derived from multidimensional lattices. The perturbations are constrained by a maximum allowable mean-squared error that can be introduced in the host. Channel-optimized VQ can be used for increased robustness to noise. The generic approach is readily adapted to make retrieval possible for applications where the original host is not available to the retriever. The secure data in our implementations are low spatial and temporal resolution video, and sampled speech, while the host data is QCIF video. The host video with the embedded data is H.263 compressed, before attempting retrieval of the hidden video and speech from the reconstructed video. The quality of the extracted video and speech is shown for varying compression ratios of the host video.
暂无评论