We investigate two source coding problems with secrecy constraints. In the first problem we consider real-time fully secure transmission of a memoryless source. We show that although classical variable-rate coding is ...
详细信息
We investigate two source coding problems with secrecy constraints. In the first problem we consider real-time fully secure transmission of a memoryless source. We show that although classical variable-rate coding is not an option since the lengths of the codewords leak information on the source, the key rate can be as low as the average Huffman codeword length of the source. In the second problem we consider causal source coding with a fidelity criterion and side information at the decoder and the eavesdropper. We show that when the eavesdropper has degraded side information, it is optimal to first use a causal rate distortion code and then encrypt its output with a key.
A description is given of studies of source coding in the specialists group on coding for visual telephony in CCITT SG XV. Using a macro block approach, the source coding algorithm will have the capability of operatin...
详细信息
A description is given of studies of source coding in the specialists group on coding for visual telephony in CCITT SG XV. Using a macro block approach, the source coding algorithm will have the capability of operating from 64 kb/s for videophone applications up to 2 Mb/s for high-quality videoconferencing applications. The authors describe the existing reference model and the evolution toward the latest reference model (RM5), which is going to be submitted for standardization. Theoretical information is provided and some examples for possible improvements are presented for the most important techniques used in the reference model, among which are quantization, variable block size, scanning classes, loop filter, entropy coding, multiple vs. single variable-length coding, and block-type discrimination.< >
This paper investigates a source coding problem in which two terminals communicating through a relay wish to estimate one another's source within some distortion constraint. The relay has access to side informatio...
详细信息
ISBN:
(纸本)9781479902460
This paper investigates a source coding problem in which two terminals communicating through a relay wish to estimate one another's source within some distortion constraint. The relay has access to side information that is correlated with the sources. Two different schemes based on the order of communication, distributed source coding/delivery and two cascaded rounds, are proposed and inner and outer bounds for the resulting rate-distortion regions are provided. Examples are provided to show that neither rate-distortion region includes the other one.
One-shot achievable rate region for source coding when coded side information is available at the decoder (source coding with a helper) is proposed. The achievable region proposed is in terms of conditional smooth max...
详细信息
ISBN:
(纸本)9781479904440
One-shot achievable rate region for source coding when coded side information is available at the decoder (source coding with a helper) is proposed. The achievable region proposed is in terms of conditional smooth max Rényi entropy and smooth max Rényi divergence. Asymptotically (in the limit of large block lengths) this region is quantified in terms of spectral-sup conditional entropy rate and spectral-sup mutual information rate. In particular, it coincides with the rate region derived in the limit of unlimited arbitrarily distributed copies of the sources.
We consider secure multi-terminal source coding problems in the presence of a public helper. Two main scenarios are studied: 1) source coding with a helper where the coded side information from the helper is eavesdrop...
详细信息
ISBN:
(纸本)9781479904440
We consider secure multi-terminal source coding problems in the presence of a public helper. Two main scenarios are studied: 1) source coding with a helper where the coded side information from the helper is eavesdropped by an external eavesdropper, 2) triangular source coding with a helper where the helper is considered as a public terminal. We are interested in how the helper can support the source transmission subject to a constraint on the amount of information leaked due to its public nature. We characterize the tradeoff between transmission rate, incurred distortion, and information leakage rate at the helper/eavesdropper in the form of a rate-distortion-leakage region for various classes of problems.
A novel lossless source coding paradigm applies to problems of unreliable lossless channels with low bit rates, in which a vital message needs to be transmitted prior to termination of communications. This paradigm ca...
详细信息
ISBN:
(纸本)142440505X
A novel lossless source coding paradigm applies to problems of unreliable lossless channels with low bit rates, in which a vital message needs to be transmitted prior to termination of communications. This paradigm can be applied to Alfred Renyi's secondhand account of an ancient siege in which a spy was sent to scout the enemy but was captured. After escaping, the spy returned to his base in no condition to speak and unable to write. His commander asked him questions that he could answer by nodding or shaking his head, and the fortress was defended with this information. Renyi told this story with reference to prefix coding, but maximizing probability of survival in the siege scenario is distinct from yet related to the traditional source coding objective of minimizing expected codeword length. Rather than finding a code minimizing expected codeword length Xi n i=1 p(i)l(i), the siege problem involves maximizing Xi n i=1 p(i)thetas l(i) for a known thetas isin (0,1). When there are no restrictions on codewords, this problem can be solved using a known generalization of Huffman coding. The optimal solution has coding bounds which are functions of Renyi entropy; in addition to known bounds, new bounds are derived here. The alphabetically constrained version of this problem has applications in search trees and diagnostic testing. A novel dynamic programming algorithm - based upon the oldest known algorithm for the traditional alphabetic problem - optimizes this problem in O(n 3 ) time and O(n 2 ) space, whereas two novel approximation algorithms can find a suboptimal solution faster: one in linear time, the other in O(n log n). coding bounds for the alphabetic version of this problem are also presented
Various authors have obtained state-of-the-art results in lossy source coding by applying algorithms based on a combination of message-passing and decimation to low-density generator matrix codes, but to date, theoret...
详细信息
Various authors have obtained state-of-the-art results in lossy source coding by applying algorithms based on a combination of message-passing and decimation to low-density generator matrix codes, but to date, theoretical understanding of these procedures has been limited. We show that certain forms of soft decimation can be understood as iterative procedures for attempting to maximize a cost function of the node biases. This variational characterization allows us to exhibit appropriate choices of stepsize that ensure convergence to a fixed point, and to provide guarantees on the distortion of the encoding obtained from the fixed point for the case of symmetric Bernoulli sources. Our analysis applies to both an oracle form of soft decimation, in which exact marginals can be computed, and a practical form based on the (reweighted) sum-product algorithm.
In this paper, we propose a scheme for distributed source coding (DSC) that achieves any arbitrary rate on the Slepian-Wolf rate region using a single systematic LDPC code. This method is based on sending a fraction o...
详细信息
In this paper, we propose a scheme for distributed source coding (DSC) that achieves any arbitrary rate on the Slepian-Wolf rate region using a single systematic LDPC code. This method is based on sending a fraction of the information bits along with a fraction of parity bits generated by the LDPC code. First, we study the problem of DSC of two correlated sources at the symmetric rate. We propose to use nonuniform LDPC codes for this application. Then, we generalize our approach to any arbitrary rate. The detailed construction of this scheme is investigated. We illustrate that the design procedure for the LDPC code simplifies to the design of rate-adaptive LDPC codes that need unequal error protection. It is shown that the performance of DSC at any arbitrary rate is almost the same as that of asymmetric rates. Because of the proposed decoding algorithm, each of the sources is decoded independently (only part of the information bits are being exchanged between the decoders). Therefore, this approach does not suffer from the problems of heavy damage or propagation of errors. This method can be easily applied to joint source-channel coding.
Serially concatenated and iteratively decoded irregular variable length coding (IrVLC) combined with preceded fast frequency hopping (FFH) M-ary frequency shift keying (MFSK) is considered. The proposed joint source a...
详细信息
Serially concatenated and iteratively decoded irregular variable length coding (IrVLC) combined with preceded fast frequency hopping (FFH) M-ary frequency shift keying (MFSK) is considered. The proposed joint source and channel coding scheme is capable of low signal-to-noise ratio (SNR) operation in Rayleigh fading channels contaminated by partial band noise jamming (PBNJ). The IrVLC scheme is comprised of a number of component variable length coding (VLC) codebooks employing different coding rates for encoding particular fractions of the input source symbol stream. These fractions may be chosen with the aid of extrinsic information transfer (EXIT) charts in order to shape the inverted EXIT curve of the IrVLC codec so that it can be matched with the EXIT curve of the inner decoder. We demonstrate that using the proposed scheme near-zero bit error ratio may be achieved at low SNR values and the IrVLC based scheme yields a further gain of up to 0.3 dB over the identical-rate single-class VLC based benchmarker scheme
暂无评论