12,710 research outputs found

    Algebraic Structures for Multi-Terminal Communication Systems.

    Full text link
    We study a distributed source coding problem with multiple encoders, a central decoder and a joint distortion criterion. The encoders do not communicate with each other. The encoders observe correlated sources which they quantize and communicate noiselessly to a central decoder which is interested in minimizing a joint distortion criterion that depends on the sources and the reconstruction. We are interested in characterizing an inner bound to the optimal rate-distortion region. We first consider a special case where the sources are jointly Gaussian and the decoder wants to reconstruct a linear function of the sources under mean square error distortion. We demonstrate a coding scheme involving nested lattice codes that reconstructs the linear function by encoding in such a fashion that the decoder is able to reconstruct the function directly. For certain source distributions, this approach yields a larger rate-distortion region compared to when the decoder reconstructs lossy versions of the sources first and then estimates the function from them. We then extend this approach to the case of reconstructing a linear function of an arbitrary number of jointly Gaussian sources. Next, we consider the general distributed source coding problem with discrete sources. This formulation includes as a special case many famous distributed source coding problems. We present a new achievable rate-distortion region for this problem based on “good” structured nested random codes built over abelian groups. We demonstrate rate gains for this problem over traditional coding schemes using unstructured random codes. For certain sources and distortion functions, the new rate region is strictly bigger than the Berger-Tung rate region, which has been the best known achievable rate region for the problem till now. Further, there is no known way of achieving these rate gains without exploiting the structure of the coding scheme. Achievable performance limits for single-user source coding using abelian group codes are also obtained as corollaries of the main coding theorem. Our results also imply that nested linear codes achieve the Shannon rate-distortion bound in the single-user setting. Finally, we conclude by outlining some future research directions.Ph.D.Electrical Engineering: SystemsUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/75917/1/dineshk_1.pd

    On Causal Video Coding with Possible Loss of the First Encoded Frame

    Get PDF
    Multiple Description Coding (MDC) was fi rst formulated by A. Gersho and H. Witsenhausen as a way to improve the robustness of telephony links to outages. Lots of studies have been done in this area up to now. Another application of MDC is the transmission of an image in diff erent descriptions. If because of the link outage during transmission, any one of the descriptions fails, the image could still be reconstructed with some quality at the decoder side. In video coding, inter prediction is a way to reduce temporal redundancy. From an information theoretical point of view, one can model inter prediction with Causal Video Coding (CVC). If because of link outage, we lose any I-frame, how can we reconstruct the corresponding P- or B-frames at the decoder? In this thesis, we are interested in answering this question and we call this scenario as causal video coding with possible loss of the fi rst encoded frame and we denote it by CVC-PL as PL stands for possible loss. In this thesis for the fi rst time, CVC-PL is investigated. Although, due to lack of time, we mostly study two-frame CVC-PL, we extend the problem to M-frame CVC-PL as well. To provide more insight into two-frame CVC-PL, we derive an outer-bound to the achievable rate-distortion sets to show that CVC-PL is a subset of the region combining CVC and peer-to-peer coding. In addition, we propose and prove a new achievable region to highlight the fact that two-frame CVC-PL could be viewed as MDC followed by CVC. Afterwards, we present the main theorem of this thesis, which is the minimum total rate of CVC-PL with two jointly Gaussian distributed sources, i.e. X1 and X2 with normalized correlation coeffi cient r, for di fferent distortion pro files (D1,D2,D3). Defi ning Dr = r^2(D1 -1) + 1, we show that for small D3, i.e. D3 < Dr +D2 -1, CVC-PL could be treated as CVC with two jointly Gaussian distributed sources; for large D3, i.e. D3 > DrD2/(Dr+D2-DrD2), CVC-PL could be treated as two parallel peer-to-peer networks with distortion constraints D1 and D2; and for the other cases of D3, the minimum total rate is 0.5 log (1+ λ)(D3+λ)/ (Dr+λ )(D2+λ ) + 0.5 log Dr/(D1D3) where λ=D3-DrD2+r[(1-D1)(1-D2)(D3-Dr)(D3-D2)]^0.5/[Dr+D2-(D3+1) ] We also determine the optimal coding scheme which achieves the minimum total rate. We conclude the thesis by comparing the scenario of CVC-PL with two frames with a coding scheme, in which both of the sources are available at the encoders, i.e. distributed source coding versus centralized source coding. We show that for small D2 or large D3, the distributed source coding can perform as good as the centralized source coding. Finally, we talk about future work and extend and formulate the problem for M sources

    Secure Multiterminal Source Coding with Side Information at the Eavesdropper

    Full text link
    The problem of secure multiterminal source coding with side information at the eavesdropper is investigated. This scenario consists of a main encoder (referred to as Alice) that wishes to compress a single source but simultaneously satisfying the desired requirements on the distortion level at a legitimate receiver (referred to as Bob) and the equivocation rate --average uncertainty-- at an eavesdropper (referred to as Eve). It is further assumed the presence of a (public) rate-limited link between Alice and Bob. In this setting, Eve perfectly observes the information bits sent by Alice to Bob and has also access to a correlated source which can be used as side information. A second encoder (referred to as Charlie) helps Bob in estimating Alice's source by sending a compressed version of its own correlated observation via a (private) rate-limited link, which is only observed by Bob. For instance, the problem at hands can be seen as the unification between the Berger-Tung and the secure source coding setups. Inner and outer bounds on the so called rates-distortion-equivocation region are derived. The inner region turns to be tight for two cases: (i) uncoded side information at Bob and (ii) lossless reconstruction of both sources at Bob --secure distributed lossless compression. Application examples to secure lossy source coding of Gaussian and binary sources in the presence of Gaussian and binary/ternary (resp.) side informations are also considered. Optimal coding schemes are characterized for some cases of interest where the statistical differences between the side information at the decoders and the presence of a non-zero distortion at Bob can be fully exploited to guarantee secrecy.Comment: 26 pages, 16 figures, 2 table

    Lecture Notes on Network Information Theory

    Full text link
    These lecture notes have been converted to a book titled Network Information Theory published recently by Cambridge University Press. This book provides a significantly expanded exposition of the material in the lecture notes as well as problems and bibliographic notes at the end of each chapter. The authors are currently preparing a set of slides based on the book that will be posted in the second half of 2012. More information about the book can be found at http://www.cambridge.org/9781107008731/. The previous (and obsolete) version of the lecture notes can be found at http://arxiv.org/abs/1001.3404v4/
    • …
    corecore