150,032 research outputs found
Low-Latency Short-Packet Transmissions: Fixed Length or HARQ?
We study short-packet communications, subject to latency and reliability
constraints, under the premises of limited frequency diversity and no time
diversity. The question addressed is whether, and when, hybrid automatic repeat
request (HARQ) outperforms fixed-blocklength schemes with no feedback (FBL-NF)
in such a setting. We derive an achievability bound for HARQ, under the
assumption of a limited number of transmissions. The bound relies on
pilot-assisted transmission to estimate the fading channel and scaled
nearest-neighbor decoding at the receiver. We compare our achievability bound
for HARQ to stateof-the-art achievability bounds for FBL-NF communications and
show that for a given latency, reliability, number of information bits, and
number of diversity branches, HARQ may significantly outperform FBL-NF. For
example, for an average latency of 1 ms, a target error probability of 10^-3,
30 information bits, and 3 diversity branches, the gain in energy per bit is
about 4 dB.Comment: 6 pages, 5 figures, accepted to GLOBECOM 201
Reversible Data Hiding in Encrypted Images Using MSBs Integration and Histogram Modification
This paper presents a reversible data hiding in encrypted image that employs
based notions of the RDH in plain-image schemes including histogram
modification and prediction-error computation. In the proposed method, original
image may be encrypted by desire encryption algorithm. Most significant bit
(MSB) of encrypted pixels are integrated to vacate room for embedding data
bits. Integrated ones will be more resistant against failure of reconstruction
if they are modified for embedding data bits. At the recipient, we employ
chess-board predictor for lossless reconstruction of the original image by the
aim of prediction-error analysis. Comparing to existent RDHEI algorithms, not
only we propose a separable method to extract data bits, but also content-owner
may attain a perfect reconstruction of the original image without having data
hider key. Experimental results confirm that the proposed algorithm outperforms
state of the art ones
- …