32 research outputs found

    Quantum wiretap channel with non-uniform random number and its exponent and equivocation rate of leaked information

    Full text link
    A usual code for quantum wiretap channel requires an auxiliary random variable subject to the perfect uniform distribution. However, it is difficult to prepare such an auxiliary random variable. We propose a code that requires only an auxiliary random variable subject to a non-uniform distribution instead of the perfect uniform distribution. Further, we evaluate the exponential decreasing rate of leaked information and derive its equivocation rate. For practical constructions, we also discuss the security when our code consists of a linear error correcting code

    Universal Hashing for Information Theoretic Security

    Full text link
    The information theoretic approach to security entails harnessing the correlated randomness available in nature to establish security. It uses tools from information theory and coding and yields provable security, even against an adversary with unbounded computational power. However, the feasibility of this approach in practice depends on the development of efficiently implementable schemes. In this article, we review a special class of practical schemes for information theoretic security that are based on 2-universal hash families. Specific cases of secret key agreement and wiretap coding are considered, and general themes are identified. The scheme presented for wiretap coding is modular and can be implemented easily by including an extra pre-processing layer over the existing transmission codes.Comment: Corrected an error in the proof of Lemma

    Minimization on mixture family

    Full text link
    Iterative minimization algorithms appear in various areas including machine learning, neural network, and information theory. The em algorithm is one of the famous one in the former area, and Arimoto-Blahut algorithm is a typical one in the latter area. However, these two topics had been separately studied for a long time. In this paper, we generalize an algorithm that was recently proposed in the context of Arimoto-Blahut algorithm. Then, we show various convergence theorems, one of which covers the case when each iterative step is done approximately. Also, we apply this algorithm to the target problem in em algorithm, and propose its improvement. In addition, we apply it to other various problems in information theory

    Analytical Characterization and Optimum Detection of Nonlinear Multicarrier Schemes

    Get PDF
    It is widely recognized that multicarrier systems such as orthogonal frequency division multiplexing (OFDM) are suitable for severely time-dispersive channels. However, it is also recognized that multicarrier signals have high envelope fluctuations which make them especially sensitive to nonlinear distortion effects. In fact, it is almost unavoidable to have nonlinear distortion effects in the transmission chain. For this reason, it is essential to have a theoretical, accurate characterization of nonlinearly distorted signals not only to evaluate the corresponding impact of these distortion effects on the system’s performance, but also to develop mechanisms to combat them. One of the goals of this thesis is to address these challenges and involves a theoretical characterization of nonlinearly distorted multicarrier signals in a simple, accurate way. The other goal of this thesis is to study the optimum detection of nonlinearly distorted, multicarrier signals. Conventionally, nonlinear distortion is seen as a noise term that degrades the system’s performance, leading even to irreducible error floors. Even receivers that try to estimate and cancel it have a poor performance, comparatively to the performance associated to a linear transmission, even with perfect cancellation of nonlinear distortion effects. It is shown that the nonlinear distortion should not be considered as a noise term, but instead as something that contains useful information for detection purposes. The adequate receiver to take advantage of this information is the optimum receiver, since it makes a block-by-block detection, allowing us to exploit the nonlinear distortion which is spread along the signal’s band. Although the optimum receiver for nonlinear multicarrier schemes is too complex, due to its necessity to compare the received signal with all possible transmitted sequences, it is important to study its potential performance gains. In this thesis, it is shown that the optimum receiver outperforms the conventional detection, presenting gains not only relatively to conventional receivers that deal with nonlinear multicarrier signals, but also relatively to conventional receivers that deal with linear, multicarrier signals. We also present sub-optimum receivers which are able to approach the performance gains associated to the optimum detection and that can even outperform the conventional linear, multicarrier schemes

    Engineering evaluations and studies. Volume 3: Exhibit C

    Get PDF
    High rate multiplexes asymmetry and jitter, data-dependent amplitude variations, and transition density are discussed

    Compression of digital images over local area networks. Appendix 1: Item 3

    Get PDF
    Differential Pulse Code Modulation (DPCM) has been used with speech for many years. It has not been as successful for images because of poor edge performance. The only corruption in DPC is quantizer error but this corruption becomes quite large in the region of an edge because of the abrupt changes in the statistics of the signal. We introduce two improved DPCM schemes; Edge correcting DPCM and Edge Preservation Differential Coding. These two coding schemes will detect the edges and take action to correct them. In an Edge Correcting scheme, the quantizer error for an edge is encoded using a recursive quantizer with entropy coding and sent to the receiver as side information. In an Edge Preserving scheme, when the quantizer input falls in the overload region, the quantizer error is encoded and sent to the receiver repeatedly until the quantizer input falls in the inner levels. Therefore these coding schemes increase the bit rate in the region of an edge and require variable rate channels. We implement these two variable rate coding schemes on a token wing network. Timed token protocol supports two classes of messages; asynchronous and synchronous. The synchronous class provides a pre-allocated bandwidth and guaranteed response time. The remaining bandwidth is dynamically allocated to the asynchronous class. The Edge Correcting DPCM is simulated by considering the edge information under the asynchronous class. For the simulation of the Edge Preserving scheme, the amount of information sent each time is fixed, but the length of the packet or the bit rate for that packet is chosen depending on the availability capacity. The performance of the network, and the performance of the image coding algorithms, is studied

    Adaptive data acquisition for communication networks

    Get PDF
    In an increasing number of communication systems, such as sensor networks or local area networks within medical, financial or military institutions, nodes communicate information sources (e.g., video, audio) over multiple hops. Moreover, nodes have, or can acquire, correlated information sources from the environment, e.g., from data bases or from measurements. Among the new design problems raised by the outlined scenarios, two key issues are addressed in this dissertation: 1) How to preserve the consistency of sensitive information across multiple hops; 2) How to incorporate the design of actuation in the form of data acquisition and network probing in the optimization of the communication network. These aspects are investigated by using information-theoretic (source and channel coding) models, obtaining fundamental insights that have been corroborated by various illustrative examples. To address point 1), the problem of cascade source coding with side information is investigated. The motivating observation is that, in this class of problems, the estimate of the source obtained at the decoder cannot be generally reproduced at the encoder if it depends directly on the side information. In some applications, such as the one mentioned above, this lack of consistency may be undesirable, and a so called Common Reconstruction (CR) requirement, whereby one imposes that the encoder be able to agree on the decoder’s estimate, may be instead in order. The rate-distortion region is here derived for some special cases of the cascade source coding problem and of the related Heegard-Berger (HB) problem under the CR constraint. As for point 2), the work is motivated by the fact that, in order to enable, or to facilitate, the exchange of information, nodes of a communication network routinely take various types of actions, such as data acquisition or network probing. For instance, sensor nodes schedule the operation of their sensing devices to measure given physical quantities of interest, and wireless nodes probe the state of the channel via training. The problem of optimal data acquisition is studied for a cascade source coding problem, a distributed source coding problem and a two-way source coding problem assuming that the side information sequences can be controlled via the selection of cost-constrained actions. It is shown that a joint design of the description of the source and of the control signals used to guide the selection of the actions at downstream nodes is generally necessary for an efficient use of the available communication links. Instead, the problem of optimal channel probing is studied for a broadcast channel and a point-to-point link in which the decoder is interested in estimating not only the message, but also the state sequence. Finally, the problem of embedding information on the actions is studied for both the source and the channel coding set-ups described above
    corecore