Equivocation A Special Case of Distortion-based Characterization.

Slides:



Advertisements
Similar presentations
Derives the optimal achievable rate for MISO secondary users under coexistence constraints Proposes practical strategy for cognition and cooperation in.
Advertisements

PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Causal Secrecy: An Informed Eavesdropper.
Hybrid Codes and the Point-to-Point Channel Paul Cuff Curt Schieler.
Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA.
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Information Theory for Secrecy and Control.
Enhancing Secrecy With Channel Knowledge
Information Theoretical Security and Secure Network Coding NCIS11 Ning Cai May 14, 2011 Xidian University.
1 Distributed Source Coding Trial Lecture Fredrik Hekland 1. June 2007.
ECE Department Rice University dsp.rice.edu/cs Measurements and Bits: Compressed Sensing meets Information Theory Shriram Sarvotham Dror Baron Richard.
Recursive End-to-end Distortion Estimation with Model-based Cross-correlation Approximation Hua Yang, Kenneth Rose Signal Compression Lab University of.
Lossy Source Coding under a Maximum Distortion Constraint with Decoder Side- Information Jayanth Nayak 1, Ertem Tuncel 2, and Kenneth Rose 1 1 University.
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY A Framework for Partial Secrecy.
Reinventing Compression: The New Paradigm of Distributed Video Coding Bernd Girod Information Systems Laboratory Stanford University.
Introduction Lossless compression of grey-scale images TMW achieves world’s best lossless image compression  3.85 bpp on Lenna Reasons for performance.
1 Network Source Coding Lee Center Workshop 2006 Wei-Hsin Gu (EE, with Prof. Effros)
Distributed Video Coding Bernd Girod, Anne Margot Aagon and Shantanu Rane, Proceedings of IEEE, Jan, 2005 Presented by Peter.
On Hierarchical Type Covering Ertem Tuncel 1, Jayanth Nayak 2, and Kenneth Rose 2 1 University of California, Riverside 2 University of California, Santa.
Lattices for Distributed Source Coding - Reconstruction of a Linear function of Jointly Gaussian Sources -D. Krithivasan and S. Sandeep Pradhan - University.
Xiaohua (Edward) Li1 and E. Paul Ratazzi2
` 1 Department of Electrical Engineering, Stanford University Anne Aaron, Prashant Ramanathan and Bernd Girod Wyner-Ziv Coding of Light Fields for Random.
Distributed Video Coding Bernd Girod, Anne Margot Aaron, Shantanu Rane, and David Rebollo-Monedero IEEE Proceedings 2005.
Linear Codes for Distributed Source Coding: Reconstruction of a Function of the Sources -D. Krithivasan and S. Sandeep Pradhan -University of Michigan,
Secure Communication for Signals Paul Cuff Electrical Engineering Princeton University.
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Secure Communication for Distributed Systems.
Rate-distortion Theory for Secrecy Systems
EEET 5101 Information Theory Chapter 1
Network Coding and Information Security Raymond W. Yeung The Chinese University of Hong Kong Joint work with Ning Cai, Xidian University.
When rate of interferer’s codebook small Does not place burden for destination to decode interference When rate of interferer’s codebook large Treating.
CMPT 365 Multimedia Systems
MD-based scheme could outperform MR-based scheme while preserving the source- channel interface Rate is not sufficient as source- channel interface, ordering.
Secure Communication for Distributed Systems Paul Cuff Electrical Engineering Princeton University.
A Continuity Theory of Source Coding over Networks WeiHsin Gu, Michelle Effros, Mayank Bakshi, and Tracey Ho FLoWS PI Meeting, Washington DC, September.
Rei Safavi-Naini University of Calgary Joint work with: Hadi Ahmadi iCORE Information Security.
3D Geometry Coding using Mixture Models and the Estimation Quantization Algorithm Sridhar Lavu Masters Defense Electrical & Computer Engineering DSP GroupRice.
M S. Sandeep Pradhan University of Michigan, Ann Arbor joint work with K. Ramchandran Univ. of California, Berkeley A Comprehensive view of duality in.
Toward a Secure Data-Rate Theorem Paul Cuff. Control Setting Controller Encoder System (Plant) Sensors Rate R UiUi XiXi YiYi.
Understanding JPEG MIT-CETI Xi’an ‘99 Lecture 10 Ben Walter, Lan Chen, Wei Hu.
A Mathematical Theory of Communication Jin Woo Shin Sang Joon Kim Paper Review By C.E. Shannon.
1 Information Theory Nathanael Paul Oct. 09, 2002.
Coding Theory Efficient and Reliable Transfer of Information
Cryptography and Authentication A.J. Han Vinck Essen, 2008
Compression-based Texture Merging “ Unsupervised Segmentation of Natural Images via Lossy Data Compression ” Allen Y. Yang, John Wright, Shankar Sastry,
Superposition encoding A distorted version of is is encoded into the inner codebook Receiver 2 decodes using received signal and its side information Decoding.
Transmission over composite channels with combined source-channel outage: Reza Mirghaderi and Andrea Goldsmith Work Summary STATUS QUO A subset Vo (with.
1 Source Coding and Compression Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204, Lecture 10 Rate-Distortion.
We aim to exploit cognition to maximize network performance What is the side information at a cognitive node? What is the best encoding scheme given this.
Jayanth Nayak, Ertem Tuncel, Member, IEEE, and Deniz Gündüz, Member, IEEE.
Jayanth Nayak, Ertem Tuncel, Member, IEEE, and Deniz Gündüz, Member, IEEE.
Chapter 8 Lossy Compression Algorithms. Fundamentals of Multimedia, Chapter Introduction Lossless compression algorithms do not deliver compression.
Rate Distortion Theory. Introduction The description of an arbitrary real number requires an infinite number of bits, so a finite representation of a.
Compression for Fixed-Width Memories Ori Rottenstriech, Amit Berman, Yuval Cassuto and Isaac Keslassy Technion, Israel.
Secret Sharing in Distributed Storage Systems Illinois Institute of Technology Nexus of Information and Computation Theories Paris, Feb 2016 Salim El Rouayheb.
Secure Error-Correcting (SEC) Network Codes Raymond W. Yeung Institute of Network Coding & Department of Information Engineering The Chinese University.
Entropy estimation and lossless compression Structure and Entropy of English How much lossless compression can be achieved for a given image? How much.
Image Processing Architecture, © Oleh TretiakPage 1Lecture 5 ECEC 453 Image Processing Architecture Lecture 5, 1/22/2004 Rate-Distortion Theory,
Secret Sharing Schemes In cryptography, secret sharing schemes refers to any method for distributing a secret among a group of participants, each of which.
Refinement of Two Fundamental Tools in Information Theory Raymond W. Yeung Institute of Network Coding The Chinese University of Hong Kong Joint work with.
Information Theoretical Security
Shannon Entropy Shannon worked at Bell Labs (part of AT&T)
Secure Nested Codes for Type II Wiretap Channels
STOC: Annual ACM Symposium on the Theory of Computing
Information Theory Michael J. Watts
2018/9/16 Distributed Source Coding Using Syndromes (DISCUS): Design and Construction S.Sandeep Pradhan, Kannan Ramchandran IEEE Transactions on Information.
Acoustic Array Systems: Theory, Implementation and Application
CSE 589 Applied Algorithms Spring 1999
Using Secret Key to Foil an Eavesdropper
Distributed Compression For Binary Symetric Channels
Information Theoretical Analysis of Digital Watermarking
Compute-and-Forward Can Buy Secrecy Cheap
Lecture 11 The Noiseless Coding Theorem (Section 3.4)
Presentation transcript:

Equivocation A Special Case of Distortion-based Characterization

Wiretap Channel [Wyner 75]

Confidential Messages [Csiszar, Korner 78]

Merhav 2008

Villard-Piantanida 2010

Other Examples of rate-equivocation Gunduz-Erkip-Poor 2008 Lia-H. El-Gamal 2008 Tandon-Ulukus-Ramchandran 2009 …

Another Approach

Causal Disclosure (case 1)

Causal Disclosure (case 2)

Causal Disclosure (case 3)

What if lossy compression were defined with respect to information measures? R H(X^n|M) Not as interesting as R(D)

Log-loss Distortion Reconstruction space of Z is the set of distributions.

Best Reconstruction Yields Entropy

Result 1 from Secrecy R-D Theory

Result 2 from Secrecy R-D Theory

Result 3 from Secrecy R-D Theory

Equivocation is a blunt special case General optimal secrecy performance requires a specific encoding scheme. These equivocation bounds can be achieved with: – Random binning – Time-sharing – Almost any reasonable method

Summary Equivocation in secrecy is in general a special case of rate-distortion theory for secrecy systems with causal disclosure. The equivocation special case does not shed light on good coding structures in general.