Lossy Source Coding under a Maximum Distortion Constraint with Decoder Side- Information Jayanth Nayak 1, Ertem Tuncel 2, and Kenneth Rose 1 1 University.

Slides:



Advertisements
Similar presentations
1 LP Duality Lecture 13: Feb Min-Max Theorems In bipartite graph, Maximum matching = Minimum Vertex Cover In every graph, Maximum Flow = Minimum.
Advertisements

Information theory Multi-user information theory A.J. Han Vinck Essen, 2004.
On the Density of a Graph and its Blowup Raphael Yuster Joint work with Asaf Shapira.
Statistics Review – Part II Topics: – Hypothesis Testing – Paired Tests – Tests of variability 1.
B IPARTITE I NDEX C ODING Arash Saber Tehrani Alexandros G. Dimakis Michael J. Neely Department of Electrical Engineering University of Southern California.
CmpE 104 SOFTWARE STATISTICAL TOOLS & METHODS MEASURING & ESTIMATING SOFTWARE SIZE AND RESOURCE & SCHEDULE ESTIMATING.
1 12. Principles of Parameter Estimation The purpose of this lecture is to illustrate the usefulness of the various concepts introduced and studied in.
CWIT Robust Entropy Rate for Uncertain Sources: Applications to Communication and Control Systems Charalambos D. Charalambous Dept. of Electrical.
ECE Department Rice University dsp.rice.edu/cs Measurements and Bits: Compressed Sensing meets Information Theory Shriram Sarvotham Dror Baron Richard.
Recursive End-to-end Distortion Estimation with Model-based Cross-correlation Approximation Hua Yang, Kenneth Rose Signal Compression Lab University of.
MULTI-TARGET TRACKING THROUGH OPPORTUNISTIC CAMERA CONTROL IN A RESOURCE CONSTRAINED MULTIMODAL SENSOR NETWORK Jayanth Nayak, Luis Gonzalez-Argueta, Bi.
Zero-error source-channel coding with source side information at the decoder J. Nayak, E. Tuncel and K. Rose University of California, Santa Barbara.
Multiple Description Coding and Distributed Source Coding: Unexplored Connections in Information Theory and Coding Theory S. Sandeep Pradhan Department.
Entropy. Optimal Value Example The decimal number 563 costs 10  3 = 30 units. The binary number costs 2  10 = 20 units.  Same value as decimal.
Algorithms to Distinguish the Role of Gene-Conversion from Single-Crossover recombination in populations Y. Song, Z. Ding, D. Gusfield, C. Langley, Y.
1 Network Source Coding Lee Center Workshop 2006 Wei-Hsin Gu (EE, with Prof. Effros)
1 Distortion-Rate for Non-Distributed and Distributed Estimation with WSNs Presenter: Ioannis D. Schizas May 5, 2005 EE8510 Project May 5, 2005 EE8510.
Goal: Reconstruct Cellular Networks Biocarta. Conditions Genes.
On Hierarchical Type Covering Ertem Tuncel 1, Jayanth Nayak 2, and Kenneth Rose 2 1 University of California, Riverside 2 University of California, Santa.
BASiCS Group University of California at Berkeley Generalized Coset Codes for Symmetric/Asymmetric Distributed Source Coding S. Sandeep Pradhan Kannan.
Visual Recognition Tutorial
Lattices for Distributed Source Coding - Reconstruction of a Linear function of Jointly Gaussian Sources -D. Krithivasan and S. Sandeep Pradhan - University.
Jan. 6, 2006VLSI Design '061 On the Size and Generation of Minimal N-Detection Tests Kalyana R. Kantipudi Vishwani D. Agrawal Department of Electrical.
The Zero-Error Capacity of Compound Channels Jayanth Nayak & Kenneth Rose University of California, Santa Barbara.
Source-Channel Prediction in Error Resilient Video Coding Hua Yang and Kenneth Rose Signal Compression Laboratory ECE Department University of California,
Objectives: Set up a Linear Programming Problem Solve a Linear Programming Problem.
Linear Codes for Distributed Source Coding: Reconstruction of a Function of the Sources -D. Krithivasan and S. Sandeep Pradhan -University of Michigan,
Network Coding vs. Erasure Coding: Reliable Multicast in MANETs Atsushi Fujimura*, Soon Y. Oh, and Mario Gerla *NEC Corporation University of California,
Repairable Fountain Codes Megasthenis Asteris, Alexandros G. Dimakis IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 5, MAY /5/221.
Combinatorial Reconstruction of Sibling Relationships in Absence of Parental Data Tanya Y Berger-Wolf (DIMACS and UIC CS) Bhaskar DasGupta (UIC CS) Wanpracha.
On-line list colouring of graphs Xuding Zhu Zhejiang Normal University.
Huffman Coding Dr. Ying Lu RAIK 283 Data Structures & Algorithms.
Edge-disjoint induced subgraphs with given minimum degree Raphael Yuster 2012.
Basic Concepts of Encoding Codes, their efficiency and redundancy 1.
Uncorrectable Errors of Weight Half the Minimum Distance for Binary Linear Codes Kenji Yasunaga * Toru Fujiwara + * Kwansei Gakuin University, Japan +
Image Compression (Chapter 8) CSC 446 Lecturer: Nada ALZaben.
A Continuity Theory of Source Coding over Networks WeiHsin Gu, Michelle Effros, Mayank Bakshi, and Tracey Ho FLoWS PI Meeting, Washington DC, September.
Compression.  Compression ratio: how much is the size reduced?  Symmetric/asymmetric: time difference to compress, decompress?  Lossless; lossy: any.
Toward a Secure Data-Rate Theorem Paul Cuff. Control Setting Controller Encoder System (Plant) Sensors Rate R UiUi XiXi YiYi.
Erasure Coding for Real-Time Streaming Derek Leong and Tracey Ho California Institute of Technology Pasadena, California, USA ISIT
Huffman coding Content 1 Encoding and decoding messages Fixed-length coding Variable-length coding 2 Huffman coding.
Huffman Code and Data Decomposition Pranav Shah CS157B.
PROBABILITY AND STATISTICS FOR ENGINEERING Hossein Sameti Department of Computer Engineering Sharif University of Technology Principles of Parameter Estimation.
Coding Theory Efficient and Reliable Transfer of Information
The length of vertex pursuit games Anthony Bonato Ryerson University CCC 2013.
CHAPTER 5 SIGNAL SPACE ANALYSIS
Transmission over composite channels with combined source-channel outage: Reza Mirghaderi and Andrea Goldsmith Work Summary STATUS QUO A subset Vo (with.
On Coding for Real-Time Streaming under Packet Erasures Derek Leong *#, Asma Qureshi *, and Tracey Ho * * California Institute of Technology, Pasadena,
The Price of Uncertainty in Communication Brendan Juba (Washington U., St. Louis) with Mark Braverman (Princeton)
Optimization Problems Example 1: A rancher has 300 yards of fencing material and wants to use it to enclose a rectangular region. Suppose the above region.
Optimization Problems
Constraints Feasible region Bounded/ unbound Vertices
International Iran conference on Quantum Information September 2007, Kish Island Evaluation of bounds of codes defined over hexagonal and honeycomb lattices.
Jayanth Nayak, Ertem Tuncel, Member, IEEE, and Deniz Gündüz, Member, IEEE.
Jayanth Nayak, Ertem Tuncel, Member, IEEE, and Deniz Gündüz, Member, IEEE.
Lossless Decomposition and Huffman Codes Sophia Soohoo CS 157B.
1 On the Channel Capacity of Wireless Fading Channels C. D. Charalambous and S. Z. Denic School of Information Technology and Engineering, University of.
Mutual Information, Joint Entropy & Conditional Entropy
Entropy estimation and lossless compression Structure and Entropy of English How much lossless compression can be achieved for a given image? How much.
Shuchi Chawla, Carnegie Mellon University Guessing Secrets Efficiently Shuchi Chawla 1/23/2002.
Visual Recognition Tutorial
Warm-up (10 min.) I. Factor the following expressions completely over the real numbers. 3x3 – 15x2 + 18x x4 + x2 – 20 II. Solve algebraically and graphically.
2018/9/16 Distributed Source Coding Using Syndromes (DISCUS): Design and Construction S.Sandeep Pradhan, Kannan Ramchandran IEEE Transactions on Information.
Chapter 5. Optimal Matchings
Symmetric Allocations for Distributed Storage
Motivations Algebraic Manipulation Detection Codes
Introduction Basic formulations Applications
1.2 Functions and Their Properties
tUAN THANH NGUYEN Nanyang Technological University (NTU), Singapore
Information Theoretical Analysis of Digital Watermarking
Presentation transcript:

Lossy Source Coding under a Maximum Distortion Constraint with Decoder Side- Information Jayanth Nayak 1, Ertem Tuncel 2, and Kenneth Rose 1 1 University of California, Santa Barbara 2 University of California, Riverside

Source Coding with Side-Information Rate: Average distortion: Wyner-Ziv ‘76 Maximum Distortion –Prefix-free variable length codes. Encoder Decoder Alice Bob

Wyner-Ziv Converse

Prior work Lossless reconstruction –Graph theoretic formulation: Witsenhausen ‘76 –Variable length coding: Alon and Orlitsky ‘96 –Rate = : Koulgi et al. ‘03 Without side-information –Graph theoretic formulation: Tuncel et al. ‘02

The combinatorial problem Family of D-balls : Family of fan-out sets : –There is no graph on that captures the structure of the problem. Assumptions about set families –Covering: –Independence systems:

Example

The scalar encoder Observed source letter: –Decoder: some set in containing –Encoding strategy: specify a set containing whose intersection with every set in belongs to

Asymptotic rate Complement of w.r.t. : –Family of sets whose intersection with every set in belongs to. –Code = partition into sets from. Encode the partition using a prefix free variable length code

Asymptotic rate Partition into sets from. Minimum asymptotic average rate:

Single letter expression possible? Single letter characterization –Expression involves only scalar quantities. –Not known for the special case of lossless reconstruction. –Derive single letter bounds.

Single letter bounds 2 n  number of sets from needed to cover a high probability subset of –Can be expressed as a mutual information minimization Upper Bound:

Lower Bounds Lower bound: Wyner-Ziv –

Lower Bounds covers with

Coincidence of bounds Given and, when does a nowhere vanishing exist such that Two step coding: Körner, Longo ’73 –First step reconstruction: within D 1 ( ) –Second step reconstruction: within D 2 ( ) ?

Condition for coincidence Graph : = independent sets, = singletons –Reduces to condition for normality of. Result generalizes one of Körner et al. on perfect couples of graphs.

To conclude Maximum distortion source coding with side-information problem defined. Problem recast in a combinatorial framework. Non-single letter expression for the minimum asymptotic rate derived. Single letter bounds presented. Conditions for coincidence of bounds investigated.