Lossy compression with privacy constraints: Optimality of polar codes

F. Mokhtarinezhad, J. Kliewer, O. Simeone
{"title":"Lossy compression with privacy constraints: Optimality of polar codes","authors":"F. Mokhtarinezhad, J. Kliewer, O. Simeone","doi":"10.1109/ITWF.2015.7360759","DOIUrl":null,"url":null,"abstract":"A lossy source coding problem with privacy constraint is studied in which two correlated discrete sources X and Y are compressed into a reconstruction X̂ with some prescribed distortion D. In addition, a privacy constraint is specified as the equivocation between the lossy reconstruction X̂ and Y. This models the situation where a certain amount of source information from one user is provided as utility (given by the fidelity of its reconstruction) to another user or the public, while some other correlated part of the source information Y must be kept private. In this work, we show that polar codes are able, possibly with the aid of time sharing, to achieve any point in the optimal rate-distortion-equivocation region identified by Yamamoto, thus providing a constructive scheme that obtains the optimal tradeoff between utility and privacy in this framework.","PeriodicalId":281890,"journal":{"name":"2015 IEEE Information Theory Workshop - Fall (ITW)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE Information Theory Workshop - Fall (ITW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITWF.2015.7360759","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

A lossy source coding problem with privacy constraint is studied in which two correlated discrete sources X and Y are compressed into a reconstruction X̂ with some prescribed distortion D. In addition, a privacy constraint is specified as the equivocation between the lossy reconstruction X̂ and Y. This models the situation where a certain amount of source information from one user is provided as utility (given by the fidelity of its reconstruction) to another user or the public, while some other correlated part of the source information Y must be kept private. In this work, we show that polar codes are able, possibly with the aid of time sharing, to achieve any point in the optimal rate-distortion-equivocation region identified by Yamamoto, thus providing a constructive scheme that obtains the optimal tradeoff between utility and privacy in this framework.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
具有隐私约束的有损压缩:极坐标码的最优性
隐私约束的损耗源编码问题研究中两个相关的离散源X和Y是压缩成一个重建X̂一些规定失真d .此外,隐私约束被指定为损耗之间的含糊其辞重建X̂,Y这模型情况下一定数量的源信息从一个用户提供实用程序(由忠诚的重建)到另一个用户或公众,而源信息Y的其他相关部分必须保密。在这项工作中,我们证明了极性码能够,可能在分时的帮助下,达到Yamamoto识别的最优速率扭曲-模糊区域的任何点,从而提供了一个建设性的方案,在该框架中获得效用和隐私之间的最佳权衡。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Exact recovery threshold in the binary censored block model Coding theorems via linear codes: Joint decoding rate regions Locally correcting multiple bits and codes of high rate The two-hop interference untrusted-relay channel with confidential messages Authentication for two-way relay channel with Physical-Layer Network coding
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1