Information integrity between correlated sources through Wyner-Ziv coding

Eric Graves, T. Wong
{"title":"Information integrity between correlated sources through Wyner-Ziv coding","authors":"Eric Graves, T. Wong","doi":"10.1109/ITWF.2015.7360790","DOIUrl":null,"url":null,"abstract":"In this paper, the problem of achieving information integrity in the classical Wyner-Ziv lossy source coding model is considered. A discrete memoryless source encodes its source sequence using the standard Wyner-Ziv coding technique and forwards the bin index to another source that employs the bin index and its own correlated sequence to decode the first source's sequence. There is an adversary who may arbitrarily modify the bin index sent to the decoder. It is assumed the adversary may base the attack on the true bin index, its own sequence (which may be correlated to both the encoder and decoder sequences) as well as the known codebook used by the sources. It is shown that a non-simulatability condition on the joint source distribution is necessary and sufficient to achieve information integrity. However, the additional requirement of information integrity may incur a penalty on the rate-distortion performance.","PeriodicalId":281890,"journal":{"name":"2015 IEEE Information Theory Workshop - Fall (ITW)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE Information Theory Workshop - Fall (ITW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITWF.2015.7360790","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

In this paper, the problem of achieving information integrity in the classical Wyner-Ziv lossy source coding model is considered. A discrete memoryless source encodes its source sequence using the standard Wyner-Ziv coding technique and forwards the bin index to another source that employs the bin index and its own correlated sequence to decode the first source's sequence. There is an adversary who may arbitrarily modify the bin index sent to the decoder. It is assumed the adversary may base the attack on the true bin index, its own sequence (which may be correlated to both the encoder and decoder sequences) as well as the known codebook used by the sources. It is shown that a non-simulatability condition on the joint source distribution is necessary and sufficient to achieve information integrity. However, the additional requirement of information integrity may incur a penalty on the rate-distortion performance.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
本文研究了经典Wyner-Ziv有损源编码模型中信息完整性的实现问题。离散无内存源使用标准Wyner-Ziv编码技术对其源序列进行编码,并将bin索引转发给另一个源,该源使用bin索引和自己的相关序列解码第一个源的序列。有一个对手可以任意修改发送给解码器的bin索引。假设攻击者可能基于真实的bin索引、自己的序列(可能与编码器和解码器序列相关)以及源使用的已知码本进行攻击。研究表明,联合信源分布的非拟合性条件是实现信息完整性的充分必要条件。然而,对信息完整性的额外要求可能会导致对率失真性能的惩罚。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Exact recovery threshold in the binary censored block model Coding theorems via linear codes: Joint decoding rate regions Locally correcting multiple bits and codes of high rate The two-hop interference untrusted-relay channel with confidential messages Authentication for two-way relay channel with Physical-Layer Network coding
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1