• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

The rate-distortion function for source coding with side information at the decoder (1976)

by A D Wyner, J Ziv
Venue:IEEE Trans. Inf. Theory
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 1,064
Next 10 →

Cooperative diversity in wireless networks: efficient protocols and outage behavior

by J. Nicholas Laneman, David N. C. Tse, Gregory W. Wornell - IEEE TRANS. INFORM. THEORY , 2004
"... We develop and analyze low-complexity cooperative diversity protocols that combat fading induced by multipath propagation in wireless networks. The underlying techniques exploit space diversity available through cooperating terminals’ relaying signals for one another. We outline several strategies ..."
Abstract - Cited by 2009 (31 self) - Add to MetaCart
We develop and analyze low-complexity cooperative diversity protocols that combat fading induced by multipath propagation in wireless networks. The underlying techniques exploit space diversity available through cooperating terminals’ relaying signals for one another. We outline several strategies employed by the cooperating radios, including fixed relaying schemes such as amplify-and-forward and decode-and-forward, selection relaying schemes that adapt based upon channel measurements between the cooperating terminals, and incremental relaying schemes that adapt based upon limited feedback from the destination terminal. We develop performance characterizations in terms of outage events and associated outage probabilities, which measure robustness of the transmissions to fading, focusing on the high signal-to-noise ratio (SNR) regime. Except for fixed decode-and-forward, all of our cooperative diversity protocols are efficient in the sense that they achieve full diversity (i.e., second-order diversity in the case of two terminals), and, moreover, are close to optimum (within 1.5 dB) in certain regimes. Thus, using distributed antennas, we can provide the powerful benefits of space diversity without need for physical arrays, though at a loss of spectral efficiency due to half-duplex operation and possibly at the cost of additional receive hardware. Applicable to any wireless setting, including cellular or ad hoc networks—wherever space constraints preclude the use of physical arrays—the performance characterizations reveal that large power or energy savings result from the use of these protocols.
(Show Context)

Citation Context

... of the previous source message; • observation2 [5, Theorem 6], in which the relay encodes a quantized version of its received signal, using ideas from source coding with side information [14], [16], =-=[17]-=-. 1 At a high level, degradedness means that the destination receives a corrupted version of what the relay receives, all conditioned on the relay transmit signal. While this class is mathematically c...

Cooperative strategies and capacity theorems for relay networks

by Gerhard Kramer, Michael Gastpar, Piyush Gupta - IEEE TRANS. INFORM. THEORY , 2005
"... Coding strategies that exploit node cooperation are developed for relay networks. Two basic schemes are studied: the relays decode-and-forward the source message to the destination, or they compress-and-forward their channel outputs to the destination. The decode-and-forward scheme is a variant of ..."
Abstract - Cited by 739 (19 self) - Add to MetaCart
Coding strategies that exploit node cooperation are developed for relay networks. Two basic schemes are studied: the relays decode-and-forward the source message to the destination, or they compress-and-forward their channel outputs to the destination. The decode-and-forward scheme is a variant of multihopping, but in addition to having the relays successively decode the message, the transmitters cooperate and each receiver uses several or all of its past channel output blocks to decode. For the compress-and-forward scheme, the relays take advantage of the statistical dependence between their channel outputs and the destination’s channel output. The strategies are applied to wireless channels, and it is shown that decode-and-forward achieves the ergodic capacity with phase fading if phase information is available only locally, and if the relays are near the source node. The ergodic capacity coincides with the rate of a distributed antenna array with full cooperation even though the transmitting antennas are not colocated. The capacity results generalize broadly, including to multiantenna transmission with Rayleigh fading, single-bounce fading, certain quasi-static fading problems, cases where partial channel knowl-edge is available at the transmitters, and cases where local user co-operation is permitted. The results further extend to multisource and multidestination networks such as multiaccess and broadcast relay channels.

A Survey on Wireless Multimedia Sensor Networks

by Ian F. Akyildiz, Tommaso Melodia, Kaushik R. Chowdhury - Computer Networks , 2007
"... ..."
Abstract - Cited by 417 (26 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

..., and still retain the advantages of high compression efficiency. However, it is known from information-theoretic bounds established by Slepian and Wolf for lossless coding [117] and by Wyner and Ziv =-=[130]-=- for lossy coding with decoder side information, that efficient compression can be achieved by leveraging knowledge of the source statistics at the decoder only. This way, the traditional balance of c...

Distributed Source Coding Using Syndromes (DISCUS): Design and Construction

by S. Sandeep Pradhan, Kannan Ramchandran - IEEE TRANS. INFORM. THEORY , 1999
"... We address the problem of distributed source coding, i.e. compression of correlated sources that are not co-located and/or cannot communicate with each other to minimize their joint description cost. In this work we tackle the related problem of compressing a source that is correlated with anothe ..."
Abstract - Cited by 407 (9 self) - Add to MetaCart
We address the problem of distributed source coding, i.e. compression of correlated sources that are not co-located and/or cannot communicate with each other to minimize their joint description cost. In this work we tackle the related problem of compressing a source that is correlated with another source which is however available only at the decoder. In contrast to prior information-theoretic approaches, we introduce a new constructive and practical framework for tackling the problem based on the judicious incorporation of channel coding principles into this source coding problem. We dub our approach as DIstributed Source Coding Using Syndromes (DISCUS). We focus in this paper on trellis-structured consructions of the framework to illustrate its utility. Simulation results confirm the power of DISCUS, opening up a new and exciting constructive playing-ground for the distributed source coding problem. For the distributed coding of correlated i.i.d. Gaussian sources that are ...

Nested Linear/Lattice Codes for Structured Multiterminal Binning

by Ram Zamir, Shlomo Shamai (Shitz), Uri Erez , 2002
"... Network information theory promises high gains over simple point-to-point communication techniques, at the cost of higher complexity. However, lack of structured coding schemes limited the practical application of these concepts so far. One of the basic elements of a network code is the binning sch ..."
Abstract - Cited by 345 (14 self) - Add to MetaCart
Network information theory promises high gains over simple point-to-point communication techniques, at the cost of higher complexity. However, lack of structured coding schemes limited the practical application of these concepts so far. One of the basic elements of a network code is the binning scheme. Wyner and other researchers proposed various forms of coset codes for efficient binning, yet these schemes were applicable only for lossless source (or noiseless channel) network coding. To extend the algebraic binning approach to lossy source (or noisy channel) network coding, recent work proposed the idea of nested codes, or more specifically, nested parity-check codes for the binary case and nested lattices in the continuous case. These ideas connect network information theory with the rich areas of linear codes and lattice codes, and have strong potential for practical applications. We review these recent developments and explore their tight relation to concepts such as combined shaping and precoding, coding for memories with defects, and digital watermarking. We also propose a few novel applications adhering to a unified approach.

Capacity bounds and power allocation for wireless relay channels

by Anders Høst-madsen, Junshan Zhang - IEEE TRANS. INF. THEORY , 2005
"... We consider three-node wireless relay channels in a Rayleigh-fading environment. Assuming transmitter channel state information (CSI), we study upper bounds and lower bounds on the outage capacity and the ergodic capacity. Our studies take into account practical constraints on the transmission/rece ..."
Abstract - Cited by 324 (6 self) - Add to MetaCart
We consider three-node wireless relay channels in a Rayleigh-fading environment. Assuming transmitter channel state information (CSI), we study upper bounds and lower bounds on the outage capacity and the ergodic capacity. Our studies take into account practical constraints on the transmission/reception duplexing at the relay node and on the synchronization between the source node and the relay node. We also explore power allocation. Compared to the direct transmission and traditional multihop protocols, our results reveal that optimum relay channel signaling can significantly outperform multihop protocols, and that power allocation has a significant impact on the performance.

Distributed video coding

by Bernd Girod, Anne Margot Aaron, SHANTANU RANE, DAVID REBOLLO-MONEDERO - PROC. OF THE IEEE 93 (2005) 71–83 , 2005
"... Distributed coding is a new paradigm for video compression, ..."
Abstract - Cited by 316 (11 self) - Add to MetaCart
Distributed coding is a new paradigm for video compression,
(Show Context)

Citation Context

...compression performance approaches the Slepian–Wolf bound. C. Rate-Distortion Theory for Lossy Compression With Receiver Side Information Shortly after Slepian and Wolf’s seminal paper, Wyner and Ziv =-=[31]-=-–[33] extended this work to establish informationtheoretic bounds for lossy compression with side information at the decoder. More precisely, let and represent samples of two i.i.d. random sequences, ...

Information-theoretic analysis of information hiding

by Pierre Moulin, Joseph A. O’sullivan - IEEE Transactions on Information Theory , 2003
"... Abstract—An information-theoretic analysis of information hiding is presented in this paper, forming the theoretical basis for design of information-hiding systems. Information hiding is an emerging research area which encompasses applications such as copyright protection for digital media, watermar ..."
Abstract - Cited by 265 (19 self) - Add to MetaCart
Abstract—An information-theoretic analysis of information hiding is presented in this paper, forming the theoretical basis for design of information-hiding systems. Information hiding is an emerging research area which encompasses applications such as copyright protection for digital media, watermarking, fingerprinting, steganography, and data embedding. In these applications, information is hidden within a host data set and is to be reliably communicated to a receiver. The host data set is intentionally corrupted, but in a covert way, designed to be imperceptible to a casual analysis. Next, an attacker may seek to destroy this hidden information, and for this purpose, introduce additional distortion to the data set. Side information (in the form of cryptographic keys and/or information about the host signal) may be available to the information hider and to the decoder. We formalize these notions and evaluate the hiding capacity, which upper-bounds the rates of reliable transmission and quantifies the fundamental tradeoff between three quantities: the achievable information-hiding rates and the allowed distortion levels for the information hider and the attacker. The hiding capacity is the value of a game between the information hider and the attacker. The optimal attack strategy is the solution of a particular rate-distortion problem, and the optimal hiding strategy is the solution to a channel-coding problem. The hiding capacity is derived by extending the Gel’fand–Pinsker theory of communication with side information at the encoder. The extensions include the presence of distortion constraints, side information at the decoder, and unknown communication channel. Explicit formulas for capacity are given in several cases, including Bernoulli and Gaussian problems, as well as the important special case of small distortions. In some cases, including the last two above, the hiding capacity is the same whether or not the decoder knows the host data set. It is shown that many existing information-hiding systems in the literature operate far below capacity. Index Terms—Channel capacity, cryptography, fingerprinting, game theory, information hiding, network information theory,
(Show Context)

Citation Context

...d Willems [11]. Our initial derivation of hiding capacity was based on the analogy between the watermarking problem and Wyner–Ziv’s problem of source coding with side information at the decoder [31], =-=[45]-=-. This analogy was further developed by Chou et al. [29] and Barron et al. [30]. Four key differences between our setup and Gel’fand and Pinsker’s are • the presence of distortion constraints; • the a...

Hidden Markov processes

by Yariv Ephraim, Neri Merhav - IEEE Trans. Inform. Theory , 2002
"... Abstract—An overview of statistical and information-theoretic aspects of hidden Markov processes (HMPs) is presented. An HMP is a discrete-time finite-state homogeneous Markov chain observed through a discrete-time memoryless invariant channel. In recent years, the work of Baum and Petrie on finite- ..."
Abstract - Cited by 264 (5 self) - Add to MetaCart
Abstract—An overview of statistical and information-theoretic aspects of hidden Markov processes (HMPs) is presented. An HMP is a discrete-time finite-state homogeneous Markov chain observed through a discrete-time memoryless invariant channel. In recent years, the work of Baum and Petrie on finite-state finite-alphabet HMPs was expanded to HMPs with finite as well as continuous state spaces and a general alphabet. In particular, statistical properties and ergodic theorems for relative entropy densities of HMPs were developed. Consistency and asymptotic normality of the maximum-likelihood (ML) parameter estimator were proved under some mild conditions. Similar results were established for switching autoregressive processes. These processes generalize HMPs. New algorithms were developed for estimating the state, parameter, and order of an HMP, for universal coding and classification of HMPs, and for universal decoding of hidden Markov channels. These and other related topics are reviewed in this paper. Index Terms—Baum–Petrie algorithm, entropy ergodic theorems, finite-state channels, hidden Markov models, identifiability, Kalman filter, maximum-likelihood (ML) estimation, order estimation, recursive parameter estimation, switching autoregressive processes, Ziv inequality. I.
(Show Context)

Citation Context

...tch process and under varying degrees of knowledge of the switch process at the encoder and decoder were determined by Berger [31]. A correct version of [31, Theorem 6.1.1] was given by Wyner and Ziv =-=[318]-=- where the rate-distortion function of sources with side information at the decoder was developed. 9) The Telegraph Signal: The telegraph signal is an example of a continuous-time binary Markov proces...

Distributed source coding for sensor networks

by Zixiang Xiong, Angelos D. Liveris, Samuel Cheng - In IEEE Signal Processing Magazine , 2004
"... n recent years, sensor research has been undergoing a quiet revolution, promising to have a significant impact throughout society that could quite possibly dwarf pre-vious milestones in the information revolution. MIT Technology Review ranked wireless sensor networks that con-sist of many tiny, low- ..."
Abstract - Cited by 224 (4 self) - Add to MetaCart
n recent years, sensor research has been undergoing a quiet revolution, promising to have a significant impact throughout society that could quite possibly dwarf pre-vious milestones in the information revolution. MIT Technology Review ranked wireless sensor networks that con-sist of many tiny, low-power and cheap wireless sensors as the number one emerging technology. Unlike PCs or the Internet, which are designed to support all types of applications, sensor networks are usually mission driven and application specific (be it detection of biological agents and toxic chemicals; environmental measure-ment of temperature, pressure and vibration; or real-time area video surveillance). Thus they must operate under a set of unique constraints and requirements. For example, in contrast to many other wireless devices (e.g., cellular phones, PDAs, and laptops), in which energy can be recharged from time to time, the energy provisioned for a wireless sensor node is not expected to be renewed throughout its mission. The limited amount of energy available to wireless sensors has a significant impact on all aspects of a wireless sensor network, from the amount of information that the node can process, to the volume of wireless communication it can carry across large distances. Realizing the great promise of sensor networks requires more than a mere advance in individual technologies; it relies on many com-ponents working together in an efficient, unattended, comprehensible, and trustworthy manner. One of the enabling technologies for sensor networks is distributed source coding (DSC), which refers to the compression of multiple correlated sensor out-puts [1]–[4] that do not communicate with each other (hence distributed coding). These sensors send their compressed outputs to a central point [e.g., the base station (BS)] for joint decoding. I
(Show Context)

Citation Context

...ed into the correlation model and thus considered in the code design for DSC. There is actually one specific DSC IEEE SIGNAL PROCESSING MAGAZINE92 SEPTEMBER 2004 Source Coding Channel Coding DSC [1], =-=[2]-=- (source coding with side Data hiding [46], [47] (channel coding information at the decoder) with side information at the encoder) Multiterminal source coding [4] Coding for MIMO/broadcast channelss[2...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University