Results 11 - 20
of
351
Computation over Multiple-Access Channels
- IEEE TRANSACTIONS ON INFORMATION THEORY
, 2007
"... The problem of reliably reconstructing a function of sources over a multiple-access channel is considered. It is shown that there is no source-channel separation theorem even when the individual sources are independent. Joint sourcechannel strategies are developed that are optimal when the structure ..."
Abstract
-
Cited by 139 (24 self)
- Add to MetaCart
The problem of reliably reconstructing a function of sources over a multiple-access channel is considered. It is shown that there is no source-channel separation theorem even when the individual sources are independent. Joint sourcechannel strategies are developed that are optimal when the structure of the channel probability transition matrix and the function are appropriately matched. Even when the channel and function are mismatched, these computation codes often outperform separation-based strategies. Achievable distortions are given for the distributed refinement of the sum of Gaussian sources over a Gaussian multiple-access channel with a joint source-channel lattice code. Finally, computation codes are used to determine the multicast capacity of finite field multiple-access networks, thus linking them to network coding.
Scalar Costa Scheme for Information Embedding
- IEEE Transactions on Signal Processing
, 2002
"... Research on information embedding and particularly information hiding techniques has received considerable attention within the last years due to its potential application in multimedia security. Digital watermarking, which is an information hiding technique where the embedded information is robust ..."
Abstract
-
Cited by 117 (1 self)
- Add to MetaCart
(Show Context)
Research on information embedding and particularly information hiding techniques has received considerable attention within the last years due to its potential application in multimedia security. Digital watermarking, which is an information hiding technique where the embedded information is robust against malicious or accidental attacks, might offer new possibilities to enforce the copyrights of multimedia data. In this article, the specific case of information embedding into independent identically distributed (IID) data and attacks by additive white Gaussian noise (AWGN) is considered. The original data is not available to the decoder. For Gaussian data, Costa proposed already in 1983 a scheme that theoretically achieves the capacity of this communication scenario. However, Costa's scheme is not practical. Thus, several research groups have proposed suboptimal practical communication schemes based on Costa's idea. The goal of this artical is to give a complete performance analysis of the scalar Costa scheme (SCS) which is a suboptimal technique using scalar embedding and reception functions. Information theoretic bounds and simulation results with state-of-the-art coding techniques are compared. Further, reception after amplitude scaling attacks and the invertibility of SCS embedding are investigated. Keywords Information embedding, communication with side-information, blind digital watermarking, scalar Costa scheme I.
Gossip algorithms for distributed signal processing
- PROCEEDINGS OF THE IEEE
, 2010
"... Gossip algorithms are attractive for in-network processing in sensor networks because they do not require any specialized routing, there is no bottleneck or single point of failure, and they are robust to unreliable wireless network conditions. Recently, there has been a surge of activity in the co ..."
Abstract
-
Cited by 116 (30 self)
- Add to MetaCart
Gossip algorithms are attractive for in-network processing in sensor networks because they do not require any specialized routing, there is no bottleneck or single point of failure, and they are robust to unreliable wireless network conditions. Recently, there has been a surge of activity in the computer science, control, signal processing, and information theory communities, developing faster and more robust gossip algorithms and deriving theoretical performance guarantees. This paper presents an overview of recent work in the area. We describe convergence rate results, which are related to the number of transmittedmessages and thus the amount of energy consumed in the network for gossiping. We discuss issues related to gossiping over wireless links, including the effects of quantization and noise, and we illustrate the use of gossip algorithms for canonical signal processing tasks including distributed estimation, source localization, and compression.
On downlink beamforming with greedy user selection: performance analysis and a simple new algorithm
- IEEE Trans. Signal Processing
, 2005
"... Abstract—This paper considers the problem of simultaneous multiuser downlink beamforming. The idea is to employ a transmit antenna array to create multiple “beams ” directed toward the individual users, and the aim is to increase throughput, measured by sum capacity. In particular, we are interested ..."
Abstract
-
Cited by 109 (1 self)
- Add to MetaCart
(Show Context)
Abstract—This paper considers the problem of simultaneous multiuser downlink beamforming. The idea is to employ a transmit antenna array to create multiple “beams ” directed toward the individual users, and the aim is to increase throughput, measured by sum capacity. In particular, we are interested in the practically important case of more users than transmit antennas, which requires user selection. Optimal solutions to this problem can be prohibitively complex for online implementation at the base station and entail so-called Dirty Paper (DP) precoding for known interference. Suboptimal solutions capitalize on multiuser (selection) diversity to achieve a significant fraction of sum capacity at lower complexity cost. We analyze the throughput performance in Rayleigh fading of a suboptimal greedy DP-based scheme proposed by Tu and Blum. We also propose another user-selection method of the same computational complexity based on simple zero-forcing beamforming. Our results indicate that the proposed method attains a significant fraction of sum capacity and throughput of Tu and Blum’s scheme and, thus, offers an attractive alternative to DP-based schemes. Index Terms—Beamforming, downlink, multiuser diversity. I.
Performance of Polar Codes for Channel and Source Coding
"... Polar codes, introduced recently by Arıkan, are the first family of codes known to achieve capacity of symmetric channels using a low complexity successive cancellation decoder. Although these codes, combined with successive cancellation, are optimal in this respect, their finite-length performance ..."
Abstract
-
Cited by 72 (3 self)
- Add to MetaCart
(Show Context)
Polar codes, introduced recently by Arıkan, are the first family of codes known to achieve capacity of symmetric channels using a low complexity successive cancellation decoder. Although these codes, combined with successive cancellation, are optimal in this respect, their finite-length performance is not record breaking. We discuss several techniques through which their finite-length performance can be improved. We also study the performance of these codes in the context of source coding, both lossless and lossy, in the single-user context as well as for distributed applications.
Polar Codes are Optimal for Lossy Source Coding
"... We consider lossy source compression of a binary symmetric source with Hamming distortion function. We show that polar codes combined with a low-complexity successive cancellation encoding algorithm achieve the rate-distortion bound. The complexity of both the encoding and the decoding algorithm is ..."
Abstract
-
Cited by 63 (2 self)
- Add to MetaCart
We consider lossy source compression of a binary symmetric source with Hamming distortion function. We show that polar codes combined with a low-complexity successive cancellation encoding algorithm achieve the rate-distortion bound. The complexity of both the encoding and the decoding algorithm is O(N log(N)), where N is the blocklength of the code. Our result mirrors Arıkan’s capacity achieving polar code construction for channel coding.
The multi-way relay channel
- in Proc. IEEE Int. Symposium on Inf. Theory (ISIT), Seoul, Korea
"... Abstract—The multi-user communication channel, in which multiple users exchange information with the help of a single relay terminal, called the multi-way relay channel, is considered. In this model, multiple interfering clusters of users communicate simultaneously, where the users within the same c ..."
Abstract
-
Cited by 59 (3 self)
- Add to MetaCart
(Show Context)
Abstract—The multi-user communication channel, in which multiple users exchange information with the help of a single relay terminal, called the multi-way relay channel, is considered. In this model, multiple interfering clusters of users communicate simultaneously, where the users within the same cluster wish to exchange messages among themselves. It is assumed that the users cannot receive each other’s signals directly, and hence the relay terminal is the enabler of communication. A relevant metric to study in this scenario is the symmetric rate achievable by all users, which we identify for amplify-and-forward (AF), decodeand-forward (DF) and compress-and-forward (CF) protocols. We also present an upper bound for comparison. The two extreme cases, namely full data exchange, in which every user wants to receive messages of all other users, and pairwise data exchange, consisting of multiple two-way relay channels, are investigated and presented in detail. I.
Lattice strategies for the dirty multiple access channel
- in Proceedings of IEEE International Symposium on Information Theory
, 2007
"... A generalization of the Gaussian dirty-paper problem to a multiple access setup is considered. There are two additive interference signals, one known to each transmitter but none to the receiver. The rates achievable using Costa’s strategies (i.e. by a random binning scheme induced by Costa’s auxili ..."
Abstract
-
Cited by 58 (10 self)
- Add to MetaCart
(Show Context)
A generalization of the Gaussian dirty-paper problem to a multiple access setup is considered. There are two additive interference signals, one known to each transmitter but none to the receiver. The rates achievable using Costa’s strategies (i.e. by a random binning scheme induced by Costa’s auxiliary random variables) vanish in the limit when the interference signals are strong. In contrast, it is shown that lattice strategies (“lattice precoding”) can achieve positive rates independent of the interferences, and in fact in some cases- which depend on the noise variance and power constraints- they are optimal. In particular, lattice strategies are optimal in the limit of high SNR. It is also shown that the gap between the achievable rate region and the capacity region is at most 0.167 bit. Thus, the dirty MAC is another instance of a network setup, like the Korner-Marton modulo-two sum problem, where linear coding is potentially better than random binning. Lattice transmission schemes and conditions for optimality for the asymmetric case, where there is only one interference which is known to one of the users (who serves as a “helper ” to the other user), and for the “common interference ” case are also derived. In the former case the gap between the helper achievable rate and its capacity is at most 0.085 bit.
Data-Hiding Codes
- Proc. IEEE
, 2005
"... This tutorial paper reviews the theory and design of codes for hiding or embedding information in signals such as images, video, audio, graphics, and text. Such codes have also been called watermarking codes; they can be used in a variety of applications, including copyright protection for digital m ..."
Abstract
-
Cited by 58 (4 self)
- Add to MetaCart
(Show Context)
This tutorial paper reviews the theory and design of codes for hiding or embedding information in signals such as images, video, audio, graphics, and text. Such codes have also been called watermarking codes; they can be used in a variety of applications, including copyright protection for digital media, content authentication, media forensics, data binding, and covert communications. Some of these applications imply the presence of an adversary attempting to disrupt the transmission of information to the receiver; other applications involve a noisy, generally unknown, communication channel. Our focus is on the mathematical models, fundamental principles, and code design techniques that are applicable to data hiding. The approach draws from basic concepts in information theory, coding theory, game theory, and signal processing, and is illustrated with applications to the problem of hiding data in images. Keywords—Coding theory, data hiding, game theory, image processing, information theory, security, signal processing, watermarking. I.
Reliable physical layer network coding
- PROCEEDINGS OF THE IEEE
, 2011
"... When two or more users in a wireless network transmit simultaneously, their electromagnetic signals are linearly superimposed on the channel. As a result, a receiver that is interested in one of these signals sees the others as unwanted interference. This property of the wireless medium is typicall ..."
Abstract
-
Cited by 54 (5 self)
- Add to MetaCart
(Show Context)
When two or more users in a wireless network transmit simultaneously, their electromagnetic signals are linearly superimposed on the channel. As a result, a receiver that is interested in one of these signals sees the others as unwanted interference. This property of the wireless medium is typically viewed as a hindrance to reliable communication over a network. However, using a recently developed coding strategy, interference can in fact be harnessed for network coding. In a wired network, (linear) network coding refers to each intermediate node taking its received packets, computing a linear combination over a finite field, and forwarding the outcome towards the destinations. Then, given an appropriate set of linear combinations, a destination can solve for its desired packets. For certain topologies, this strategy can attain significantly higher throughputs over routing-based strategies. Reliable physical layer network coding takes this idea one step further: using judiciously chosen linear error-correcting codes, intermediate nodes in a wireless network can directly recover linear combinations of the packets from the observed noisy superpositions of transmitted signals. Starting with some simple examples, this survey explores the core ideas behind this new technique and the possibilities it offers for communication over interference-limited wireless networks.