Computer Science – Information Theory
Scientific paper
2008-05-20
Computer Science
Information Theory
Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, July 6 - 11, 2008
Scientific paper
Secure distributed data compression in the presence of an eavesdropper is explored. Two correlated sources that need to be reliably transmitted to a legitimate receiver are available at separate encoders. Noise-free, limited rate links from the encoders to the legitimate receiver, one of which can also be perfectly observed by the eavesdropper, are considered. The eavesdropper also has its own correlated observation. Inner and outer bounds on the achievable compression-equivocation rate region are given. Several different scenarios involving the side information at the transmitters as well as multiple receivers/eavesdroppers are also considered.
Erkip Elza
Gunduz Deniz
Poor Harold Vincent
No associations
LandOfFree
Lossless Compression with Security Constraints does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Lossless Compression with Security Constraints, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Lossless Compression with Security Constraints will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-299813