Lossless Compression with Security Constraints

Computer Science – Information Theory

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, July 6 - 11, 2008

Scientific paper

Secure distributed data compression in the presence of an eavesdropper is explored. Two correlated sources that need to be reliably transmitted to a legitimate receiver are available at separate encoders. Noise-free, limited rate links from the encoders to the legitimate receiver, one of which can also be perfectly observed by the eavesdropper, are considered. The eavesdropper also has its own correlated observation. Inner and outer bounds on the achievable compression-equivocation rate region are given. Several different scenarios involving the side information at the transmitters as well as multiple receivers/eavesdroppers are also considered.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Lossless Compression with Security Constraints does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Lossless Compression with Security Constraints, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Lossless Compression with Security Constraints will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-299813

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.