Computer Science – Information Theory
Scientific paper
2011-05-23
Computer Science
Information Theory
10 pages, 5 figures. To be presented at ISIT 2011
Scientific paper
10.1109/ISIT.2011.6033710
The problem of secure lossy source-channel wiretapping with arbitrarily correlated side informations at both receivers is investigated. This scenario consists of an encoder (referred to as Alice) that wishes to compress a source and send it through a noisy channel to a legitimate receiver (referred to as Bob). In this context, Alice must simultaneously satisfy the desired requirements on the distortion level at Bob, and the equivocation rate at the eavesdropper (referred to as Eve). This setting can be seen as a generalization of the conventional problems of secure source coding with side information at the decoders, and the wiretap channel. Inner and outer bounds on the rate-distortion-equivocation region for the case of arbitrary channels and side informations are derived. In some special cases of interest, it is shown that separation holds. By means of an appropriate coding, the presence of any statistical difference among the side informations, the channel noises, and the distortion at Bob can be fully exploited in terms of secrecy.
Piantanida Pablo
Shamai Shlomo
Villard Joffrey
No associations
LandOfFree
Secure Lossy Source-Channel Wiretapping with Side Information at the Receiving Terminals does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Secure Lossy Source-Channel Wiretapping with Side Information at the Receiving Terminals, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure Lossy Source-Channel Wiretapping with Side Information at the Receiving Terminals will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-22910