Binary CEO Problem Coding Under Hamming Distortion Criterion Based on Source Splitting Technique
نویسندگان
چکیده
منابع مشابه
Zero-Error Source Coding with Maximum Distortion Criterion
Let finite source and reproduction alphabets X and Y and a distortion measure d : X ×Y → [0,∞) be given. We study the minimum asymptotic rate required to describe a source distributed over X within a (given) distortion threshold D at every sample. The problem is hence a min-max problem, and the distortion measure is extended to vectors as follows: for x ∈ X, y ∈ Y, d(x, y) = maxi d(xi, yi). In ...
متن کاملSuccessive Wyner-Ziv Coding for the Binary CEO Problem under Log-Loss
An l-link binary CEO problem is considered in this paper. We present a practical encoding and decoding scheme for this problem employing the graphbased codes. A successive coding scheme is proposed for converting an l-link binary CEO problem to the (2l − 1) single binary Wyner-Ziv (WZ) problems. By using the compound LDGM-LDPC codes, the theoretical bound of each binary WZ is asymptotically ach...
متن کاملThe Achievable Rate-Distortion Region for Distributed Source Coding with One Distortion Criterion and Correlated Messages
In this paper, distributed (or multiterminal) source coding with one distortion criterion and correlated messages is considered. This problem can be also called “Berger-Yeung problem with correlated messages”. It corresponds to the source coding part of the graph-based framework for transmission of a pair of correlated sources over the multiple-access channel (MAC) where one is lossless and the...
متن کاملRate-Based versus Distortion-Based Optimal Joint Source-Channel Coding
We consider a joint source-channel coding system that protects an embedded wavelet bitstream against noise using a finite family of channel codes with error detection and error correction capability. The performance of this system may be measured by the expected distortion or by the expected number of correctly received source bits subject to a target total transmission rate. Whereas a rate-bas...
متن کاملThe Optimal Differential Privacy Mechanism under Hamming Distortion for Universal Memoryless Source Classes
To be considered for the 2016 IEEE Jack Keil Wolf ISIT Student Paper Award. We develop the tradeoff between privacy, quantified using local differential privacy (L-DP), and utility, quantified using Hamming distortion, for specific classes of universal memoryless finite-alphabet sources. In particular, for the class of permutation invariant sources (i.e., sources whose distributions are invaria...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ????? ?????? ??? ? ????????? ?????
سال: 2023
ISSN: ['2676-5810', '2676-6086']
DOI: https://doi.org/10.52547/jiaeee.20.3.81