On the Linear Codebook-Level Duality Between Slepian–Wolf Coding and Channel Coding

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the linear codebook-level duality between Slepian-Wolf coding and channel coding

In this paper, it is shown that each Slepian–Wolf coding problem is related to a dual channel coding problem in the sense that the sphere packing exponents, random coding exponents, and correct decoding exponents in these two problems are mirror-symmetrical to each other. This mirror symmetry is interpreted as a manifestation of the linear codebook-level duality between Slepian–Wolf coding and ...

متن کامل

A randomized covering-packing duality between source and channel coding

Given a general channel b over which the uniform X source, denoted by U , is directly communicated within distortion D. The source U puts uniform distribution on all sequences with type precisely pX as compared with the i.i.d. X source which puts ‘most of’ its mass on sequences with type ‘close to’ pX . A randomized covering-packing duality is established between source-coding and channel-codin...

متن کامل

Analogy and duality between random channel coding and lossy source coding

Here we write in a unified fashion (using “R(P,Q,D)” [1]) the random coding exponents in channel coding and lossy source coding. We derive their explicit forms and show, that, for a given random codebook distribution Q, the channel decoding error exponent can be viewed as an encoding success exponent in lossy source coding, and the channel correct-decoding exponent can be viewed as an encoding ...

متن کامل

An efficient secure channel coding scheme based on polar codes

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Theory

سال: 2009

ISSN: 0018-9448,1557-9654

DOI: 10.1109/tit.2009.2032815