On an Improvement over Rényi's Equivocation Bound

نویسندگان

  • Nandakishore Santhi
  • Alexander Vardy
چکیده

We consider the problem of estimating the probability of error in multi-hypothesis testing when MAP criterion is used. This probability, which is also known as the Bayes risk is an important measure in many communication and information theory problems. In general, the exact Bayes risk can be difficult to obtain. Many upper and lower bounds are known in literature. One such upper bound is the equivocation bound due to Rényi which is of great philosophical interest because it connects the Bayes risk to conditional entropy. Here we give a simple derivation for an improved equivocation bound. We then give some typical examples of problems where these bounds can be of use. We first consider a binary hypothesis testing problem for which the exact Bayes risk is difficult to derive. In such problems bounds are of interest. Furthermore using the bounds on Bayes risk derived in the paper and a random coding argument, we prove a lower bound on equivocation valid for most random codes over memoryless channels.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Contribution of Channel Equivocation for the Development of Source Coding Theorems

The present communication deals with the development of new coding theorems in terms of channel equivocation, that is, coding is done for a source which selects a new set of source statistics after each output symbol is received from the channel. New proof for Fano’s bound on Shannon’s equivocation is provided by using log sum inequality. Moreover, bounds on various generalizations of Shannon’s...

متن کامل

The Generalized Multiple Access Channel with Confidential Messages

Abstract— A discrete memoryless generalized multiple access channel (GMAC) with confidential messages is studied, where two users attempt to transmit common information to a destination and each user also has private (confidential) information intended for the destination. This channel generalizes the multiple access channel (MAC) in that the two users also receive channel outputs. It is assume...

متن کامل

Submitted to the IEEE Transactions on Information Theory , April 2006 Generalized Multiple Access Channels with Confidential Messages 1 2

A discrete memoryless generalized multiple access channel (GMAC) with confidential messages is studied, where two users attempt to transmit common information to a destination and each user also has private (confidential) information intended for the destination. This channel generalizes the multiple access channel (MAC) in that the two users also receive channel outputs, and hence may obtain t...

متن کامل

Sounds on key equivocation for simple substitution ciphers

The equlvocatloo or the key ror a simple substitution cipbcr is upper and lower bounded, wben the message source is memoryless. lbe bounds are sbown to be expooentlally tight. lbe results are compared with randoro cipbering. lt is observed that tbe exponentlsJ bebavior or tbe equivocatlon or the key is DO( determioed by tbe redundancy in tbe message source, but by tbc symbol probabilities wbicb...

متن کامل

2 9 Ju l 2 00 3 On observability of Rényi ’ s entropy

Despite recent claims we argue that Rényi's entropy is an observable quantity. It is shown that, contrary to popular belief, the reported domain of instability for Rényi entropies has zero measure (Bhattacharyya measure). In addition, we show the instabilities can be easily emended by introducing a coarse graining into an actual measurement. We also clear up any doubts regarding the observabili...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/cs/0608087  شماره 

صفحات  -

تاریخ انتشار 2006