Secure Joint Source-Channel Coding With Side Information

نویسندگان

  • Ghadamali Bagherikaram
  • Konstantinos N. Plataniotis
چکیده

The problem of transmitting an i.i.d Gaussian source over an i.i.d Gaussian wiretap channel with an i.i.d Gaussian side information is considered. The intended receiver is assumed to have a certain minimum SNR and the eavesdropper is assumed to have a strictly lower SNR compared to the intended receiver. The objective is minimizing the distortion of source reconstruction at the intended receiver. It is shown, in this work, that unlike the Gaussian wiretap channel without side information, Shannon’s source-channel separation coding scheme is not optimum in the sense of achieving the minimum distortion. Three hybrid digital-analog secure joint source channel coding schemes are then proposed which achieve the minimum distortion. The first coding scheme is based on Costa’s dirty paper coding scheme and wiretap channel coding scheme when the analog source is not explicitly quantized. The second coding scheme is based on superposition of the secure digital signal and the hybrid digital-analog signal. It is shown that for the problem of communicating a Gaussian source over a Gaussian wiretap channel with side information, there exists an infinite family of optimum secure joint source-channel coding scheme. In the third coding scheme, the quantized signal and the analog error signal are explicitly superimposed. It is shown that this scheme provide an infinite family of optimum secure joint source-channel channel coding schemes with a variable number of binning. Finally, the proposed secure hybrid digital-analog schemes are analyzed under the main channel SNR mismatch. It is proven that the proposed schemes can give a graceful degradation of distortion with SNR under SNR mismatch, i.e., when the actual SNR is larger than the designed SNR.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient secure channel coding scheme based on polar codes

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

متن کامل

Secure Hybrid Digital-Analog Coding With Side Information at the Receiver

In this work, the problem of transmitting an i.i.d Gaussian source over an i.i.d Gaussian wiretap channel with an i.i.d Gaussian side information available at the intended receiver is considered. The intended receiver is assumed to have a certain minimum SNR and the eavesdropper is assumed to have a strictly lower SNR, compared to the intended receiver. The objective is to minimize the distorti...

متن کامل

Secure joint source-channel coding with interference known at the transmitter

In this study, the problem of transmitting an independent and identically distributed (i.i.d.) Gaussian source over an i.i.d. Gaussian wire-tap channel, with an i.i.d. Gaussian known interference available at the transmitter is considered. The intended receiver is assumed to have a certain minimum signal-to-noise ratio (SNR) and the eavesdropper is assumed to have a strictly lower SNR compared ...

متن کامل

Sequential decoding for lossless streaming source coding with side information

The problem of lossless fixed-rate streaming coding of discrete memoryless sources with side information at the decoder is studied. A random time-varying tree-code is used to sequentially bin strings and a Stack Algorithm with a variable bias uses the side information to give a delay-universal coding system for lossless source coding with side information. The scheme is shown to give exponentia...

متن کامل

Source coding under security constraints

Information theoretic security characterizes the fundamental limitations of unconditional security against computationally unbounded adversaries. In this chapter, secure distributed compression in the presence of eavesdropper(s) is considered from the information theoretic security perspective. Basic models and fundamental results are summarized for lossless and lossy source compression. Distri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1008.0223  شماره 

صفحات  -

تاریخ انتشار 2010