Reliable Communications with Asymmetric Codebooks: An Information Theoretic Analysis of Robust Signal Hashing

نویسندگان

  • Yucel Altug
  • Mehmet Kivanç Mihçak
  • Onur Özyesil
  • Vishal Monga
چکیده

In this paper, a generalization of the traditional point-to-point to communication setup, which is named as “reliable communications with asymmetric codebooks”, is proposed. Under the assumption of independent identically distributed (i.i.d) encoder codewords, it is proven that the operational capacity of the system is equal to the information capacity of the system, which is given by maxp(x) I(U ; Y ), where X, U and Y denote the individual random elements of encoder codewords, decoder codewords and decoder inputs. The capacity result is derived in the “binary symmetric” case (which is an analogous formulation of the traditional “binary symmetric channel” for our case), as a function of the system parameters. A conceptually insightful inference is made by attributing the difference from the classical Shannon-type capacity of binary symmetric channel to the gap due to the codebook asymmetry.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Information-Theoretic Discussion of Convolutional Bottleneck Features for Robust Speech Recognition

Convolutional Neural Networks (CNNs) have been shown their performance in speech recognition systems for extracting features, and also acoustic modeling. In addition, CNNs have been used for robust speech recognition and competitive results have been reported. Convolutive Bottleneck Network (CBN) is a kind of CNNs which has a bottleneck layer among its fully connected layers. The bottleneck fea...

متن کامل

Image authentication using LBP-based perceptual image hashing

Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...

متن کامل

Compressed Image Hashing using Minimum Magnitude CSLBP

Image hashing allows compression, enhancement or other signal processing operations on digital images which are usually acceptable manipulations. Whereas, cryptographic hash functions are very sensitive to even single bit changes in image. Image hashing is a sum of important quality features in quantized form. In this paper, we proposed a novel image hashing algorithm for authentication which i...

متن کامل

Security analysis of robust data-hiding with geometrically structured codebooks

In digital media transfer, geometrical transformations desynchronize the communications between the encoder and the decoder. Therefore, an attempt to decode the message based on the direct output of the channel with random geometrical state fails. The main goal of this paper is to analyze the conditions of reliable communications based on structured codebooks in channels with geometrical transf...

متن کامل

On Security of Geometrically-robust Data-hiding

In this paper we analyze security of robust data-hiding in channels with geometrical transformations. We categorize possible decoding strategies for channels with geometrical transformations within the information-theoretic framework for geometrically-robust datahiding. Furthermore, considering template-based and redundantbased design of geometrically robust data-hiding systems, we provide the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/0809.1910  شماره 

صفحات  -

تاریخ انتشار 2008