Reliable Communications with Asymmetric Codebooks: An Information Theoretic Analysis of Robust Signal Hashing
نویسندگان
چکیده
In this paper, a generalization of the traditional point-to-point to communication setup, which is named as “reliable communications with asymmetric codebooks”, is proposed. Under the assumption of independent identically distributed (i.i.d) encoder codewords, it is proven that the operational capacity of the system is equal to the information capacity of the system, which is given by maxp(x) I(U ; Y ), where X, U and Y denote the individual random elements of encoder codewords, decoder codewords and decoder inputs. The capacity result is derived in the “binary symmetric” case (which is an analogous formulation of the traditional “binary symmetric channel” for our case), as a function of the system parameters. A conceptually insightful inference is made by attributing the difference from the classical Shannon-type capacity of binary symmetric channel to the gap due to the codebook asymmetry.
منابع مشابه
An Information-Theoretic Discussion of Convolutional Bottleneck Features for Robust Speech Recognition
Convolutional Neural Networks (CNNs) have been shown their performance in speech recognition systems for extracting features, and also acoustic modeling. In addition, CNNs have been used for robust speech recognition and competitive results have been reported. Convolutive Bottleneck Network (CBN) is a kind of CNNs which has a bottleneck layer among its fully connected layers. The bottleneck fea...
متن کاملImage authentication using LBP-based perceptual image hashing
Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...
متن کاملCompressed Image Hashing using Minimum Magnitude CSLBP
Image hashing allows compression, enhancement or other signal processing operations on digital images which are usually acceptable manipulations. Whereas, cryptographic hash functions are very sensitive to even single bit changes in image. Image hashing is a sum of important quality features in quantized form. In this paper, we proposed a novel image hashing algorithm for authentication which i...
متن کاملSecurity analysis of robust data-hiding with geometrically structured codebooks
In digital media transfer, geometrical transformations desynchronize the communications between the encoder and the decoder. Therefore, an attempt to decode the message based on the direct output of the channel with random geometrical state fails. The main goal of this paper is to analyze the conditions of reliable communications based on structured codebooks in channels with geometrical transf...
متن کاملOn Security of Geometrically-robust Data-hiding
In this paper we analyze security of robust data-hiding in channels with geometrical transformations. We categorize possible decoding strategies for channels with geometrical transformations within the information-theoretic framework for geometrically-robust datahiding. Furthermore, considering template-based and redundantbased design of geometrically robust data-hiding systems, we provide the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/0809.1910 شماره
صفحات -
تاریخ انتشار 2008