An Information-Theoretic Analysis of Dirty Paper Coding for Informed Audio Watermarking

Size: px
Start display at page:

Download "An Information-Theoretic Analysis of Dirty Paper Coding for Informed Audio Watermarking"

Transcription

1 1 An Information-Theoretic Analysis of Dirty Paper Coding for Informed Audio Watermarking Andrea Abrardo, Mauro Barni, Andrea Gorrieri, Gianluigi Ferrari Department of Information Engineering and Mathematical Sciences, University of Siena, Italy & CNIT Research Unit of Siena Department of Information Engineering, University of Parma, Italy & CNIT Research Unit of Parma Abstract Upon the introduction a simplified distortion model for a Gaussian audio watermaking scenario, we derive a lower bound for the Gelfand-Pinsker capacity of the watermark channel. Then, we use the capacity bound for designing an efficient practical watermarking scheme based on dirty trellis codes. The proposed information-theoretic framework is then validated, through the use of experimentally acquired audio signals, with the use of a recently proposed frequency-domain audio watermarking. Both an ideal (reflection-free) Gaussian acoustic channel and a realistic multipath acoustic channel are considered. I. INTRODUCTION Digital watermarking is nowadays a rather well-understood field, backed by a solid theoretical background. However, the application of theoretical findings to real systems is often problematic due to the deviation of practical working conditions from the assumptions underlying the theoretical analysis. The most striking example is the difficulty of applying the informed watermarking paradigm [1], derived by modeling the watermarking problem as one of channel coding with side information at the encoder [2], to certain practical situations, in which the oldest spread-spectrum paradigm is often preferred by system designers. This is often the case, for instance, in audio watermarking systems designed to couple high imperceptibility with robustness against heavy distortions including temporal de-synchronization, D/A and A/D conversions, environment noise addition, multipath and microphone distortion. It is a matter of fact that the best performing schemes proposed so far to address this scenario are not based on informed watermarking. Spread-spectrum schemes are easy to implement, are very flexible, and can be applied to different signal representation domains, e.g., frequency and time domains. The most undesirable characteristic of spread spectrum watermarking is that the host signal acts as an interference and, therefore, must be treated as a disturbing noise limiting the watermark channel capacity. As opposed to spread spectrum watermarking, watermarking theory shows that, under certain hypotheses, it is possible to completely eliminate the interference between the watermark and the host signal, thus reaching the same performance obtained by systems where the decoder can access the original non-watermarked signal [1], [3], [4]. To achieve this goal, it is necessary to resort to so-called informed watermarking schemes, also known as dirty paper coding schemes, like the well known Quantization Index Modulation (QIM) approach [1]. At least in some application scenarios, then, there is an evident hiatus between theory and practice. While it is not easy to understand which are the conditions whose deviation from the theoretical assumptions determine the difficulty of fulfilling the expectations promised by informed watermarking, psychoacoustic considerations surely play a major role. In audio watermarking, the inaudibility of the embedded signal is usually obtained by relying on a masking threshold which determines the maximum allowed distortion. In particular, a psychoacoustic mask defines the maximum modification which can applied to each frequency sample. This represents a major deviation from classical distortion models in which inaudibility is defined in terms of Mean Square Error (MSE), thus making the direct application of the dirty coding paradigm, derived from a theoretical analysis, problematic. Additionally, when the energy of the noise, added after watermark embedding, is comparable to the energy of the host signal, the advantage ensured by informed watermarking decreases. In this paper, we first propose a theoretical approach that, under proper approximations, allows to compute the capacity of the Dirty Trellis Codes and Spread Spectrum (DTC-SS) system proposed in [5]. Then, by comparing the theoretical findings with some simulation results, we show how the theoretical approach can predict when and how the informed watermarking paradigm performs better than its non-informed counterpart. The paper is organized as follows. In Section II, the watermark transmission model is presented, together with the underlying assumptions. In Section III, the computation of the capacity of the informed watermarking system is described. In Section IV, we compare the theoretical findings with the performance results, relative to experimentally acquired audio signals, of the DTC-SS digital watermarking system proposed in [5]. In particular, two propagation environments are considered: an AWGN channel (Subsection IV-A) and a more realistic multipath channel (Subsection IV-B). Finally, Section V concludes the work. II. CHANNEL AND TRANSMISSION MODEL In the following, we denote by S the interference signal representing the features to be marked. Hence, we assume that

2 2 the transmitted signal is forced to take binary antipodal values which determine the following fixed error: X = ±. (1) The considered scenario is referred to as Dirty Paper Channel with Fixed Distortion (DPC-FD) and it accurately models the audio watermarking scenario considered in [5], provided that: (i) S represents the magnitude (in logarithmic scale, db) of the Modulated Complex Lapped Transform (MCLT) samples extracted from the audio signal; (ii) the admissible distortion is fixed. The latter assumption is justified by the fact that the system model presented in [5] is such that, for each MCLT samples, the allowed modification is limited by a maximum acceptable value, namely γ max, which, in practice, is often reached. A. Problem Formulation III. THE CAPACITY OF A DPC-FD Costa s expression for the capacity of a DPC is a particular case of the Gelfand-Pinsker capacity of a channel with random parameters non-causally known at the transmitter [6]. In particular, the channel output can be written as follows: Y = X +S +Z where S is the underlying Gaussian interfering signal (the host signal to be marked), X is the transmitted signal (the watermark), and Z is an independent Gaussian random variables with variancen, which represents the noise attack. In general, the Gelfand-Pinsker capacity can be expressed as [6]: C GP = max {I(U;Y) I(U;S)} (2) p(u,x s) where the maximization is performed over all possible joint probability density functions (pdfs) of the channel input X and of the auxiliary random variable U conditioned on the channel status S. Random binning is strictly related to the presence, in (2), of the auxiliary random variable U and to the concept of typical sequences. As shown in [6], the capacity can be achieved by generating a code C containing 2 n(i(u;y) ε) independent and identically distributed (i.i.d.) sequences drawn according to the pdf of U and splitting them into a number of bins, each containing2 n(i(u;s)+δ) sequences, where ε and δ are arbitrarily small positive quantities. Given a message (hereafter indicated as a sequence of bits w) and a sequence of channel states s, the transmitter looks into the bin indexed by w for a sequence that is jointly typical 1 with s according to p(u s), let us call it u(s,w). Then, it transmits a sequence x which is jointly typical with s and u(s,w). Upon receiving a sequence y, the decoder looks for a sequence in C which is jointly typical with y according to p(y u) and outputs the index of the bin the decoded sequence belongs to. Given that the number of bins is approximately equal to 1 Roughly speaking two sequences are jointly typical if their joint empirical pdf is in accordance with the joint pdf of the sources that emitted them see [7] for a rigorous introduction to the use of typical sequences in information theory. 2 n(i(u;y) I(U;S)), any rate lower than C GP can be achieved. Costa showed that for the DPC channel, considering U = X +αs with α = P/(P+N) the capacity in (2) is maximized and this maximum is equal to the Shannon s capacity for the AWGN channel. Our goal is to redefine the maximization problem in (2) when Y = X +S +Z, as in Costa s model, but the alphabet of X is forced to be ±. For comparison purposes, we assume, as in Costa s paper, that S and Z are zero-mean independent Gaussian random variables with variances Q and N, respectively. Note that this is equivalent to assume that the interference signal S is a normalized (i.e., unitary mean) lognormal random variable. As for Z, while in the time domain Gaussian assumption is reasonable, in the considered watermarking scheme we have to consider the samples of noise in the logarithmic MCLT domain, so that Z is in general not Gaussian. However, our results (not shown here) confirm that approximating Z as Gaussian is reasonable. Our goal is then to solve the following maximization: C DPC FD = max p(u,x s) s.t. x X(s) {I(U;Y) I(U;S)} (3) where X(s) = {, }. Note that in the considered model the distortion power is fixed and equal to P = 2. Note that in (3) we have denoted the capacity C DPC FD to put in evidence the fact that it represents the capacity of the DPC-FD scenario considered in this paper. B. A Lower Bound for the Capacity First of all, observing that p(u,x s) = p(x u,s)p(u s), it can be concluded that the maximization in (2) reduces to finding the optimized expressions for p(u s) and p(x u, s). In order to find such expressions and solve the maximization problem (2), we impose the following relationship between the auxiliary random variable U and S: U = sign(ξ +αs) (4) where: sign(x) is the signum function; ξ is a Gaussian random variable independent from S, with zero mean and unitary variance; and α > 0 is a parameter whose value needs to be selected so that I(U;Y) I(U;S) is maximized. Of course, imposing the expression (4) limits our search space and, hence, a lower bound for C DPC FD will eventually be determined. The validity of this approximation will be proved later, by showing that, at least for moderate to low bit-rates, the lower bound approaches Costa s capacity. Taking into account (4), we now investigate p(u s) and p(x u,s). We first consider p(u s). Since, owing to its expression (4), U assumes the values 1 and 1 with the same probability, we focus, without loss of generality, on the probability that U = 1, conditioned to a certain value of S. It then follows that: A(s) Pr{U = 1 S = s} = 1 ( 2 erfc αs ) (5) 2

3 3 where erfc(x) = 2/ π x e t2 dt. As a next step, we need to determine p(x u,s). To do so, we invoke Proposition 1 in [6] and assume that X is a deterministic function of U and S. In particular, since x is forced to take binary antipodal values, a natural choice is to consider x = u. At this point, owing to the expressions of p(u s) and p(x u,s), the parameter α needs only to be determined. In order to solve (3), the optimized value of α is obtained by maximizing the objective function in (3), which, for ease of notational simplicity is defined as follows: R(α) I(U;Y) I(U;S). (6) R(α) WNR = 10 db WNR = 5 db The optimized value of α and the corresponding value of R in (6) (which corresponds to a lower bound for the capacity C DPC FD in (3)) will be denoted as α and R = R(α ), respectively. It is worth noting that for α = 0 the auxiliary random variable U is independent of S and A(s) = 0.5 regardless of the value of s. In this case, the proposed scheme is virtually identical to a classical Spread Spectrum (SS) embedding scheme. By recognizing the similarity of our scheme and a classical SS scheme, in the following we refer to proposed scheme as Informed-Coded SS (IC-SS). In order to evaluate R(α), let us consider first the quantity I(U;S). One has: I(U;S) = H(U) H(U S) = 1 h(a(s))p S (s)ds (7) where h(p) = plog 2 p (1 p)log 2 (1 p). In order to evaluate I(U;Y), we start by considering the conditional pdf P Y (y U = 1). One can write: P Y (y U = 1) = (a) = 2 = 2 P Y (y,s U = 1)ds P Y (y,s,u = 1)ds P Y (y s,u = 1)A(s)P S (s)ds (8) where in (a) we have exploited the fact that p(u = 1) = 1/2. Since x = u, we have: P Y (y U = 1) = 2 πn e (y s )2 2N A(s)P S (s)ds. (9) Since, owing to symmetry, it holds that P Y (y U = 1) = P Y ( y U = 1), the unconditioned pdf of Y can be expressed as follows: P Y (y) = 1 2 P Y(y U = 1)+ 1 2 P Y( y U = 1) α Fig. 1. R(α) as a function of α for two values of WNR, namely -10 db and -5 db. In both cases, DWR = 20 db. The following expression for I(U;Y) can then be derived: I(U;Y) = P Y (y U = 1)log 2 (P Y (y U = 1)) dy P Y (y U = 1)log 2 (P Y (y U = 1)) dy P Y (y)log 2 (P Y (y)) dy. (10) By taking into account expression (7) for I(U; S) and expression (10) for I(U;Y), it is now possible to evaluate R(α) in equation (6) by means of numerical integration. In particular, by evaluating R(α) for α [0,1], the value α, in correspondence to which R = R(α ) is maximized, can be determined. In Fig. 1, R(α) is shown as a function of α considering two possible value of the watermark-to-noise ratio WNR P/N, namely: -10 db and -5 db. In both cases, the state-to-signal (or document-to-watermark) ratio DWR Q/P is set 20 db. In both curves shown in Fig. 1, maxima can be clearly identified and the corresponding values α can be immediately determined. The same behavior can be observed for different values of γ, WNR, and DWR. C. Discussion In order to assess how close to capacity the lower bound derived in the previous section is, we have compared the maximum rate R achieved by the proposed IC-SS scheme with Costa s limit, which represents an upper bound for C DPC FD. Moreover, we have also compared the maximum rate R achieved by the proposed IC-SS scheme with the ultimate achievable rate of the Scalar Costa Scheme (SCS) evaluated in [8]. Note that, as discussed in [8], for low WNRs, the SCS can be interpreted as a distortion compensated-spread spectrum (DC-SS) scheme or, equivalently, as an improved spread spectrum (ISS) scheme with linear embedding. More

4 4 R (bits/coefficient) R (bits/coefficient) C (Costa scheme) SCS SS R * (IC SS) DWR = 20 db C (Costa scheme) SCS SS R * (IC SS) (a) DWR = 10 db (b) Fig. 2. Performance comparisons among Costa s capacity limit and the achievable rates of IC-SS, SCS, and SS schemes. Two possible values of DWR are considered: (a) 20 db and (b) 10 db. precisely, in [8] a typical knee behavior of the achievable rate of SCS is observed. In other words: below a critical value of WNR, the achievable rate is the same as those of the DC-SS scheme and of the ISS scheme with linear embedding; for values of WNR above the critical value, the behavior of the achievable rate of SCS follows that of Eggers et al. s scheme [9] with DWR =. For the purpose of comparison, we also evaluated R(0) (i.e., setting α = 0), as this corresponds to the achievable rate of a traditional SS scheme. The achievable rates obtained with the schemes outlined in the previous paragraph are shown in Fig. 2. In particular, two values of DWR are considered: (a) 20 db and (b) 10 db. As anticipated, the achievable rate of the proposed IC-SS scheme approaches Costa s capacity for low values of the, which correspond to moderate-to-low bit-rates. 2 In this regime, in fact, R = C, whereas SCS lies several dbs below 2 A payload of 0.1 bits per sample can be considered a moderate payload for most watermarking applications. the achievable rate. Eventually, the SS scheme achieves the same asymptotic performance of IC-SS when the bit rate tends to zero, but it is considerably worse than IC-SS for practical values of WNR. Finally, we observe that, as opposed to Costa s setup, the DWR has an impact on the achievable performance, since the range of bit-rates for which the lower bound becomes indistinguishable from C DPC depends on DWR. IV. PERFORMANCE ANALYSIS WITH EXPERIMENTALLY ACQUIRED AUDIO SIGNALS According to the approach outlined in Subsection III-B and as confirmed by the results in Fig. 1, for given values of WNR and DWR, the optimized value α, in correspondence to which the achievable rate R = R(α ) is maximized, can be determined. In particular, the corresponding values of I(U;Y) and I(U;S) can be computed and, from them, the corresponding optimal structure of the DTC-SS scheme presented in [5] can be determined as follows. We preliminary recall the informed watermarking scheme presented in [5], where trellis codes, in which the same information is represented by several paths of the trellis, are used. More specifically, we consider a trellis-based transmission scheme where only one out of M input bits represents the actual information bit, while the other M 1 bits, referred to as free bits, are used to create different paths in the trellis associated with the same information sequence. In this context, the set of trellis paths indexed by the free bits can be intepreted as the elements of a bin associated to a given information sequence, thus yielding a dirty trellis code. Hence, the overall gross transmitted rate of the auxiliary channel, comprising the free bits, is M times the net information rate. Drawing a parallel with the theoretical framework presented in Section III, where the rate of the auxiliary channel is I(U;Y) and the actual information rate is R(α) = I(U;Y) I(U;S), the optimal M can finally be determined as: M = I(U;Y) I(U;Y) I(U;S). (11) In the following, we investigate the validity of the predictions of the theoretical approach outlined in Section III considering two acoustic propagation channel models. First, we consider a simple AWGN channel: this is an idealized acoustic propagation channel with no secondary paths (i.e., reflections). Then, we consider a more realistic acoustic propagation channel with multipath. While the AWGN channel case is compliant with the assumptions of the theoretical framework, the multipath channel case is not. A. AWGN Channel In Fig. 3, the optimized value of M, derived from the theoretical model from R, is shown, as a function of the SN R = Q/N, for two single track (mono) audio clips, experimentally acquired with a sampling frequencyf s = Hz, that represent two different music styles: rock and jazz. It can be observed that, increasing the, the optimal value of M increases. For high s, one can take advantage from the knowledge of the host track; for low s, one have

5 jazz rock M=1.5 M=2 M=2.5 M=3 M= M 1.9 BER Fig. 3. M as a function of for 2 different tracks which represent two different music styles: rock and jazz. a lower advantage in the use of the informed scheme of [5], because the channel distortion is comparable with the host signal interference. In order to verify if the theoretical findings match the reality, we present the performance results obtained by applying the DTC-SS watermarking scheme [5], implemented in Matlab, to the experimental acquired audio signals. The watermark is inserted in the frequency interval [1400, 4400] Hz. In Fig. 4, the bit error rate (BER) of the receiver (where the watermark is extracted) is shown, as a function of the, for the two tracks considered in Fig. 3: (a) jazz, (b) rock. In each case, various values of M are considered, namely: 1, 1.5, 2, 2.5, 3. In all cases, γ max is set to 3 db. The following observations can be carried out from the results in Fig. 4. First of all, one can note that, for both jazz and rock audio tracks, for low s a good performance is reached when M = 1: this means that the embedded bits are completely independent from the host track and, hence, the system turns out to be a non-informed embedder with classical clean trellis encoding. Note that the DTC-SS system considered in [5] foreseen that higher values of M, i.e. higher dirtiness, is achieved at the expenses of a lower spreading gain. For low s the informed scheme brings no advantage, as the channel introduces a distortion much more serious than the interference related to the host signal, therefore, the use of M = 1, which maximizes the spreading gain, is the best approach. By comparing Fig. 3 with Fig. 4 (a) we can see that, for the jazz track, the theoretical findings are confirmed by experimental results. Fig. 3 shows that the optimized values of M lie between 1.55 (for low s) and 2.15 (for high s). Fig. 4 (a) shows that, when the is low, both M = 1.5 and M = 2 guarantee a good performance, while for higher s the best performance is obtained with M = 2. Increasing M further leads to a performance loss. Regarding Fig. 4 (b), we can note that for the rock track the theoretical results are not so accurate as in the case of the jazz track. In particular, the best performance is obtained with M = 1.5 while, according to the results in Fig. 3, the BER (a) (b) Fig. 4. BER, as a function of the, for the considered audio clips: (a) jazz and (b) rock. The considered propagation model is represented by a simple AWGN channel. In both cases, various values of M are considered. optimal value of M should lie between 1.7 and However, while the curve related to M = 2 is quite near to that of M = 1.5, the other curves (associated to the other values of M) show a more evident performance degradation. This slight misalignment between the theoretical results and the experimental ones is likely due to the assumption, made in Subsection III-A, that Z is a zero-mean Gaussian random variable. In fact, although this assumption might be verified in the time domain, in the considered watermarking scheme the noise samples belong to the logarithmic MCLT domain and this implies that Z can not be Gaussian. B. Realistic Multi-path Acoustic Channel In this subsection, we investigate the performance of the considered DTC-SS watermarking scheme using, for the propagation environment, the more realistic audio channel model presented in [5]. In Fig. 5, the BER is shown, as a function of the, for the jazz track, considering various values of M. First of all, it can be observed that, regardless of the value of M, the performance significantly degrades with respect to the AWGN case. Although the assumptions behind the theoretical framework do not apply to this propagation environment (Z M=1.5 M=2 M=2.5 M=3 M=1

6 6 BER M=1.5 M=2 M=2.5 M=3 M=1 [5] A. Abrardo, M. Barni, and G. Ferrari. Audio informed watermarking by means of dirty trellis codes. In Information Theory and Applications Workshop (ITA), pages 1 8, [6] S. I. Gelfand and M. S. Pinsker. Coding for channel with random parameters. Problems of Control and Information Theory, 9(1):19 31, [7] T. M. Cover and J. A. Thomas. Elements of Information Theory. Wiley Interscience, New York, [8] L. Pérez-Freire, F. Pérez-González, and S. Voloshynovskiy. An accurate analysis of scalar quantization-based data hiding. IEEE Trans. on Information Forensics and Security, 1(1):80 86, March [9] J. J. Eggers, R. Bäuml, R. Tzschoppe, and B. Girod. Scalar Costa scheme for information embedding. IEEE Trans. on Signal Processing, 51(4): , April Fig. 5. BER, as a function of the, for the jazz audio clip. The considered propagation model is represented by a multi-path audio propagation channel. Various values of M are considered. is not Gaussian at all), a value of M between 1.5. and 2.5 still guarantees the best performance. This means that, in this scenario as well, the informed approach outperforms the non-informed one, especially for high values of the. For low values, the noise energy is comparable to the host signal energy, so that the advantage brought by informed watermarking decreases. V. CONCLUSIONS In this work, we have proposed an information-theoretic modeling framework for the DTC-SS watermarking system introduced in [5]. In particular, we have first derived an upper bound (R ) on Gelfand-Pinsker capacity of a simple Gaussian watermark channel. Then, we have shown how this framework can be used to determine an optimized value of the parameter M, which quantifies the amount of dirtiness of the code (i.e., the amount of embedded information related to the host signal), of the DTC-SS algorithm in [5]. The obtained results, based on the use of experimentally acquired audio traces, show that the proposed information-theoretic framework allows to accurately predict optimized values of M in a simple AWGN communication scenario. Although the proposed theoretical approach is no longer valid for a realistic multipath acoustic channel, the obtained results show that in this propagation scenario as well the informed approach is still the best choice, especially for high values. REFERENCES [1] B. Chen and G. Wornell. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inform. Theory, 47(4): , May [2] I. J. Cox, M. L. Miller, and A. L. McKellips. Watermarking as communications with side information. Proc. IEEE, 87(7): , Jul [3] P. Moulin and J. A. O Sullivan. Information-theoretic analysis of information hiding. IEEE Trans. Inform. Theory, 49(3): , March [4] A. S. Cohen and A. Lapidoth. The Gaussian watermarking game. IEEE Trans. Inform. Theory, 48(6): , June 2002.

Generalized Writing on Dirty Paper

Generalized Writing on Dirty Paper Generalized Writing on Dirty Paper Aaron S. Cohen acohen@mit.edu MIT, 36-689 77 Massachusetts Ave. Cambridge, MA 02139-4307 Amos Lapidoth lapidoth@isi.ee.ethz.ch ETF E107 ETH-Zentrum CH-8092 Zürich, Switzerland

More information

Dirty Paper Writing and Watermarking Applications

Dirty Paper Writing and Watermarking Applications Dirty Paper Writing and Watermarking Applications G.RaviKiran February 10, 2003 1 Introduction Following an underlying theme in Communication is the duo of Dirty Paper Writing and Watermarking. In 1983

More information

Witsenhausen s counterexample and its links with multimedia security problems

Witsenhausen s counterexample and its links with multimedia security problems Witsenhausen s counterexample and its links with multimedia security problems Pedro Comesaña-Alfaro Fernando Pérez-González Chaouki T. Abdallah IWDW 2011 Atlantic City, New Jersey Outline Introduction

More information

X 1 Q 3 Q 2 Y 1. quantizers. watermark decoder N S N

X 1 Q 3 Q 2 Y 1. quantizers. watermark decoder N S N Quantizer characteristics important for Quantization Index Modulation Hugh Brunk Digimarc, 19801 SW 72nd Ave., Tualatin, OR 97062 ABSTRACT Quantization Index Modulation (QIM) has been shown to be a promising

More information

University of Siena. Multimedia Security. Watermark extraction. Mauro Barni University of Siena. M. Barni, University of Siena

University of Siena. Multimedia Security. Watermark extraction. Mauro Barni University of Siena. M. Barni, University of Siena Multimedia Security Mauro Barni University of Siena : summary Optimum decoding/detection Additive SS watermarks Decoding/detection of QIM watermarks The dilemma of de-synchronization attacks Geometric

More information

Rational Dither Modulation: A High-Rate Data-Hiding Method Invariant to Gain Attacks

Rational Dither Modulation: A High-Rate Data-Hiding Method Invariant to Gain Attacks 1 Rational Dither Modulation: A High-Rate Data-Hiding Method Invariant to Gain Attacks Fernando Pérez-González Ý *, Carlos Mosquera Ý, Mauro Barni Þ and Andrea Abrardo Þ. Abstract A novel quantization-based

More information

TCQ PRACTICAL EVALUATION IN THE HYPER-CUBE WATERMARKING FRAMEWORK. 161, rue Ada, Montpellier cedex 05, France contact:

TCQ PRACTICAL EVALUATION IN THE HYPER-CUBE WATERMARKING FRAMEWORK. 161, rue Ada, Montpellier cedex 05, France contact: TCQ PRACTICAL EVALUATION IN THE HYPER-CUBE WATERMARKING FRAMEWORK Marc CHAUMONT 1,2 and Dalila GOUDIA 2 1 University of Nîmes, Place Gabriel Péri, 30000 Nîmes, France 2 Laboratory LIRMM, UMR CNRS 5506,

More information

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Nan Liu and Andrea Goldsmith Department of Electrical Engineering Stanford University, Stanford CA 94305 Email:

More information

2804 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 6, JUNE 2010

2804 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 6, JUNE 2010 2804 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 6, JUNE 2010 Asymptotically Optimum Universal Watermark Embedding and Detection in the High-SNR Regime Pedro Comesaña, Member, IEEE, Neri Merhav,

More information

The Method of Types and Its Application to Information Hiding

The Method of Types and Its Application to Information Hiding The Method of Types and Its Application to Information Hiding Pierre Moulin University of Illinois at Urbana-Champaign www.ifp.uiuc.edu/ moulin/talks/eusipco05-slides.pdf EUSIPCO Antalya, September 7,

More information

The Robustness of Dirty Paper Coding and The Binary Dirty Multiple Access Channel with Common Interference

The Robustness of Dirty Paper Coding and The Binary Dirty Multiple Access Channel with Common Interference The and The Binary Dirty Multiple Access Channel with Common Interference Dept. EE - Systems, Tel Aviv University, Tel Aviv, Israel April 25th, 2010 M.Sc. Presentation The B/G Model Compound CSI Smart

More information

Bernd Girod Information Systems Laboratory Stanford University Stanford, CA , USA

Bernd Girod Information Systems Laboratory Stanford University Stanford, CA , USA Estimation Of Amplitude Modifications before SCS Watermark Detection Joachim J. Eggers and R. Bäuml Telecommunications Laboratory University of Erlangen-Nuremberg Cauerstrasse 7/NT, 9158 Erlangen, Germany

More information

The Duality Between Information Embedding and Source Coding With Side Information and Some Applications

The Duality Between Information Embedding and Source Coding With Side Information and Some Applications IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 5, MAY 2003 1159 The Duality Between Information Embedding and Source Coding With Side Information and Some Applications Richard J. Barron, Member,

More information

On the Rate-Limited Gelfand-Pinsker Problem

On the Rate-Limited Gelfand-Pinsker Problem On the Rate-Limited Gelfand-Pinsker Problem Ravi Tandon Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 74 ravit@umd.edu ulukus@umd.edu Abstract

More information

Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels

Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Jilei Hou, Paul H. Siegel and Laurence B. Milstein Department of Electrical and Computer Engineering

More information

A Simple Converse Proof and a Unified Capacity Formula for Channels with Input Constraints

A Simple Converse Proof and a Unified Capacity Formula for Channels with Input Constraints A Simple Converse Proof and a Unified Capacity Formula for Channels with Input Constraints Youjian Eugene Liu Department of Electrical and Computer Engineering University of Colorado at Boulder eugeneliu@ieee.org

More information

Sparse Regression Codes for Multi-terminal Source and Channel Coding

Sparse Regression Codes for Multi-terminal Source and Channel Coding Sparse Regression Codes for Multi-terminal Source and Channel Coding Ramji Venkataramanan Yale University Sekhar Tatikonda Allerton 2012 1 / 20 Compression with Side-Information X Encoder Rate R Decoder

More information

Practical Watermarking scheme based on Wide Spread Spectrum and Game Theory

Practical Watermarking scheme based on Wide Spread Spectrum and Game Theory Practical Watermarking scheme based on Wide Spread Spectrum and Game Theory Stéphane Pateux,Gaëtan Le Guelvouit IRISA / INRIA-Rennes Campus de Beaulieu 35042 Rennes Cedex, FRANCE. Abstract In this paper,

More information

Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding

Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding To appear in IEEE Trans. Inform. Theory. Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding Brian Chen and Gregory W. Wornell Submitted June

More information

Data-Hiding Capacities of Non-Redundant Complex Wavelets

Data-Hiding Capacities of Non-Redundant Complex Wavelets Data-Hiding Capacities of Non-Redundant Complex Wavelets Lahouari Ghouti School of Computer Science, Queen's University of Belfast. Belfast BT7 INN, United ingdom. Email: L.Ghouti@qub.ac.uk eywords: Digital

More information

Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets

Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets Shivaprasad Kotagiri and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame,

More information

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack A Modified Moment-Based Watermarking Method Robust to Cropping Attack Tianrui Zong, Yong Xiang, and Suzan Elbadry School of Information Technology Deakin University, Burwood Campus Melbourne, Australia

More information

The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR

The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR 1 Stefano Rini, Daniela Tuninetti and Natasha Devroye srini2, danielat, devroye @ece.uic.edu University of Illinois at Chicago Abstract

More information

One Lesson of Information Theory

One Lesson of Information Theory Institut für One Lesson of Information Theory Prof. Dr.-Ing. Volker Kühn Institute of Communications Engineering University of Rostock, Germany Email: volker.kuehn@uni-rostock.de http://www.int.uni-rostock.de/

More information

On the Capacity of the Two-Hop Half-Duplex Relay Channel

On the Capacity of the Two-Hop Half-Duplex Relay Channel On the Capacity of the Two-Hop Half-Duplex Relay Channel Nikola Zlatanov, Vahid Jamali, and Robert Schober University of British Columbia, Vancouver, Canada, and Friedrich-Alexander-University Erlangen-Nürnberg,

More information

Asymptotically Optimum Universal Watermark Embedding and Detection in the High SNR Regime

Asymptotically Optimum Universal Watermark Embedding and Detection in the High SNR Regime Asymptotically Optimum Universal Watermark Embedding and etection in the High SNR Regime Pedro Comesaña, Neri Merhav, and Mauro Barni 1 Abstract The problem of optimum watermark embedding and detection

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

ELEC546 Review of Information Theory

ELEC546 Review of Information Theory ELEC546 Review of Information Theory Vincent Lau 1/1/004 1 Review of Information Theory Entropy: Measure of uncertainty of a random variable X. The entropy of X, H(X), is given by: If X is a discrete random

More information

MMSE DECODING FOR ANALOG JOINT SOURCE CHANNEL CODING USING MONTE CARLO IMPORTANCE SAMPLING

MMSE DECODING FOR ANALOG JOINT SOURCE CHANNEL CODING USING MONTE CARLO IMPORTANCE SAMPLING MMSE DECODING FOR ANALOG JOINT SOURCE CHANNEL CODING USING MONTE CARLO IMPORTANCE SAMPLING Yichuan Hu (), Javier Garcia-Frias () () Dept. of Elec. and Comp. Engineering University of Delaware Newark, DE

More information

Energy State Amplification in an Energy Harvesting Communication System

Energy State Amplification in an Energy Harvesting Communication System Energy State Amplification in an Energy Harvesting Communication System Omur Ozel Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland College Park, MD 20742 omur@umd.edu

More information

Broadcasting over Fading Channelswith Mixed Delay Constraints

Broadcasting over Fading Channelswith Mixed Delay Constraints Broadcasting over Fading Channels with Mixed Delay Constraints Shlomo Shamai (Shitz) Department of Electrical Engineering, Technion - Israel Institute of Technology Joint work with Kfir M. Cohen and Avi

More information

DATA-HIDING codes have been widely used for embedding

DATA-HIDING codes have been widely used for embedding 284 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 3, SEPTEMBER 2009 On Estimation Accuracy of Desynchronization Attack Channel Parameters Shankar Sadasivam, Student Member, IEEE,

More information

Duality Between Channel Capacity and Rate Distortion With Two-Sided State Information

Duality Between Channel Capacity and Rate Distortion With Two-Sided State Information IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 6, JUNE 2002 1629 Duality Between Channel Capacity Rate Distortion With Two-Sided State Information Thomas M. Cover, Fellow, IEEE, Mung Chiang, Student

More information

A Comparison of Two Achievable Rate Regions for the Interference Channel

A Comparison of Two Achievable Rate Regions for the Interference Channel A Comparison of Two Achievable Rate Regions for the Interference Channel Hon-Fah Chong, Mehul Motani, and Hari Krishna Garg Electrical & Computer Engineering National University of Singapore Email: {g030596,motani,eleghk}@nus.edu.sg

More information

The Poisson Channel with Side Information

The Poisson Channel with Side Information The Poisson Channel with Side Information Shraga Bross School of Enginerring Bar-Ilan University, Israel brosss@macs.biu.ac.il Amos Lapidoth Ligong Wang Signal and Information Processing Laboratory ETH

More information

Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels

Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels Anindya Sarkar and B. S. Manjunath Department of Electrical and Computer Engineering, University

More information

On Multiple User Channels with State Information at the Transmitters

On Multiple User Channels with State Information at the Transmitters On Multiple User Channels with State Information at the Transmitters Styrmir Sigurjónsson and Young-Han Kim* Information Systems Laboratory Stanford University Stanford, CA 94305, USA Email: {styrmir,yhk}@stanford.edu

More information

A Framework for Optimizing Nonlinear Collusion Attacks on Fingerprinting Systems

A Framework for Optimizing Nonlinear Collusion Attacks on Fingerprinting Systems A Framework for Optimizing onlinear Collusion Attacks on Fingerprinting Systems egar iyavash Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign Coordinated Science

More information

Joint Source-Channel Coding for the Multiple-Access Relay Channel

Joint Source-Channel Coding for the Multiple-Access Relay Channel Joint Source-Channel Coding for the Multiple-Access Relay Channel Yonathan Murin, Ron Dabora Department of Electrical and Computer Engineering Ben-Gurion University, Israel Email: moriny@bgu.ac.il, ron@ee.bgu.ac.il

More information

Quantization Based Watermarking Methods Against Valumetric Distortions

Quantization Based Watermarking Methods Against Valumetric Distortions International Journal of Automation and Computing 14(6), December 2017, 672-685 DOI: 10.1007/s11633-016-1010-6 Quantization Based Watermarking Methods Against Valumetric Distortions Zai-Ran Wang 1,2 Jing

More information

Image Data Compression. Dirty-paper codes Alexey Pak, Lehrstuhl für Interak<ve Echtzeitsysteme, Fakultät für Informa<k, KIT

Image Data Compression. Dirty-paper codes Alexey Pak, Lehrstuhl für Interak<ve Echtzeitsysteme, Fakultät für Informa<k, KIT Image Data Compression Dirty-paper codes 1 Reminder: watermarking with side informa8on Watermark embedder Noise n Input message m Auxiliary informa

More information

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM ANAYSIS OF A PARTIA DECORREATOR IN A MUTI-CE DS/CDMA SYSTEM Mohammad Saquib ECE Department, SU Baton Rouge, A 70803-590 e-mail: saquib@winlab.rutgers.edu Roy Yates WINAB, Rutgers University Piscataway

More information

ECE Information theory Final (Fall 2008)

ECE Information theory Final (Fall 2008) ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1

More information

Cut-Set Bound and Dependence Balance Bound

Cut-Set Bound and Dependence Balance Bound Cut-Set Bound and Dependence Balance Bound Lei Xiao lxiao@nd.edu 1 Date: 4 October, 2006 Reading: Elements of information theory by Cover and Thomas [1, Section 14.10], and the paper by Hekstra and Willems

More information

On the Secrecy Capacity of the Z-Interference Channel

On the Secrecy Capacity of the Z-Interference Channel On the Secrecy Capacity of the Z-Interference Channel Ronit Bustin Tel Aviv University Email: ronitbustin@post.tau.ac.il Mojtaba Vaezi Princeton University Email: mvaezi@princeton.edu Rafael F. Schaefer

More information

GAUSSIANIZATION METHOD FOR IDENTIFICATION OF MEMORYLESS NONLINEAR AUDIO SYSTEMS

GAUSSIANIZATION METHOD FOR IDENTIFICATION OF MEMORYLESS NONLINEAR AUDIO SYSTEMS GAUSSIANIATION METHOD FOR IDENTIFICATION OF MEMORYLESS NONLINEAR AUDIO SYSTEMS I. Marrakchi-Mezghani (1),G. Mahé (2), M. Jaïdane-Saïdane (1), S. Djaziri-Larbi (1), M. Turki-Hadj Alouane (1) (1) Unité Signaux

More information

Constellation Shaping for Communication Channels with Quantized Outputs

Constellation Shaping for Communication Channels with Quantized Outputs Constellation Shaping for Communication Channels with Quantized Outputs Chandana Nannapaneni, Matthew C. Valenti, and Xingyu Xiang Lane Department of Computer Science and Electrical Engineering West Virginia

More information

Multicoding Schemes for Interference Channels

Multicoding Schemes for Interference Channels Multicoding Schemes for Interference Channels 1 Ritesh Kolte, Ayfer Özgür, Haim Permuter Abstract arxiv:1502.04273v1 [cs.it] 15 Feb 2015 The best known inner bound for the 2-user discrete memoryless interference

More information

On Compound Channels With Side Information at the Transmitter

On Compound Channels With Side Information at the Transmitter IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 52, NO 4, APRIL 2006 1745 On Compound Channels With Side Information at the Transmitter Patrick Mitran, Student Member, IEEE, Natasha Devroye, Student Member,

More information

BASICS OF DETECTION AND ESTIMATION THEORY

BASICS OF DETECTION AND ESTIMATION THEORY BASICS OF DETECTION AND ESTIMATION THEORY 83050E/158 In this chapter we discuss how the transmitted symbols are detected optimally from a noisy received signal (observation). Based on these results, optimal

More information

Double Sided Watermark Embedding and Detection with Perceptual Analysis

Double Sided Watermark Embedding and Detection with Perceptual Analysis DOUBLE SIDED WATERMARK EMBEDDIG AD DETECTIO WITH PERCEPTUAL AALYSIS Double Sided Watermark Embedding and Detection with Perceptual Analysis Jidong Zhong and Shangteng Huang Abstract In our previous work,

More information

Information Hiding and Covert Communication

Information Hiding and Covert Communication Information Hiding and Covert Communication Andrew Ker adk @ comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory Foundations of Security Analysis and Design

More information

Information Theory. Lecture 10. Network Information Theory (CT15); a focus on channel capacity results

Information Theory. Lecture 10. Network Information Theory (CT15); a focus on channel capacity results Information Theory Lecture 10 Network Information Theory (CT15); a focus on channel capacity results The (two-user) multiple access channel (15.3) The (two-user) broadcast channel (15.6) The relay channel

More information

Spread Spectrum Watermarking. Information Technologies for IPR Protection

Spread Spectrum Watermarking. Information Technologies for IPR Protection Spread Spectrum Watermarking Information Technologies for IPR Protection Spread Spectrum Communication A Narrow-band signal is transmitted over a much larger bandwidth such that the signal energy presented

More information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information 204 IEEE International Symposium on Information Theory Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information Omur Ozel, Kaya Tutuncuoglu 2, Sennur Ulukus, and Aylin Yener

More information

On the K-user Cognitive Interference Channel with Cumulative Message Sharing Sum-Capacity

On the K-user Cognitive Interference Channel with Cumulative Message Sharing Sum-Capacity 03 EEE nternational Symposium on nformation Theory On the K-user Cognitive nterference Channel with Cumulative Message Sharing Sum-Capacity Diana Maamari, Daniela Tuninetti and Natasha Devroye Department

More information

Quantization Index Modulation using the E 8 lattice

Quantization Index Modulation using the E 8 lattice 1 Quantization Index Modulation using the E 8 lattice Qian Zhang and Nigel Boston Dept of Electrical and Computer Engineering University of Wisconsin Madison 1415 Engineering Drive, Madison, WI 53706 Email:

More information

Digital Transmission Methods S

Digital Transmission Methods S Digital ransmission ethods S-7.5 Second Exercise Session Hypothesis esting Decision aking Gram-Schmidt method Detection.K.K. Communication Laboratory 5//6 Konstantinos.koufos@tkk.fi Exercise We assume

More information

On Source-Channel Communication in Networks

On Source-Channel Communication in Networks On Source-Channel Communication in Networks Michael Gastpar Department of EECS University of California, Berkeley gastpar@eecs.berkeley.edu DIMACS: March 17, 2003. Outline 1. Source-Channel Communication

More information

Research Article A New QIM-Based Watermarking Method Robust to Gain Attack

Research Article A New QIM-Based Watermarking Method Robust to Gain Attack International Journal of Digital Multimedia Broadcasting, Article ID 9188, 14 pages http://dx.doi.org/1.1155/214/9188 Research Article A New QIM-Based Watermarking Method Robust to Gain Attack Yevhen Zolotavkin

More information

Capacity of a Two-way Function Multicast Channel

Capacity of a Two-way Function Multicast Channel Capacity of a Two-way Function Multicast Channel 1 Seiyun Shin, Student Member, IEEE and Changho Suh, Member, IEEE Abstract We explore the role of interaction for the problem of reliable computation over

More information

Multiple-Input Multiple-Output Systems

Multiple-Input Multiple-Output Systems Multiple-Input Multiple-Output Systems What is the best way to use antenna arrays? MIMO! This is a totally new approach ( paradigm ) to wireless communications, which has been discovered in 95-96. Performance

More information

New wrinkle in dirty paper techniques

New wrinkle in dirty paper techniques New wrinkle in dirty paper techniques Brett Bradley, John Stach Digimarc Corporation, 19801 SW 72 nd Ave, Suite 250, Tualatin, OR, USA 97062 ABSTRACT The many recent publications that focus upon watermarking

More information

Approximately achieving the feedback interference channel capacity with point-to-point codes

Approximately achieving the feedback interference channel capacity with point-to-point codes Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used

More information

SCALABLE AUDIO CODING USING WATERMARKING

SCALABLE AUDIO CODING USING WATERMARKING SCALABLE AUDIO CODING USING WATERMARKING Mahmood Movassagh Peter Kabal Department of Electrical and Computer Engineering McGill University, Montreal, Canada Email: {mahmood.movassagh@mail.mcgill.ca, peter.kabal@mcgill.ca}

More information

arxiv: v1 [cs.it] 4 Jun 2018

arxiv: v1 [cs.it] 4 Jun 2018 State-Dependent Interference Channel with Correlated States 1 Yunhao Sun, 2 Ruchen Duan, 3 Yingbin Liang, 4 Shlomo Shamai (Shitz) 5 Abstract arxiv:180600937v1 [csit] 4 Jun 2018 This paper investigates

More information

Representation of Correlated Sources into Graphs for Transmission over Broadcast Channels

Representation of Correlated Sources into Graphs for Transmission over Broadcast Channels Representation of Correlated s into Graphs for Transmission over Broadcast s Suhan Choi Department of Electrical Eng. and Computer Science University of Michigan, Ann Arbor, MI 80, USA Email: suhanc@eecs.umich.edu

More information

arxiv: v2 [cs.it] 28 May 2017

arxiv: v2 [cs.it] 28 May 2017 Feedback and Partial Message Side-Information on the Semideterministic Broadcast Channel Annina Bracher and Michèle Wigger arxiv:1508.01880v2 [cs.it] 28 May 2017 May 30, 2017 Abstract The capacity of the

More information

Block 2: Introduction to Information Theory

Block 2: Introduction to Information Theory Block 2: Introduction to Information Theory Francisco J. Escribano April 26, 2015 Francisco J. Escribano Block 2: Introduction to Information Theory April 26, 2015 1 / 51 Table of contents 1 Motivation

More information

Communication Engineering Prof. Surendra Prasad Department of Electrical Engineering Indian Institute of Technology, Delhi

Communication Engineering Prof. Surendra Prasad Department of Electrical Engineering Indian Institute of Technology, Delhi Communication Engineering Prof. Surendra Prasad Department of Electrical Engineering Indian Institute of Technology, Delhi Lecture - 41 Pulse Code Modulation (PCM) So, if you remember we have been talking

More information

Decoupling of CDMA Multiuser Detection via the Replica Method

Decoupling of CDMA Multiuser Detection via the Replica Method Decoupling of CDMA Multiuser Detection via the Replica Method Dongning Guo and Sergio Verdú Dept. of Electrical Engineering Princeton University Princeton, NJ 08544, USA email: {dguo,verdu}@princeton.edu

More information

Channel capacity. Outline : 1. Source entropy 2. Discrete memoryless channel 3. Mutual information 4. Channel capacity 5.

Channel capacity. Outline : 1. Source entropy 2. Discrete memoryless channel 3. Mutual information 4. Channel capacity 5. Channel capacity Outline : 1. Source entropy 2. Discrete memoryless channel 3. Mutual information 4. Channel capacity 5. Exercices Exercise session 11 : Channel capacity 1 1. Source entropy Given X a memoryless

More information

CODING WITH SIDE INFORMATION. A Dissertation SZE MING CHENG

CODING WITH SIDE INFORMATION. A Dissertation SZE MING CHENG CODING WITH SIDE INFORMATION A Dissertation by SZE MING CHENG Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF

More information

Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel

Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel Stefano Rini, Ernest Kurniawan and Andrea Goldsmith Technische Universität München, Munich, Germany, Stanford University,

More information

ON SCALABLE CODING OF HIDDEN MARKOV SOURCES. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose

ON SCALABLE CODING OF HIDDEN MARKOV SOURCES. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose ON SCALABLE CODING OF HIDDEN MARKOV SOURCES Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose Department of Electrical and Computer Engineering University of California, Santa Barbara, CA, 93106

More information

Entropies & Information Theory

Entropies & Information Theory Entropies & Information Theory LECTURE I Nilanjana Datta University of Cambridge,U.K. See lecture notes on: http://www.qi.damtp.cam.ac.uk/node/223 Quantum Information Theory Born out of Classical Information

More information

Shannon meets Wiener II: On MMSE estimation in successive decoding schemes

Shannon meets Wiener II: On MMSE estimation in successive decoding schemes Shannon meets Wiener II: On MMSE estimation in successive decoding schemes G. David Forney, Jr. MIT Cambridge, MA 0239 USA forneyd@comcast.net Abstract We continue to discuss why MMSE estimation arises

More information

Joint Compression and Digital Watermarking: Information-Theoretic Study and Algorithms Development

Joint Compression and Digital Watermarking: Information-Theoretic Study and Algorithms Development Joint Compression and Digital Watermarking: Information-Theoretic Study and Algorithms Development by Wei Sun A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for

More information

ECE Information theory Final

ECE Information theory Final ECE 776 - Information theory Final Q1 (1 point) We would like to compress a Gaussian source with zero mean and variance 1 We consider two strategies In the first, we quantize with a step size so that the

More information

An Outer Bound for the Gaussian. Interference channel with a relay.

An Outer Bound for the Gaussian. Interference channel with a relay. An Outer Bound for the Gaussian Interference Channel with a Relay Ivana Marić Stanford University Stanford, CA ivanam@wsl.stanford.edu Ron Dabora Ben-Gurion University Be er-sheva, Israel ron@ee.bgu.ac.il

More information

Optimal Power Control in Decentralized Gaussian Multiple Access Channels

Optimal Power Control in Decentralized Gaussian Multiple Access Channels 1 Optimal Power Control in Decentralized Gaussian Multiple Access Channels Kamal Singh Department of Electrical Engineering Indian Institute of Technology Bombay. arxiv:1711.08272v1 [eess.sp] 21 Nov 2017

More information

Data-aided and blind synchronization

Data-aided and blind synchronization PHYDYAS Review Meeting 2009-03-02 Data-aided and blind synchronization Mario Tanda Università di Napoli Federico II Dipartimento di Ingegneria Biomedica, Elettronicae delle Telecomunicazioni Via Claudio

More information

New communication strategies for broadcast and interference networks

New communication strategies for broadcast and interference networks New communication strategies for broadcast and interference networks S. Sandeep Pradhan (Joint work with Arun Padakandla and Aria Sahebi) University of Michigan, Ann Arbor Distributed Information Coding

More information

On the Capacity of Free-Space Optical Intensity Channels

On the Capacity of Free-Space Optical Intensity Channels On the Capacity of Free-Space Optical Intensity Channels Amos Lapidoth TH Zurich Zurich, Switzerl mail: lapidoth@isi.ee.ethz.ch Stefan M. Moser National Chiao Tung University NCTU Hsinchu, Taiwan mail:

More information

MAHALAKSHMI ENGINEERING COLLEGE-TRICHY QUESTION BANK UNIT V PART-A. 1. What is binary symmetric channel (AUC DEC 2006)

MAHALAKSHMI ENGINEERING COLLEGE-TRICHY QUESTION BANK UNIT V PART-A. 1. What is binary symmetric channel (AUC DEC 2006) MAHALAKSHMI ENGINEERING COLLEGE-TRICHY QUESTION BANK SATELLITE COMMUNICATION DEPT./SEM.:ECE/VIII UNIT V PART-A 1. What is binary symmetric channel (AUC DEC 2006) 2. Define information rate? (AUC DEC 2007)

More information

ECE 564/645 - Digital Communications, Spring 2018 Homework #2 Due: March 19 (In Lecture)

ECE 564/645 - Digital Communications, Spring 2018 Homework #2 Due: March 19 (In Lecture) ECE 564/645 - Digital Communications, Spring 018 Homework # Due: March 19 (In Lecture) 1. Consider a binary communication system over a 1-dimensional vector channel where message m 1 is sent by signaling

More information

ACOMMUNICATION situation where a single transmitter

ACOMMUNICATION situation where a single transmitter IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 9, SEPTEMBER 2004 1875 Sum Capacity of Gaussian Vector Broadcast Channels Wei Yu, Member, IEEE, and John M. Cioffi, Fellow, IEEE Abstract This paper

More information

Security Analysis of ISS Watermarking Using Natural Scene Statistics

Security Analysis of ISS Watermarking Using Natural Scene Statistics Security Analysis of ISS Watermarking Using Natural Scene Statistics Dong Zhang 1, Jiangqun Ni 1, Qiping Zeng 1, Dah-Jye Lee 2, and Jiwu Huang 1 1 School of Information Science and Technology, Sun Yat-sen

More information

Information Theoretical Analysis of Digital Watermarking. Multimedia Security

Information Theoretical Analysis of Digital Watermarking. Multimedia Security Information Theoretical Analysis of Digital Watermaring Multimedia Security Definitions: X : the output of a source with alphabet X W : a message in a discrete alphabet W={1,2,,M} Assumption : X is a discrete

More information

Performance analysis and improvement of dither modulation under the composite attacks

Performance analysis and improvement of dither modulation under the composite attacks Zhu and Ding EURASIP Journal on Advances in Signal Processing 212, 212:53 http://asp.eurasipjournals.com/content/212/1/53 RESEARCH Open Access Performance analysis and improvement of dither modulation

More information

Notes 3: Stochastic channels and noisy coding theorem bound. 1 Model of information communication and noisy channel

Notes 3: Stochastic channels and noisy coding theorem bound. 1 Model of information communication and noisy channel Introduction to Coding Theory CMU: Spring 2010 Notes 3: Stochastic channels and noisy coding theorem bound January 2010 Lecturer: Venkatesan Guruswami Scribe: Venkatesan Guruswami We now turn to the basic

More information

Lecture 4 Noisy Channel Coding

Lecture 4 Noisy Channel Coding Lecture 4 Noisy Channel Coding I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw October 9, 2015 1 / 56 I-Hsiang Wang IT Lecture 4 The Channel Coding Problem

More information

The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel

The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel Stefano Rini, Daniela Tuninetti, and Natasha Devroye Department

More information

Data Detection for Controlled ISI. h(nt) = 1 for n=0,1 and zero otherwise.

Data Detection for Controlled ISI. h(nt) = 1 for n=0,1 and zero otherwise. Data Detection for Controlled ISI *Symbol by symbol suboptimum detection For the duobinary signal pulse h(nt) = 1 for n=0,1 and zero otherwise. The samples at the output of the receiving filter(demodulator)

More information

INFORMATION PROCESSING ABILITY OF BINARY DETECTORS AND BLOCK DECODERS. Michael A. Lexa and Don H. Johnson

INFORMATION PROCESSING ABILITY OF BINARY DETECTORS AND BLOCK DECODERS. Michael A. Lexa and Don H. Johnson INFORMATION PROCESSING ABILITY OF BINARY DETECTORS AND BLOCK DECODERS Michael A. Lexa and Don H. Johnson Rice University Department of Electrical and Computer Engineering Houston, TX 775-892 amlexa@rice.edu,

More information

Compound Polar Codes

Compound Polar Codes Compound Polar Codes Hessam Mahdavifar, Mostafa El-Khamy, Jungwon Lee, Inyup Kang Mobile Solutions Lab, Samsung Information Systems America 4921 Directors Place, San Diego, CA 92121 {h.mahdavifar, mostafa.e,

More information

820 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 2, FEBRUARY Stefano Rini, Daniela Tuninetti, and Natasha Devroye

820 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 2, FEBRUARY Stefano Rini, Daniela Tuninetti, and Natasha Devroye 820 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 2, FEBRUARY 2012 Inner and Outer Bounds for the Gaussian Cognitive Interference Channel and New Capacity Results Stefano Rini, Daniela Tuninetti,

More information

Chapter 9 Fundamental Limits in Information Theory

Chapter 9 Fundamental Limits in Information Theory Chapter 9 Fundamental Limits in Information Theory Information Theory is the fundamental theory behind information manipulation, including data compression and data transmission. 9.1 Introduction o For

More information

Degrees-of-Freedom for the 4-User SISO Interference Channel with Improper Signaling

Degrees-of-Freedom for the 4-User SISO Interference Channel with Improper Signaling Degrees-of-Freedom for the -User SISO Interference Channel with Improper Signaling C Lameiro and I Santamaría Dept of Communications Engineering University of Cantabria 9005 Santander Cantabria Spain Email:

More information

The Choice of MPEG-4 AAC encoding parameters as a direct function of the perceptual entropy of the audio signal

The Choice of MPEG-4 AAC encoding parameters as a direct function of the perceptual entropy of the audio signal The Choice of MPEG-4 AAC encoding parameters as a direct function of the perceptual entropy of the audio signal Claus Bauer, Mark Vinton Abstract This paper proposes a new procedure of lowcomplexity to

More information