Lossless compression with security constraints

Deniz Gündüz, Elza Erkip, H. Vincent Poor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Secure distributed data compression in the presence of an eavesdropper is explored. Two correlated sources that need to be reliably transmitted to a legitimate receiver are available at separate encoders. Noise-free, limited rate links from the encoders to the legitimate receiver, one of which can also be perfectly observed by the eavesdropper, are considered. The eavesdropper also has its own correlated observation. Inner and outer bounds on the achievable compression-equivocation rate region are given. Several different scenarios involving the side information at the transmitters as well as multiple receivers/eavesdroppers are also considered.

Original languageEnglish (US)
Title of host publicationProceedings - 2008 IEEE International Symposium on Information Theory, ISIT 2008
Pages111-115
Number of pages5
DOIs
StatePublished - 2008
Event2008 IEEE International Symposium on Information Theory, ISIT 2008 - Toronto, ON, Canada
Duration: Jul 6 2008Jul 11 2008

Other

Other2008 IEEE International Symposium on Information Theory, ISIT 2008
CountryCanada
CityToronto, ON
Period7/6/087/11/08

Fingerprint

Lossless Compression
Data compression
Transmitters
Receiver
Encoder
Correlated Observations
Side Information
Data Compression
Transmitter
Compression
Scenarios

ASJC Scopus subject areas

  • Applied Mathematics
  • Modeling and Simulation
  • Theoretical Computer Science
  • Information Systems

Cite this

Gündüz, D., Erkip, E., & Poor, H. V. (2008). Lossless compression with security constraints. In Proceedings - 2008 IEEE International Symposium on Information Theory, ISIT 2008 (pp. 111-115). [4594958] https://doi.org/10.1109/ISIT.2008.4594958

Lossless compression with security constraints. / Gündüz, Deniz; Erkip, Elza; Poor, H. Vincent.

Proceedings - 2008 IEEE International Symposium on Information Theory, ISIT 2008. 2008. p. 111-115 4594958.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Gündüz, D, Erkip, E & Poor, HV 2008, Lossless compression with security constraints. in Proceedings - 2008 IEEE International Symposium on Information Theory, ISIT 2008., 4594958, pp. 111-115, 2008 IEEE International Symposium on Information Theory, ISIT 2008, Toronto, ON, Canada, 7/6/08. https://doi.org/10.1109/ISIT.2008.4594958
Gündüz D, Erkip E, Poor HV. Lossless compression with security constraints. In Proceedings - 2008 IEEE International Symposium on Information Theory, ISIT 2008. 2008. p. 111-115. 4594958 https://doi.org/10.1109/ISIT.2008.4594958
Gündüz, Deniz ; Erkip, Elza ; Poor, H. Vincent. / Lossless compression with security constraints. Proceedings - 2008 IEEE International Symposium on Information Theory, ISIT 2008. 2008. pp. 111-115
@inproceedings{64856c70284f461a81bdcd39f84a6d48,
title = "Lossless compression with security constraints",
abstract = "Secure distributed data compression in the presence of an eavesdropper is explored. Two correlated sources that need to be reliably transmitted to a legitimate receiver are available at separate encoders. Noise-free, limited rate links from the encoders to the legitimate receiver, one of which can also be perfectly observed by the eavesdropper, are considered. The eavesdropper also has its own correlated observation. Inner and outer bounds on the achievable compression-equivocation rate region are given. Several different scenarios involving the side information at the transmitters as well as multiple receivers/eavesdroppers are also considered.",
author = "Deniz G{\"u}nd{\"u}z and Elza Erkip and Poor, {H. Vincent}",
year = "2008",
doi = "10.1109/ISIT.2008.4594958",
language = "English (US)",
isbn = "9781424422579",
pages = "111--115",
booktitle = "Proceedings - 2008 IEEE International Symposium on Information Theory, ISIT 2008",

}

TY - GEN

T1 - Lossless compression with security constraints

AU - Gündüz, Deniz

AU - Erkip, Elza

AU - Poor, H. Vincent

PY - 2008

Y1 - 2008

N2 - Secure distributed data compression in the presence of an eavesdropper is explored. Two correlated sources that need to be reliably transmitted to a legitimate receiver are available at separate encoders. Noise-free, limited rate links from the encoders to the legitimate receiver, one of which can also be perfectly observed by the eavesdropper, are considered. The eavesdropper also has its own correlated observation. Inner and outer bounds on the achievable compression-equivocation rate region are given. Several different scenarios involving the side information at the transmitters as well as multiple receivers/eavesdroppers are also considered.

AB - Secure distributed data compression in the presence of an eavesdropper is explored. Two correlated sources that need to be reliably transmitted to a legitimate receiver are available at separate encoders. Noise-free, limited rate links from the encoders to the legitimate receiver, one of which can also be perfectly observed by the eavesdropper, are considered. The eavesdropper also has its own correlated observation. Inner and outer bounds on the achievable compression-equivocation rate region are given. Several different scenarios involving the side information at the transmitters as well as multiple receivers/eavesdroppers are also considered.

UR - http://www.scopus.com/inward/record.url?scp=52349088659&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=52349088659&partnerID=8YFLogxK

U2 - 10.1109/ISIT.2008.4594958

DO - 10.1109/ISIT.2008.4594958

M3 - Conference contribution

SN - 9781424422579

SP - 111

EP - 115

BT - Proceedings - 2008 IEEE International Symposium on Information Theory, ISIT 2008

ER -