30 results on '"Dirty paper"'
Search Results
2. Proper multi‐layer coding in fading dirty‐paper channel
- Author
-
Sayed Ali Khodam Hoseini and Soroush Akhlaghi
- Subjects
Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Transmitter ,020206 networking & telecommunications ,020302 automobile design & engineering ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Computer Science Applications ,Dirty paper ,Channel capacity ,0203 mechanical engineering ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,Fading ,Electrical and Electronic Engineering ,Multi layer ,Computer Science::Information Theory ,Coding (social sciences) ,Communication channel - Abstract
This study investigates multi-layer coding over a dirty-paper channel. First, it is demonstrated that superposition coding in such channel still achieves the capacity of interference-free additive white Gaussian noise channel when the transmitter is non-causally aware of interference signal. Then, the problem is extended to the dirty-paper block fading channel, where it is shown that in the lack of channel information at the transmitter, the so-called broadcast approach maximises the average achievable rate of such channel.
- Published
- 2018
3. On the Fading-Paper Achievable Region of the Fading MIMO Broadcast Channel.
- Author
-
Bennatan, Amir and Burshtein, David
- Subjects
- *
BROADCASTING industry , *MIMO systems , *WIRELESS communications , *TELECOMMUNICATION transmitters & transmission , *CONVEX functions , *GAUSSIAN distribution - Abstract
We consider transmission over the ergodic fading multiple-antenna broadcast (MIMO-BC) channel with partial channel state information at the transmitter and full information at the receiver. Over the equivalent non-fading channel, capacity has recently been shown to be achievable using transmission schemes that were designed for the "dirty paper" channel. We focus on a similar "fading paper" model. The evaluation of the fading paper capacity is difficult to obtain. We confine ourselves to the linear-assignment capacity, which we define, and use convex analysis methods to prove that its maximizing distribution is Gaussian. We compare our fading-paper transmission to an application of dirty paper coding that ignores the partial state information and assumes the channel is fixed at the average fade. We show that a gain is easily achieved by appropriately exploiting the information. We also consider a cooperative upper bound on the sum-rate capacity as suggested by Sato. We present a numeric example that indicates that our scheme is capable of realizing much of this upper bound. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
4. Coding for the Feedback Gel'fand-Pinsker Channel and the Feedforward Wyner-Ziv Source.
- Author
-
Merhav, Ned and Weissman, Tsachy
- Subjects
- *
CODING theory , *DATA compression , *DIGITAL electronics , *GAUSSIAN processes , *INFORMATION measurement , *INFORMATION theory , *SIGNAL processing , *SIGNAL theory , *COMMUNICATIONS industries - Abstract
We consider both channel coding and source coding, with perfect past feedback/feedforward, in the presence of side information. it is first observed that feedback does not increase the capacity of the Gel'fand-Pinsker channel, nor does feedforward improve the achievable rate-distortion performance in the Wyner-Ziv problem. We then focus on the Gaussian case showing that, as in the absence of side information, feedback/feedforward allows to efficiently attain the respective performance limits. In particular, we derive schemes via variations on that of Schalkwijk and Kailath. These variants, which are as simple as their origin and require no binning, are shown to achieve, respectively, the capacity of Costa's channel, and the Wyner-Ziv rate distortion function. Finally, we consider the finite-alphabet setting and derive schemes for both the channel and the source coding problems that attain the fundamental limits, using variations on schemes of Ahlswede and Ooi and Wornell, and of Martinian and Wornell, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
5. Superposition Coding for Side-Information Channels.
- Author
-
Bennatan, Amir, Burshtein, David, Caire, Giuseppe, and Shamai, Shlomo
- Subjects
- *
ELECTRONICS , *WIRELESS communications , *ELECTRONIC systems , *DATA transmission systems , *INFORMATION & communication technologies , *RADIO transmitter-receivers , *PROBABILITY theory , *MATHEMATICAL sequences - Abstract
We present simple, practical codes designed for the binary and Gaussian dirty-paper channels. We show that the dirty-paper decoding problem can be transformed into an equivalent multiple-access decoding problem, for which we apply superposition coding. Our concept is a generalization of the nested lattices approach of Zamir, Shamai, and Erez. In a theoretical setting, our constructions are capable of achieving capacity using random component codes and maximum-likelihood decoding. We also present practical implementations of the constructions, and simulation results for both dirty-paper channels. Our results for the Gaussian dirty-paper channel are on par with the best known results for nested lattices. We discuss the binary dirty-tape channel, for which we present a simple, effective coding technique. Finally, we propose a framework for extending our approach to general Gel'fand-Pinsker channels. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
6. Bounds on the Achievable Rates of Faded Dirty Paper Channel
- Author
-
Wael Abu Shehab and Zouhair Al-qudah
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,business.industry ,Computer science ,0202 electrical engineering, electronic engineering, information engineering ,Electrical engineering ,020206 networking & telecommunications ,02 engineering and technology ,Telecommunications ,business ,Dirty paper ,Communication channel - Published
- 2017
7. Two Lower Bounds on the Secrecy Capacity of the Action-dependent Dirty Paper Wiretap Channel
- Author
-
Linman Yu, Zheng Ma, Zhuojun Zhuang, and Bin Dai
- Subjects
Computer science ,Gaussian ,Transmitter ,020206 networking & telecommunications ,02 engineering and technology ,State (functional analysis) ,Topology ,01 natural sciences ,Action (physics) ,010305 fluids & plasmas ,Dirty paper ,symbols.namesake ,0103 physical sciences ,Secrecy ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,Encoder ,Communication channel - Abstract
In this paper, we study the state-dependent Gaussian wiretap channel with action encoder and noncausal state at the transmitter, which is also called the action-dependent dirty paper wiretap channel. Two lower bounds on the secrecy capacity of this model are provided, and we find that the two bounds have their advantages and disadvantages, i.e., none of the two always performs better than the other. In addition, we find that taking action on the state helps to increase the achievable secrecy rate of the dirty paper wiretap channel.
- Published
- 2019
8. The Dirty Paper Wiretap Feedback Channel with or without Action on the State
- Author
-
Chong Li, Yingbin Liang, Zheng Ma, Shlomo Shamai Shitz, and Bin Dai
- Subjects
Computer science ,Gaussian ,010401 analytical chemistry ,Transmitter ,020206 networking & telecommunications ,02 engineering and technology ,01 natural sciences ,Action (physics) ,0104 chemical sciences ,Dirty paper ,symbols.namesake ,Control theory ,Secrecy ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,State (computer science) ,Communication channel - Abstract
The dirty paper wiretap channel, also referred to as the Gaussian wiretap channel with noncausal state at the transmitter, is revisited. First, we determine the secrecy capacity of the dirty paper wiretap channel with noiseless feedback, where the feedback channel is from the legitimate receiver to the transmitter. Next, we obtain lower and upper bounds on the secrecy capacity of the action-dependent dirty paper wiretap channel with noiseless feedback, and show that these bounds meet for a special case. Unlike the fact that action on the state helps to enhance the capacity of the dirty paper channel with feedback, numerical results of this paper indicate that it may not help to enhance the secrecy capacity of the dirty paper wiretap channel with feedback.
- Published
- 2019
- Full Text
- View/download PDF
9. Constrained Communication Over the Gaussian Dirty Paper Channel
- Author
-
Guojun Chen, Yinfei Xu, and Jian Lu
- Subjects
Mathematical optimization ,Computer science ,Gaussian ,020206 networking & telecommunications ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Upper and lower bounds ,Dirty paper ,symbols.namesake ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,Joint (audio engineering) ,Computer Science::Information Theory ,Communication channel - Abstract
The problem of joint information transmission and input signalling estimation over a state-dependent channel is considered. The general single-letter upper and lower bounds of the optimal capacity-distortion trade-offs are provided. For the Gaussian dirty paper channel, we calculate the bounds by choosing parameters carefully, and obtain a computable form eventually. In such a way, we obtain a complete characterization for this problem setting.
- Published
- 2019
10. Capacity Results on the Action-Dependent Dirty Paper Wiretap Channel
- Author
-
Zheng Ma, Haonan Zhang, and Bin Dai
- Subjects
Computer science ,business.industry ,Gaussian ,Transmitter ,Physical layer ,Topology ,Action (physics) ,Dirty paper ,symbols.namesake ,Secrecy ,symbols ,Wireless ,business ,Computer Science::Cryptography and Security ,Computer Science::Information Theory ,Communication channel - Abstract
The dirty paper wiretap channel, also referred to as the Gaussian wiretap channel with noncausal channel state at the transmitter, plays an important role in wireless physical layer security. In this paper, the dirty paper wiretap channel is revisited by considering actions on the channel state, i.e., the transmitter generates an action sequence that affects the formation of the channel state. Lower and upper bounds on the secrecy capacity of this model are proposed, and numerical results indicate that the actions on the state help to increase the achievable secrecy rate of the dirty paper wiretap channel. The study of this paper offers a new option for enhancing the secrecy rates of the state-dependent wiretap channel models.
- Published
- 2019
11. Dirty paper via a relay with oblivious processing
- Author
-
Michael Peleg and Shlomo Shamai
- Subjects
Computer engineering ,Relay ,law ,Need to know ,Computer science ,Transmitter ,Error correcting ,Computer Science::Information Theory ,Channel use ,law.invention ,Dirty paper ,Coding (social sciences) - Abstract
The Oblivious Relay serves users without a need to know the users error correcting codes. We extend the oblivious relay concept to channels with interference which is known to the transmitter but not to the receiver. Our system uses structured modulation and coding based on lattices. We show that when the interference is known non-causally, it's influence can be overcome wholly and that in simpler causal schemes the performance is usually within the shaping loss of 0.254 bits/channel use from the optimal performance attainable with large lattices.
- Published
- 2017
12. Ecosystem services deserve better than 'dirty paper'
- Author
-
Neelke Doorn, Peter M. Chapman, Wayne R. Munns, and Henriette Selck
- Subjects
Conservation of Natural Resources ,business.industry ,Health, Toxicology and Mutagenesis ,05 social sciences ,Environmental resource management ,010501 environmental sciences ,01 natural sciences ,Risk Assessment ,Article ,Dirty paper ,Ecosystem services ,0502 economics and business ,Environmental Chemistry ,Humans ,050207 economics ,business ,Ecosystem ,0105 earth and related environmental sciences - Published
- 2017
13. Achievable Rates of Gaussian Broadcast Channel with Interference
- Author
-
Zouhair Al-qudah
- Subjects
Causal knowledge ,Single antenna interference cancellation ,business.industry ,Lattice (order) ,Transmitter ,Electrical and Electronic Engineering ,Telecommunications ,business ,Gaussian broadcast channel ,Algorithm ,Computer Science::Information Theory ,Mathematics ,Dirty paper - Abstract
In this paper, we study the achievable region for a Gaussian broadcast channel in the presence of an additional interference at the receivers. We consider that a noisy version of this interference is known to the transmitter and the receivers. A nested lattice code coupled with a dirty paper code is used to compute the achievable region. A two phase causal encoding technique is also proposed in which the interference signal is estimated at the end of the first phase and then the desired signal is transmitted in the second phase. Numerical results show that causal knowledge of the interference can significantly improve the achievable rate region over a scheme that does not use interference cancellation. Results are also shown when the transmitter operates in both half-duplex and fullduplex modes. Index Terms—
- Published
- 2014
14. Lattice strategies for the ergodic fading dirty paper channel
- Author
-
Ahmed Hindy and Aria Nosratinia
- Subjects
business.industry ,020206 networking & telecommunications ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Topology ,Precoding ,Dirty paper ,Fading distribution ,Broadcast channels ,Channel state information ,Lattice (order) ,0202 electrical engineering, electronic engineering, information engineering ,Ergodic theory ,Fading ,Telecommunications ,business ,Computer Science::Information Theory ,Mathematics - Abstract
A modified version of Costa's dirty paper channel is studied, in which both the input signal and the state experience stationary and ergodic time-varying fading. The fading coefficients are assumed to be known exclusively at the receiver. An inner bound of the achievable rates using lattice codes is derived and compared to an outer bound of the capacity. For a wide range of fading distributions, the gap to capacity is within a constant value that does not depend on either the power of the input signal or the state. The results presented in this paper are applied to a class of ergodic fading broadcast channels with receive channel state information, where the achievable rate region is shown to be close to capacity under certain configurations.
- Published
- 2016
15. Nash Fairness Based Resource Allocation Algorithm for Dirty-Paper Coded Multi-user MIMO-OFDM Systems
- Author
-
Fang Xiong, Yi Zhao, Gang Xie, Lingkang Zeng, and Yuanan Liu
- Subjects
Computer science ,business.industry ,Orthogonal frequency-division multiplexing ,Max-min fairness ,Fairness measure ,Resource allocation algorithm ,Electrical and Electronic Engineering ,business ,Multi-user MIMO ,Computer network ,Dirty paper - Published
- 2011
16. Writing on a Dirty Paper in the presence of Jamming
- Author
-
Vinod M. Prabhakaran, Amitalok J. Budkuley, and Bikash Kumar Dey
- Subjects
FOS: Computer and information sciences ,Computer science ,Computer Science - Information Theory ,Gaussian ,Information Theory (cs.IT) ,Jamming ,State (functional analysis) ,Dirty paper ,symbols.namesake ,Additive white Gaussian noise ,symbols ,Encoder ,Algorithm ,Communication channel ,Computer Science::Cryptography and Security ,Computer Science::Information Theory - Abstract
In this paper, the problem of writing on a dirty paper in the presence of jamming is examined. We consider an AWGN channel with an additive white Gaussian state and an additive adversarial jammer. The state is assumed to be known non-causally to the encoder and the jammer but not to the decoder. The capacity of the channel in the presence of a jammer is determined. A surprising result that this capacity is equal to the capacity of a relaxed version of the problem, where the state is also known non-causally to the decoder, is proved.
- Published
- 2014
- Full Text
- View/download PDF
17. An Upper Bound on the Capacity of Vector Dirty Paper with Unknown Spin and Stretch
- Author
-
David T. H. Kao and Ashutosh Sabharwal
- Subjects
010302 applied physics ,FOS: Computer and information sciences ,business.industry ,Gaussian ,Computer Science - Information Theory ,Information Theory (cs.IT) ,Scalar (mathematics) ,Significant difference ,Transmitter ,020206 networking & telecommunications ,02 engineering and technology ,Topology ,01 natural sciences ,Upper and lower bounds ,Dirty paper ,Channel capacity ,symbols.namesake ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,Zero-forcing precoding ,Telecommunications ,business ,Mathematics ,Computer Science::Information Theory - Abstract
Dirty paper codes are a powerful tool for combating known interference. However, there is a significant difference between knowing the transmitted interference sequence and knowing the received interference sequence, especially when the channel modifying the interference is uncertain. We present an upper bound on the capacity of a compound vector dirty paper channel where although an additive Gaussian sequence is known to the transmitter, the channel matrix between the interferer and receiver is uncertain but known to lie within a bounded set. Our bound is tighter than previous bounds in the low-SIR regime for the scalar version of the compound dirty paper channel and employs a construction that focuses on the relationship between the dimension of the message-bearing signal and the dimension of the additive state sequence. Additionally, a bound on the high-SNR behavior of the system is established., Comment: to be presented at ISIT 2013
- Published
- 2013
- Full Text
- View/download PDF
18. Witsenhausen’s Counterexample and Its Links with Multimedia Security Problems
- Author
-
Pedro Comesaña, Chaouki T. Abdallah, and Fernando Pérez-González
- Subjects
Stochastic control ,Theoretical computer science ,Multimedia ,Computer science ,Witsenhausen's counterexample ,Open problem ,Dirty paper coding ,Affine transformation ,computer.software_genre ,Digital watermarking ,computer ,Counterexample ,Dirty paper - Abstract
Witsenhausen's counterexample was proposed more than four decades ago in order to show that affine control strategies are not optimal for systems with non-classical information patterns. Finding the optimal solution to Witsenhausen's problem however remains an open problem. Recently, the stochastic control community has re-discovered Costa's Dirty Paper result as a potential solution to Witsenhausen's problem. In this paper the similarities and differences between Witsenhausen's scenario and multimedia security problems are reviewed, and the historical evolution of the solutions to Witsenhausen's problem compared with those proposed for watermarking detection.
- Published
- 2012
19. Secret writing on dirty paper: A deterministic view
- Author
-
Mustafa El-Halabi, Tie Liu, Shlomo Shamai, and Costas N. Georghiades
- Subjects
FOS: Computer and information sciences ,Approximation theory ,Theoretical computer science ,Computer science ,Information Theory (cs.IT) ,Computer Science - Information Theory ,Gaussian ,Library and Information Sciences ,Information-theoretic security ,Computer Science Applications ,Dirty paper ,symbols.namesake ,Channel capacity ,Secrecy ,symbols ,Dirty paper coding ,Gaussian process ,Gaussian network model ,Information Systems ,Computer Science::Cryptography and Security ,Computer Science::Information Theory ,Deterministic system - Abstract
Recently there has been a lot of success in using the deterministic approach to provide approximate characterization of Gaussian network capacity. In this paper, we take a deterministic view and revisit the problem of wiretap channel with side information. A precise characterization of the secrecy capacity is obtained for a linear deterministic model, which naturally suggests a coding scheme which we show to achieve the secrecy capacity of the degraded Gaussian model (dubbed as "secret writing on dirty paper") to within half a bit., Removed the section on writing on fading paper; improved the gap result from $(1/2)\log3$ bits to half a bit; added a section on secret-key agreement via dirty-paper coding; revised version submitted to the IEEE Transaction on Information Theory
- Published
- 2011
20. Gaussian causal dirty paper capacity is at most log (1 + SNR over e)
- Author
-
Mustafa Kesal and Uri Erez
- Subjects
Discrete mathematics ,Gaussian ,Complex dimension ,Dirty paper ,symbols.namesake ,Channel capacity ,Additive white Gaussian noise ,Gaussian noise ,Bounded function ,Statistics ,symbols ,Entropy (information theory) ,Computer Science::Information Theory ,Mathematics - Abstract
A bound on the capacity of the causal dirty paper problem with arbitrary interference and general independent identically distributed additive noise is derived. In particular, it is shown that for the case of Gaussian noise the capacity is upper bounded by log 2 (1 + SNR over e) bits per real dimension. This bound is useful for SNR ≤ e(e - 2).
- Published
- 2010
21. Tight BER bound of binned orthogonal and quasi-orthogonal dirty-paper codes
- Author
-
Xiaotian Xu and Yong Liang Guan
- Subjects
Block code ,Theoretical computer science ,Gold code ,Data_CODINGANDINFORMATIONTHEORY ,Linear code ,Dirty paper ,Computer Science::Performance ,Computer Science::Networking and Internet Architecture ,Turbo code ,Bit error rate ,Side information ,Algorithm ,Computer Science::Information Theory ,Mathematics ,Coding (social sciences) - Abstract
Existing dirty-paper coding (DPC) schemes based on binned FEC codes lack of tractable BER analysis, hence it is difficult to predict the performance behavior of DPC. In this paper, we derive closed-form BER upper bounds of binned Walsh-Hadamard codes and binned Gold codes as DPC. Their BER upper bounds are verified to be very tight under the condition that the channel contains side information only, or side information plus noise.
- Published
- 2008
22. Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes
- Author
-
Gwenael Doerr, Patrick Bas, GIPSA - Communication, Signal et Sécurité (GIPSA-C2S), Département Images et Signal (GIPSA-DIS), Grenoble Images Parole Signal Automatique (GIPSA-lab), Université Stendhal - Grenoble 3-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS)-Université Stendhal - Grenoble 3-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS)-Grenoble Images Parole Signal Automatique (GIPSA-lab), Université Stendhal - Grenoble 3-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS)-Université Stendhal - Grenoble 3-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS), University College of London [London] (UCL), ANR-05-SSIA-0017,TSAR,Transfert Sécurisé d'images d'Art haute Résolution(2005), Bas, Patrick, and ARA Sécurité des systèmes embarqués et Intelligence Ambiante - Transfert Sécurisé d'images d'Art haute Résolution - - TSAR2005 - ANR-05-SSIA-0017 - SSIA - VALID
- Subjects
[INFO.INFO-TS] Computer Science [cs]/Signal and Image Processing ,Computer science ,Data_MISCELLANEOUS ,ACM ,020206 networking & telecommunications ,Watermark ,02 engineering and technology ,Benchmarking ,Lossy compression ,Computer security ,computer.software_genre ,Dirty paper ,Computer engineering ,[INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing ,Robustness (computer science) ,Resampling ,Information leakage ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Digital watermarking ,computer ,[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing ,[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processing - Abstract
International audience; Benchmarking watermarking systems now goes beyond only evaluating the ability of the embedded watermark to with- stand common signal primitives such as filtering, resampling, lossy compression, D/A-A/D conversions, etc. Evaluation procedures have to consider how much information leaks from a watermarking system since such knowledge could prove most helpful to design very powerful attacks. This paper further refines an attack on dirty paper watermarking schemes which relies on security weaknesses i.e. information leakage. In particular, additional constraints are introduced to be able to handle ‘complex' trellises. Moreover, the ef- ficiency of this attack has been evaluated for different trel- lis configurations. Quite counter-intuitively, increasing the number of states in the trellis seems to enhance both the robustness and the security of the system.
- Published
- 2008
23. Practical Security Analysis of Dirty Paper Trellis Watermarking
- Author
-
Patrick Bas, Gwenael Doerr, Bas, Patrick, Teddy Furon (Editor), François Cayre (Editor), Gwenaël DoërrG (Editor), Patrick Bas (Editor), GIPSA - Communication, Signal et Sécurité (GIPSA-C2S), Département Images et Signal (GIPSA-DIS), Grenoble Images Parole Signal Automatique (GIPSA-lab), Université Stendhal - Grenoble 3-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS)-Université Stendhal - Grenoble 3-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS)-Grenoble Images Parole Signal Automatique (GIPSA-lab), Université Stendhal - Grenoble 3-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS)-Université Stendhal - Grenoble 3-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS), University College of London [London] (UCL), Centre National de la Recherche Scientifique (CNRS)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Université Joseph Fourier - Grenoble 1 (UJF)-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Stendhal - Grenoble 3-Centre National de la Recherche Scientifique (CNRS)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Université Joseph Fourier - Grenoble 1 (UJF)-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Stendhal - Grenoble 3-Grenoble Images Parole Signal Automatique (GIPSA-lab), and Centre National de la Recherche Scientifique (CNRS)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Université Joseph Fourier - Grenoble 1 (UJF)-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Stendhal - Grenoble 3-Centre National de la Recherche Scientifique (CNRS)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Université Joseph Fourier - Grenoble 1 (UJF)-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Stendhal - Grenoble 3
- Subjects
Security analysis ,Computer science ,[INFO.INFO-TS] Computer Science [cs]/Signal and Image Processing ,Data_MISCELLANEOUS ,020206 networking & telecommunications ,02 engineering and technology ,Data_CODINGANDINFORMATIONTHEORY ,computer.software_genre ,Dirty paper ,symbols.namesake ,Additive white Gaussian noise ,[INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing ,Viterbi decoder ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,Embedding ,020201 artificial intelligence & image processing ,Data mining ,Cluster analysis ,[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing ,Algorithm ,computer ,Digital watermarking ,[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processing - Abstract
International audience; This paper analyses the security of dirty paper trellis (DPT) watermarking schemes which use both informed coding and informed em- bedding. After recalling the principles of message embedding with DPT watermarking, the secret parameters of the scheme are highlighted. The security weaknesses of DPT watermarking are then presented: in the wa- termarked contents only attack (WOA) setup, the watermarked data-set exhibits clusters corresponding to the different patterns attached to the arcs of the trellis. The K-means clustering algorithm is used to estimate these patterns and a co-occurrence analysis is performed to retrieve the connectivity of the trellis. Experimental results demonstrate that it is possible to accurately estimate the trellis configuration, which enables to perform attacks much more efficient than simple additive white Gaus- sian noise (AWGN).
- Published
- 2007
24. DPC VS TDMA in SISO Broadcast Channels: A Practical Comparison
- Author
-
Julien Dumont, G. R. Mohammad-Khani, and Samson Lasaulce
- Subjects
business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Time division multiple access ,Data_CODINGANDINFORMATIONTHEORY ,Imperfect channel state information ,Dirty paper ,Broadcast channels ,Computer Science::Networking and Internet Architecture ,Trellis modulation ,Trellis coded quantization ,business ,Algorithm ,Decoding methods ,Computer Science::Information Theory ,Coding (social sciences) ,Computer network ,Mathematics - Abstract
In this paper we want to make a fair comparison between TDMA and DPC in terms of the BER region and maximum number of satisfied users. For this purpose we choose the coding/decoding schemes as follows : DPC is based on a trellis coded quantization implementation and successive coding while TDMA uses trellis coded modulation. Simulation results are provided both for the perfect and imperfect channel state information cases. In the perfect CSI case all the tested scenarios show that TDMA generally outperfoms DPC. In the imperfect CSI case DPC is shown to be less sensitive than TDMA to channel estimation errors.
- Published
- 2006
25. Nested codes for constrained memory and for dirty paper
- Author
-
Gérard D. Cohen and Hans Georg Schaathun
- Subjects
Theoretical computer science ,Hardware_MEMORYSTRUCTURES ,Wireless network ,GeneralLiterature_INTRODUCTORYANDSURVEY ,Binary number ,Data_CODINGANDINFORMATIONTHEORY ,Dirty paper ,Dirty paper coding ,Binary code ,Error detection and correction ,Digital watermarking ,Computer Science::Information Theory ,Mathematics ,Coding (social sciences) - Abstract
Dirty paper coding are relevant for wireless networks, multiuser channels, and digital watermarking. We show that the problem of dirty paper is essentially equivalent to some classes of constrained memories, and we explore the binary so-called nested codes, which are used for efficient coding and error-correction on such channels and memories. © Springer-Verlag Berlin Heidelberg 2006.
- Published
- 2006
26. Applying Erez and ten Brink's dirty paper codes to data-hiding
- Author
-
Comesaña, Pedro, Pérez-González, Fernando, Willems, Frans M.J., Delp, Edward J., Wong, Ping W., and Signal Processing Systems
- Subjects
Repetition (rhetorical device) ,Computer science ,Information hiding ,Turbo code ,Arithmetic ,Computer security ,computer.software_genre ,Digital watermarking ,computer ,Dirty paper - Abstract
Structured codes are known to be necessary in practical implementations of capacity-approaching "dirty paper schemes". In this paper we study the performance of a recently proposed dirty paper technique, by Erez and ten Brink which, to the authors' knowledge, is firstly applied to data-hiding, and compare it with other existing approaches. Specifically, we compare it with conventional side-informed schemes previously used in data-hiding based on repetition and turbo coding. We show that a significant improvement can be achieved using Erez and ten Brink's proposal. We also study the considerations we have to take into account when these codes are used in data-hiding, mainly related with perceptual questions.
- Published
- 2005
27. Near-capacity dirty-paper code designs based on TCQ and IRA codes
- Author
-
A.D. Liveris, Vladimir Stankovic, Zixiang Xiong, and Yong Sun
- Subjects
Channel code ,Theoretical computer science ,Source code ,media_common.quotation_subject ,Vector quantization ,Vector quantisation ,Data_CODINGANDINFORMATIONTHEORY ,EXIT chart ,Dirty paper ,Channel capacity ,Arithmetic ,Mathematics ,Coding (social sciences) ,media_common - Abstract
This paper addresses near-capacity dirty-paper code designs based on TCQ and IRA codes, where the former is employed as the most efficient means of vector quantization and the latter for their capacity-approaching performance. By bringing together TCQ - the best quantizer from the source coding community and EXIT chart based IRA code designs - the best from the channel coding community, we are able to approach the theoretical limit of dirty-paper coding. For example, at 0.25 b/s, one of our code designs (with 1024-state TCQ) performs 0.83 dB away from the capacity
- Published
- 2005
28. Superposition coding for Gaussian dirty paper
- Author
-
Shlomo Shamai, David Burshtein, Amir Bennatan, and Giuseppe Caire
- Subjects
Theoretical computer science ,Channel (digital image) ,Generalization ,Gaussian ,List decoding ,Data_CODINGANDINFORMATIONTHEORY ,Dirty paper ,symbols.namesake ,Gaussian channels ,symbols ,Superposition coding ,Algorithm ,Decoding methods ,Computer Science::Information Theory ,Mathematics - Abstract
We present practical codes designed for the Gaussian dirty paper channel. We show that the dirty paper decoding problem can be transformed into an equivalent multiple-access problem, for which we apply superposition coding. Our approach is a generalization of the nested lattices approach of Zamir et al. (2002). We present simulation results which confirm the effectiveness of our methods.
- Published
- 2004
29. New wrinkle in dirty paper techniques
- Author
-
Brett A. Bradley and John Stach
- Subjects
Amplitude ,Embedding ,Watermark ,Invariant (physics) ,Quantization (image processing) ,Digital watermarking ,Algorithm ,Luminance ,Mathematics ,Dirty paper - Abstract
The many recent publications that focus upon watermarking with side information at the embedder emphasize the fact that this side information can be used to improve practical capacity. Many of the proposed algorithms use quantization to carry out the embedding process. Although both powerful and simple, recovering the original quantization levels, and hence the embedded data, can be difficult if the image amplitude is modified. In our paper, we present a method that is similar to the existing class of quantization-based techniques, but is different in the sense that we first apply a projection to the image data that is invariant to a class of amplitude modifications that can be described as order preserving. Watermark reading and embedding is done with respect to the projected data rather than the original. Not surprisingly, by requiring invariance to amplitude modifications we increase our vulnerability to other types of distortions. Uniform quantization of the projected data generally leads to non-uniform quantization of the original data, which in turn can cause greater susceptibility to additive noise. Later in the paper we describe a strategy that results in an effective compromise between invariance to amplitude modification and noise susceptibility.
- Published
- 2003
30. Capacity bounds and constructions for reversible data-hiding
- Author
-
Frans M. J. Willems and Ton Kalker
- Subjects
Upload ,Optical engineering ,Information hiding ,Information theory ,Digital watermarking ,Algorithm ,Decoding methods ,Coding (social sciences) ,Mathematics ,Dirty paper - Abstract
An undesirable side effect of many watermarking and data-hiding schemes is that the host signal into which auxiliary data is embedded is distorted. Finding an optimal balance between the amount of information embedded and the induced distortion is therefore an active field of research. In recent years, with the rediscovery of Costa's seminal paper Writing on Dirty Paper , there has been considerable progress in understanding the fundamental limits of the capacity versus distortion of watermarking and data-hiding schemes. For some applications, however, no distortion resulting from auxiliary data, however small, is allowed. In these cases the use of reversible data-hiding methods provide a way out. A reversible data-hiding scheme is defined as a scheme that allows complete and blind restoration (i.e. without additional signaling) of the original host data. Practical reversible data-hiding schemes have been proposed by Fridrich et al., but little attention has been paid to the theoretical limits. Some first results on the capacity of reversible watermarking schemes have been derived. The reversible schemes considered in most previous papers have a highly fragile nature: in those schemes, changing a single bit in the watermarked data would prohibit recovery of both the original host signal as well as the embedded auxiliary data. It is the purpose of this paper to repair this situation and to provide some first results on the limits of robust reversible data-hiding. Admittedly, the examples provided in this paper are toy examples, but they are indicative of more practical schemes that will be presented in subsequent papers.© (2003) COPYRIGHT SPIE--The International Society for Optical Engineering. Downloading of the abstract is permitted for personal use only.
- Published
- 2003
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.