{"title":"Information integrity between correlated sources through Wyner-Ziv coding","authors":"Eric Graves, T. Wong","doi":"10.1109/ITWF.2015.7360790","DOIUrl":null,"url":null,"abstract":"In this paper, the problem of achieving information integrity in the classical Wyner-Ziv lossy source coding model is considered. A discrete memoryless source encodes its source sequence using the standard Wyner-Ziv coding technique and forwards the bin index to another source that employs the bin index and its own correlated sequence to decode the first source's sequence. There is an adversary who may arbitrarily modify the bin index sent to the decoder. It is assumed the adversary may base the attack on the true bin index, its own sequence (which may be correlated to both the encoder and decoder sequences) as well as the known codebook used by the sources. It is shown that a non-simulatability condition on the joint source distribution is necessary and sufficient to achieve information integrity. However, the additional requirement of information integrity may incur a penalty on the rate-distortion performance.","PeriodicalId":281890,"journal":{"name":"2015 IEEE Information Theory Workshop - Fall (ITW)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE Information Theory Workshop - Fall (ITW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITWF.2015.7360790","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Information integrity between correlated sources through Wyner-Ziv coding
In this paper, the problem of achieving information integrity in the classical Wyner-Ziv lossy source coding model is considered. A discrete memoryless source encodes its source sequence using the standard Wyner-Ziv coding technique and forwards the bin index to another source that employs the bin index and its own correlated sequence to decode the first source's sequence. There is an adversary who may arbitrarily modify the bin index sent to the decoder. It is assumed the adversary may base the attack on the true bin index, its own sequence (which may be correlated to both the encoder and decoder sequences) as well as the known codebook used by the sources. It is shown that a non-simulatability condition on the joint source distribution is necessary and sufficient to achieve information integrity. However, the additional requirement of information integrity may incur a penalty on the rate-distortion performance.