Lossy Source Coding with Reconstruction Privacy
2014 (English)In: 2014 IEEE International Symposium on Information Theory (ISIT), IEEE , 2014, 386-390 p.Conference paper (Refereed)
We consider the problem of lossy source coding with side information under a privacy constraint that the reconstruction sequence at a decoder should be kept secret to a certain extent from another terminal such as an eavesdropper, a sender, or a helper. We are interested in how the reconstruction privacy constraint at a particular terminal affects the rate-distortion tradeoff. In this work, we allow the decoder to use a random mapping, and give inner and outer bounds to the rate-distortion-equivocation region for different cases. In the case where each reconstruction symbol depends only on the source description and current side information symbol, the complete rate-distortion-equivocation region is provided. A binary example illustrating a new tradeoff due to the new privacy constraint, and a gain from the use of randomized decoder is given.
Place, publisher, year, edition, pages
IEEE , 2014. 386-390 p.
, IEEE International Symposium on Information Theory - Proceedings, ISSN 2157-8095
Electric distortion, Signal distortion, Lossy source coding, Outer bounds, Privacy constraints, Random Mappings, Rate distortions, Side information
IdentifiersURN: urn:nbn:se:kth:diva-160803DOI: 10.1109/ISIT.2014.6874860ISI: 000346496100077ScopusID: 2-s2.0-84906536395ISBN: 978-1-4799-5186-4OAI: oai:DiVA.org:kth-160803DiVA: diva2:791263
2014 IEEE International Symposium on Information Theory, ISIT 2014, Honolulu, HI, United States, 29 June 2014 through 4 July 2014
QC 201502272015-02-272015-02-272015-02-27Bibliographically approved