2018
DOI: 10.1109/tit.2018.2842775
|View full text |Cite
|
Sign up to set email alerts
|

Exponential Strong Converse for Content Identification With Lossy Recovery

Abstract: We revisit the high-dimensional content identification with lossy recovery problem (Tuncel and Gündüz, 2014) and establish an exponential strong converse theorem. As a corollary of the exponential strong converse theorem, we derive an upper bound on the joint identification-error and excess-distortion exponent for the problem. Our main results can be specialized to the biometrical identification problem (Willems, 2003) and the content identification problem (Tuncel, 2009) since these two problems are both spec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 13 publications
(24 citation statements)
references
References 59 publications
0
24
0
Order By: Relevance
“…We first obtain a non-asymptotic upper bound using the information spectrum of log-likelihoods involved in the definition of ω (µ,α k ,β k ) QT (see (16)) and then apply Cramér's bound on large deviations (see e.g., [29,Lemma 13]) to obtain an exponential type non-asymptotic upper bound. Subsequently, we apply the recursive method [23] and proceed similarly as in [29] to obtain the desired result. Our method can also be used to establish similar results for other source coding problems with causal decoder side information [15], [18], [20].…”
Section: B Main Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…We first obtain a non-asymptotic upper bound using the information spectrum of log-likelihoods involved in the definition of ω (µ,α k ,β k ) QT (see (16)) and then apply Cramér's bound on large deviations (see e.g., [29,Lemma 13]) to obtain an exponential type non-asymptotic upper bound. Subsequently, we apply the recursive method [23] and proceed similarly as in [29] to obtain the desired result. Our method can also be used to establish similar results for other source coding problems with causal decoder side information [15], [18], [20].…”
Section: B Main Resultsmentioning
confidence: 99%
“…i.e., strong converse holds for the k-user causal successive refinement problem. Using the strong converse theorem and Marton's change-of-measure technique [36], similarly to [29,Theorem 5], we can also derive an upper bound on the exponent of the excess-distortion probability. Furthermore, applying the one-shot techniques in [37], we can also establish a non-asymptotic achievability bound.…”
Section: B Main Resultsmentioning
confidence: 99%
See 3 more Smart Citations