2004
DOI: 10.1109/tit.2004.836706
|View full text |Cite
|
Sign up to set email alerts
|

On Properties of Rate-Reliability-Distortion Functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2006
2006
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…The idea of analyzing the inverse function of the error exponent was first introduced by Haroutunian et al [9], [10]. They defined the rate-reliability-distortion function as the minimum rate at which the messages of a source can be encoded and then reconstructed by the decoder with an exponentially decreasing probability of error, and proved that the optimal rate-reliability-distortion function is given by (10).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The idea of analyzing the inverse function of the error exponent was first introduced by Haroutunian et al [9], [10]. They defined the rate-reliability-distortion function as the minimum rate at which the messages of a source can be encoded and then reconstructed by the decoder with an exponentially decreasing probability of error, and proved that the optimal rate-reliability-distortion function is given by (10).…”
Section: Resultsmentioning
confidence: 99%
“…3) Minimax theorem: We substitute ( 11) into (10). Then, except for the maximization over ν ≥ 0, we have to evaluate the following saddle point w.r.t.…”
Section: ) a Parametric Expression For The Rate Distortion Functionmentioning
confidence: 99%
“…It turns out (as coming discussion shows) that the described guessing problem is substantially interconnected with the problem of source lossy coding subject to distortion and reliability criteria. The latter, according to [15], as well as further works [14], [19], treats the Shannon rate-distortion coding in view of the error probability exponential decay with exponent E. This implies a more general optimal relation, rate-reliability-distortion one R(P * , E, ∆) between the coding parameters instead of the rate-distortion function R(P * , ∆). For more details, let f c : X N → {1, 2, · · · , C(N)} be an encoding mapping for source N-vectors with C(N) standing for the volume of the code.…”
Section: Proof Of Theoremmentioning
confidence: 99%
“…Denote by GN (w, P ) a guessing strategy of the wiretapper that for any encryption function guarantees small error probability: e(L(N), GN (w, P ), ∆) ≤ exp{−NE}. Regardless the source probability distribution the optimal guessing strategy under the condition (19) is the key-search attack. The wiretapper can then find the exact x applying description function f −1 N on the key vector and w. Of course it is supposed that guessing of the exact x is also acceptable for the wiretapper.…”
Section: Proof Of Theoremmentioning
confidence: 99%
See 1 more Smart Citation