Reliability Criteria in Source Coding Problem with Secret Component
Keywords:
Rate-reliability-distortion-equivocation function, Source codingAbstract
This work addresses a source coding problem for one-way sources with correlated outputs. In this scenario, one source output must be transmitted to the receiver within a specified distortion level, similar to conventional source coding. Simultaneously,
the other source output must be kept as confidential as possible from the receiver or a potential wiretapper. For this model, the rate-reliability-distortion-equivocation function and the equivocation-reliability-distortion function are defined and analyzed.
References
C. E. Shannon, “Coding theorems for a discrete source with a fidelity criterion”, IRE National Convention Record, vol. 7, pp.142–163, 1959.
H. Yamamoto, “A source coding problem for sources with additional outputs to keep secret from the receiver or wiretappers”, IEEE Transactions on Information Theory, vol. 29, no. 6, pp. 918–923, 1983.
H. Yamamoto, ”Source coding theory for cascade and branching communication systems”, IEEE Transactions on Information Theory, vol. 27, no. 3, pp. 299–308, 1981.
H. Yamamoto, ”A rate-distortion problem for a communication system with a secondarydecoder to be hindered”, IEEE Transactions on Information Theory, vol. 34, no. 4, pp. 835–842, 1988.
H. Yamamoto, ”Rate-distortion theory for the Shannon cipher system”, IEEE Transactions on Information Theory, vol. 43, no. 3, pp. 827–835, 1997.
E. Haroutunian, M. Haroutunian and A. Harutyunyan, “Reliability Criteria in Information Theory and in Statistical Hypothesis Testing”, Foundations and Trends in Communications and Information Theory, vol. 4, nos 2-3, pp. 97–263, 2007. doi: 10.1561/0100000008
E. Haroutunian, A. Harutyunyan, A. Ghazaryan and E. van der Meulen, ”On branching communication system rates-reliability-distortions region with partial secrecy under distortion criterion”, Mathematical Problems of Computer Science, vol. 21, pp. 61–76, 2000.
L. Sankar, S. R. Rajagopalan and H. V. Poor, “Utility-privacy tradeoffs in databases: an information-theoretic approach”, IEEE Transactions on Information Theory, vol. 8, no. 6, pp. 838–852, 2013.
T. M. Cover and J. A. Thomas, Elements of Information Theory, Second Edition. Wiley, New York, 2006.
I. Csiszár, “Method of types”, IEEE Transactions on Information Theory, vol. 44, no. 6, pp. 2505-2523, 1998.
I. Csiszár and J. Körner, Information Theory: Coding Theorems for Discrete Memoryless Systems, Academic Press, New York, 1981.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Mariam E. Haroutunian, Jemma S. Santrosyan and Parandzem M. Hakobyan

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.