2012
DOI: 10.1109/tit.2012.2201346
|View full text |Cite
|
Sign up to set email alerts
|

Reliability in Source Coding With Side Information

Abstract: We study error exponents for source coding with side information. Both achievable exponents and converse bounds are obtained for the following two cases: lossless source coding with coded information (SCCSI) and lossy source coding with full side information (Wyner-Ziv). These results recover and extend several existing results on source-coding error exponents and are tight in some circumstances. Our bounds have a natural interpretation as a two-player game between nature and the code designer, with nature see… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
38
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(43 citation statements)
references
References 34 publications
1
38
0
Order By: Relevance
“…To subsequently apply this lemma to calculate the joint excess-distortion probability, we need to define the notion of Gaussian types (cf. [16], [17]) carefully. Indeed, the quantizations of the power of the source for the second-order and moderate deviations analyses are different and they need to be chosen carefully.…”
Section: A Main Contributionsmentioning
confidence: 99%
“…To subsequently apply this lemma to calculate the joint excess-distortion probability, we need to define the notion of Gaussian types (cf. [16], [17]) carefully. Indeed, the quantizations of the power of the source for the second-order and moderate deviations analyses are different and they need to be chosen carefully.…”
Section: A Main Contributionsmentioning
confidence: 99%
“…Also letZ =Ỹ per (172). It should be noted here that, in this case, T c (γ c ) defined in (173) is equivalent to T WAK c (γ c ) defined in (51). Now, let us consider the stochastic map ϕ C constructed from the smoothed measureP LỸ (cf.…”
Section: A Code Constructionmentioning
confidence: 99%
“…For PDF, our work leverages on the proofs of the various forms of the packing lemmas for multiuser channels in Haroutunian et al [9]. For CF, since it is related to Wyner-Ziv, we leverage on the work of Kelly-Wagner [10] who derived an achievable exponent for Wyner-Ziv. In a similar vein, [11] and [12] derived lower bounds for the error exponents of Gel'fand-Pinsker and content identification respectively.…”
Section: A Related Workmentioning
confidence: 99%
“…The receiver decodes both the bin index and the message. This combination of covering and packing leads to a more involved analysis that needs to leverage on ideas in [10] where the error exponent for Wyner-Ziv was derived. It also leverages on a technique [6] to analyze the error when two indices are to be simultaneously decoded given a channel output.…”
Section: Partial Decode-forwardmentioning
confidence: 99%
See 1 more Smart Citation