2014 IEEE International Symposium on Information Theory 2014
DOI: 10.1109/isit.2014.6875192
|View full text |Cite
|
Sign up to set email alerts
|

The likelihood encoder for lossy source compression

Abstract: Abstract-In this work, a likelihood encoder is studied in the context of lossy source compression. The analysis of the likelihood encoder is based on a soft-covering lemma. It is demonstrated that the use of a likelihood encoder together with the soft-covering lemma gives alternative achievability proofs for classical source coding problems. The case of the rate-distortion function with side information at the decoder (i.e. the Wyner-Ziv problem) is carefully examined and an application of the likelihood encod… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
30
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
5
1

Relationship

6
0

Authors

Journals

citations
Cited by 13 publications
(30 citation statements)
references
References 19 publications
0
30
0
Order By: Relevance
“…For the entirety of the proof, we use the henchman formulation instead of the list reconstruction one. The main idea in the proof of achievability concerns the problem of compressing codewords from a random codebook beyond the rate-distortion limit; the proof also relies on a likelihood encoder [6] and the soft covering lemma [7, Lemma IV.1]. The converse is straightforward, as we now show.…”
Section: Main Results (Lossless Communication)mentioning
confidence: 93%
See 3 more Smart Citations
“…For the entirety of the proof, we use the henchman formulation instead of the list reconstruction one. The main idea in the proof of achievability concerns the problem of compressing codewords from a random codebook beyond the rate-distortion limit; the proof also relies on a likelihood encoder [6] and the soft covering lemma [7, Lemma IV.1]. The converse is straightforward, as we now show.…”
Section: Main Results (Lossless Communication)mentioning
confidence: 93%
“…We now complete the proof of achievability by showing that the likelihood encoder can be used to achieve distortion E d B (X, Y ) at the legitimate receiver (this is also done in [6]). To do this, Node B uses a deterministic decoder that simply produces the codeword indexed by (m, k), i.e., P Y n |M K (y n |m, k) = 1{y n = y n (m, k)}.…”
Section: B Likelihood Encodermentioning
confidence: 95%
See 2 more Smart Citations
“…Remark 7. Since the E γ metric reduces to TV when γ = 1, Theorem 5 generalizes the likelihood source encoder based on the standard soft-covering/resolvability lemma [8]. In [8], the error exponent for the likelihood source encoder at rates above the rate-distortion function is analyzed using the exponential decay of TV in the approximation of output statistics, and the exponent does not match the optimal exponent in [13].…”
Section: Application To Lossy Source Codingmentioning
confidence: 99%