TY - GEN
T1 - Lossless compression with security constraints
AU - Gündüz, Deniz
AU - Erkip, Elza
AU - Poor, H. Vincent
PY - 2008
Y1 - 2008
N2 - Secure distributed data compression in the presence of an eavesdropper is explored. Two correlated sources that need to be reliably transmitted to a legitimate receiver are available at separate encoders. Noise-free, limited rate links from the encoders to the legitimate receiver, one of which can also be perfectly observed by the eavesdropper, are considered. The eavesdropper also has its own correlated observation. Inner and outer bounds on the achievable compression-equivocation rate region are given. Several different scenarios involving the side information at the transmitters as well as multiple receivers/eavesdroppers are also considered.
AB - Secure distributed data compression in the presence of an eavesdropper is explored. Two correlated sources that need to be reliably transmitted to a legitimate receiver are available at separate encoders. Noise-free, limited rate links from the encoders to the legitimate receiver, one of which can also be perfectly observed by the eavesdropper, are considered. The eavesdropper also has its own correlated observation. Inner and outer bounds on the achievable compression-equivocation rate region are given. Several different scenarios involving the side information at the transmitters as well as multiple receivers/eavesdroppers are also considered.
UR - http://www.scopus.com/inward/record.url?scp=52349088659&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=52349088659&partnerID=8YFLogxK
U2 - 10.1109/ISIT.2008.4594958
DO - 10.1109/ISIT.2008.4594958
M3 - Conference contribution
AN - SCOPUS:52349088659
SN - 9781424422579
T3 - IEEE International Symposium on Information Theory - Proceedings
SP - 111
EP - 115
BT - Proceedings - 2008 IEEE International Symposium on Information Theory, ISIT 2008
T2 - 2008 IEEE International Symposium on Information Theory, ISIT 2008
Y2 - 6 July 2008 through 11 July 2008
ER -