DocumentCode
2512994
Title
Lossless compression with security constraints
Author
Gündüz, Deniz ; Erkip, Elza ; Poor, H. Vincent
Author_Institution
Dept. of Electr. Eng., Princeton Univ., Princeton, NJ
fYear
2008
fDate
6-11 July 2008
Firstpage
111
Lastpage
115
Abstract
Secure distributed data compression in the presence of an eavesdropper is explored. Two correlated sources that need to be reliably transmitted to a legitimate receiver are available at separate encoders. Noise-free, limited rate links from the encoders to the legitimate receiver, one of which can also be perfectly observed by the eavesdropper, are considered. The eavesdropper also has its own correlated observation. Inner and outer bounds on the achievable compression-equivocation rate region are given. Several different scenarios involving the side information at the transmitters as well as multiple receivers/eavesdroppers are also considered.
Keywords
cryptography; data compression; encoding; telecommunication security; cryptography; eavesdropping; encoding; lossless compression; secure distributed data compression; Computer security; Data compression; Data security; Monitoring; Quality of service; Reliability engineering; Transmitters; Video compression; Video surveillance; Wireless sensor networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Theory, 2008. ISIT 2008. IEEE International Symposium on
Conference_Location
Toronto, ON
Print_ISBN
978-1-4244-2256-2
Electronic_ISBN
978-1-4244-2257-9
Type
conf
DOI
10.1109/ISIT.2008.4594958
Filename
4594958
Link To Document