#### Filter Results:

#### Publication Year

2005

2010

#### Co-author

#### Key Phrase

#### Publication Venue

Learn More

—We investigate the computation of Csiszár's bounds for the joint source–channel coding (JSCC) error exponent of a communication system consisting of a discrete memoryless source and a discrete memoryless channel. We provide equivalent expressions for these bounds and derive explicit formulas for the rates where the bounds are attained. These equivalent… (More)

We study the error exponent, E J , for reliably transmitting a discrete stationary ergodic Markov (SEM) source Q over a discrete channel W with additive SEM noise via a joint source-channel (JSC) code. We first establish an upper bound for E J in terms of the Rényi entropy rates of the source and noise processes. We next investigate the analytical… (More)

—We investigate the joint source–channel coding (JSCC) excess distortion exponent E J (the exponent of the probability of exceeding a prescribed distortion level) for some memo-ryless communication systems with continuous alphabets. We first establish upper and lower bounds for EJ for systems consisting of a memoryless Gaussian source under the… (More)

—We study the transmission of two discrete memoryless correlated sources, consisting of a common and a private source, over a discrete memoryless multiterminal channel with two transmitters and two receivers. At the transmitter side, the common source is observed by both encoders but the private source can only be accessed by one encoder. At the receiver… (More)

We investigate the computation of Csiszár's bounds for the joint source-channel coding (JSCC) error exponent, E J , of a communication system consisting of a discrete memoryless source and a discrete memoryless channel. We provide equivalent expressions for these bounds and derive explicit formulas for the rates where the bounds are attained. These… (More)

We consider a public multiuser information embedding (watermarking) system in which two messages (watermarks) are independently embedded into two correlated covertexts and are transmitted through a multiple-access attack channel. The tradeoff between the achievable embedding rates and the average distortions for the two embedders is studied. For given… (More)

—We establish random-coding lower bounds to the error exponent of discrete and Gaussian joint quantization and private watermarking systems. In the discrete system, both the covertext and the attack channel are memoryless and have finite alphabets. In the Gaussian system, the covertext is memory-less Gaussian and the attack channel has additive memoryless… (More)

— We consider a public multiuser information embedding (watermarking) system in which two messages (watermarks) are independently embedded into two correlated covertexts and are transmitted through a multiple-access attack channel. The tradeoff between the achievable embedding rates and the average distortions for the two embedders is studied. For given… (More)

- ‹
- 1
- ›