• 제목/요약/키워드: Distributed source coding

검색결과 23건 처리시간 0.018초

실제적인 분산 비디오 부호화를 위한 분산 소스 부호화 시스템의 피드백 지연 문제 개선 방안 (Improvement of Feedback Delay for Practical Distributed Source Coding)

  • 신승식;신상윤;장민;임대운;김상효
    • 방송공학회논문지
    • /
    • 제17권1호
    • /
    • pp.122-128
    • /
    • 2012
  • 본 논문에서는 실제적으로 사용 가능한 분산 비디오 부호화 (Distributed Vedio Coding, DVC) 시스템을 구현하기 위하여 기존의 문제였던 높은 피드백 재전송 횟수에 의한 복원 지연문제를 개선하는 방법을 제안한다. 이는 각 압축률 영역에 맞추어 설계된 저밀도 패리티 검사 (Low-Density Parity-Check, LDPC) 부호를 사용함으로써 복원 성능을 높이고 각 부호가 복호에 실패할 경우 다른 부호율의 LDPC 부호를 구성하기 위한 소스 공개 (Source Revealing) 기법을 사용하여 피드백 전송 수를 줄임으로써 문제를 해결한다. 모의 실험 결과, 제안된 방법에 따른 DVC 방법은 기존 방법에 비해 57%의 복호 성능 개선 효과를 얻어 피드백 재전송 횟수를 50% 이상 감소시켰다.

A Distributed Privacy-Utility Tradeoff Method Using Distributed Lossy Source Coding with Side Information

  • Gu, Yonghao;Wang, Yongfei;Yang, Zhen;Gao, Yimu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권5호
    • /
    • pp.2778-2791
    • /
    • 2017
  • In the age of big data, distributed data providers need to ensure the privacy, while data analysts need to mine the value of data. Therefore, how to find the privacy-utility tradeoff has become a research hotspot. Besides, the adversary may have the background knowledge of the data source. Therefore, it is significant to solve the privacy-utility tradeoff problem in the distributed environment with side information. This paper proposes a distributed privacy-utility tradeoff method using distributed lossy source coding with side information, and quantitatively gives the privacy-utility tradeoff region and Rate-Distortion-Leakage region. Four results are shown in the simulation analysis. The first result is that both the source rate and the privacy leakage decrease with the increase of source distortion. The second result is that the finer relevance between the public data and private data of source, the finer perturbation of source needed to get the same privacy protection. The third result is that the greater the variance of the data source, the slighter distortion is chosen to ensure more data utility. The fourth result is that under the same privacy restriction, the slighter the variance of the side information, the less distortion of data source is chosen to ensure more data utility. Finally, the provided method is compared with current ones from five aspects to show the advantage of our method.

LDPCA 부호를 이용한 실용적 분산 소스 부호화의 복호복잡도 (Complexity of Distributed Source Coding using LDPCA Codes)

  • 장민;강진환;김상효
    • 한국통신학회논문지
    • /
    • 제35권4C호
    • /
    • pp.329-336
    • /
    • 2010
  • 분산 소스 부호화 시스템은 복호복잡도가 높다는 문제점을 갖는다. 본 논문에서는 신드롬 기반의 분산 소스 부호인 low-density parity check accumulate (LDPCA) 부호의 복호복잡도를 효율적으로 낮추기 위하여 LDPC 부호에 사용되는 각종 정지조건을 LDPCA 복호기에 적용하고 이에 따른 복잡도를 평가하였다. 대표적으로 convergence of mean magnitude (CMM) 정지 조건을 적용하여, 정지 조건을 사용하지 않았을 때보다 압축부호율 손실을 2% 이하로 발생시키며 약 85%의 복호복잡도 감소 효과를 얻을 수 있었다. 더불어 사용되는 부호의 성능을 파악하고 있을 때 초기에 과잉 신드롬을 전송하는 방법과, 채널 정보가 얻기 힘든 경우 기존 정지조건을 부호율 적응적인 LDPCA 부호에 적합하게 수정하는 방법을 제안하였다.

Outage Analysis and Power Allocation for Distributed Space-Time Coding-Based Cooperative Systems over Rayleigh Fading Channels

  • Lee, In-Ho
    • Journal of information and communication convergence engineering
    • /
    • 제15권1호
    • /
    • pp.21-27
    • /
    • 2017
  • In this research, we study the outage probability for distributed space-time coding-based cooperative (DSTC) systems with amplify-and-forward relaying over Rayleigh fading channels with a high temporal correlation where the direct link between the source and the destination is available. In particular, we derive the upper and lower bounds of the outage probability as well as their corresponding asymptotic expressions. In addition, using only the average channel powers for the source-to-relay and relay-to-destination links, we propose an efficient power allocation scheme between the source and the relay to minimize the asymptotic upper bound of the outage probability. Through a numerical investigation, we verify the analytical expressions as well as the effectiveness of the proposed efficient power allocation. The numerical results show that the lower and upper bounds tightly correspond to the exact outage probability, and the proposed efficient power allocation scheme provides an outage probability similar to that of the optimal power allocation scheme that minimizes the exact outage probability.

부호율 적응적 분산 소스 부호화를 위한 극부호의 설계 (On the Construction of Polar Codes for Rate Adaptive Distributed Source Coding)

  • 김재열;김종환;;김상효
    • 전자공학회논문지
    • /
    • 제52권10호
    • /
    • pp.3-10
    • /
    • 2015
  • 본 논문에서는 비대칭 Slepian-Wolf 부호화에 극부호를 적용하는 방법을 고려하며, 부호율 적응성을 갖도록 극부호를 설계하는 방법을 제시한다. 제안된 극부호 기반 분산 소스 부호화에 연속제거 리스트 복호 기법을 적용하는 경우에 Slepian-Wolf의 한계에 매우 근접함을 확인하였으며, 이는 기존의 저밀도 패리티 검사 부호를 이용한 구현보다 현저하게 향상된 것이다.

Energy-efficient data transmission technique for wireless sensor networks based on DSC and virtual MIMO

  • Singh, Manish Kumar;Amin, Syed Intekhab
    • ETRI Journal
    • /
    • 제42권3호
    • /
    • pp.341-350
    • /
    • 2020
  • In a wireless sensor network (WSN), the data transmission technique based on the cooperative multiple-input multiple-output (CMIMO) scheme reduces the energy consumption of sensor nodes quite effectively by utilizing the space-time block coding scheme. However, in networks with high node density, the scheme is ineffective due to the high degree of correlated data. Therefore, to enhance the energy efficiency in high node density WSNs, we implemented the distributed source coding (DSC) with the virtual multiple-input multiple-output (MIMO) data transmission technique in the WSNs. The DSC-MIMO first compresses redundant source data using the DSC and then sends it to a virtual MIMO link. The results reveal that, in the DSC-MIMO scheme, energy consumption is lower than that in the CMIMO technique; it is also lower in the DSC single-input single-output (SISO) scheme, compared to that in the SISO technique at various code rates, compression rates, and training overhead factors. The results also indicate that the energy consumption per bit is directly proportional to the velocity and training overhead factor in all the energy saving schemes.

Wyner-Ziv 부호화기를 위한 필드 부호화 기반 개선된 보조정보 생성 (Improved Side Information Generation using Field Coding for Wyner-Ziv Codec)

  • 한찬희;전영일;이시웅
    • 한국콘텐츠학회논문지
    • /
    • 제9권11호
    • /
    • pp.10-17
    • /
    • 2009
  • Wyner-Ziv 비디오 부호화 기술은 Slepian-Wolf와 Wyner-Ziv의 분산 정보원 부호화 (DSC : distributed source coding) 이론을 기반으로 한 새로운 비디오 압축 패러다임이다. Wyner-Ziv 부호화는 기존 부호화기 측의 복잡한 작업을 복호화기 측으로 이동시킴으로써 단순한 부호화기/복잡한 복호화기의 구조를 실현한다. Wyner-Ziv 복호화기는 원영상의 예측신호인 보조정보를 생성하기 위해 움직임 추정 및 보상을 수행하며, Wyner-Ziv 부호화기의 정보량은 이 보조정보에 직접적으로 의존하기 때문에 보조정보 생성효율은 전체 부호화 성능에 큰 영향을 미친다. 본 논문에서는 필드 부호화를 이용한 개선된 보조정보 생성방법을 제안한다. 우선 top 필드는 기존의 방식으로 부호화되고, bottom 필드는 이미 복호화 된 top 필드의 정보를 이용한 새로운 보조정보 생성방식으로 부호화된다. 실험결과를 통해 제안된 보조정보 생성방식이 기존의 방식과 비교할 때, 율-왜곡 성능 및 주관적 화질이 개선되었음을 알 수 있다.

Markov 그라픽 데이타에 대한 incremental-runlength의 확률분포 (Incremental-runlength distribution for Markov graphic data source)

  • 김재균
    • 전기의세계
    • /
    • 제29권6호
    • /
    • pp.389-392
    • /
    • 1980
  • For Markov graphic source, it is well known that the conditional runlength coding for the runs of correct prediction is optimum for data compression. However, because of the simplicity in counting and the stronger concentration in distrubution, the incremental run is possibly a better parameter for coding than the run itself for some cases. It is shown that the incremental-runlength is also geometrically distributed as the runlength itself. The distribution is explicitly described with the basic parameters defined for a Markov model.

  • PDF

Homomorphic Subspace MAC Scheme for Secure Network Coding

  • Liu, Guangjun;Wang, Xiao
    • ETRI Journal
    • /
    • 제35권1호
    • /
    • pp.173-176
    • /
    • 2013
  • Existing symmetric cryptography-based solutions against pollution attacks for network coding systems suffer various drawbacks, such as highly complicated key distribution and vulnerable security against collusion. This letter presents a novel homomorphic subspace message authentication code (MAC) scheme that can thwart pollution attacks in an efficient way. The basic idea is to exploit the combination of the symmetric cryptography and linear subspace properties of network coding. The proposed scheme can tolerate the compromise of up to r-1 intermediate nodes when r source keys are used. Compared to previous MAC solutions, less secret keys are needed for the source and only one secret key is distributed to each intermediate node.

Weighted Distance-Based Quantization for Distributed Estimation

  • Kim, Yoon Hak
    • Journal of information and communication convergence engineering
    • /
    • 제12권4호
    • /
    • pp.215-220
    • /
    • 2014
  • We consider quantization optimized for distributed estimation, where a set of sensors at different sites collect measurements on the parameter of interest, quantize them, and transmit the quantized data to a fusion node, which then estimates the parameter. Here, we propose an iterative quantizer design algorithm with a weighted distance rule that allows us to reduce a system-wide metric such as the estimation error by constructing quantization partitions with their optimal weights. We show that the search for the weights, the most expensive computational step in the algorithm, can be conducted in a sequential manner without deviating from convergence, leading to a significant reduction in design complexity. Our experments demonstrate that the proposed algorithm achieves improved performance over traditional quantizer designs. The benefit of the proposed technique is further illustrated by the experiments providing similar estimation performance with much lower complexity as compared to the recently published novel algorithms.