Hybrid Digital-Analog Source-Channel Coding and Information Hiding: Information-Theoretic Perspectives

Joint source-channel coding (JSCC) has been acknowledged to have superior performance over separate source-channel coding in terms of coding efficiency, delay and complexity. In the first part of this thesis, we study a hybrid digital-analog (HDA) JSCC system to transmit a memoryless Gaussian source over a memoryless Gaussian channel under bandwidth compression. Information-theoretic upper bounds on the asymptotically optimal mean squared error distortion of the system are obtained. An allocation scheme for distributing the channel input power between the analog and the digital signals is derived for the HDA system with mismatched channel conditions. A lowcomplexity and low-delay version of the system is next designed and implemented. We then propose an image communication application demonstrating the effectiveness of HDA coding. In the second part of this thesis, we consider problems in information hiding. We begin by considering a single-user joint compression and private watermarking (JCPW) problem. For memoryless Gaussian sources and memoryless Gaussian attacks, an exponential upper bound on the probability of error in decoding the watermark is derived. Numerical examples show that the error exponent is positive over a (large) subset of the entire achievable region derived by Karakos and Papamarcou (2003). We then extend the JCPW problem to a multi-user setting. Two encoders independently embed two secret information messages into two correlated host sources subject to a pair of tolerable distortion levels. The (compressed) outputs are subject to multiple access attacks. The tradeoff between the achievable watermarking rates and the compression rates is studied for discrete memoryless host sources and discrete memoryless multiple access channels. We derive an inner bound and an outer bound with singleletter characterization for the achievable compression and watermarking rate region. We next consider a problem where two correlated sources are separately embedded into a common host source. A single-letter sufficient condition is established under which the sources can be successfully embedded into the host source under multiple access attacks. Finally, we investigate a public two-user information hiding problem under multiple access attacks. Inner and outer bounds for the embedding capacity region are obtained with single-letter characterization.

[1]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[2]  Neri Merhav On random coding error exponents of watermarking systems , 2000, IEEE Trans. Inf. Theory.

[3]  A. Grovlen,et al.  Robust digital signal compression and modulation exploiting the advantages of analog communications , 1995, Proceedings of GLOBECOM '95.

[4]  Neri Merhav,et al.  On the error exponent and capacity games of private watermarking systems , 2003, IEEE Trans. Inf. Theory.

[5]  Yasutada Oohama Gaussian multiterminal source coding , 1997, IEEE Trans. Inf. Theory.

[6]  Amos Lapidoth,et al.  Nearest neighbor decoding for additive non-Gaussian noise channels , 1996, IEEE Trans. Inf. Theory.

[7]  Amos Lapidoth,et al.  The Gaussian watermarking game , 2000, IEEE Trans. Inf. Theory.

[8]  D. A. Bell,et al.  Information Theory and Reliable Communication , 1969 .

[9]  Yadong Wang,et al.  A Sufficient Condition for Private Information Hiding of Two Correlated Sources Under Multiple Access Attacks , 2007, 2007 IEEE International Symposium on Information Theory.

[10]  A. Lapidoth On the role of mismatch in rate distortion theory , 1995, Proceedings of 1995 IEEE International Symposium on Information Theory.

[11]  Damianos Karakos,et al.  A relationship between quantization and watermarking rates in the presence of additive Gaussian attacks , 2003, IEEE Trans. Inf. Theory.

[12]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[13]  Nam C. Phamdo,et al.  Hybrid digital-analog (HDA) joint source-channel codes for broadcasting and robust communications , 2002, IEEE Trans. Inf. Theory.

[14]  Nariman Farvardin,et al.  Subband Image Coding Using Entropy-Coded Quantization over Noisy Channels , 1992, IEEE J. Sel. Areas Commun..

[15]  D. Slepian,et al.  A coding theorem for multiple access channels with correlated sources , 1973 .

[16]  Toby Berger,et al.  Rate distortion theory : a mathematical basis for data compression , 1971 .

[17]  Mark Ettinger,et al.  Steganalysis and Game Equilibria , 1998, Information Hiding.

[18]  Mikael Skoglund,et al.  Hybrid Digital–Analog Source–Channel Coding for Bandwidth Compression/Expansion , 2006, IEEE Transactions on Information Theory.

[19]  David L. Neuhoff,et al.  Joint and tandem source-channel coding with complexity and delay constraints , 2003, IEEE Trans. Commun..

[20]  Rudolf Ahlswede,et al.  On source coding with side information via a multiple-access channel and related problems in multi-user information theory , 1983, IEEE Trans. Inf. Theory.

[21]  Kannan Ramchandran,et al.  Hybrid compressed-uncompressed framework for wireless image transmission , 1997, Proceedings of International Conference on Image Processing.

[22]  Vinay A. Vaishampayan Combined Source-Channel Coding for Bandlimited Waveform Channels , 1989 .

[23]  Nariman Farvardin,et al.  A study of vector quantization for noisy channels , 1990, IEEE Trans. Inf. Theory.

[24]  Jack K. Wolf,et al.  Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.

[25]  Mikael Skoglund,et al.  Soft Decoding for Vector Quantization Over Noisy Channels with Memory , 1999, IEEE Trans. Inf. Theory.

[26]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[27]  Shunsuke Ihara Error Exponent for Coding of Memoryless Gaussian Sources with a Fidelity Criterion , 2000 .

[28]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[29]  Neri Merhav,et al.  On the capacity game of public watermarking systems , 2004, IEEE Transactions on Information Theory.

[30]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[31]  H. Coward,et al.  Robust image communication using bandwidth reducing and expanding mappings , 2000, Conference Record of the Thirty-Fourth Asilomar Conference on Signals, Systems and Computers (Cat. No.00CH37154).

[32]  Jan Skoglund,et al.  Vector quantization based on Gaussian mixture models , 2000, IEEE Trans. Speech Audio Process..

[33]  Deepa Kundur Implications for high capacity data hiding in the presence of lossy compression , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[34]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[35]  Chao Tian,et al.  Multiple Description Quantization Via Gram–Schmidt Orthogonalization , 2005, IEEE Transactions on Information Theory.

[36]  Masoud Salehi,et al.  Multiple access channels with arbitrarily correlated sources , 1980, IEEE Trans. Inf. Theory.

[37]  Meir Feder,et al.  Distortion Bounds for Broadcasting With Bandwidth Expansion , 2006, IEEE Transactions on Information Theory.

[38]  I. Daubechies,et al.  Factoring wavelet transforms into lifting steps , 1998 .

[39]  J. Nicholas Laneman,et al.  Reversible Information Embedding in Multi-User Channels ∗ , 2005 .

[40]  Gregory W. Wornell,et al.  The duality between information embedding and source coding with side information and some applications , 2003, IEEE Trans. Inf. Theory.

[41]  Mikael Skoglund,et al.  Design and performance of VQ-based hybrid digital-analog joint source-channel codes , 2002, IEEE Trans. Inf. Theory.

[42]  Nariman Farvardin,et al.  On the performance and complexity of channel-optimized vector quantizers , 1991, IEEE Trans. Inf. Theory.

[43]  Wei Sun,et al.  Joint Compression and Digital Watermarking: Information-Theoretic Study and Algorithms Development , 2006 .

[44]  Sueli I. Rodrigues Costa,et al.  Curves on a sphere, shift-map dynamics, and error control for continuous alphabet sources , 2003, IEEE Transactions on Information Theory.

[45]  Neri Merhav,et al.  On joint information embedding and lossy compression in the presence of a stationary memoryless attack channel , 2004, IEEE Transactions on Information Theory.

[46]  Neri Merhav,et al.  On the capacity game of private fingerprinting systems under collusion attacks , 2003, IEEE Transactions on Information Theory.

[47]  Pierre Moulin,et al.  The parallel-Gaussian watermarking game , 2004, IEEE Transactions on Information Theory.

[48]  Gabriel Fernandez,et al.  LIFTPACK: a software package for wavelet transforms using lifting , 1996, Optics & Photonics.

[49]  Mahalingam Ramkumar,et al.  Theoretical capacity measures for data hiding in compressed images , 1999, Other Conferences.

[50]  Tor A. Ramstad,et al.  Bandwidth compression for continuous amplitude channels based on vector approximation to a continuous subset of the source signal space , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[51]  Yadong Wang,et al.  Design of VQ-based hybrid digital-analog joint source-channel codes for image communication , 2005, Data Compression Conference.

[52]  P. Wintz,et al.  Quantizing for Noisy Channels , 1969 .

[53]  Tor A. Ramstad,et al.  Using 2:1 Shannon mapping for joint source-channel coding , 2005, Data Compression Conference.

[54]  Shlomo Shamai,et al.  Capacity and lattice strategies for canceling known interference , 2005, IEEE Transactions on Information Theory.

[55]  Robert M. Gray,et al.  An Algorithm for Vector Quantizer Design , 1980, IEEE Trans. Commun..

[56]  T.E. Fuja,et al.  Channel codes that exploit the residual redundancy in CELP-encoded speech , 1996, IEEE Trans. Speech Audio Process..

[57]  Allen Gersho,et al.  Vector quantizer design for memoryless noisy channels , 1988, IEEE International Conference on Communications, - Spanning the Universe..

[58]  En-Hui Yang,et al.  On Achievable Regions of Public Multiple-Access Gaussian Watermarking Systems , 2004, Information Hiding.

[59]  Fady Alajaji,et al.  Soft-decision demodulation design for COVQ over white, colored, and ISI Gaussian channels , 2000, IEEE Trans. Commun..

[60]  Nam C. Phamdo,et al.  A joint source-channel speech coder using hybrid digital-analog (HDA) modulation , 2002, IEEE Trans. Speech Audio Process..

[61]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[62]  Haralabos C. Papadopoulos,et al.  Simultaneous broadcasting of analog FM and digital audio signals by means of adaptive precanceling techniques , 1998, IEEE Trans. Commun..

[63]  Neri Merhav,et al.  On causal and semicausal codes for joint information embedding and source coding , 2004, IEEE Transactions on Information Theory.

[64]  David J. Sakrison,et al.  A geometric treatment of the source encoding of a Gaussian random variable , 1968, IEEE Trans. Inf. Theory.

[65]  Uri Erez,et al.  Achieving 1/2 log (1+SNR) on the AWGN channel with lattice encoding and decoding , 2004, IEEE Transactions on Information Theory.

[66]  Shlomo Shamai,et al.  Systematic Lossy Source/Channel Coding , 1998, IEEE Trans. Inf. Theory.

[68]  Meir Feder,et al.  On universal quantization by randomized uniform/lattice quantizers , 1992, IEEE Trans. Inf. Theory.

[69]  Giuseppe Caire,et al.  Lossy transmission over slow-fading AWGN channels: a comparison of progressive and superposition and hybrid approaches , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[70]  T. Linder,et al.  Hybrid Digital-Analog Coding of Memoryless Gaussian Sources over AWGN Channels with Bandwidth Compression , 2006, 23rd Biennial Symposium on Communications, 2006.

[71]  Sergio Verdú,et al.  The source-channel separation theorem revisited , 1995, IEEE Trans. Inf. Theory.

[72]  Claude E. Shannon,et al.  Channels with Side Information at the Transmitter , 1958, IBM J. Res. Dev..

[73]  Frans M. J. Willems An informationtheoretical approach to information embedding , 2000 .

[74]  Damianos Karakos,et al.  Relationship between quantization and distribution rates of digitally watermarked data , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).

[75]  Shlomo Shamai,et al.  On joint source-channel coding for the Wyner-Ziv source and the Gel'fand-Pinsker channel , 2003, IEEE Trans. Inf. Theory.

[76]  Allen Gersho,et al.  Pseudo-Gray coding , 1990, IEEE Trans. Commun..

[77]  Damianos Karakos Digital Watermarking, Fingerprinting and Compression: An Information-Theoretic Perspective , 2002 .

[78]  Helge Coward Joint Source-channel Coding: Development of Methods and Utilization in Image Communications , 2001 .

[79]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[80]  Fredrik Hekland A Review of Joint Source-Channel Coding , 2004 .

[81]  Neri Merhav,et al.  On joint information embedding and lossy compression , 2005, IEEE Transactions on Information Theory.

[82]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[83]  Te Sun Han,et al.  A unified achievable rate region for a general class of multiterminal source coding systems , 1980, IEEE Trans. Inf. Theory.

[84]  Masao Kasahara,et al.  A construction of vector quantizers for noisy channels , 1984 .