Secure transmission of a Gaussian source over Gaussian channels with side information

This paper investigates the problem of source-channel coding for secure transmission of a Gaussian source over a Gaussian wiretap channel in presence of arbitrarily correlated side informations at both receivers. By means of an appropriate coding scheme (either hybrid digital/analog or pure digital), the optimal rate-distortion-equivocation region is characterized for most of the scenarios. These results provide the best achievable tradeoff between the requirement on the distortion level at the legitimate receiver and the equivocation rate at the eavesdropper.

[1]  Shlomo Shamai,et al.  Secure lossy source-channel wiretapping with side information at the receiving terminals , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.

[2]  V. Prabhakaran,et al.  On Secure Distributed Source Coding , 2007, 2007 IEEE Information Theory Workshop.

[3]  Shlomo Shamai,et al.  Hybrid digital/analog schemes for secure transmission with side information , 2011, 2011 IEEE Information Theory Workshop.

[4]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[5]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[6]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[7]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[8]  Neri Merhav Shannon's Secrecy System With Informed Receivers and its Application to Systematic Coding for Wiretapped Channels , 2007, ISIT.

[9]  Shlomo Shamai,et al.  Secure Transmission of Sources Over Noisy Channels With Side Information at the Receivers , 2012, IEEE Transactions on Information Theory.

[10]  Aaron D. Wyner,et al.  The rate-distortion function for source coding with side information at the decoder , 1976, IEEE Trans. Inf. Theory.

[11]  Ertem Tuncel,et al.  Slepian-Wolf coding over broadcast channels , 2006, IEEE Transactions on Information Theory.

[12]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[13]  Yuhong Yang Elements of Information Theory (2nd ed.). Thomas M. Cover and Joy A. Thomas , 2008 .

[14]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[15]  R. A. McDonald,et al.  Noiseless Coding of Correlated Information Sources , 1973 .

[16]  Pablo Piantanida,et al.  Secure lossy source coding with side information at the decoders , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).