Skip to main content

Showing 1–47 of 47 results for author: Oechtering, T J

.
  1. arXiv:2407.01167  [pdf, other

    cs.IT cs.CR

    Information Density Bounds for Privacy

    Authors: Sara Saeidian, Leonhard Grosse, Parastoo Sadeghi, Mikael Skoglund, Tobias J. Oechtering

    Abstract: This paper explores the implications of guaranteeing privacy by imposing a lower bound on the information density between the private and the public data. We introduce an operationally meaningful privacy measure called pointwise maximal cost (PMC) and demonstrate that imposing an upper bound on PMC is equivalent to enforcing a lower bound on the information density. PMC quantifies the information… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  2. arXiv:2405.08709  [pdf, other

    cs.IT

    Multi-Task Private Semantic Communication

    Authors: Amirreza Zamani, Sajad Daei, Tobias J. Oechtering, Mikael Skoglund

    Abstract: We study a multi-task private semantic communication problem, in which an encoder has access to an information source arbitrarily correlated with some latent private data. A user has $L$ tasks with priorities. The encoder designs a message to be revealed which is called the semantic of the information source. Due to the privacy constraints the semantic can not be disclosed directly and the encoder… ▽ More

    Submitted 14 May, 2024; originally announced May 2024.

  3. arXiv:2403.03361  [pdf, ps, other

    stat.ML cs.LG

    Chained Information-Theoretic bounds and Tight Regret Rate for Linear Bandit Problems

    Authors: Amaury Gouverneur, Borja Rodríguez-Gálvez, Tobias J. Oechtering, Mikael Skoglund

    Abstract: This paper studies the Bayesian regret of a variant of the Thompson-Sampling algorithm for bandit problems. It builds upon the information-theoretic framework of [Russo and Van Roy, 2015] and, more specifically, on the rate-distortion analysis from [Dong and Van Roy, 2020], where they proved a bound with regret rate of $O(d\sqrt{T \log(T)})$ for the $d$-dimensional linear bandit setting. We focus… ▽ More

    Submitted 5 March, 2024; originally announced March 2024.

    Comments: 15 pages: 8 of main text and 7 of appendices

  4. arXiv:2402.12967  [pdf, other

    cs.IT cs.CR

    Quantifying Privacy via Information Density

    Authors: Leonhard Grosse, Sara Saeidian, Parastoo Sadeghi, Tobias J. Oechtering, Mikael Skoglund

    Abstract: We examine the relationship between privacy metrics that utilize information density to measure information leakage between a private and a disclosed random variable. Firstly, we prove that bounding the information density from above or below in turn implies a lower or upper bound on the information density, respectively. Using this result, we establish new relationships between local information… ▽ More

    Submitted 20 February, 2024; originally announced February 2024.

    MSC Class: 94A17 ACM Class: H.1.1

  5. arXiv:2401.16926  [pdf, ps, other

    cs.IT

    Coordination Coding with Causal Encoder for Vector-valued Witsenhausen Counterexample

    Authors: Mengyuan Zhao, Maël Le Treust, Tobias J. Oechtering

    Abstract: We investigate the Witsenhausen counterexample in a continuous vector-valued context with a causal encoder and noncausal decoder. Our main result is the optimal single-letter condition that characterizes the set of achievable Witsenhausen power costs and estimation costs, leveraging a modified weak typicality approach. In particular, we accommodate our power analysis to the causal encoder constrai… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

    Comments: This work has been submitted to 2024 IEEE International Symposium on Information Theory (ISIT 2024)

  6. Private Variable-Length Coding with Zero Leakage

    Authors: Amirreza Zamani, Tobias J. Oechtering, Deniz Gündüz, Mikael Skoglund

    Abstract: A private compression design problem is studied, where an encoder observes useful data $Y$, wishes to compress it using variable length code and communicates it through an unsecured channel. Since $Y$ is correlated with private attribute $X$, the encoder uses a private compression mechanism to design encoded message $\cal C$ and sends it over the channel. An adversary is assumed to have access to… ▽ More

    Submitted 29 October, 2023; originally announced October 2023.

    Comments: arXiv admin note: text overlap with arXiv:2306.13184, arXiv:2309.09034, arXiv:2211.15525, arXiv:2310.19122

    Journal ref: 2023 IEEE International Workshop on Information Forensics and Security (WIFS)

  7. arXiv:2310.19122  [pdf, ps, other

    cs.IT

    Private Variable-Length Coding with Non-zero Leakage

    Authors: Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund

    Abstract: A private compression design problem is studied, where an encoder observes useful data $Y$, wishes to compress it using variable length code and communicates it through an unsecured channel. Since $Y$ is correlated with private data $X$, the encoder uses a private compression mechanism to design encoded message $\cal C$ and sends it over the channel. An adversary is assumed to have access to the o… ▽ More

    Submitted 20 November, 2023; v1 submitted 29 October, 2023; originally announced October 2023.

    Comments: arXiv admin note: text overlap with arXiv:2306.13184

  8. arXiv:2309.09034  [pdf, other

    cs.IT

    Private Variable-Length Coding with Sequential Encoder

    Authors: Amirreza Zamani, Tobias J. Oechtering, Deniz Gündüz, Mikael Skoglund

    Abstract: A multi-user private data compression problem is studied. A server has access to a database of $N$ files, $(Y_1,...,Y_N)$, each of size $F$ bits and is connected to an encoder. The encoder is connected through an unsecured link to a user. We assume that each file $Y_i$ is arbitrarily correlated with a private attribute $X$, which is assumed to be accessible by the encoder. Moreover, an adversary i… ▽ More

    Submitted 16 September, 2023; originally announced September 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2306.13184

  9. arXiv:2309.09033  [pdf, other

    cs.IT

    New Privacy Mechanism Design With Direct Access to the Private Data

    Authors: Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund

    Abstract: The design of a statistical signal processing privacy problem is studied where the private data is assumed to be observable. In this work, an agent observes useful data $Y$, which is correlated with private data $X$, and wants to disclose the useful information to a user. A statistical privacy mechanism is employed to generate data $U$ based on $(X,Y)$ that maximizes the revealed information about… ▽ More

    Submitted 16 September, 2023; originally announced September 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2201.08738, arXiv:2212.12475

  10. arXiv:2306.13184  [pdf, other

    cs.IT

    Cache-Aided Private Variable-Length Coding with Zero and Non-Zero Leakage

    Authors: Amirreza Zamani, Tobias J. Oechtering, Deniz Gündüz, Mikael Skoglund

    Abstract: A private cache-aided compression problem is studied, where a server has access to a database of $N$ files, $(Y_1,...,Y_N)$, each of size $F$ bits and is connected through a shared link to $K$ users, each equipped with a local cache of size $MF$ bits. In the placement phase, the server fills the users$'$ caches without knowing their demands, while the delivery phase takes place after the users sen… ▽ More

    Submitted 22 June, 2023; originally announced June 2023.

  11. arXiv:2305.06038  [pdf, other

    cs.IT

    Secure Block Joint Source-Channel Coding with Sequential Encoding

    Authors: Hamid Ghourchian, Tobias J. Oechtering, Mikael Skoglund

    Abstract: We extend the results of Ghourchian et al. [IEEE JSAIT-2021], to joint source-channel coding with eavesdrop**. Our work characterizes the sequential encoding process using the cumulative rate distribution functions (CRDF) and includes a security constraint using the cumulative leakage distribution functions (CLF). The information leakage is defined based on the mutual information between the sou… ▽ More

    Submitted 10 May, 2023; originally announced May 2023.

    Comments: Long version of the accepted paper in the International Symposium on Information Theory (ISIT 2023). 23 pages, 1 figure. arXiv admin note: text overlap with arXiv:2108.13295

  12. arXiv:2304.13593  [pdf, ps, other

    stat.ML cs.LG

    Thompson Sampling Regret Bounds for Contextual Bandits with sub-Gaussian rewards

    Authors: Amaury Gouverneur, Borja Rodríguez-Gálvez, Tobias J. Oechtering, Mikael Skoglund

    Abstract: In this work, we study the performance of the Thompson Sampling algorithm for Contextual Bandit problems based on the framework introduced by Neu et al. and their concept of lifted information ratio. First, we prove a comprehensive bound on the Thompson Sampling expected cumulative regret that depends on the mutual information of the environment parameters and the history. Then, we introduce new b… ▽ More

    Submitted 26 April, 2023; originally announced April 2023.

    Comments: 8 pages: 5 of the main text, 1 of references, and 2 of appendices. Accepted to ISIT 2023

  13. arXiv:2304.07722  [pdf, ps, other

    cs.IT cs.CR

    Pointwise Maximal Leakage on General Alphabets

    Authors: Sara Saeidian, Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund

    Abstract: Pointwise maximal leakage (PML) is an operationally meaningful privacy measure that quantifies the amount of information leaking about a secret $X$ to a single outcome of a related random variable $Y$. In this paper, we extend the notion of PML to random variables on arbitrary probability spaces. We develop two new definitions: First, we extend PML to countably infinite random variables by conside… ▽ More

    Submitted 16 April, 2023; originally announced April 2023.

    Comments: Accepted for presentation at ISIT2023

  14. arXiv:2303.07782  [pdf, ps, other

    cs.CR cs.IT

    Inferential Privacy: From Impossibility to Database Privacy

    Authors: Sara Saeidian, Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund

    Abstract: We investigate the possibility of guaranteeing inferential privacy for mechanisms that release useful information about some data containing sensitive information, denoted by $X$. We describe a general model of utility and privacy in which utility is achieved by disclosing the value of low-entropy features of $X$, while privacy is maintained by kee** high-entropy features of $X$ secret. Adopting… ▽ More

    Submitted 14 March, 2023; originally announced March 2023.

  15. arXiv:2212.12475  [pdf, other

    cs.IT

    On the Privacy-Utility Trade-off With and Without Direct Access to the Private Data

    Authors: Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund

    Abstract: We study an information theoretic privacy mechanism design problem for two scenarios where the private data is either observable or hidden. In each scenario, we first consider bounded mutual information as privacy leakage criterion, then we use two different per-letter privacy constraints. In the first scenario, an agent observes useful data $Y$ that is correlated with private data $X$, and wishes… ▽ More

    Submitted 23 December, 2022; originally announced December 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2205.04881, arXiv:2201.08738

  16. arXiv:2211.15525  [pdf, other

    cs.IT

    Multi-User Privacy Mechanism Design with Non-zero Leakage

    Authors: Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund

    Abstract: A privacy mechanism design problem is studied through the lens of information theory. In this work, an agent observes useful data $Y=(Y_1,...,Y_N)$ that is correlated with private data $X=(X_1,...,X_N)$ which is assumed to be also accessible by the agent. Here, we consider $K$ users where user $i$ demands a sub-vector of $Y$, denoted by $C_{i}$. The agent wishes to disclose $C_{i}$ to user $i$. Si… ▽ More

    Submitted 28 November, 2022; originally announced November 2022.

    Comments: arXiv admin note: text overlap with arXiv:2205.04881, arXiv:2201.08738

  17. arXiv:2207.08735  [pdf, ps, other

    cs.LG stat.ML

    An Information-Theoretic Analysis of Bayesian Reinforcement Learning

    Authors: Amaury Gouverneur, Borja Rodríguez-Gálvez, Tobias J. Oechtering, Mikael Skoglund

    Abstract: Building on the framework introduced by Xu and Raginksy [1] for supervised learning problems, we study the best achievable performance for model-based Bayesian reinforcement learning problems. With this purpose, we define minimum Bayesian regret (MBR) as the difference between the maximum expected cumulative reward obtainable either by learning from the collected data or by knowing the environment… ▽ More

    Submitted 18 July, 2022; originally announced July 2022.

    Comments: 10 pages: 6 of the main text, 1 of references, and 3 of appendices

  18. Pointwise Maximal Leakage

    Authors: Sara Saeidian, Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund

    Abstract: We introduce a privacy measure called pointwise maximal leakage, generalizing the pre-existing notion of maximal leakage, which quantifies the amount of information leaking about a secret $X$ by disclosing a single outcome of a (randomized) function calculated on $X$. Pointwise maximal leakage is a robust and operationally meaningful privacy measure that captures the largest amount of information… ▽ More

    Submitted 15 August, 2023; v1 submitted 10 May, 2022; originally announced May 2022.

    Comments: Results unchanged. New examples added. This version has been accepted for publication in IEEE Transactions on Information Theory

  19. arXiv:2205.04881  [pdf, other

    cs.IT

    Bounds for Privacy-Utility Trade-off with Per-letter Privacy Constraints and Non-zero Leakage

    Authors: Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund

    Abstract: An information theoretic privacy mechanism design problem for two scenarios is studied where the private data is either hidden or observable. In each scenario, privacy leakage constraints are considered using two different measures. In these scenarios the private data is hidden or observable. In the first scenario, an agent observes useful data $Y$ that is correlated with private data $X$, and wis… ▽ More

    Submitted 10 May, 2022; originally announced May 2022.

    Comments: arXiv admin note: text overlap with arXiv:2201.08738

  20. arXiv:2201.08738  [pdf, other

    cs.IT

    Bounds for Privacy-Utility Trade-off with Non-zero Leakage

    Authors: Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund

    Abstract: The design of privacy mechanisms for two scenarios is studied where the private data is hidden or observable. In the first scenario, an agent observes useful data $Y$, which is correlated with private data $X$, and wants to disclose the useful information to a user. A privacy mechanism is employed to generate data $U$ that maximizes the revealed information about $Y$ while satisfying a privacy cri… ▽ More

    Submitted 13 January, 2023; v1 submitted 21 January, 2022; originally announced January 2022.

  21. Secure Source Coding with Side-information at Decoder and Shared Key at Encoder and Decoder

    Authors: Hamid Ghourchian, Photios A. Stavrou, Tobias J. Oechtering, Mikael Skoglund

    Abstract: We study the problem of rate-distortion-equivocation with side-information only available at the decoder when an independent private random key is shared between the sender and the receiver. The sender compresses the sequence, and the receiver reconstructs it such that the average distortion between the source and the output is limited. The equivocation is measured at an eavesdropper that intercep… ▽ More

    Submitted 23 January, 2022; v1 submitted 3 September, 2021; originally announced September 2021.

    Comments: Long version of the accepted paper in the Information Theory Workshop (ITW 2021). 23 pages, 4 figures

  22. Secure Block Source Coding with Sequential Encoding

    Authors: Hamid Ghourchian, Photios A. Stavrou, Tobias J. Oechtering, Mikael Skoglund

    Abstract: We introduce fundamental bounds on achievable cumulative rate distribution functions (CRDF) to characterize a sequential encoding process that ensures lossless or lossy reconstruction subject to an average distortion criterion using a non-causal decoder. The CRDF describes the rate resources spent sequentially to compress the sequence. We also include a security constraint that affects the set of… ▽ More

    Submitted 30 August, 2021; originally announced August 2021.

    Comments: 38 pages, 5 figures

  23. arXiv:2107.07484  [pdf, other

    cs.IT

    Data Disclosure with Non-zero Leakage and Non-invertible Leakage Matrix

    Authors: Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund

    Abstract: We study a statistical signal processing privacy problem, where an agent observes useful data $Y$ and wants to reveal the information to a user. Since the useful data is correlated with the private data $X$, the agent employs a privacy mechanism to generate data $U$ that can be released. We study the privacy mechanism design that maximizes the revealed information about $Y$ while satisfying a stro… ▽ More

    Submitted 15 July, 2021; originally announced July 2021.

  24. arXiv:2105.01033  [pdf, other

    cs.IT

    Optimal Maximal Leakage-Distortion Tradeoff

    Authors: Sara Saeidian, Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund

    Abstract: Most methods for publishing data with privacy guarantees introduce randomness into datasets which reduces the utility of the published data. In this paper, we study the privacy-utility tradeoff by taking maximal leakage as the privacy measure and the expected Hamming distortion as the utility measure. We study three different but related problems. First, we assume that the data-generating distribu… ▽ More

    Submitted 3 May, 2021; originally announced May 2021.

  25. arXiv:2101.06937  [pdf, other

    cs.IT

    $(ε, n)$ Fixed-Length Strong Coordination Capacity

    Authors: Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund

    Abstract: This paper investigates the problem of synthesizing joint distributions in the finite-length regime. For a fixed blocklength $n$ and an upper bound on the distribution approximation $ε$, we prove a capacity result for fixed-length strong coordination. It is shown analytically that the rate conditions for the fixed-length regime are lower-bounded by the mutual information that appears in the asympt… ▽ More

    Submitted 13 May, 2021; v1 submitted 18 January, 2021; originally announced January 2021.

  26. Quantifying Membership Privacy via Information Leakage

    Authors: Sara Saeidian, Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund

    Abstract: Machine learning models are known to memorize the unique properties of individual data points in a training set. This memorization capability can be exploited by several types of attacks to infer information about the training data, most notably, membership inference attacks. In this paper, we propose an approach based on information leakage for guaranteeing membership privacy. Specifically, we pr… ▽ More

    Submitted 15 April, 2021; v1 submitted 12 October, 2020; originally announced October 2020.

    Comments: To be published in IEEE Transactions on Information Forensics and Security

  27. A Design Framework for Strongly $χ^2$-Private Data Disclosure

    Authors: Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund

    Abstract: In this paper, we study a stochastic disclosure control problem using information-theoretic methods. The useful data to be disclosed depend on private data that should be protected. Thus, we design a privacy mechanism to produce new data which maximizes the disclosed information about the useful data under a strong $χ^2$-privacy criterion. For sufficiently small leakage, the privacy mechanism desi… ▽ More

    Submitted 22 March, 2021; v1 submitted 3 September, 2020; originally announced September 2020.

    Comments: 16 pages, 2 figures

    Journal ref: vol. 16, pp. 2312-2325, 2021

  28. arXiv:2009.01569  [pdf, other

    cs.IT

    Remote Joint Strong Coordination and Reliable Communication

    Authors: Giulia Cervia, Tobias J. Oechtering, Mikael Skoglund

    Abstract: We consider a three-node network, in which two agents wish to communicate over a noisy channel, while controlling the distribution observed by a third external agent. We use strong coordination to constrain the distribution, and we provide a complete characterization of the "remote strong coordination and reliable communication" region.

    Submitted 3 September, 2020; originally announced September 2020.

    Journal ref: 2020 IEEE International Symposium on Information Theory (ISIT)

  29. arXiv:2004.06567  [pdf, other

    cs.CV cs.CR cs.LG stat.ML

    Decentralized Differentially Private Segmentation with PATE

    Authors: Dominik Fay, Jens Sjölund, Tobias J. Oechtering

    Abstract: When it comes to preserving privacy in medical machine learning, two important considerations are (1) kee** data local to the institution and (2) avoiding inference of sensitive information from the trained model. These are often addressed using federated learning and differential privacy, respectively. However, the commonly used Federated Averaging algorithm requires a high degree of synchroniz… ▽ More

    Submitted 9 April, 2020; originally announced April 2020.

    Comments: Under review for MICCAI 2020

  30. arXiv:2001.06831  [pdf, ps, other

    cs.IR cs.IT

    On the Minimum Achievable Age of Information for General Service-Time Distributions

    Authors: Jaya Prakash Champati, Ramana R. Avula, Tobias J. Oechtering, James Gross

    Abstract: There is a growing interest in analysing the freshness of data in networked systems. Age of Information (AoI) has emerged as a popular metric to quantify this freshness at a given destination. There has been a significant research effort in optimizing this metric in communication and networking systems under different settings. In contrast to previous works, we are interested in a fundamental ques… ▽ More

    Submitted 19 January, 2020; originally announced January 2020.

  31. arXiv:1809.04329  [pdf, other

    cs.IT

    Privacy-Utility Management of Hypothesis Tests

    Authors: Zuxing Li, Tobias J. Oechtering

    Abstract: The trade-off of hypothesis tests on the correlated privacy hypothesis and utility hypothesis is studied. The error exponent of the Bayesian composite hypothesis test on the privacy or utility hypothesis can be characterized by the corresponding minimal Chernoff information rate. An optimal management protects the privacy by minimizing the error exponent of the privacy hypothesis test and meanwhil… ▽ More

    Submitted 12 September, 2018; originally announced September 2018.

    Comments: accepted in IEEE Information Theory Workshop 2018

  32. arXiv:1807.01916  [pdf, other

    cs.IT

    Privacy against a Hypothesis Testing Adversary

    Authors: Zuxing Li, Tobias J. Oechtering, Deniz Gunduz

    Abstract: Privacy against an adversary (AD) that tries to detect the underlying privacy-sensitive data distribution is studied. The original data sequence is assumed to come from one of the two known distributions, and the privacy leakage is measured by the probability of error of the binary hypothesis test carried out by the AD. A management unit (MU) is allowed to manipulate the original data sequence in… ▽ More

    Submitted 9 March, 2019; v1 submitted 5 July, 2018; originally announced July 2018.

    Comments: published by IEEE Transactions on Information Forensics and Security

    Journal ref: IEEE Transactions on Information Forensics and Security, vol. 14, no. 6, pp. 1567-1581, 2019

  33. Privacy-preserving smart meter control strategy including energy storage losses

    Authors: Ramana R. Avula, Tobias J. Oechtering, Daniel Månsson

    Abstract: Privacy-preserving smart meter control strategies proposed in the literature so far make some ideal assumptions such as instantaneous control without delay, lossless energy storage systems etc. In this paper, we present a one-step-ahead predictive control strategy using Bayesian risk to measure and control privacy leakage with an energy storage system. The controller estimates energy state using a… ▽ More

    Submitted 11 July, 2018; v1 submitted 21 March, 2018; originally announced March 2018.

    Comments: 6 pages

  34. arXiv:1612.05552  [pdf, other

    eess.SY cs.IT

    Secure Estimation and Zero-Error Secrecy Capacity

    Authors: Moritz Wiese, Tobias J. Oechtering, Karl Henrik Johansson, Panos Papadimitratos, Henrik Sandberg, Mikael Skoglund

    Abstract: We study the problem of securely estimating the states of an unstable dynamical system subject to nonstochastic disturbances. The estimator obtains all its information through an uncertain channel which is subject to nonstochastic disturbances as well, and an eavesdropper obtains a disturbed version of the channel inputs through a second uncertain channel. An encoder observes and block-encodes the… ▽ More

    Submitted 14 July, 2017; v1 submitted 16 December, 2016; originally announced December 2016.

    Comments: Submitted to IEEE Transactions on Automatic Control

  35. arXiv:1611.08316  [pdf, ps, other

    cs.IT

    Massive MIMO Pilot Retransmission Strategies for Robustification against Jamming

    Authors: Tan Tai Do, Hien Quoc Ngo, Trung Q. Duong, Tobias J. Oechtering, Mikael Skoglund

    Abstract: This letter proposes anti-jamming strategies based on pilot retransmission for a single user uplink massive MIMO under jamming attack. A jammer is assumed to attack the system both in the training and data transmission phases. We first derive an achievable rate which enables us to analyze the effect of jamming attacks on the system performance. Counter-attack strategies are then proposed to mitiga… ▽ More

    Submitted 24 November, 2016; originally announced November 2016.

    Comments: Accepted for publication in the IEEE Wireless Communications Letters

  36. arXiv:1605.00274  [pdf, ps, other

    eess.SY cs.IT

    Uncertain Wiretap Channels and Secure Estimation

    Authors: Moritz Wiese, Karl Henrik Johansson, Tobias J. Oechtering, Panos Papadimitratos, Henrik Sandberg, Mikael Skoglund

    Abstract: Uncertain wiretap channels are introduced. Their zero-error secrecy capacity is defined. If the sensor-estimator channel is perfect, it is also calculated. Further properties are discussed. The problem of estimating a dynamical system with nonstochastic disturbances is studied where the sensor is connected to the estimator and an eavesdropper via an uncertain wiretap channel. The estimator should… ▽ More

    Submitted 1 May, 2016; originally announced May 2016.

    Comments: Long version of a paper to be presented at ISIT 2016

  37. arXiv:1511.08020  [pdf, other

    cs.IT

    Authentication With a Guessing Adversary

    Authors: Farshad Naghibi, Tobias J. Oechtering, Mikael Skoglund

    Abstract: In this paper, we consider the authentication problem where a candidate measurement presented by an unidentified user is compared to a previously stored measurement of the legitimate user, the enrollment, with respect to a certain distortion criteria for authentication. An adversary wishes to impersonate the legitimate user by guessing the enrollment until the system authenticates him. For this se… ▽ More

    Submitted 25 November, 2015; originally announced November 2015.

    Comments: 6 pages, 1 figure, revised IEEE WIFS 2015 submission

  38. On the Entropy Computation of Large Complex Gaussian Mixture Distributions

    Authors: Su Min Kim, Tan Tai Do, Tobias J. Oechtering, Gunnar Peters

    Abstract: The entropy computation of Gaussian mixture distributions with a large number of components has a prohibitive computational complexity. In this paper, we propose a novel approach exploiting the sphere decoding concept to bound and approximate such entropy terms with reduced complexity and good accuracy. Moreover, we propose an SNR region based enhancement of the approximation method to reduce the… ▽ More

    Submitted 27 May, 2015; v1 submitted 12 February, 2015; originally announced February 2015.

    Comments: 14 pages, Accepted to IEEE Transactions on Signal Processing

  39. arXiv:1402.4308  [pdf, ps, other

    cs.IT

    Lossy Source Coding with Reconstruction Privacy

    Authors: Kittipong Kittichokechai, Tobias J. Oechtering, Mikael Skoglund

    Abstract: We consider the problem of lossy source coding with side information under a privacy constraint that the reconstruction sequence at a decoder should be kept secret to a certain extent from another terminal such as an eavesdropper, a sender, or a helper. We are interested in how the reconstruction privacy constraint at a particular terminal affects the rate-distortion tradeoff. In this work, we all… ▽ More

    Submitted 24 June, 2014; v1 submitted 18 February, 2014; originally announced February 2014.

    Comments: 22 pages, added proofs, to be presented at ISIT 2014

  40. arXiv:1307.7533  [pdf, ps, other

    math.OC cs.IT

    Stabilization of Linear Systems Over Gaussian Networks

    Authors: Ali A. Zaidi, Tobias J. Oechtering, Serdar Yuksel, Mikael Skoglund

    Abstract: The problem of remotely stabilizing a noisy linear time invariant plant over a Gaussian relay network is addressed. The network is comprised of a sensor node, a group of relay nodes and a remote controller. The sensor and the relay nodes operate subject to an average transmit power constraint and they can cooperate to communicate the observations of the plant's state to the remote controller. The… ▽ More

    Submitted 29 July, 2013; originally announced July 2013.

  41. arXiv:1307.1397  [pdf

    cs.IT

    Secure Source Coding with a Public Helper

    Authors: Kittipong Kittichokechai, Yeow-Khiang Chia, Tobias J. Oechtering, Mikael Skoglund, Tsachy Weissman

    Abstract: We consider secure multi-terminal source coding problems in the presence of a public helper. Two main scenarios are studied: 1) source coding with a helper where the coded side information from the helper is eavesdropped by an external eavesdropper; 2) triangular source coding with a helper where the helper is considered as a public terminal. We are interested in how the helper can support the sou… ▽ More

    Submitted 4 July, 2013; originally announced July 2013.

    Comments: 45 pages, 12 figures, a short version to be presented at ISIT 2013

  42. arXiv:1212.2396  [pdf, other

    cs.IT

    Source Coding Problems with Conditionally Less Noisy Side Information

    Authors: Roy Timo, Tobias J. Oechtering, Michèle Wigger

    Abstract: A computable expression for the rate-distortion (RD) function proposed by Heegard and Berger has eluded information theory for nearly three decades. Heegard and Berger's single-letter achievability bound is well known to be optimal for \emph{physically degraded} side information; however, it is not known whether the bound is optimal for arbitrarily correlated side information (general discrete mem… ▽ More

    Submitted 11 December, 2012; originally announced December 2012.

  43. arXiv:1205.4563  [pdf, ps, other

    math.OC

    Iterative Source-Channel Coding Approach to Witsenhausen's Counterexample

    Authors: Johannes Kron, Ather Gattami, Tobias J. Oechtering, Mikael Skoglund

    Abstract: In 1968, Witsenhausen introduced his famous counterexample where he showed that even in the simple linear quadratic static team decision problem, complex nonlinear decisions could outperform any given linear decision. This problem has served as a benchmark problem for decades where researchers try to achieve the optimal solution. This paper introduces a systematic iterative source--channel coding… ▽ More

    Submitted 21 May, 2012; originally announced May 2012.

  44. Coding With Action-dependent Side Information and Additional Reconstruction Requirements

    Authors: Kittipong Kittichokechai, Tobias J. Oechtering, Mikael Skoglund

    Abstract: Constrained lossy source coding and channel coding with side information problems which extend the classic Wyner-Ziv and Gel'fand-Pinsker problems are considered. Inspired by applications in sensor networking and control, we first consider lossy source coding with two-sided partial side information where the quality/availability of the side information can be influenced by a cost-constrained actio… ▽ More

    Submitted 7 February, 2012; originally announced February 2012.

    Comments: submitted to IEEE Trans. Information Theory

  45. Capacity of Gaussian MIMO Bidirectional Broadcast Channels

    Authors: Rafael F. Wyrembelski, Tobias J. Oechtering, Igor Bjelakovic, Clemens Schnurr, Holger Boche

    Abstract: We consider the broadcast phase of a three-node network, where a relay node establishes a bidirectional communication between two nodes using a spectrally efficient two-phase decode-and-forward protocol. In the first phase the two nodes transmit their messages to the relay node. Then the relay node decodes the messages and broadcasts a re-encoded composition of them in the second phase. We consi… ▽ More

    Submitted 30 April, 2008; v1 submitted 26 March, 2008; originally announced March 2008.

    Comments: Proc. IEEE International Symposium on Information Theory (ISIT 2008), Toronto, Canada, July 2008

  46. Broadcast Capacity Region of Two-Phase Bidirectional Relaying

    Authors: Tobias J. Oechtering, Igor Bjelakovic, Clemens Schnurr, Holger Boche

    Abstract: In a three-node network a half-duplex relay node enables bidirectional communication between two nodes with a spectral efficient two phase protocol. In the first phase, two nodes transmit their message to the relay node, which decodes the messages and broadcast a re-encoded composition in the second phase. In this work we determine the capacity region of the broadcast phase. In this scenario eac… ▽ More

    Submitted 15 March, 2007; originally announced March 2007.

    Comments: 25 pages, 2 figures, submitted to IEEE Transactions on Information Theory

  47. arXiv:cs/0412067  [pdf, ps, other

    cs.IT

    Complete Characterization of the Equivalent MIMO Channel for Quasi-Orthogonal Space-Time Codes

    Authors: A. Sezgin, T. J. Oechtering

    Abstract: Recently, a quasi-orthogonal space-time block code (QSTBC) capable of achieving a significant fraction of the outage mutual information of a multiple-input-multiple output (MIMO) wireless communication system for the case of four transmit and one receive antennas was proposed. We generalize these results to $n_T=2^n$ transmit and an arbitrary number of receive antennas $n_R$. Furthermore, we com… ▽ More

    Submitted 17 December, 2004; originally announced December 2004.

    Comments: 30 pages, 4 figures

    Journal ref: IEEE Transactions on Information Theory, vol. 54(7), pp. 3315-3327, July, 2008