Shannon Theory: Joint Source-Channel coding, Data Processing Bounds,
Guesswork, Secrecy, Mismatched Decoding, and Others
Joint Source-Channel Coding
-
E. Arikan and N. Merhav,
``Joint source-channel coding and
guessing with application to sequential decoding,''
IEEE Trans. Inform. Theory, vol. 44, no. 5, pp. 1756-1769,
September 1998.
-
N. Merhav and S. Shamai (Shitz),
``On joint source-channel coding for the Wyner-Ziv source
and the Gel'fand-Pinsker channel,''
IEEE Trans. Inform.
Theory, vol. 49, no. 11, pp. 2844-2855, November 2003.
-
N. Merhav,
``On joint coding for watermarking and encryption,''
IEEE Trans. Inform. Theory, vol. 52, no. 1, pp. 190-205, January
2006.
-
Y. Steinberg and N. Merhav,
``On hierarchical joint source-channel coding with degraded side
information,''
IEEE Trans. Inform. Theory, vol. 52, no. 3, pp. 886-903, March 2006.
-
A. Maor and N. Merhav,
``Two-way successively refined
joint source-channel coding with a fidelity criterion,''
IEEE Trans. Inform. Theory, vol. 52, no. 4, pp. 1483-1494, April 2006.
-
N. Merhav,
``The random energy model in
a magnetic field and joint source-channel coding,''
Physica A: Statistical
Mechanics and its Applications , vol. 387, issue 22,
pp. 5662-5674, September 15, 2008.
-
N. Merhav,
``Joint source-channel coding via statistical mechanics: thermal
equilibrium between the source and the channel,''
IEEE Trans. Inform. Theory, vol. 55, no. 12, pp. 5382-5393, December 2009.
-
N. Merhav,
``Finite-state source-channel coding for individual source sequences with source
side information at the decoder,''
IEEE Trans. Inform. Theory, vol. 68, no. 3, pp. 1532-1544, March
2022.
Data Processing Bounds
-
N. Merhav,
``Data processing theorems and the second law of thermodynamics,''
IEEE Trans. on Inform. Theory, vol. 57, no. 8, pp. 4926-4939, August
2011.
-
N. Merhav,
``Data processing inequalities based on a certain structured class
of information measures with application to estimation theory,''
IEEE Trans. Inform. Theory, vol. 58, no. 8, pp. 5287-5301, August
2012.
-
N. Merhav,
``On the data processing theorem in the semi-deterministic setting,''
IEEE Trans. Inform. Theory,
vol. 60, no. 10, pp. 6032-6040, October 2014.
-
N. Merhav,
``Finite-state source-channel coding for individual source sequences with source
side information at the decoder,''
IEEE Trans. Inform. Theory, vol. 68, no. 3, pp. 1532-1544, March
Guesswork
-
E. Arikan and N. Merhav,
``Guessing subject to distortion,''
IEEE Trans. Inform. Theory, vol. 44,
no. 3, pp. 1041-1056, May 1998.
-
E. Arikan and N. Merhav,
``Joint source-channel coding and
guessing with application to sequential decoding,''
IEEE Trans. Inform. Theory, vol. 44, no. 5, pp. 1756-1769,
September 1998.
-
N. Merhav, R. M. Roth, and E. Arikan,
``Hierarchical guessing with a
fidelity criterion,''
IEEE Trans. Inform. Theory, vol. 45,
no. 1, pp. 330-337, January 1999.
-
N. Merhav and E. Arikan,
``The Shannon
cipher system with a guessing wiretapper,''
IEEE Trans. Inform. Theory, vol. 45,
no. 6, pp. 1860-1866, September 1999.
-
N. Merhav and A. Cohen,
``Universal randomized guessing with application to
asynchronous decentralized brute-force attacks,''
IEEE Trans. Inform. Theory,
vol. 66, no. 1, pp. 114--129, January 2020.
-
N. Merhav,
``Guessing individual sequences: generating randomized guesses using
finite-state machines,'' IEEE Trans. Inform.
Theory, vol. 66, no. 5, pp. 2912-2920, May 2020.
-
N. Merhav,
``Noisy guesses, IEEE Trans. Inform. Theory,
vol. 66, no. 8, pp. 4796-4803, August 2020.
-
R. Graczyk, A. Lapidoth, N. Merhav, and C. Pfister,
``Guessing based on
compressed side information,'' IEEE Trans. Inform.
Theory, vol. 68,
no. 7, pp. 4244-4256, July 2022.
-
A. Cohen and N. Merhav,
``Universal randomized guessing subjected to distortion,''
IEEE Trans. Inform. Theory, vol. 68, no. 12, pp.
7714-7734, December 2022.
Secrecy
-
N. Merhav and E. Arikan,
``The Shannon
cipher system with a guessing wiretapper,''
IEEE Trans. Inform. Theory, vol. 45,
no. 6, pp. 1860-1866, September 1999.
-
N. Merhav,
``A large-deviations notion of perfect secrecy,''
IEEE Trans. Inform. Theory,
vol. 49, no. 2, pp. 506-508, February 2003.
-
N. Merhav,
``On joint coding for watermarking and encryption,''
IEEE Trans. Inform. Theory, vol. 52, no. 1, pp. 190-205, January
2006.
-
N. Merhav,
``On the Shannon cipher system with a capacity-limited key-distribution
channel,'' IEEE Trans. Inform. Theory, vol. 52, no. 3, pp.
1269-1273, March 2006.
-
N. Merhav and S. Shamai (Shitz),
``Information rates subjected to state masking,''
IEEE Trans. Inform. Theory, vol. 53, no. 6, pp. 2254-2261, June
2007.
-
N. Merhav,
``Shannon's secrecy system with informed receivers an its application to
systematic coding for wiretapped channels,''
IEEE Trans. Inform. Theory,
special issue on Information-Theoretic Security,
vol. 54, no. 6, pp. 2723-2734, June 2008.
-
N. Merhav,
``Perfectly secure encryption of individual sequences,''
IEEE Trans. Inform. Theory, vol. 58, no. 3, pp. 1302-1310, March
2013.
-
Y. Kaspi and N. Merhav,
``On real-time and causal secure source coding,''
Proc. ISIT 2012, pp. 358-362, Cambridge, MA, USA, July 2012.
Full version (with a slightly different title) appears
here.
-
N. Merhav,
``Exact correct-decoding exponent for the wiretap channel decoder,
IEEE Trans. Inform. Theory. vol. 60, no. 12 pp. 7606-7615, December
2014.
-
N. Weinberger and N. Merhav,
``A large deviations approach to secure lossy compression,''
IEEE Trans. Inform. Theory. vol. 63, no. 4, pp. 2533-2559, April
2017.
-
M. Bastani Parizi, E. Telatar and N. Merhav,
``Exact random coding secrecy exponents for the wiretap channel,
IEEE Trans. Inform. Theory. vol. 63, no. 1, pp. 509-531,
January 2017.
-
N. Merhav,
``Ensemble performance of biometric authentication systems based on secret
key generation,'' IEEE Trans. Inform. Theory,
vol. 65, no. 4, pp. 2477-2491, April 2019.
-
N. Merhav and A. Cohen,
``Universal randomized guessing with application to
asynchronous decentralized brute-force attacks,''
IEEE Trans. Inform. Theory,
vol. 66, no. 1, pp. 114-129, January 2020.
-
N. Merhav,
``Encoding individual source sequences for the wiretap channel.''
Entropy, 23(12) 1694, December 17, 2021.
-
S. Loyka and N. Merhav,
``The secrecy capacity of the Gaussian wiretap channel with rate-limited
help,'' IEEE Trans. Inform. Theory,
vol. 70, no. 1, pp. 189-205, January 2024.
-
N. Merhav,
``Refinements and extensions of Ziv's model of perfect secrecy for individual
sequences,'' submitted for publication, May 2024.
Mismatched Decoding
-
N. Merhav, G. Kaplan, A. Lapidoth, and S. Shamai (Shitz),
``On information rates for mismatched decoders,''
IEEE Trans. Inform. Theory, vol. 40, no. 6, pp. 1953-1967, November
1994.
-
J. Scarlett, L. Peng, N. Merhav, A. Martinez, and A. G. i Fabregas,
``Expurgated random-coding ensembles: exponents, refinements and
connections,'' IEEE Trans. Inform. Theory, vol. 60, no. 8, pp.
4449-4462, August 2014.
-
N. Merhav,
``The generalized likelihood decoder: random coding and expurgated
bounds,''
IEEE Trans. Inform. Theory, vol. 63, no. 6, pp. 5039-5051, August
2017.
- N. Merhav,
``Error exponents of typical random codes,''
IEEE Trans. Inform. Theory,
vol. 64, no. 9, pp. 6223-6235,
September 2018.
-
R. Averbuch, N. Weinberger and N. Merhav,
``Expurgated bounds for the asymmetric broadcast channel,''
IEEE Trans. Inform. Theory,
vol. 65, no. 6, pp. 3412-3435, June 2019.
-
W. Huleihel, S. Salamtian, N. Merhav, and M. Medard,
``Gaussian intersymbol inteference channels with mismatch,''
IEEE Trans. Inform. Theory, vol. 65, no. 7, pp. 4499--4517,
July 2019.
-
N. Merhav,
``Error exponents of typical random codes for the colored Gaussian
channel,''
IEEE Trans. Inform. Theory,
vol. 65, no. 12, pp. 8164-8179,
December 2019.
-
N. Merhav,
``A Lagrange-dual lower bound to the error exponent of the typical random
code,''
IEEE Trans. Inform. Theory,
vol. 66, no. 6, pp. 3456-3464, June 2020.
-
N. Merhav and G. Bocherer,
``Codebook mismatch can be fully compensated by mismatched decoding,''
IEEE Trans. Inform. Theory, vol. 69, no. 4, pp. 2152-2164, April
2023.
Others
-
M. Feder and N. Merhav,
``Relations between
entropy and error probability,''
IEEE Trans. Inform. Theory, vol. 40, no. 1, pp. 259-266, January
1994.
-
N. Merhav,
``How many information bits does
a decoder need about the channel statistics?''
IEEE Trans. Inform. Theory, vol.
43, no. 5, pp. 1707-1714, September 1997.
-
N. Merhav,
``On the Shannon cipher system with a capacity-limited key-distribution
channel,'' IEEE Trans. Inform. Theory, vol. 52, no. 3, pp. 1269-1273, March 2006.
-
T. Weissman and N. Merhav,
``Coding for the feedback Gel'fand-Pinsker channel and the feedforward
Wyner-Ziv source,'' IEEE Trans.
Inform. Theory, vol. 52, no. 9, pp. 4207-4211,
September 2006.
-
A. Maor and N. Merhav,
``On successive refinement with causal side information at the decoders,''
IEEE Trans. Inform. Theory,
vol. 54, no. 1, pp. 332-343, January 2008.
-
A. Maor and N. Merhav,
``On successive refinement for the Kaspi/Heegard-Berger problem,''
IEEE Trans. Inform. Theory}, vol. 56, no. 8, pp. 3930--3945, August
2010.
-
N. Merhav,
``Physics of the Shannon limits,''
IEEE Trans. Inform. Theory, vol. 56, no. 9, pp. 4274-4285,
September 2010.
Short version -
in Proc. 2009 IEEE Workshop on Information
Theory (ITW 2009),
Taormina, Sicily, Italy, October 2009.
-
N. Merhav,
``On optimum strategies for minimizing exponential moments of a given cost
function,''
Communications in Information and Systems, vol. 11, no. 4,
pp. 343-368, 2011.
-
W. Huleihel, N. Merhav and S. Shamai (Shitz),
``On compressive sensing in
coding problems: a rigorous approach,''
IEEE Trans. Inform. Theory, vol. 61, no. 10, pp. 5727-5744,
October 2015.
-
W. Huleihel and N. Merhav,
``Codewords with memory improve achievable rate regions of the Gaussian
memoryless interference channel,''
unpublished 2015.
-
N. Weinberger and N. Merhav,
``The DNA-storage channel: capacity and error probability bounds,''
IEEE Trans. Inform. Theory, vol. 68, no. 9, pp. 3657-5700,
September 2022.