On achievable security levels for lattice data hiding in the known message attack scenario
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
On the capacity of stegosystems
Proceedings of the 9th workshop on Multimedia & security
Foundations and Trends® in Networking
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Hybrid digital-analog coding with bandwidth compression for Gaussian source-channel pairs
IEEE Transactions on Communications
Relaying simultaneous multicasts via structured codes
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Hybrid coding for Gaussian broadcast channels with Gaussian sources
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Structured superposition for backhaul constrained cellular uplink
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
The Gaussian many-to-one interference channel with confidential messages
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
On the secrecy rate of interference networks using structured codes
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
Power-constrained communications using LDLC lattices
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
Vector Gaussian hypothesis testing and lossy one-helper problem
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
Power allocation strategies and lattice based coding schemes for bi-directional relaying
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 1
On the capacity of multi-user cognitive radio networks
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 1
Joint Wyner-Ziv/dirty-paper coding by modulo-lattice modulation
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
AAECC'07 Proceedings of the 17th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Exploiting security holes in lattice data hiding
IH'07 Proceedings of the 9th international conference on Information hiding
Algebraic lattice alignment for K-user interference channel
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Interference channels with strong secrecy
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Achieving lower distortion with lattice strategies in multicast wireless networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
IEEE Transactions on Information Theory
Capacity of the Gaussian two-way relay channel to within 1/2 bit
IEEE Transactions on Information Theory
Joint physical layer coding and network coding for bidirectional relaying
IEEE Transactions on Information Theory
Multiple multicasts with the help of a relay
IEEE Transactions on Information Theory
N-channel asymmetric entropy-constrained multiple-description lattice vector quantization
IEEE Transactions on Information Theory
EURASIP Journal on Wireless Communications and Networking - Special issue on physical-layer network coding for wireless cooperative networks
Comparison of Forbidden Zone Data Hiding and Quantization Index Modulation
Digital Signal Processing
Improved QIM strategies for gaussian watermarking
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Information-theoretic analysis of security in side-informed data hiding
IH'05 Proceedings of the 7th international conference on Information Hiding
Witsenhausen's counterexample and its links with multimedia security problems
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Hi-index | 755.26 |
We address an open question, regarding whether a lattice code with lattice decoding (as opposed to maximum-likelihood (ML) decoding) can achieve the additive white Gaussian noise (AWGN) channel capacity. We first demonstrate how minimum mean-square error (MMSE) scaling along with dithering (lattice randomization) techniques can transform the power-constrained AWGN channel into a modulo-lattice additive noise channel, whose effective noise is reduced by a factor of √(1+SNR/SNR). For the resulting channel, a uniform input maximizes mutual information, which in the limit of large lattice dimension becomes 1/2 log (1+SNR), i.e., the full capacity of the original power constrained AWGN channel. We then show that capacity may also be achieved using nested lattice codes, the coarse lattice serving for shaping via the modulo-lattice transformation, the fine lattice for channel coding. We show that such pairs exist for any desired nesting ratio, i.e., for any signal-to-noise ratio (SNR). Furthermore, for the modulo-lattice additive noise channel lattice decoding is optimal. Finally, we show that the error exponent of the proposed scheme is lower bounded by the Poltyrev exponent.