3.8 Proceedings Paper

Information Leakage in Zero-Error Source Coding: A Graph-Theoretic Perspective

Journal

Publisher

IEEE
DOI: 10.1109/ISIT45174.2021.9517778

Keywords

-

Funding

  1. ARC [DP190100770, FT190100429]
  2. US National Science Foundation [CNS-1815322]
  3. Australian Research Council [FT190100429] Funding Source: Australian Research Council

Ask authors/readers for more resources

We investigate information leakage to a guessing adversary in zero-error source coding, using a confusion graph to capture distinguishability between source symbols. We develop a single-letter characterization of optimal normalized leakage under the basic adversary model and discover that this optimal leakage is equal to the optimal compression rate with fixed-length source codes. Extending the leakage measurement to generalized adversary models, we derive single-letter lower and upper bounds for cases with multiple guesses and some level of distortion allowed.
We study the information leakage to a guessing adversary in zero-error source coding. The source coding problem is defined by a confusion graph capturing the distinguishability between source symbols. The information leakage is measured by the ratio of the adversary's successful guessing probability after and before eavesdropping the codeword, maximized over all possible source distributions. Such measurement under the basic adversarial model where the adversary makes a single guess and the guess is regarded successful if and only if the estimator sequence equals to the true source sequence is known as the maximum min-entropy leakage or the maximal leakage in the literature. We develop a single-letter characterization of the optimal normalized leakage under the basic adversarial model, together with an optimum-achieving memoryless stochastic mapping scheme. An interesting observation is that the optimal normalized leakage is equal to the optimal compression rate with fixed-length source codes, both of which can be simultaneously achieved by some deterministic coding schemes. We then extend the leakage measurement to generalized adversarial models where the adversary makes multiple guesses and allows a certain level of distortion, for which we derive single-letter lower and upper bounds.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available