Skip to main content

Showing 1–14 of 14 results for author: Altug, Y

.
  1. arXiv:1908.11428  [pdf, other

    cs.IT

    A New Method for Employing Feedback to Improve Coding Performance

    Authors: Aaron B. Wagner, Nirmal V. Shende, Yücel Altuğ

    Abstract: We introduce a novel mechanism, called timid/bold coding, by which feedback can be used to improve coding performance. For a certain class of DMCs, called compound-dispersion channels, we show that timid/bold coding allows for an improved second-order coding rate compared with coding without feedback. For DMCs that are not compound dispersion, we show that feedback does not improve the second-orde… ▽ More

    Submitted 29 August, 2019; originally announced August 2019.

  2. arXiv:1908.11419  [pdf, ps, other

    cs.IT

    On exact asymptotics of the error probability in channel coding: symmetric channels

    Authors: Yücel Altuğ, Aaron B. Wagner

    Abstract: The exact order of the optimal sub-exponentially decaying factor in the classical bounds on the error probability of fixed-length codes over a Gallager-symmetric discrete memoryless channel with and without ideal feedback is determined. Regardless of the availability of feedback, it is shown that the order of the optimal sub-exponential factor exhibits a dichotomy. Moreover, the proof technique is… ▽ More

    Submitted 29 August, 2019; originally announced August 2019.

    Comments: arXiv admin note: text overlap with arXiv:1309.5126

  3. arXiv:1810.03255  [pdf, ps, other

    eess.SP

    Information Theoretic Analysis of the Fundamental Limits of Content Identification

    Authors: Sait Tunc, Yucel Altug, Serdar Kozat, Kivanc Mihcak

    Abstract: We investigate the content identification problem from an information theoretic perspective and derive its fundamental limits. Here, a rights-holder company desires to keep track of illegal uses of its commercial content, by utilizing resources of a security company, while securing the privacy of its content. Due to privacy issues, the rights-holder company only reveals certain hash values of the… ▽ More

    Submitted 7 October, 2018; originally announced October 2018.

  4. Minimax Rényi Redundancy

    Authors: Semih Yagli, Yücel Altuğ, Sergio Verdú

    Abstract: The redundancy for universal lossless compression of discrete memoryless sources in Campbell's setting is characterized as a minimax Rényi divergence, which is shown to be equal to the maximal $α$-mutual information via a generalized redundancy-capacity theorem. Special attention is placed on the analysis of the asymptotics of minimax Rényi divergence, which is determined up to a term vanishing in… ▽ More

    Submitted 24 January, 2018; v1 submitted 4 January, 2017; originally announced January 2017.

    Comments: Double-column, 19 pages, submitted for publication to IEEE Transactions on Information Theory. Disclaimer: the published version may have slight variations. Part of this work appeared in ISIT '17

  5. arXiv:1312.6875  [pdf, ps, other

    cs.IT

    Refinement of the random coding bound

    Authors: Yucel Altug, Aaron B. Wagner

    Abstract: An improved pre-factor for the random coding bound is proved. Specifically, for channels with critical rate not equal to capacity, if a regularity condition is satisfied (resp. not satisfied), then for any $ε>0$ a pre-factor of $O(N^{-\frac{1}{2}\left( 1 - ε+ \barρ^\ast_R \right)})$ (resp. $O(N^{-\frac{1}{2}})$) is achievable for rates above the critical rate, where $N$ and $R$ is the blocklength… ▽ More

    Submitted 24 December, 2013; originally announced December 2013.

    Comments: Submitted to IEEE Trans. Inform. Theory

  6. arXiv:1309.5126  [pdf, ps, other

    cs.IT

    The third-order term in the normal approximation for singular channels

    Authors: Yucel Altug, Aaron B. Wagner

    Abstract: For a singular and symmetric discrete memoryless channel with positive dispersion, the third-order term in the normal approximation is shown to be upper bounded by a constant. This finding completes the characterization of the third-order term for symmetric discrete memoryless channels. The proof method is extended to asymmetric and singular channels with constant composition codes, and its connec… ▽ More

    Submitted 19 September, 2013; originally announced September 2013.

    Comments: Submitted to IEEE Trans. Inform. Theory

  7. arXiv:1211.6697  [pdf, ps, other

    cs.IT

    Refinement of the Sphere-Packing Bound: Asymmetric Channels

    Authors: Yucel Altug, Aaron B. Wagner

    Abstract: We provide a refinement of the sphere-packing bound for constant composition codes over asymmetric discrete memoryless channels that improves the pre-factor in front of the exponential term. The order of our pre-factor is $Ω(N^{-1/2(1+ε+ ρ_{R}^{\ast})})$ for any $ε>0$, where $ρ_{R}^{\ast}$ is the maximum absolute-value subdifferential of the sphere-packing exponent at rate $R$ and $N$ is the block… ▽ More

    Submitted 28 November, 2012; originally announced November 2012.

    Comments: Submitted to IEEE Trans. Inform. Theory

  8. arXiv:1208.1924  [pdf, ps, other

    cs.IT

    Moderate Deviations in Channel Coding

    Authors: Yucel Altug, Aaron B. Wagner

    Abstract: We consider block codes whose rate converges to the channel capacity with increasing block length at a certain speed and examine the best possible decay of the probability of error. We prove that a moderate deviation principle holds for all convergence rates between the large deviation and the central limit theorem regimes.

    Submitted 9 August, 2012; originally announced August 2012.

    Comments: Submitted to IEEE Trans. on Information Theory

  9. arXiv:0910.5261  [pdf, ps, other

    cs.IT cs.CR

    On Detection With Partial Information In The Gaussian Setup

    Authors: Onur Ozyesil, M. Kivanc Mihcak, Yucel Altug

    Abstract: We introduce the problem of communication with partial information, where there is an asymmetry between the transmitter and the receiver codebooks. Practical applications of the proposed setup include the robust signal hashing problem within the context of multimedia security and asymmetric communications with resource-lacking receivers. We study this setup in a binary detection theoretic contex… ▽ More

    Submitted 27 October, 2009; originally announced October 2009.

    Comments: Proceedings of the Forty-Seventh Annual Allerton Conference on Communication, Control, and Computing, September 30-October 2, 2009, Monticello, Illinois; 8 pages

  10. arXiv:0908.2141  [pdf, ps, other

    cs.IT

    Source and Channel Simulation Using Arbitrary Randomness

    Authors: Yucel Altug, Aaron B. Wagner

    Abstract: Necessary and sufficient conditions for approximation of a general channel by a general source are proved. For the special case in which the channel input is deterministic, which corresponds to source simulation, we prove a stronger necessary condition. As the approximation criteria, vanishing variational distance between the original and the approximated quantity is used for both of the problem… ▽ More

    Submitted 14 August, 2009; originally announced August 2009.

    Comments: 26 pages, 2 figures, submitted to IEEE Trans. on Information Theory. A shorter version will be presented at 2009 Allerton Conference on Communication, Control, and Computing

  11. arXiv:0901.0643  [pdf, ps, other

    cs.IT

    An Information Theoretic Analysis of Single Transceiver Passive RFID Networks

    Authors: Yucel Altug, S. Serdar Kozat, M. Kivanc Mihcak

    Abstract: In this paper, we study single transceiver passive RFID networks by modeling the underlying physical system as a special cascade of a certain broadcast channel (BCC) and a multiple access channel (MAC), using a "nested codebook" structure in between. The particular application differentiates this communication setup from an ordinary cascade of a BCC and a MAC, and requires certain structures suc… ▽ More

    Submitted 6 January, 2009; originally announced January 2009.

    Comments: 15 pages, 2 figures, submitted to IEEE Trans. Information Theory

  12. arXiv:0809.1910  [pdf, ps, other

    cs.IT

    Reliable Communications with Asymmetric Codebooks: An Information Theoretic Analysis of Robust Signal Hashing

    Authors: Yucel Altug, M. Kivanc Mihcak, Onur Ozyesil, Vishal Monga

    Abstract: In this paper, a generalization of the traditional point-to-point to communication setup, which is named as "reliable communications with asymmetric codebooks", is proposed. Under the assumption of independent identically distributed (i.i.d) encoder codewords, it is proven that the operational capacity of the system is equal to the information capacity of the system, which is given by… ▽ More

    Submitted 10 September, 2008; originally announced September 2008.

    Comments: 24 pages, 3 figures, submitted to IEEE Trans. Information Theory

  13. arXiv:0805.0268  [pdf, ps, other

    cs.CR cs.IT

    Towards Exploring Fundamental Limits of System-Specific Cryptanalysis Within Limited Attack Classes: Application to ABSG

    Authors: Yucel Altug, M. Kivanc Mihcak

    Abstract: A new approach on cryptanalysis is proposed where the goal is to explore the fundamental limits of a specific class of attacks against a particular cryptosystem. As a first step, the approach is applied on ABSG, which is an LFSR-based stream cipher where irregular decimation techniques are utilized. Consequently, under some mild assumptions, which are common in cryptanalysis, the tight lower bou… ▽ More

    Submitted 2 May, 2008; originally announced May 2008.

    Comments: 30 pages, Submitted to IEEE Transactions on Information Theory

  14. A Note on the Periodicity and the Output Rate of Bit Search Type Generators

    Authors: Yucel Altug, N. Polat Ayerden, M. Kivanc Mihcak, Emin Anarim

    Abstract: We investigate the bit-search type irregular decimation algorithms that are used within LFSR-based stream ciphers. In particular, we concentrate on BSG and ABSG, and consider two different setups for the analysis. In the first case, the input is assumed to be a m-sequence; we show that all possible output sequences can be classified into two sets, each of which is characterized by the equivalenc… ▽ More

    Submitted 16 February, 2007; originally announced February 2007.

    Comments: 20 pages, 2 figures and submitted to IEEE Transactions on Information Theory