A theorem on the entropy of certain binary sequences and applications--I

A Wyner, J Ziv - IEEE Transactions on Information Theory, 1973 - ieeexplore.ieee.org
… establish a theorem concerning the entropy of a certain sequence of binary random variables…
of which have been open for some time. Specifically we show the following. Let X and Y be …

Skip-sliding window codes

TY Wu, A Tandon, LR Varshney… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
binary sequences are of particular interest, we largely focus on (L, J, E)E,2-SSW sequences
… denotes the entropy rate of a binary source which produces sequences satisfying the (L, J, …

Achieving secure fuzzy commitment scheme for optical pufs

T Ignatenko, F Willems - 2009 Fifth International Conference on …, 2009 - ieeexplore.ieee.org
… commitment are summarized in the following theorem. Assume that a PUF sequence XN is
a binary stationary sequence with entropy H∞(X). Define the binary entropy function h(p) ∆ = …

Biometric security from an information-theoretical perspective

T Ignatenko, FMJ Willems - Foundations and Trends® in …, 2012 - nowpublishers.com
Entropy is a measure of the information contained in a random variable. … entropy concepts,
for example, Rényi and min-entropy (Rényi entropy of order 2) [62], and smooth Rényi entropy

[PDF][PDF] NM Abramson. Information Theory and Coding. McGraw-Hill, New York, 1963. RL Adler, D. Coppersmith, and M. Hassner. Algorithms for sliding block codes-an …

TM Cover, JA Thomas - Science, 1988 - poincare.matf.bg.ac.rs
… A theorem on the entropy of certain binary sequences and applications II. IEEE Trans. Inform…
A theorem on the entropy of certain binary sequences and applications I. IEEE Trans. Inform…

Biometric systems: Privacy and secrecy aspects

T Ignatenko, FMJ Willems - IEEE Transactions on Information …, 2009 - ieeexplore.ieee.org
binary sequences of length 23. A decoding sphere of this code contains exactly 2048
sequences… lated to the secret-key entropy of the converse for Theorem 3 for chosen-secret …

Fundamental limits for biometric identification with a database containing protected templates

T Ignatenko, FMJ Willems - 2010 International Symposium On …, 2010 - ieeexplore.ieee.org
… following five theorems from the theorem presented above. These theorems represent already
… We start by considering the joint entropy H(I,S(I)) of the individual’s identity and his secret. …

Information leakage in fuzzy commitment schemes

T Ignatenko, FMJ Willems - IEEE Transactions on Information …, 2010 - ieeexplore.ieee.org
… For our purposes, we need an adapted version of this binary analog to the entropy-power …
Ziv, “A theorem on the entropy of certain binary sequences and applicationsI,” IEEE Trans…

Index coding with side information

Z Bar-Yossef, Y Birk, TS Jayram… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
… is the size of the maximum acyclic induced subgraph of and is the binary entropy function. …
Ziv, “A theorem on the entropy of certain binary sequences and applications I,” IEEE Trans. …

Towards a general theory of source networks

I Csiszar, J Korner - IEEE Transactions on Information Theory, 1980 - ieeexplore.ieee.org
… While we believe that entropy characterization problems are the mathematical core of source
network … Ziv, “A theorem on the entropy of certain binary sequences and applications I-II.” …