A theorem on the entropy of certain binary sequences and applications--I
A Wyner, J Ziv - IEEE Transactions on Information Theory, 1973 - ieeexplore.ieee.org
… establish a theorem concerning the entropy of a certain sequence of binary random variables…
of which have been open for some time. Specifically we show the following. Let X and Y be …
of which have been open for some time. Specifically we show the following. Let X and Y be …
Skip-sliding window codes
… binary sequences are of particular interest, we largely focus on (L, J, E)E,2-SSW sequences
… denotes the entropy rate of a binary source which produces sequences satisfying the (L, J, …
… denotes the entropy rate of a binary source which produces sequences satisfying the (L, J, …
Achieving secure fuzzy commitment scheme for optical pufs
T Ignatenko, F Willems - 2009 Fifth International Conference on …, 2009 - ieeexplore.ieee.org
… commitment are summarized in the following theorem. Assume that a PUF sequence XN is
a binary stationary sequence with entropy H∞(X). Define the binary entropy function h(p) ∆ = …
a binary stationary sequence with entropy H∞(X). Define the binary entropy function h(p) ∆ = …
Biometric security from an information-theoretical perspective
T Ignatenko, FMJ Willems - Foundations and Trends® in …, 2012 - nowpublishers.com
… Entropy is a measure of the information contained in a random variable. … entropy concepts,
for example, Rényi and min-entropy (Rényi entropy of order 2) [62], and smooth Rényi entropy …
for example, Rényi and min-entropy (Rényi entropy of order 2) [62], and smooth Rényi entropy …
[PDF][PDF] NM Abramson. Information Theory and Coding. McGraw-Hill, New York, 1963. RL Adler, D. Coppersmith, and M. Hassner. Algorithms for sliding block codes-an …
TM Cover, JA Thomas - Science, 1988 - poincare.matf.bg.ac.rs
… A theorem on the entropy of certain binary sequences and applications II. IEEE Trans. Inform…
A theorem on the entropy of certain binary sequences and applications I. IEEE Trans. Inform…
A theorem on the entropy of certain binary sequences and applications I. IEEE Trans. Inform…
Biometric systems: Privacy and secrecy aspects
T Ignatenko, FMJ Willems - IEEE Transactions on Information …, 2009 - ieeexplore.ieee.org
… binary sequences of length 23. A decoding sphere of this code contains exactly 2048
sequences… lated to the secret-key entropy of the converse for Theorem 3 for chosen-secret …
sequences… lated to the secret-key entropy of the converse for Theorem 3 for chosen-secret …
Fundamental limits for biometric identification with a database containing protected templates
T Ignatenko, FMJ Willems - 2010 International Symposium On …, 2010 - ieeexplore.ieee.org
… following five theorems from the theorem presented above. These theorems represent already
… We start by considering the joint entropy H(I,S(I)) of the individual’s identity and his secret. …
… We start by considering the joint entropy H(I,S(I)) of the individual’s identity and his secret. …
Information leakage in fuzzy commitment schemes
T Ignatenko, FMJ Willems - IEEE Transactions on Information …, 2010 - ieeexplore.ieee.org
… For our purposes, we need an adapted version of this binary analog to the entropy-power …
Ziv, “A theorem on the entropy of certain binary sequences and applications—I,” IEEE Trans…
Ziv, “A theorem on the entropy of certain binary sequences and applications—I,” IEEE Trans…
Index coding with side information
… is the size of the maximum acyclic induced subgraph of and is the binary entropy function. …
Ziv, “A theorem on the entropy of certain binary sequences and applications I,” IEEE Trans. …
Ziv, “A theorem on the entropy of certain binary sequences and applications I,” IEEE Trans. …
Towards a general theory of source networks
I Csiszar, J Korner - IEEE Transactions on Information Theory, 1980 - ieeexplore.ieee.org
… While we believe that entropy characterization problems are the mathematical core of source
network … Ziv, “A theorem on the entropy of certain binary sequences and applications I-II.” …
network … Ziv, “A theorem on the entropy of certain binary sequences and applications I-II.” …