Secure Source Coding With a Public Helper

We consider secure multi-terminal source coding problems in the presence of a public helper. Two main scenarios are studied: 1) source coding with a helper where the coded side information from the helper is eavesdropped by an external eavesdropper and 2) triangular source coding with a helper where...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on information theory Vol. 62; no. 7; pp. 3930 - 3949
Main Authors Kittichokechai, Kittipong, Chia, Yeow-Khiang, Oechtering, Tobias J., Skoglund, Mikael, Weissman, Tsachy
Format Journal Article
LanguageEnglish
Published New York IEEE 01.07.2016
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN0018-9448
1557-9654
1557-9654
DOI10.1109/TIT.2016.2570011

Cover

Abstract We consider secure multi-terminal source coding problems in the presence of a public helper. Two main scenarios are studied: 1) source coding with a helper where the coded side information from the helper is eavesdropped by an external eavesdropper and 2) triangular source coding with a helper where the helper is considered as a public terminal. We are interested in how the helper can support the source transmission subject to a constraint on the amount of information leaked due to its public nature. We characterize the tradeoff among transmission rate, incurred distortion, and information leakage rate at the helper/eavesdropper in the form of the rate-distortion-leakage region for various classes of problems.
AbstractList We consider secure multi-terminal source coding problems in the presence of a public helper. Two main scenarios are studied: 1) source coding with a helper where the coded side information from the helper is eavesdropped by an external eavesdropper and 2) triangular source coding with a helper where the helper is considered as a public terminal. We are interested in how the helper can support the source transmission subject to a constraint on the amount of information leaked due to its public nature. We characterize the tradeoff among transmission rate, incurred distortion, and information leakage rate at the helper/eavesdropper in the form of the rate-distortion-leakage region for various classes of problems.
Author Skoglund, Mikael
Weissman, Tsachy
Kittichokechai, Kittipong
Oechtering, Tobias J.
Chia, Yeow-Khiang
Author_xml – sequence: 1
  givenname: Kittipong
  surname: Kittichokechai
  fullname: Kittichokechai, Kittipong
  email: kittipong.kittichokechai@tu-berlin.de
  organization: ACCESS Linnaeus Center, KTH R. Inst. of Technol., Stockholm, Sweden
– sequence: 2
  givenname: Yeow-Khiang
  surname: Chia
  fullname: Chia, Yeow-Khiang
  email: yeowkhiang@gmail.com
  organization: Inst. for Infocomm Res., Singapore, Singapore
– sequence: 3
  givenname: Tobias J.
  surname: Oechtering
  fullname: Oechtering, Tobias J.
  email: oech@kth.se
  organization: ACCESS Linnaeus Center, KTH R. Inst. of Technol., Stockholm, Sweden
– sequence: 4
  givenname: Mikael
  surname: Skoglund
  fullname: Skoglund, Mikael
  email: skoglund@ee.kth.se
  organization: ACCESS Linnaeus Center, KTH R. Inst. of Technol., Stockholm, Sweden
– sequence: 5
  givenname: Tsachy
  surname: Weissman
  fullname: Weissman, Tsachy
  email: tsachy@stanford.edu
  organization: Stanford Univ., Stanford, CA, USA
BackLink https://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-193839$$DView record from Swedish Publication Index
BookMark eNp9kU1LHTEUhoNY6PVjX3Az0I0u5prPSbKU21oFwYLXdhkyuWc0dpxMkwziv290xMUtuAoJz3POeU_20O4QBkDoC8FLQrA-XV-ulxSTZkmFxJiQHbQgQshaN4LvokV5UrXmXH1Geyk9lCsXhC7QyQ24KUJ1E6booFqFjR_uqt8-31e2-jm1vXfVBfQjxAP0qbN9gsO3cx_dnn9fry7qq-sfl6uzq9pxzHNNmMSCNRaw7BRzjCsnhbCN3cjGSmi7jQLnRKs3SnZagbKgBXYOt4LTBlq2j8hcdxpG-_xk-96M0T_a-GwINi9ZTfbZvGQ1b1mLU89OeoJxat-FYL355n-dmRDvzJ98b4hmiunCH8_8GMPfCVI2jz456Hs7QJiSIYoKQbF-Rb9uoQ9lVUPZQKEwpZQIzgqFZ8rFkFKE7r-Zy_9sz9xsKc5nm30YcrS-_0g8mkUPAO99JJeYN4T9A3mUmtw
CODEN IETTAW
CitedBy_id crossref_primary_10_1109_TIT_2020_3026061
crossref_primary_10_1109_TIT_2020_2972348
crossref_primary_10_1109_TIFS_2024_3522775
crossref_primary_10_1109_TIFS_2023_3286285
crossref_primary_10_3390_e24121716
crossref_primary_10_1109_JSAIT_2024_3410235
Cites_doi 10.1109/ISIT.2013.6620617
10.1002/j.1538-7305.1975.tb02040.x
10.1017/CBO9780511977985
10.1109/GLOCOM.2010.5683471
10.1109/18.32119
10.1561/0100000036
10.1109/TIT.1976.1055508
10.1109/ITW.2007.4313115
10.1109/TIT.2008.920343
10.1109/18.641555
10.1109/TIFS.2013.2253320
10.1002/j.1538-7305.1949.tb00928.x
10.1109/TIT.2013.2288257
10.1109/TIT.2013.2245394
10.1109/TIP.2007.909408
10.1109/18.256484
10.1093/bioinformatics/btt066
10.1109/TIT.2014.2365175
10.1109/18.243431
10.1109/TIT.1979.1056105
10.1109/TIT.2012.2236973
10.1126/science.1229566
10.1109/TIT.2011.2167738
10.1109/ISIT.2012.6283628
10.1109/ISIT.2014.6874864
10.1109/TIT.2010.2046238
10.1017/CBO9780511921889
10.1109/TIT.1978.1055892
10.1109/TIT.1981.1056347
10.1109/18.720534
10.1109/TIT.2008.921858
10.1109/TIT.1973.1055037
10.1109/Allerton.2011.6120290
10.1016/S0019-9958(78)90034-7
10.1109/CISS.2008.4558665
10.1017/CBO9781139030687
10.1109/18.568694
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jul 2016
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jul 2016
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
F28
FR3
ADTPV
AOWAS
D8V
ADTOC
UNPAY
DOI 10.1109/TIT.2016.2570011
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Xplore Digital Library
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
SwePub
SwePub Articles
SWEPUB Kungliga Tekniska Högskolan
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
Engineering Research Database
ANTE: Abstracts in New Technology & Engineering
DatabaseTitleList Technology Research Database

Technology Research Database

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore Digital Library
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
– sequence: 2
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1557-9654
EndPage 3949
ExternalDocumentID oai:pubmedcentral.nih.gov:5791931
oai_DiVA_org_kth_193839
4110072861
10_1109_TIT_2016_2570011
7470461
Genre orig-research
Feature
GrantInformation_xml – fundername: National Science Foundation Center for Science of Information
– fundername: Swedish Research Council through the Project CLONE
  grantid: E0628201
GroupedDBID -~X
.DC
0R~
29I
3EH
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABFSI
ABQJQ
ABVLG
ACGFO
ACGFS
ACGOD
ACIWK
AENEX
AETEA
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
E.L
EBS
EJD
F5P
HZ~
H~9
IAAWW
IBMZZ
ICLAB
IDIHD
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
RXW
TAE
TN5
VH1
VJK
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
RIG
F28
FR3
ADTPV
AOWAS
D8V
ADTOC
UNPAY
ID FETCH-LOGICAL-c404t-1370536ae07f83c348c755a6ad76a7ebfd8ecc5b9d87f98e8ae950cc0b5426eb3
IEDL.DBID UNPAY
ISSN 0018-9448
1557-9654
IngestDate Sun Oct 26 04:13:06 EDT 2025
Thu Aug 21 06:45:59 EDT 2025
Thu Oct 02 05:52:48 EDT 2025
Sun Jun 29 12:48:04 EDT 2025
Wed Oct 01 02:55:12 EDT 2025
Thu Apr 24 23:01:41 EDT 2025
Tue Aug 26 16:40:40 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 7
Keywords eavesdropper
Wyner-Ziv coding
helper
secrecy
lossy source coding
side information
privacy
rate-distortion-leakage tradeoff
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c404t-1370536ae07f83c348c755a6ad76a7ebfd8ecc5b9d87f98e8ae950cc0b5426eb3
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-1
ObjectType-Feature-2
content type line 23
ORCID 0000-0002-8164-6676
OpenAccessLink https://proxy.k.utb.cz/login?url=https://www.ncbi.nlm.nih.gov/pmc/articles/5791931
PQID 1802221543
PQPubID 36024
PageCount 20
ParticipantIDs unpaywall_primary_10_1109_tit_2016_2570011
swepub_primary_oai_DiVA_org_kth_193839
crossref_primary_10_1109_TIT_2016_2570011
proquest_miscellaneous_1825520939
crossref_citationtrail_10_1109_TIT_2016_2570011
ieee_primary_7470461
proquest_journals_1802221543
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2016-07-01
PublicationDateYYYYMMDD 2016-07-01
PublicationDate_xml – month: 07
  year: 2016
  text: 2016-07-01
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on information theory
PublicationTitleAbbrev TIT
PublicationYear 2016
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref35
ref13
ref34
ref12
ref37
ref15
ref31
ref30
ref33
ref11
ref32
ref10
berger (ref7) 1977
ref2
ref1
ref39
ref17
ref38
ref16
ref19
gündüz (ref23) 2008
ref24
ref26
ref25
ref20
ref41
ref22
ref21
vasudevan (ref14) 2006
bishop (ref36) 2006
ref28
ref27
cover (ref42) 2006
liang (ref18) 2009; 5
ref29
ref8
ref9
ref4
ref3
ref6
ref5
ref40
References_xml – ident: ref39
  doi: 10.1109/ISIT.2013.6620617
– ident: ref16
  doi: 10.1002/j.1538-7305.1975.tb02040.x
– ident: ref32
  doi: 10.1017/CBO9780511977985
– ident: ref31
  doi: 10.1109/GLOCOM.2010.5683471
– ident: ref9
  doi: 10.1109/18.32119
– volume: 5
  start-page: 355
  year: 2009
  ident: ref18
  article-title: Information theoretic security
  publication-title: Found Trends Commun Inf Theory
  doi: 10.1561/0100000036
– ident: ref8
  doi: 10.1109/TIT.1976.1055508
– ident: ref22
  doi: 10.1109/ITW.2007.4313115
– ident: ref11
  doi: 10.1109/TIT.2008.920343
– ident: ref10
  doi: 10.1109/18.641555
– ident: ref19
  doi: 10.1109/TIFS.2013.2253320
– ident: ref26
  doi: 10.1002/j.1538-7305.1949.tb00928.x
– ident: ref12
  doi: 10.1109/TIT.2013.2288257
– ident: ref5
  doi: 10.1109/TIT.2013.2245394
– ident: ref37
  doi: 10.1109/TIP.2007.909408
– ident: ref28
  doi: 10.1109/18.256484
– ident: ref21
  doi: 10.1093/bioinformatics/btt066
– ident: ref33
  doi: 10.1109/TIT.2014.2365175
– start-page: 1
  year: 2006
  ident: ref14
  article-title: Lossy source coding for a cascade communication system with side-informations
  publication-title: Proc Allerton Conf Commun Control Comput
– ident: ref29
  doi: 10.1109/18.243431
– ident: ref1
  doi: 10.1109/TIT.1979.1056105
– year: 2006
  ident: ref42
  publication-title: Elements of Information Theory
– ident: ref4
  doi: 10.1109/TIT.2012.2236973
– ident: ref20
  doi: 10.1126/science.1229566
– start-page: 170
  year: 1977
  ident: ref7
  article-title: Multiterminal source coding
  publication-title: The Information Theory Approach to Communications
– year: 2006
  ident: ref36
  publication-title: Pattern Recognition and Machine Learning
– ident: ref15
  doi: 10.1109/TIT.2011.2167738
– ident: ref25
  doi: 10.1109/ISIT.2012.6283628
– ident: ref34
  doi: 10.1109/ISIT.2014.6874864
– ident: ref3
  doi: 10.1109/TIT.2010.2046238
– ident: ref38
  doi: 10.1017/CBO9780511921889
– ident: ref17
  doi: 10.1109/TIT.1978.1055892
– ident: ref13
  doi: 10.1109/TIT.1981.1056347
– ident: ref35
  doi: 10.1109/18.720534
– ident: ref30
  doi: 10.1109/TIT.2008.921858
– ident: ref6
  doi: 10.1109/TIT.1973.1055037
– ident: ref24
  doi: 10.1109/Allerton.2011.6120290
– ident: ref40
  doi: 10.1016/S0019-9958(78)90034-7
– ident: ref2
  doi: 10.1109/CISS.2008.4558665
– ident: ref41
  doi: 10.1017/CBO9781139030687
– ident: ref27
  doi: 10.1109/18.568694
– start-page: 111
  year: 2008
  ident: ref23
  article-title: Lossless compression with security constraints
  publication-title: Proc IEEE Int Symp Inf Theory (ISIT)
SSID ssj0014512
Score 2.2724307
Snippet We consider secure multi-terminal source coding problems in the presence of a public helper. Two main scenarios are studied: 1) source coding with a helper...
SourceID unpaywall
swepub
proquest
crossref
ieee
SourceType Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 3930
SubjectTerms Codes
Coding
Data integrity
Data transmission
Decoding
Distortion
Distortion measurement
eavesdropper
Electronic eavesdropping
helper
Information theory
Leakage
Leaking of information
Loss measurement
lossy source coding
Markov processes
privacy
rate-distortion-leakage tradeoff
secrecy
side information
Source coding
Terminals
Wyner-Ziv coding
SummonAdditionalLinks – databaseName: IEEE Xplore Digital Library
  dbid: RIE
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3db9QwDLe2vcAeGGygFcZUJIQ0RO_SJc3H47QPDaTxwg32FiVpqk079U6jFYK_Hqdpqx2gibdIdSs3tmU7dn4GeMtJyXPrVVbmFBMUW-SZrTzNmKAV2hdn8YbcxWd-fsk-XRVXa_BhvAvjve-az_wkLLtafrlwbTgqm2LoG_DB12FdSB7vao0VA1bkERk8RwPGnGMoSRI1nX2chR4uPgkT20ier7igbqbKangZIUM34VFbL83PH2Y-v-dyzrbgYmA2dprcTtrGTtyvP3Ac__dvnsKTPvZMj6KyPIM1X2_D1jDXIe3NfBs274EU7sBBdyTv0y_dMX96vAjeLv1201ynJo2nfik6r6W_ew6XZ6ez4_OsH7CQOUZYGEMv0Aa58URUkjrKpBNFYbgpBTfC26qUKOHCqlKKSkkvjVcFcY7YAh07puEvYKNe1H4XUsuMU7mpKOZ0TJRKOkfRuiWuCC0FS2A67Ll2Pfp4GIIx110WQpRGKekgJd1LKYGD8Y1lRN54gHYn7O9I129tAnuDWHVvmt91gLw7xECH0QTejI_RqEKlxNR-0QYazLQOiaIqgXdRHcZvBzzuk5uvRxqFqW-ba40hsAyE70d1-YtfNPwVfl_-m99X8DhQxW7gPdho7lr_GmOexu53yv4bGob5VA
  priority: 102
  providerName: IEEE
Title Secure Source Coding With a Public Helper
URI https://ieeexplore.ieee.org/document/7470461
https://www.proquest.com/docview/1802221543
https://www.proquest.com/docview/1825520939
https://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-193839
https://www.ncbi.nlm.nih.gov/pmc/articles/5791931
UnpaywallVersion submittedVersion
Volume 62
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Xplore Digital Library
  customDbUrl:
  eissn: 1557-9654
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0014512
  issn: 1557-9654
  databaseCode: RIE
  dateStart: 19630101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fb9MwED5N3QPsgcEGWmCbgoSQhpTMmR07fqzGpoHEhKCF8WTZjkOrdWlVUiH463fOL61DQtpbqlwjp-fr3Wefvw_gDSc5T4yTUZ5QBCgmTSJTOBoxQQuML86aE3KfLvnFmH28Sq82IOnOwtRN-9ZM43J2E5fTSd1bubixx12fGCJ4iUUHAp5NnmL5PYDN8eXn4Y_mHxeDl9WKWZgmRSR5yrqtSSK9npDv5eKxV24jSbKWimptlfUys6EO3YJHq3Kh__zWs9md1HO-DV-6QTcdJ9fxqjKx_XuPz_FBb_UUnrSFaDhsbj2DDVfuwHYn8hC2Mb8DW3cYC3fhqF6fd-HXes0_PJ371Bd-n1aTUIfNEmCImWzhls9hfH42Or2IWrWFyDLCvCa9wIDk2hFRZNRSllmRpprrXHAtnCnyDN2dGplnopCZy7STKbGWmBSzPGLyFzAo56Xbg9AwbWWiC4oAj4lcZtZSDPUMrwjNBQvguPvhlW2pyL0ixkzVkIRINfowUt5VqnVVAEf9NxYNDcd_bHe9L3s7BEyeVT6A_c63qo3TX8rz351g1cNoAK_72xhhfttEl26-8jYIu06IpDKAt82c6J_tybnfT78N1Xz5U11XE4VOzLzhu37O_DNenIZr4335EONX8Nh_bBqG92FQLVfuAMuiyhzWZxcP23C4BSiMBeE
linkProvider Unpaywall
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB6Vcig9tNCCCBQIEkIqIrtObcf2sSpUW-j2whZ6sxzHUauusquSqIJfzzhOoi4gxC1S7GjimdE8_Q3Am4wUWZo7lRQpxQAl52mSl44mTNAS9Stj4Ybc9CybnLNPF_xiDd4Pd2Gcc23zmRv5x7aWXyxs41NlY3R9PT74PbjPGWM83NYaagaMpwEbPEUVxqijL0oSNZ6dzHwXVzbyM9tImq4YoXaqyqqDGUBDN2GjqZbmx62Zz-8YneNtmPbkhl6T61FT5yP78zckx__9n4ew1Xmf8WEQl0ew5qod2O4nO8Sdou_A5h2Ywl3Yb5PyLv7SJvrjo4W3d_G3q_oyNnHI-8Vovpbu5jGcH3-cHU2SbsRCYhlhfhC9QC3MjCOilNRSJq3g3GSmEJkRLi8LiTzmuSqkKJV00jjFibUk52jaMRB_AuvVonJPIc6ZsSo1JcWojolCSWsp6rfEJ0ILwSIY92eubYc_7sdgzHUbhxClkUvac0l3XIpgf9ixDNgb_1i76893WNcdbQR7PVt1p5zftQe9O0BXh9EIXg-vUa18rcRUbtH4NRhrHRBFVQRvgzgM3_aI3B-uvh5qZKa-ri81OsHSL3w3iMsf9KLqr9D77O_0voKNyWx6qk9Pzj4_hwd-R-gN3oP1-qZxL9ADqvOXreD_Ak1F_KE
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fa9RAEB7K9UH70NZWMf0hEUSokHTT3exmH49qqYJF9E7r07K72XhHr7njmkP0r3c2v-gpCH1LyCRsMvtl5ttM5gN4xUnOE-NklCcUCYpJk8gUjkZM0ALxxVnzh9zHK345Zh-u0-sNSLp_YeqifWumcTm7jcvppK6tXNza065ODBm8xKQDCc8mTzH9HsDm-OrT8HvzxkXwsloxC8OkiCRPWfdpkkivJ-RruXjsldtIkqyFolpbZT3NbFqHbsGjVbnQv37q2exe6LnYgc_doJuKk5t4VZnY_v6rn-OD7moXtttENBw2h57Ahiv3YKcTeQhbzO_B1r2OhftwUq_Pu_BLveYfns996Au_TatJqMNmCTDESLZwy6cwvng3Or-MWrWFyDLCvCa9QEBy7YgoMmopy6xIU811LrgWzhR5hu5OjcwzUcjMZdrJlFhLTIpRHjn5MxiU89I9h9AwbWWiC4oEj4lcZtZShHqGW4TmggVw2j14ZdtW5F4RY6ZqSkKkGr0fKe8q1boqgJP-jEXThuM_tvvel70dEibfVT6Ao863qsXpnfL9784w62E0gJf9YUSY_2yiSzdfeRukXWdEUhnA62ZO9Nf2zbnfTr8O1Xz5Q91UE4VOzLzhm37O_DNenIZr4z14iPEhPPa7TcHwEQyq5codY1pUmRctEP4ACtcE4A
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+Source+Coding+With+a+Public+Helper&rft.jtitle=IEEE+transactions+on+information+theory&rft.au=Kittichokechai%2C+Kittipong&rft.au=Chia%2C+Yeow-Khiang&rft.au=Oechtering%2C+Tobias+J&rft.au=Skoglund%2C+Mikael&rft.date=2016-07-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=0018-9448&rft.eissn=1557-9654&rft.volume=62&rft.issue=7&rft.spage=3930&rft_id=info:doi/10.1109%2FTIT.2016.2570011&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=4110072861
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9448&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9448&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9448&client=summon