Secure Source Coding With a Public Helper
We consider secure multi-terminal source coding problems in the presence of a public helper. Two main scenarios are studied: 1) source coding with a helper where the coded side information from the helper is eavesdropped by an external eavesdropper and 2) triangular source coding with a helper where...
Saved in:
| Published in | IEEE transactions on information theory Vol. 62; no. 7; pp. 3930 - 3949 |
|---|---|
| Main Authors | , , , , |
| Format | Journal Article |
| Language | English |
| Published |
New York
IEEE
01.07.2016
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects | |
| Online Access | Get full text |
| ISSN | 0018-9448 1557-9654 1557-9654 |
| DOI | 10.1109/TIT.2016.2570011 |
Cover
| Abstract | We consider secure multi-terminal source coding problems in the presence of a public helper. Two main scenarios are studied: 1) source coding with a helper where the coded side information from the helper is eavesdropped by an external eavesdropper and 2) triangular source coding with a helper where the helper is considered as a public terminal. We are interested in how the helper can support the source transmission subject to a constraint on the amount of information leaked due to its public nature. We characterize the tradeoff among transmission rate, incurred distortion, and information leakage rate at the helper/eavesdropper in the form of the rate-distortion-leakage region for various classes of problems. |
|---|---|
| AbstractList | We consider secure multi-terminal source coding problems in the presence of a public helper. Two main scenarios are studied: 1) source coding with a helper where the coded side information from the helper is eavesdropped by an external eavesdropper and 2) triangular source coding with a helper where the helper is considered as a public terminal. We are interested in how the helper can support the source transmission subject to a constraint on the amount of information leaked due to its public nature. We characterize the tradeoff among transmission rate, incurred distortion, and information leakage rate at the helper/eavesdropper in the form of the rate-distortion-leakage region for various classes of problems. |
| Author | Skoglund, Mikael Weissman, Tsachy Kittichokechai, Kittipong Oechtering, Tobias J. Chia, Yeow-Khiang |
| Author_xml | – sequence: 1 givenname: Kittipong surname: Kittichokechai fullname: Kittichokechai, Kittipong email: kittipong.kittichokechai@tu-berlin.de organization: ACCESS Linnaeus Center, KTH R. Inst. of Technol., Stockholm, Sweden – sequence: 2 givenname: Yeow-Khiang surname: Chia fullname: Chia, Yeow-Khiang email: yeowkhiang@gmail.com organization: Inst. for Infocomm Res., Singapore, Singapore – sequence: 3 givenname: Tobias J. surname: Oechtering fullname: Oechtering, Tobias J. email: oech@kth.se organization: ACCESS Linnaeus Center, KTH R. Inst. of Technol., Stockholm, Sweden – sequence: 4 givenname: Mikael surname: Skoglund fullname: Skoglund, Mikael email: skoglund@ee.kth.se organization: ACCESS Linnaeus Center, KTH R. Inst. of Technol., Stockholm, Sweden – sequence: 5 givenname: Tsachy surname: Weissman fullname: Weissman, Tsachy email: tsachy@stanford.edu organization: Stanford Univ., Stanford, CA, USA |
| BackLink | https://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-193839$$DView record from Swedish Publication Index |
| BookMark | eNp9kU1LHTEUhoNY6PVjX3Az0I0u5prPSbKU21oFwYLXdhkyuWc0dpxMkwziv290xMUtuAoJz3POeU_20O4QBkDoC8FLQrA-XV-ulxSTZkmFxJiQHbQgQshaN4LvokV5UrXmXH1Geyk9lCsXhC7QyQ24KUJ1E6booFqFjR_uqt8-31e2-jm1vXfVBfQjxAP0qbN9gsO3cx_dnn9fry7qq-sfl6uzq9pxzHNNmMSCNRaw7BRzjCsnhbCN3cjGSmi7jQLnRKs3SnZagbKgBXYOt4LTBlq2j8hcdxpG-_xk-96M0T_a-GwINi9ZTfbZvGQ1b1mLU89OeoJxat-FYL355n-dmRDvzJ98b4hmiunCH8_8GMPfCVI2jz456Hs7QJiSIYoKQbF-Rb9uoQ9lVUPZQKEwpZQIzgqFZ8rFkFKE7r-Zy_9sz9xsKc5nm30YcrS-_0g8mkUPAO99JJeYN4T9A3mUmtw |
| CODEN | IETTAW |
| CitedBy_id | crossref_primary_10_1109_TIT_2020_3026061 crossref_primary_10_1109_TIT_2020_2972348 crossref_primary_10_1109_TIFS_2024_3522775 crossref_primary_10_1109_TIFS_2023_3286285 crossref_primary_10_3390_e24121716 crossref_primary_10_1109_JSAIT_2024_3410235 |
| Cites_doi | 10.1109/ISIT.2013.6620617 10.1002/j.1538-7305.1975.tb02040.x 10.1017/CBO9780511977985 10.1109/GLOCOM.2010.5683471 10.1109/18.32119 10.1561/0100000036 10.1109/TIT.1976.1055508 10.1109/ITW.2007.4313115 10.1109/TIT.2008.920343 10.1109/18.641555 10.1109/TIFS.2013.2253320 10.1002/j.1538-7305.1949.tb00928.x 10.1109/TIT.2013.2288257 10.1109/TIT.2013.2245394 10.1109/TIP.2007.909408 10.1109/18.256484 10.1093/bioinformatics/btt066 10.1109/TIT.2014.2365175 10.1109/18.243431 10.1109/TIT.1979.1056105 10.1109/TIT.2012.2236973 10.1126/science.1229566 10.1109/TIT.2011.2167738 10.1109/ISIT.2012.6283628 10.1109/ISIT.2014.6874864 10.1109/TIT.2010.2046238 10.1017/CBO9780511921889 10.1109/TIT.1978.1055892 10.1109/TIT.1981.1056347 10.1109/18.720534 10.1109/TIT.2008.921858 10.1109/TIT.1973.1055037 10.1109/Allerton.2011.6120290 10.1016/S0019-9958(78)90034-7 10.1109/CISS.2008.4558665 10.1017/CBO9781139030687 10.1109/18.568694 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jul 2016 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jul 2016 |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D F28 FR3 ADTPV AOWAS D8V ADTOC UNPAY |
| DOI | 10.1109/TIT.2016.2570011 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Xplore Digital Library CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering Engineering Research Database SwePub SwePub Articles SWEPUB Kungliga Tekniska Högskolan Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional Engineering Research Database ANTE: Abstracts in New Technology & Engineering |
| DatabaseTitleList | Technology Research Database Technology Research Database |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore Digital Library url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1557-9654 |
| EndPage | 3949 |
| ExternalDocumentID | oai:pubmedcentral.nih.gov:5791931 oai_DiVA_org_kth_193839 4110072861 10_1109_TIT_2016_2570011 7470461 |
| Genre | orig-research Feature |
| GrantInformation_xml | – fundername: National Science Foundation Center for Science of Information – fundername: Swedish Research Council through the Project CLONE grantid: E0628201 |
| GroupedDBID | -~X .DC 0R~ 29I 3EH 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABFSI ABQJQ ABVLG ACGFO ACGFS ACGOD ACIWK AENEX AETEA AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 E.L EBS EJD F5P HZ~ H~9 IAAWW IBMZZ ICLAB IDIHD IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL P2P PQQKQ RIA RIE RNS RXW TAE TN5 VH1 VJK AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D RIG F28 FR3 ADTPV AOWAS D8V ADTOC UNPAY |
| ID | FETCH-LOGICAL-c404t-1370536ae07f83c348c755a6ad76a7ebfd8ecc5b9d87f98e8ae950cc0b5426eb3 |
| IEDL.DBID | UNPAY |
| ISSN | 0018-9448 1557-9654 |
| IngestDate | Sun Oct 26 04:13:06 EDT 2025 Thu Aug 21 06:45:59 EDT 2025 Thu Oct 02 05:52:48 EDT 2025 Sun Jun 29 12:48:04 EDT 2025 Wed Oct 01 02:55:12 EDT 2025 Thu Apr 24 23:01:41 EDT 2025 Tue Aug 26 16:40:40 EDT 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 7 |
| Keywords | eavesdropper Wyner-Ziv coding helper secrecy lossy source coding side information privacy rate-distortion-leakage tradeoff |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c404t-1370536ae07f83c348c755a6ad76a7ebfd8ecc5b9d87f98e8ae950cc0b5426eb3 |
| Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-1 ObjectType-Feature-2 content type line 23 |
| ORCID | 0000-0002-8164-6676 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://www.ncbi.nlm.nih.gov/pmc/articles/5791931 |
| PQID | 1802221543 |
| PQPubID | 36024 |
| PageCount | 20 |
| ParticipantIDs | unpaywall_primary_10_1109_tit_2016_2570011 swepub_primary_oai_DiVA_org_kth_193839 crossref_primary_10_1109_TIT_2016_2570011 proquest_miscellaneous_1825520939 crossref_citationtrail_10_1109_TIT_2016_2570011 ieee_primary_7470461 proquest_journals_1802221543 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2016-07-01 |
| PublicationDateYYYYMMDD | 2016-07-01 |
| PublicationDate_xml | – month: 07 year: 2016 text: 2016-07-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE transactions on information theory |
| PublicationTitleAbbrev | TIT |
| PublicationYear | 2016 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref35 ref13 ref34 ref12 ref37 ref15 ref31 ref30 ref33 ref11 ref32 ref10 berger (ref7) 1977 ref2 ref1 ref39 ref17 ref38 ref16 ref19 gündüz (ref23) 2008 ref24 ref26 ref25 ref20 ref41 ref22 ref21 vasudevan (ref14) 2006 bishop (ref36) 2006 ref28 ref27 cover (ref42) 2006 liang (ref18) 2009; 5 ref29 ref8 ref9 ref4 ref3 ref6 ref5 ref40 |
| References_xml | – ident: ref39 doi: 10.1109/ISIT.2013.6620617 – ident: ref16 doi: 10.1002/j.1538-7305.1975.tb02040.x – ident: ref32 doi: 10.1017/CBO9780511977985 – ident: ref31 doi: 10.1109/GLOCOM.2010.5683471 – ident: ref9 doi: 10.1109/18.32119 – volume: 5 start-page: 355 year: 2009 ident: ref18 article-title: Information theoretic security publication-title: Found Trends Commun Inf Theory doi: 10.1561/0100000036 – ident: ref8 doi: 10.1109/TIT.1976.1055508 – ident: ref22 doi: 10.1109/ITW.2007.4313115 – ident: ref11 doi: 10.1109/TIT.2008.920343 – ident: ref10 doi: 10.1109/18.641555 – ident: ref19 doi: 10.1109/TIFS.2013.2253320 – ident: ref26 doi: 10.1002/j.1538-7305.1949.tb00928.x – ident: ref12 doi: 10.1109/TIT.2013.2288257 – ident: ref5 doi: 10.1109/TIT.2013.2245394 – ident: ref37 doi: 10.1109/TIP.2007.909408 – ident: ref28 doi: 10.1109/18.256484 – ident: ref21 doi: 10.1093/bioinformatics/btt066 – ident: ref33 doi: 10.1109/TIT.2014.2365175 – start-page: 1 year: 2006 ident: ref14 article-title: Lossy source coding for a cascade communication system with side-informations publication-title: Proc Allerton Conf Commun Control Comput – ident: ref29 doi: 10.1109/18.243431 – ident: ref1 doi: 10.1109/TIT.1979.1056105 – year: 2006 ident: ref42 publication-title: Elements of Information Theory – ident: ref4 doi: 10.1109/TIT.2012.2236973 – ident: ref20 doi: 10.1126/science.1229566 – start-page: 170 year: 1977 ident: ref7 article-title: Multiterminal source coding publication-title: The Information Theory Approach to Communications – year: 2006 ident: ref36 publication-title: Pattern Recognition and Machine Learning – ident: ref15 doi: 10.1109/TIT.2011.2167738 – ident: ref25 doi: 10.1109/ISIT.2012.6283628 – ident: ref34 doi: 10.1109/ISIT.2014.6874864 – ident: ref3 doi: 10.1109/TIT.2010.2046238 – ident: ref38 doi: 10.1017/CBO9780511921889 – ident: ref17 doi: 10.1109/TIT.1978.1055892 – ident: ref13 doi: 10.1109/TIT.1981.1056347 – ident: ref35 doi: 10.1109/18.720534 – ident: ref30 doi: 10.1109/TIT.2008.921858 – ident: ref6 doi: 10.1109/TIT.1973.1055037 – ident: ref24 doi: 10.1109/Allerton.2011.6120290 – ident: ref40 doi: 10.1016/S0019-9958(78)90034-7 – ident: ref2 doi: 10.1109/CISS.2008.4558665 – ident: ref41 doi: 10.1017/CBO9781139030687 – ident: ref27 doi: 10.1109/18.568694 – start-page: 111 year: 2008 ident: ref23 article-title: Lossless compression with security constraints publication-title: Proc IEEE Int Symp Inf Theory (ISIT) |
| SSID | ssj0014512 |
| Score | 2.2724307 |
| Snippet | We consider secure multi-terminal source coding problems in the presence of a public helper. Two main scenarios are studied: 1) source coding with a helper... |
| SourceID | unpaywall swepub proquest crossref ieee |
| SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 3930 |
| SubjectTerms | Codes Coding Data integrity Data transmission Decoding Distortion Distortion measurement eavesdropper Electronic eavesdropping helper Information theory Leakage Leaking of information Loss measurement lossy source coding Markov processes privacy rate-distortion-leakage tradeoff secrecy side information Source coding Terminals Wyner-Ziv coding |
| SummonAdditionalLinks | – databaseName: IEEE Xplore Digital Library dbid: RIE link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3db9QwDLe2vcAeGGygFcZUJIQ0RO_SJc3H47QPDaTxwg32FiVpqk079U6jFYK_Hqdpqx2gibdIdSs3tmU7dn4GeMtJyXPrVVbmFBMUW-SZrTzNmKAV2hdn8YbcxWd-fsk-XRVXa_BhvAvjve-az_wkLLtafrlwbTgqm2LoG_DB12FdSB7vao0VA1bkERk8RwPGnGMoSRI1nX2chR4uPgkT20ier7igbqbKangZIUM34VFbL83PH2Y-v-dyzrbgYmA2dprcTtrGTtyvP3Ac__dvnsKTPvZMj6KyPIM1X2_D1jDXIe3NfBs274EU7sBBdyTv0y_dMX96vAjeLv1201ynJo2nfik6r6W_ew6XZ6ez4_OsH7CQOUZYGEMv0Aa58URUkjrKpBNFYbgpBTfC26qUKOHCqlKKSkkvjVcFcY7YAh07puEvYKNe1H4XUsuMU7mpKOZ0TJRKOkfRuiWuCC0FS2A67Ll2Pfp4GIIx110WQpRGKekgJd1LKYGD8Y1lRN54gHYn7O9I129tAnuDWHVvmt91gLw7xECH0QTejI_RqEKlxNR-0QYazLQOiaIqgXdRHcZvBzzuk5uvRxqFqW-ba40hsAyE70d1-YtfNPwVfl_-m99X8DhQxW7gPdho7lr_GmOexu53yv4bGob5VA priority: 102 providerName: IEEE |
| Title | Secure Source Coding With a Public Helper |
| URI | https://ieeexplore.ieee.org/document/7470461 https://www.proquest.com/docview/1802221543 https://www.proquest.com/docview/1825520939 https://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-193839 https://www.ncbi.nlm.nih.gov/pmc/articles/5791931 |
| UnpaywallVersion | submittedVersion |
| Volume | 62 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Xplore Digital Library customDbUrl: eissn: 1557-9654 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0014512 issn: 1557-9654 databaseCode: RIE dateStart: 19630101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fb9MwED5N3QPsgcEGWmCbgoSQhpTMmR07fqzGpoHEhKCF8WTZjkOrdWlVUiH463fOL61DQtpbqlwjp-fr3Wefvw_gDSc5T4yTUZ5QBCgmTSJTOBoxQQuML86aE3KfLvnFmH28Sq82IOnOwtRN-9ZM43J2E5fTSd1bubixx12fGCJ4iUUHAp5NnmL5PYDN8eXn4Y_mHxeDl9WKWZgmRSR5yrqtSSK9npDv5eKxV24jSbKWimptlfUys6EO3YJHq3Kh__zWs9md1HO-DV-6QTcdJ9fxqjKx_XuPz_FBb_UUnrSFaDhsbj2DDVfuwHYn8hC2Mb8DW3cYC3fhqF6fd-HXes0_PJ371Bd-n1aTUIfNEmCImWzhls9hfH42Or2IWrWFyDLCvCa9wIDk2hFRZNRSllmRpprrXHAtnCnyDN2dGplnopCZy7STKbGWmBSzPGLyFzAo56Xbg9AwbWWiC4oAj4lcZtZSDPUMrwjNBQvguPvhlW2pyL0ixkzVkIRINfowUt5VqnVVAEf9NxYNDcd_bHe9L3s7BEyeVT6A_c63qo3TX8rz351g1cNoAK_72xhhfttEl26-8jYIu06IpDKAt82c6J_tybnfT78N1Xz5U11XE4VOzLzhu37O_DNenIZr4335EONX8Nh_bBqG92FQLVfuAMuiyhzWZxcP23C4BSiMBeE |
| linkProvider | Unpaywall |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB6Vcig9tNCCCBQIEkIqIrtObcf2sSpUW-j2whZ6sxzHUauusquSqIJfzzhOoi4gxC1S7GjimdE8_Q3Am4wUWZo7lRQpxQAl52mSl44mTNAS9Stj4Ybc9CybnLNPF_xiDd4Pd2Gcc23zmRv5x7aWXyxs41NlY3R9PT74PbjPGWM83NYaagaMpwEbPEUVxqijL0oSNZ6dzHwXVzbyM9tImq4YoXaqyqqDGUBDN2GjqZbmx62Zz-8YneNtmPbkhl6T61FT5yP78zckx__9n4ew1Xmf8WEQl0ew5qod2O4nO8Sdou_A5h2Ywl3Yb5PyLv7SJvrjo4W3d_G3q_oyNnHI-8Vovpbu5jGcH3-cHU2SbsRCYhlhfhC9QC3MjCOilNRSJq3g3GSmEJkRLi8LiTzmuSqkKJV00jjFibUk52jaMRB_AuvVonJPIc6ZsSo1JcWojolCSWsp6rfEJ0ILwSIY92eubYc_7sdgzHUbhxClkUvac0l3XIpgf9ixDNgb_1i76893WNcdbQR7PVt1p5zftQe9O0BXh9EIXg-vUa18rcRUbtH4NRhrHRBFVQRvgzgM3_aI3B-uvh5qZKa-ri81OsHSL3w3iMsf9KLqr9D77O_0voKNyWx6qk9Pzj4_hwd-R-gN3oP1-qZxL9ADqvOXreD_Ak1F_KE |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fa9RAEB7K9UH70NZWMf0hEUSokHTT3exmH49qqYJF9E7r07K72XhHr7njmkP0r3c2v-gpCH1LyCRsMvtl5ttM5gN4xUnOE-NklCcUCYpJk8gUjkZM0ALxxVnzh9zHK345Zh-u0-sNSLp_YeqifWumcTm7jcvppK6tXNza065ODBm8xKQDCc8mTzH9HsDm-OrT8HvzxkXwsloxC8OkiCRPWfdpkkivJ-RruXjsldtIkqyFolpbZT3NbFqHbsGjVbnQv37q2exe6LnYgc_doJuKk5t4VZnY_v6rn-OD7moXtttENBw2h57Ahiv3YKcTeQhbzO_B1r2OhftwUq_Pu_BLveYfns996Au_TatJqMNmCTDESLZwy6cwvng3Or-MWrWFyDLCvCa9QEBy7YgoMmopy6xIU811LrgWzhR5hu5OjcwzUcjMZdrJlFhLTIpRHjn5MxiU89I9h9AwbWWiC4oEj4lcZtZShHqGW4TmggVw2j14ZdtW5F4RY6ZqSkKkGr0fKe8q1boqgJP-jEXThuM_tvvel70dEibfVT6Ao863qsXpnfL9784w62E0gJf9YUSY_2yiSzdfeRukXWdEUhnA62ZO9Nf2zbnfTr8O1Xz5Q91UE4VOzLzhm37O_DNenIZr4z14iPEhPPa7TcHwEQyq5codY1pUmRctEP4ACtcE4A |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+Source+Coding+With+a+Public+Helper&rft.jtitle=IEEE+transactions+on+information+theory&rft.au=Kittichokechai%2C+Kittipong&rft.au=Chia%2C+Yeow-Khiang&rft.au=Oechtering%2C+Tobias+J&rft.au=Skoglund%2C+Mikael&rft.date=2016-07-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=0018-9448&rft.eissn=1557-9654&rft.volume=62&rft.issue=7&rft.spage=3930&rft_id=info:doi/10.1109%2FTIT.2016.2570011&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=4110072861 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9448&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9448&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9448&client=summon |