Lossy Source Compression Using Low-Density Generator Matrix Codes: Analysis and Algorithms
We study the use of low-density generator matrix (LDGM) codes for lossy compression of the Bernoulli symmetric source. First, we establish rigorous upper bounds on the average distortion achieved by check-regular ensemble of LDGM codes under optimal minimum distance source encoding. These bounds est...
Saved in:
| Published in | IEEE transactions on information theory Vol. 56; no. 3; pp. 1351 - 1368 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
New York, NY
IEEE
01.03.2010
Institute of Electrical and Electronics Engineers The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects | |
| Online Access | Get full text |
| ISSN | 0018-9448 1557-9654 |
| DOI | 10.1109/TIT.2009.2039160 |
Cover
| Abstract | We study the use of low-density generator matrix (LDGM) codes for lossy compression of the Bernoulli symmetric source. First, we establish rigorous upper bounds on the average distortion achieved by check-regular ensemble of LDGM codes under optimal minimum distance source encoding. These bounds establish that the average distortion using such bounded degree families rapidly approaches the Shannon limit as the degrees are increased. Second, we propose a family of message-passing algorithms, ranging from the standard belief propagation algorithm at one extreme to a variant of survey propagation algorithm at the other. When combined with a decimation subroutine and applied to LDGM codes with suitably irregular degree distributions, we show that such a message-passing/decimation algorithm yields distortion very close to the Shannon rate-distortion bound for the binary symmetric source. |
|---|---|
| AbstractList | We study the use of low-density generator matrix (LDGM) codes for lossy compression of the Bernoulli symmetric source. First, we establish rigorous upper bounds on the average distortion achieved by check-regular ensemble of LDGM codes under optimal minimum distance source encoding. These bounds establish that the average distortion using such bounded degree families rapidly approaches the Shannon limit as the degrees are increased. Second, we propose a family of message-passing algorithms, ranging from the standard belief propagation algorithm at one extreme to a variant of survey propagation algorithm at the other. When combined with a decimation subroutine and applied to LDGM codes with suitably irregular degree distributions, we show that such a message-passing/decimation algorithm yields distortion very close to the Shannon rate-distortion bound for the binary symmetric source. We study the use of low-density generator matrix (LDGM) codes for lossy compression of the Bernoulli symmetric source. First, we establish rigorous upper bounds on the average distortion achieved by check-regular ensemble of LDGM codes under optimal minimum distance source encoding. These bounds establish that the average distortion using such bounded degree families rapidly approaches the Shannon limit as the degrees are increased. Second, we propose a family of message-passing algorithms, ranging from the standard belief propagation algorithm at one extreme to a variant of survey propagation algorithm at the other. When combined with a decimation subroutine and applied to LDGM codes with suitably irregular degree distributions, we show that such a message-passing/decimation algorithm yields distortion very close to the Shannon rate-distortion bound for the binary symmetric source. [PUBLICATION ABSTRACT] |
| Author | Maneva, E. Martinian, E. Wainwright, M.J. |
| Author_xml | – sequence: 1 givenname: M.J. surname: Wainwright fullname: Wainwright, M.J. organization: Dept. of Stat., Univ. of California at Berkeley, Berkeley, CA, USA – sequence: 2 givenname: E. surname: Maneva fullname: Maneva, E. organization: Inst. de Mat., Univ. de Barcelona (UB), Barcelona, Spain – sequence: 3 givenname: E. surname: Martinian fullname: Martinian, E. organization: Tilda Consulting, Boston, MA, USA |
| BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=22729626$$DView record in Pascal Francis |
| BookMark | eNp9kU1rVDEUhoNUcFrdC24ugri6NZ83ibth1FoYceF04yakuefWlDvJmJNB59-bMqOLLtwkBJ7n5eS85-Qs5QSEvGT0kjFq322uN5ecUtsOYdlAn5AFU0r3dlDyjCwoZaa3Uppn5Bzxvj2lYnxBvq8z4qH7lvclQLfK210BxJhTd4Mx3XXr_Kv_AAljPXRXkKD4mkv3xdcSfzd8BHzfLZOfDxix82nslvNdLrH-2OJz8nTyM8KL031Bbj593Kw-9-uvV9er5boPkpnaazXqSSoRlBJtWB6CAXsbpNe3xng7QgA7UDNMkoowjkroaWBGCz8GryW14oK8PebuSv65B6xuGzHAPPsEeY9ON4VbK3UjXz8i79u_2_TomBXGGMt4g96cII_Bz1PxKUR0uxK3vhwc5y1s4EPjhiMXSlthgcmFWH1tq6vFx9kx6h6Kca0Y91CMOxXTRPpI_Jv9H-XVUYkA8A9XklvGtPgDsAGZ_g |
| CODEN | IETTAW |
| CitedBy_id | crossref_primary_10_1093_bioinformatics_btt116 crossref_primary_10_1109_TIT_2015_2434842 crossref_primary_10_1109_TCOMM_2023_3245660 crossref_primary_10_3390_s23218805 crossref_primary_10_1109_TCOMM_2011_061511_100462 crossref_primary_10_1109_TIT_2014_2313085 crossref_primary_10_1109_TIT_2017_2716360 crossref_primary_10_1103_PhysRevE_102_042122 crossref_primary_10_1049_iet_com_2017_0032 crossref_primary_10_1109_TIT_2014_2360692 crossref_primary_10_1073_pnas_1109521108 crossref_primary_10_1109_LCOMM_2018_2869816 crossref_primary_10_1109_TIT_2014_2314676 crossref_primary_10_1109_TIT_2023_3323839 crossref_primary_10_1007_s00493_019_3897_3 crossref_primary_10_3390_e25020252 crossref_primary_10_1109_TCOMM_2018_2848241 crossref_primary_10_1109_TCOMM_2019_2937932 crossref_primary_10_1109_TCOMM_2020_3020796 crossref_primary_10_1109_TCOMM_2019_2950714 crossref_primary_10_1109_TCOMM_2023_3342247 crossref_primary_10_1109_TCOMM_2012_082812_110817 crossref_primary_10_1109_TCOMM_2012_12_100562 crossref_primary_10_1587_transfun_E101_A_531 crossref_primary_10_4218_etrij_10_0210_0204 crossref_primary_10_1109_JSAC_2014_140517 crossref_primary_10_1103_PhysRevE_89_033301 crossref_primary_10_1103_PhysRevE_84_051111 crossref_primary_10_3390_electronics11203337 |
| Cites_doi | 10.1109/4234.905935 10.7551/mitpress/4347.001.0001 10.1109/26.46532 10.1109/ITW.2007.4313151 10.1109/TIT.2008.2009815 10.1159/000094188 10.1002/0471722154 10.1109/18.910578 10.1109/LCOMM.2002.803484 10.1103/PhysRevLett.90.047205 10.1109/ISIT.2006.261737 10.1109/TIT.1974.1055233 10.1109/TIT.2003.815805 10.1109/18.910572 10.1109/TURBOCODING.2008.4658729 10.1109/TIT.1981.1056404 10.1109/TIT.2004.842696 10.1109/18.910575 10.1103/PhysRevE.69.035105 10.1109/TIT.2009.2016040 10.1109/MSP.2004.1267047 10.1109/26.539767 10.1017/CBO9780511791338 10.1017/CBO9780511814075 10.1126/science.1073287 10.1145/1255443.1255445 10.1109/ISIT.2005.1523592 10.1088/0305-4470/36/43/031 10.1017/S0963548302005552 10.1002/0471200611 10.1109/ISIT.2006.261716 |
| ContentType | Journal Article |
| Copyright | 2015 INIST-CNRS Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Mar 2010 |
| Copyright_xml | – notice: 2015 INIST-CNRS – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Mar 2010 |
| DBID | 97E RIA RIE AAYXX CITATION IQODW 7SC 7SP 8FD JQ2 L7M L~C L~D F28 FR3 |
| DOI | 10.1109/TIT.2009.2039160 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Pascal-Francis Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering Engineering Research Database |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional Engineering Research Database ANTE: Abstracts in New Technology & Engineering |
| DatabaseTitleList | Technology Research Database Technology Research Database |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science Applied Sciences |
| EISSN | 1557-9654 |
| EndPage | 1368 |
| ExternalDocumentID | 2020547091 22729626 10_1109_TIT_2009_2039160 5429117 |
| Genre | orig-research Feature |
| GroupedDBID | -~X .DC 0R~ 29I 3EH 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABFSI ABQJQ ABVLG ACGFO ACGFS ACGOD ACIWK AENEX AETEA AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 E.L EBS EJD F5P HZ~ H~9 IAAWW IBMZZ ICLAB IDIHD IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL P2P PQQKQ RIA RIE RNS RXW TAE TN5 VH1 VJK AAYXX CITATION IQODW RIG 7SC 7SP 8FD JQ2 L7M L~C L~D F28 FR3 |
| ID | FETCH-LOGICAL-c418t-75d7f453c5539652cc8e9bc4a7b88a9dece96086f403cdd537f61873adca74093 |
| IEDL.DBID | RIE |
| ISSN | 0018-9448 |
| IngestDate | Sat Sep 27 23:38:12 EDT 2025 Mon Jun 30 03:56:55 EDT 2025 Mon Jul 21 09:11:58 EDT 2025 Thu Apr 24 23:03:22 EDT 2025 Wed Oct 01 03:15:57 EDT 2025 Tue Aug 26 16:40:02 EDT 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Keywords | Lossy compression Signal compression message-passing Lossy source coding belief propagation survey propagation Source coding Subroutine graphical codes low-density generator matrix (LDGM) codes Binary signal Rate distortion theory Lossy medium Algorithm Credal approach Upper bound Message passing satisfiability problems MAX-XORSAT Minimal distance Distance measurement Decimation Satisfiability sum-product |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html CC BY 4.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c418t-75d7f453c5539652cc8e9bc4a7b88a9dece96086f403cdd537f61873adca74093 |
| Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-2 content type line 23 |
| PQID | 193888912 |
| PQPubID | 36024 |
| PageCount | 18 |
| ParticipantIDs | pascalfrancis_primary_22729626 ieee_primary_5429117 crossref_citationtrail_10_1109_TIT_2009_2039160 crossref_primary_10_1109_TIT_2009_2039160 proquest_miscellaneous_753729947 proquest_journals_193888912 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2010-03-01 |
| PublicationDateYYYYMMDD | 2010-03-01 |
| PublicationDate_xml | – month: 03 year: 2010 text: 2010-03-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | New York, NY |
| PublicationPlace_xml | – name: New York, NY – name: New York |
| PublicationTitle | IEEE transactions on information theory |
| PublicationTitleAbbrev | TIT |
| PublicationYear | 2010 |
| Publisher | IEEE Institute of Electrical and Electronics Engineers The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: Institute of Electrical and Electronics Engineers – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | dubois (ref12) 2002 ref13 ref34 ref37 bertsekas (ref4) 1995 ref31 mzard (ref35) 2002; 111 ref33 ref32 ref10 ref2 dimakis (ref11) 2008 ref38 ref18 grimmett (ref20) 1992 hiriart-urruty (ref22) 1993 pearl (ref40) 1988 mzard (ref36) 2002; 66 filler (ref15) 2007 martinian (ref29) 2006 ref46 ref24 ref45 ref23 ref48 ref26 ref47 schonberg (ref43) 2002 ref25 gallager (ref17) 1963 ref42 ciliberti (ref6) 2006 ref41 ref44 ref21 goblick (ref19) 1962 ref28 ref27 ref8 ref7 fridrich (ref16) 2007; 66 ref9 ref3 martinian (ref30) 2006; 1 ref5 murayama (ref39) 2003; 65 achlioptas (ref1) 2004; 17 filler (ref14) 2007 |
| References_xml | – ident: ref5 doi: 10.1109/4234.905935 – volume: 66 start-page: 1 year: 2007 ident: ref16 article-title: practical methods for minimizing embedding impact in steganography publication-title: Proc SPIE Electron Imag – year: 1963 ident: ref17 publication-title: Low-Density Parity Check Codes doi: 10.7551/mitpress/4347.001.0001 – ident: ref28 doi: 10.1109/26.46532 – year: 2008 ident: ref11 publication-title: Lower Bounds on the Rate-Distortion Function of LDGM Codes – ident: ref48 doi: 10.1109/ITW.2007.4313151 – ident: ref47 doi: 10.1109/TIT.2008.2009815 – ident: ref7 doi: 10.1159/000094188 – start-page: 229 year: 2006 ident: ref29 article-title: analysis of ldgm and compound codes for lossy compression and binning publication-title: Proc Information Theory and Applications (ITA) Workshop – ident: ref2 doi: 10.1002/0471722154 – ident: ref41 doi: 10.1109/18.910578 – ident: ref18 doi: 10.1109/LCOMM.2002.803484 – ident: ref8 doi: 10.1103/PhysRevLett.90.047205 – ident: ref32 doi: 10.1109/ISIT.2006.261737 – ident: ref45 doi: 10.1109/TIT.1974.1055233 – ident: ref33 doi: 10.1109/TIT.2003.815805 – year: 1995 ident: ref4 publication-title: Nonlinear Programming – ident: ref23 doi: 10.1109/18.910572 – start-page: 769 year: 2002 ident: ref12 article-title: the 3-xorsat threshold publication-title: Proc 42nd Annu Symp FOCS – ident: ref24 doi: 10.1109/TURBOCODING.2008.4658729 – year: 1988 ident: ref40 publication-title: Probabilistic Reasoning in Intelligent Systems – ident: ref44 doi: 10.1109/TIT.1981.1056404 – year: 1962 ident: ref19 publication-title: Coding for a discrete information source with a distortion measure – ident: ref13 doi: 10.1109/TIT.2004.842696 – year: 2007 ident: ref15 article-title: binary quantization using belief propagation with decimation over factor graphs of ldgm codes publication-title: Proc Allerton Conf Commun Contr Computing – ident: ref26 doi: 10.1109/18.910575 – ident: ref38 doi: 10.1103/PhysRevE.69.035105 – start-page: 576 year: 2002 ident: ref43 article-title: ldpc codes can approach the slepian-wolf bound for general binary sources publication-title: Proc 40th Annu Allerton Conf Contr Commun Comput – volume: 1 start-page: 153 year: 2006 ident: ref30 article-title: low density codes achieve the rate-distortion bound publication-title: Proc Data Compress Conf – volume: 66 year: 2002 ident: ref36 article-title: random k-satisfiability: from an analytic solution to an efficient algorithm publication-title: Phys Rev E – ident: ref21 doi: 10.1109/TIT.2009.2016040 – ident: ref25 doi: 10.1109/MSP.2004.1267047 – ident: ref3 doi: 10.1109/26.539767 – ident: ref42 doi: 10.1017/CBO9780511791338 – volume: 17 start-page: 947 year: 2004 ident: ref1 article-title: the threshold for random <formula formulatype="inline"> <tex notation="tex">$k$</tex></formula>-sat is <formula formulatype="inline"> <tex notation="tex">$2k \log 2 - o(k)$</tex></formula> publication-title: J AMSS – ident: ref37 doi: 10.1017/CBO9780511814075 – year: 1993 ident: ref22 publication-title: Convex Analysis and Minimization Algorithms Volume 1 – start-page: 10003p year: 2006 ident: ref6 article-title: the theoretical capacity of the parity source coder publication-title: J Stat Mechan – ident: ref34 doi: 10.1126/science.1073287 – ident: ref27 doi: 10.1145/1255443.1255445 – ident: ref46 doi: 10.1109/ISIT.2005.1523592 – volume: 65 start-page: 11123 year: 2003 ident: ref39 article-title: one step rsb} scheme for the rate distortion function publication-title: J Phys A Math Gen doi: 10.1088/0305-4470/36/43/031 – ident: ref10 doi: 10.1017/S0963548302005552 – ident: ref9 doi: 10.1002/0471200611 – year: 1992 ident: ref20 publication-title: Probability and Random Processes – volume: 111 year: 2002 ident: ref35 article-title: alternative solutions to diluted p-spin models and xorsat problems publication-title: J Statist Phys – year: 2007 ident: ref14 publication-title: Minimizing Embedding Impact in Steganography Using Low Density Codes – ident: ref31 doi: 10.1109/ISIT.2006.261716 |
| SSID | ssj0014512 |
| Score | 2.2709672 |
| Snippet | We study the use of low-density generator matrix (LDGM) codes for lossy compression of the Bernoulli symmetric source. First, we establish rigorous upper... |
| SourceID | proquest pascalfrancis crossref ieee |
| SourceType | Aggregation Database Index Database Enrichment Source Publisher |
| StartPage | 1351 |
| SubjectTerms | Algorithm design and analysis Algorithms Applied sciences Belief propagation Bernoulli Hypothesis Codes Coding, codes Compressing Decoding Distortion Exact sciences and technology Generators graphical codes Information theory Information, signal and communications theory Linear code Lossy source coding low-density generator matrix (LDGM) codes Matrix MAX-XORSAT message-passing Optimization Parity check codes Rate-distortion satisfiability problems Signal and communications theory Source coding Subroutines sum-product survey propagation Symmetric matrices Telecommunications and information theory Tree graphs Turbo codes Upper bounds |
| Title | Lossy Source Compression Using Low-Density Generator Matrix Codes: Analysis and Algorithms |
| URI | https://ieeexplore.ieee.org/document/5429117 https://www.proquest.com/docview/193888912 https://www.proquest.com/docview/753729947 |
| Volume | 56 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1557-9654 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0014512 issn: 0018-9448 databaseCode: RIE dateStart: 19630101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB61PcGBQgsiFCofuCCR3TixY5tbBVQFdbmwlSoukWM7FFES1GQF5dcztpPwFOIWyZPnzMTzecbfADz2FF6G1WXqnHYpy3WTeua9NHc5tU5kjeF-v_PqTXlyxl6f8_MteDrvhXHOheIzt_CHIZdvO7PxS2VL31uJUrEN20KWca_WnDFgnEZmcIoOjJhjSklmarl-tY7ElLmnQw9klD-moNBTxVdE6h4_ShO7WfzxYw6zzfEurKbnjEUmHxeboV6Yb79ROP7vi9yGW2PYSY6indyBLdfuwe7U0oGMHr4HN3_iJ9yHd6f4_NfkbVjgJ146Vs22JFQakNPuS_rCV8AP1yTyVyOCJyvP-v8Vxa3rn5GJ9YTo1pKjy_fd1Yfh4lN_F86OX66fn6RjM4bUMCqHVHArGsYLw3mhSp4bI52qDdOillIr64xDMCTLhmWFsZYXoimpFIW2RgsEkcU92Gm71t0HYoTSmbSU28KzzZU1xmi8KVHM8Mw0NIHlpJ_KjEzlvmHGZRUQS6Yq1Kjvn6mqUaMJPJnP-BxZOv4hu-8VMsuNukjg8BcTmMfzHPEHwr4EDiabqEY_7ysMf6WUiuYJkHkUHdRnXXTruk1fIR7ECygmHvz9xgdwI1Yk-Lq2h7AzXG3cIwx0hvowWPh3Fr_6Dw |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB6VcgAOFFoQoVB84IJEduPEjh1uFVBtYbcXtlLFJXJsBxAlQU1WUH49YzsJTyFukTx5zkw8n2f8DcBjR-GlWZXH1iobs1TVsWPei1ObUmNFUmvu9juvTvLFKXt1xs-24Om0F8Za64vP7Mwd-ly-afXGLZXNXW8lSsUVuMoZYzzs1ppyBozTwA1O0YURdYxJyaSYr4_XgZoydYTono7yxyTku6q4mkjV4WepQz-LP37Nfr452oHV-KShzOTjbNNXM_3tNxLH_32VW3BzCDzJYbCU27Blm13YGZs6kMHHd-HGTwyFe_B2ic9_Sd74JX7ipEPdbEN8rQFZtl_iF64Gvr8kgcEaMTxZOd7_ryhubPeMjLwnRDWGHJ6_ay8-9O8_dXfg9Ojl-vkiHtoxxJpR2ceCG1EznmnOsyLnqdbSFpVmSlRSqsJYbREOybxmSaaN4ZmocypFpoxWAmFkdhe2m7ax94BoUahEGspN5vjm8gqjNF7nKKZ5omsawXzUT6kHrnLXMuO89JglKUrUqOugWZSDRiN4Mp3xOfB0_EN2zylkkht0EcHBLyYwjacpIhAEfhHsjzZRDp7elRgASykLmkZAplF0UZd3UY1tN12JiBAvUDBx_-83fgTXFuvVslwen7zeh-uhPsFVuT2A7f5iYx9i2NNXB97avwNQlf1c |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Lossy+Source+Compression+Using+Low-Density+Generator+Matrix+Codes%3A+Analysis+and+Algorithms&rft.jtitle=IEEE+transactions+on+information+theory&rft.au=Wainwright%2C+M.J.&rft.au=Maneva%2C+E.&rft.au=Martinian%2C+E.&rft.date=2010-03-01&rft.pub=IEEE&rft.issn=0018-9448&rft.volume=56&rft.issue=3&rft.spage=1351&rft.epage=1368&rft_id=info:doi/10.1109%2FTIT.2009.2039160&rft.externalDocID=5429117 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9448&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9448&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9448&client=summon |