Skip to content

Advertisement

  • Research
  • Open Access

Distributed transform coding via source-splitting

EURASIP Journal on Advances in Signal Processing20122012:78

https://doi.org/10.1186/1687-6180-2012-78

  • Received: 21 October 2011
  • Accepted: 5 April 2012
  • Published:

Abstract

Transform coding (TC) is one of the best known practical methods for quantizing high-dimensional vectors. In this article, a practical approach to distributed TC of jointly Gaussian vectors is presented. This approach, referred to as source-split distributed transform coding (SP-DTC), can be used to easily implement two terminal transform codes for any given rate-pair. The main idea is to apply source-splitting using orthogonal-transforms, so that only Wyner-Ziv (WZ) quantizers are required for compression of transform coefficients. This approach however requires optimizing the bit allocation among dependent sets of WZ quantizers. In order to solve this problem, a low-complexity tree-search algorithm based on analytical models for transform coefficient quantization is developed. A rate-distortion (RD) analysis of SP-DTCs for jointly Gaussian sources is presented, which indicates that these codes can significantly outperform the practical alternative of independent TC of each source, whenever there is a strong correlation between the sources. For practical implementation of SP-DTCs, the idea of using conditional entropy constrained (CEC) quantizers followed by Slepian-Wolf coding is explored. Experimental results obtained with SP-DTC designs based on both CEC scalar quantizers and CEC trellis-coded quantizers demonstrate that actual implementations of SP-DTCs can achieve RD performance close to the analytically predicted limits.

Keywords

  • distributed transform coding
  • Wyner-Ziv quantization
  • multi-terminal quantization
  • Karhunen-Loéve transform (KLT)
  • optimal bit-allocation

1 Introduction

Many new applications such as multi-camera imaging systems rely on networks of distributed wireless sensors to acquire signals in the form of high-dimensional vectors [1]. In such situations, an encoder in each sensor quantizes a vector of observation variables (without exchanging any information with other sensors) and transmits its output to a central processor which jointly decodes all the sources. The strong statistical dependencies among the signals observed by different sensors can be exploited in the decoder to reduce the transmission bit-rate of each sensor. This problem, in general, is referred to as distributed (or multiterminal) vector quantization (VQ). The design of a distributed VQ for a large number of source variables is a difficult task. A practically simpler, yet very effective approach to quantizing a large number of correlated variables by using a bank of single variable quantizers is transform coding (TC) [24]. Clearly, TC can be used for distributed VQ when separately observed vectors have both inter-vector and intra-vector statistical dependencies, a situation typical in applications such as camera networks. Most of the previous work [57] studies Wyner-Ziv (WZ) transform coding (WZ-TC), which is a special case of more general multiterminal transform coding (MT-TC) [8]. In WZ-TC, a single source is quantized given that the decoder has access to side information about the source.

Information-theoretic studies of distributed transform coding (DTC) can be found in [5, 8]. In [8], the optimal linear transform for Gaussian WZ-TC under the mean square-error (MSE) criterion is shown to be the conditional Karhunen-Loéve transform (CKLT), which is a natural extension of the result in [2]. This result is based on the assumption that each transform coefficient is compressed by a rate-distortion (RD) optimal WZ quantizer and hence describes the optimal performance theoretically attainable (OPTA) in Gaussian WZ-TC. However, the optimal solution to the more general MT-TC problem remains unsolved, even for the Gaussian case. In [8], an iterative descent algorithm for determining the OPTA of Gaussian MT-TC problem is given. It is shown that, while this algorithm [referred to as the distributed KLT (DKLT)] always converges to a solution, the final solution is not necessarily the global optimum. In any case, the practical implementation of distributed quantizers implied by the DKLT remains an open problem. In [5] WZ-TC based on high-rate scalar quantization and ideal Slepian-Wolf (SW) coding [9] is studied. In particular, it is shown that, for jointly Gaussian vectors, CKLT followed by uniform scalar quantization is asymptotically optimal, a natural extension of the result in [10] for entropy-coded quantization at high-rate. More importantly, the bit-allocations and quantizer-step sizes found in [5] can be used for practical design of WZ-transform codes as long as high-rate approximations hold. However, we note that, even when scalar quantizers are used, achieving good performance with this approach still requires the use of a subsequent block-based SW coding method (e.g., Turbo codes or LDPC codes). Other previous studies on WZ-TC can be found in [6, 7]. However, they rely on WZ scalar quantization of transform coefficients. Such methods are therefore most suitable for applications requiring low coding delay as their performance is strictly inferior to block-based quantization.

In contrast to WZ-TC, we consider in this article the practical design of two-terminal transform codes for jointly Gaussian vectors in which arbitrary transmission rates can be assigned to each terminal. Our approach is based on the idea of source-splitting[11, 12] to convert the two-terminal TC problem into two WZ-TC problems. Since transform codes quantize linear projections, we perform source splitting in terms of optimal linear approximations, i.e., a linear approximation of one source is provided as decoder side-information for the other source. The proposed source-split DTC (SP-DTC) approach only requires the design of two-sets of WZ quantizers sequentially, and avoids having to iteratively optimize two sets of WZ quantizers to each other as in [8]. However, this approach requires the solution of a bit allocation problem involving dependent WZ quantizers. To solve this problem for Gaussian sources, we propose an efficient tree-search algorithm, which can be used to find the a good SP-DTC under different models for quantization of transform coefficients. When used with the RD-optimal WZ quantization model [8], this algorithm can potentially locate the optimal SP-DTC for Gaussian sources. In practice, with constraints imposed on tree-search complexity, the algorithm yields a near-optimal solution. We refer to the optimal solution to the Gaussian problem as the source-split DKLT (SP-DKLT). Using this algorithm, we numerically compute the rate-region achievable with a SP-DKLT code for two examples of jointly Gaussian vector sources. This study shows that, when there is sufficient inter-source correlation, optimal SP-DKLT codes can achieve substantially better performance than independent transform codes for the two sources. However, we find that the rates achievable with SP-DKLT codes are strictly inside the optimal achievable rate-region predicted by the DKLT algorithm of [8]. In order to approach the performance predicted by the optimal SP-DKLT in practice, block WZ quantization of transform coefficients is required. For implementation of block WZ quantizers, we consider the use of trellis-coded quantization (TCQ) followed by SW coding. This two stage approach is known to achieve the RD function of Gaussian WZ coding [13]. In order practically implement this approach, we introduce the idea of designing conditional entropy constrained TCQ (CEC-TCQ) based on analytically found bit-allocations. We present experimental results to demonstrate that practical implementations of SP-DTCs for Gaussian sources can closely approach the performance limits indicated by the optimal SP-DKLT. On the other hand when SW coded high-rate scalar quantization model [5] is assumed for encoding transform coefficients, the tree-search algorithm proposed in this article can also be used to find asymptotically good SP-DTC codes for scalar quantization based implementations. These codes can be readily implemented using CEC scalar quantizers (CEC-SQ) as demonstrated by experimental studies presented in this article. In our experimental study, we also investigate the design of good SP-DTCs based on widely used discrete cosine transform (DCT).

This article is organized as follows. Section 2 presents a review of WZ-TC of Gaussian vectors and motivates the particular approach introduced in this article. Section 3 presents the idea of SP-DTC and develops the tree-search algorithm for finding the optimal transforms and the bit-allocation for SP-DKLT codes. Section 4 computes the achievable rate region of SP-DKLT codes for two example Gaussian source models, and presents experimental results obtained by designing SP-DTCs based on both KLT and DCT. Finally, some concluding remarks are given in Section 5.

Notation: As usual, bold letters denote vectors and matrices, upper case denotes random variables, and lower case denotes realizations. Σ X denotes the auto-covariance matrix of the vector X. Σ XY and Σ X|Y , respectively denote the joint covariance matrix of (X, Y) and the conditional covariance matrix of X given Y. The eigenvalues λ1 , . . ., λ M of a M × M covariance matrix are always indexed such that λ1≥ λ2 . . . ≥ λ M , and the corresponding KLT matrix has the structure T = ( u 1 T , , u M T ) , where u m is the eigenvector associated λ m .

2 WZ-TC of Gaussian vectors

Consider encoding of a Gaussian vector X M 1 using B bits per vector, given that the decoder has access to a jointly Gaussian vector Y M 2 . Assume that both vectors have zero mean, and let the auto-covariance matrix of X be Σ X = E{XX T }. In WZ-TC, a linear transform is first applied to X and each component of the transform coefficient vector U = T T X is separately compressed by a WZ quantizer, considering Y as decoder side-information, where T is a M1 × M1 unitary matrix. Let Û be the quantized value of U. The decoder then estimates the source vector based on Û and Y. We wish to find the optimal transform and the allocation of B bits among M1 transform coefficients, which minimize the quantization MSE E X - X ^ 2 , where X ^ = E { X | U ^ , Y } is the optimal estimate (at the decoder) of the source vector. The solution of this problem requires an analytical model for coefficient quantization. To this end, [8] considers RD optimal WZ quantization (RD-WZQ) model, the solution based on which is appropriate for practical block quantization techniques such as TCQ. On the other hand [5] considers SW-coded high-rate scalar quantization (SWCHRSQ) model.

Let the eigenvalues of the conditional covariance matrix ΣX|Y= E{XX T |Y} be λ = λ 1 , , λ M 1 T . The CKLT of X given Y is defined as θ= T T X, where T is M1 × M1 unitary matrix such that Σ X|Y = TΛT T , where Λ = diag λ 1 , λ 2 , . . . , λ M 1 [8]. It is easy to verify that E{θθ T |Y} = Λ, i.e., the components of θ are conditionally uncorrelated, given Y. For convenience, define
d * ( λ , B , N ) m = 1 N λ m 1 N 2 - 2 B N ,

where N ≤ M1 is a positive integer.

2.1 RD-WZQ model

When RD-WZQ model is used, the quantization MSE for U m is given by [14]
d m RD - WZQ = λ m 2 - 2 r m ,
(1)

where λ m = var(U m | Y) and var(·|·) denotes the conditional variance. The optimal solution to the WZ-TC problem under RD-WZQ model is given by the following theorem.

Theorem 1 Given jointly Gaussian X and Y as defined above, and a total bit budget of B bits, if each transform coefficient U m , m = 1, . . ., M1, where U = T T X, is quantized by an RD optimal WZ quantizer which uses Y as decoder side-information, then the transform T which minimizes E X - X ^ 2 is the CKLT of X given Y, and the number of bits allocated to quantizing U m is
ρ m ( λ , B , N ) = 1 2 log 2 λ m d * ( λ , B , N ) m = 1 , , N 0 m = N + 1 , , M
(2)
where N ≤ M is the largest integer for which λ m ≥ d (λ, B, N), m = 1, . . ., N. The quantization MSE of the mth coefficient is
d m = λ m 2 - 2 ρ m = d * ( λ , B , N ) , m = 1 , , N λ m , m = N + 1 , , M
(3)
and the overall MSE is
E X - X ^ 2 = N d * ( λ , B , N ) + m = N + 1 M 1 λ m .
(4)

Proof 1 Directly follows from [[8], Section III-B].

Note that RD-WZQ model implies infinite-dimensional VQ of each coefficient and hence the above MSE is the OPTA in the Gaussian WZ-TC problem.

2.2 SWC-HRSQ model

The asymptotically (in rate) optimal solution to the WZ-TC problem under SWC-HRSQ model is given by the following theorem.

Theorem 2 Let X, Y, and B be as in Theorem 1. If each transform coefficient U m , m = 1, . . ., M1 , where U = T T X, is quantized by a high-rate scalar quantizer and the quantizer output is encoded by a SW code which uses Y as decoder side-information, then the transform T which asymptotically minimizes E X - X ^ 2 is the CKLT of X given Y and the bit allocation is given by (2). Furthermore, the asymptotically optimal quantizer for U m , m = 1, . . ., N is a uniform quantizer with step-size Δ = ( 2 π e ) d * ( λ , B , N ) . The resulting quantization MSE is
E X - X ^ 2 = π e 6 N d * ( λ , B , N ) + m = N + 1 M 1 λ m .
(5)

Proof 2 See Section "Proof of Theorem 2" in Appendix 1.

2.3 Sufficiency of scalar side-information

The WZ quantizers with vector-valued decoder side-information as considered in Theorem 1 are difficult to design in practice. However, the following theorem establishes that when CKLT is used and RD-WZQ model applies for quantization of coefficients, a linear transformation of the side-information vector can be used to convert the vector side-information problem into an equivalent scalar side-information problem. Furthermore, [[5], Section 6] shows that this result applies in asymptotic sense to the SWC-HRSQ model as well.

Theorem 3 Let the mean-zero vectors X M 1 and Y M 2 be jointly Gaussian, and let T be the CKLT of X given Y. Suppose that transform coefficients U m , m = 1, . . ., M1, where U = T T X, are each compressed by an RD optimal WZ quantizer relative to decoder side-information Y. Then, the minimum MSE (MMSE) estimate ũ m ( y ) = E{U m | y} of U m given Y = y is a sufficient statistic for decoder side-information for quantizing U m .

Proof 3 See Section "Proof of Theorem 3" in Appendix 1.

Wyner-Ziv transform coding is a special case of more general MT-TC where two or more terminals apply TC to their respective inputs and transmit the quantized outputs to a single decoder which exploits the inter-source correlation to jointly reconstruct all the sources. In this case, the problem is to optimally allocate a given bit budget among all the terminals such that the total MSE is minimized. However, the closed-from solution to this problem appears difficult, due to the inter-dependence of the encoders in different terminals. An iterative descent algorithm is given in [8] for solving the Gaussian MT-TC problem. Given a total bit-budget, the bit-rate of the system is incremented by a small amount in each iteration, and the optimal WZ-TC for each terminal is determined by fixing the encoders of all other terminals and considering their outputs as decoder-side information. The solution that gives the MMSE is accepted and the iterations are repeated until the total bit-budget is exhausted. While this algorithm, referred to as the DKLT algorithm, is guaranteed to converge to at least a locally optimal solution, there is no tractable way to implement the quantizers implied by the final solution since it is not practical to optimize a set of near-optimal WZ quantizers in each iteration of this algorithm. Note also that, DKLT requires joint decoding of two vector sources.

3 Source-splitting based distributed TC

In general, designing a multi-terminal VQ is more difficult than designing a WZ-VQ, due to the mutual dependence among the encoders. However, one could use WZ-VQs to realize a multi-terminal VQ by using source-splitting [12]. It is known that in the quadratic-Gaussian case, source-splitting can be used to realize any rate-pair in the achievable rate-region by only using ideal WZ-VQs which correspond to the corner-points of the achievable rate-region [[12], Section V-C], [15]. While the same optimality properties cannot be claimed for source-splitting by linear transforms, the aforementioned observation still provides us the motivation to take a similar approach in practically realizing the DTCs which can operate at arbitrary rates, by using only WZ quantizers.

A block diagram of the SP-DTC system is shown in Figure 1. Let the total number of bits available for encoding two jointly Gaussian vectors X 1 M 1 and X 2 M 2 be B bits. The terminal 1 performs source splitting by providing an approximation Y 1 N 1 of X1 at the rate B 1 ( < B ) bits/vector as decoder side-information for WZ coding of terminal 2, where N 1 M 1 . In a TC framework, the goal is to provide the best (in MMSE sense) linear approximation of X1 as the decoder side-information. Therefore, Y 1 is the B 1 -bit approximation of a linear projection U 1 = T 1 T X 1 , where T 1 is a M1 × M1 unitary matrix. Given the side-information Y 1 at the decoder, the terminal 2 quantizes a linear projection U 2 = T 2 T X 2 of X2 using B 2 ( < B - B 1 ) bits/vector, where T2 is a M2 × M2 unitary matrix. Let Y 2 N 2 , be the quantized value of U2, where N2≤ M2. Then, given the quantized linear projections of both X1 and X2 available at the decoder, the terminal 1 quantizes the a linear projection U 1 = T 1 T X 1 of X1 using B 1 = B - B 1 - B 2 bits/vector, where T 1 is a M1 × M1 unitary matrix. Let Y 1 N 1 be the quantized value of U 1 , where N 1 M 1 . In the receiver, each source vector is reconstructed by a WZ decoder. The MMSE optimal reconstructions for X1 and X2 are, respectively given by X ^ 1 = E X 1 | Y 1 , V and X ^ 2 = E X 2 | V , where V = Y 1 Y 2 T . The total transmission rate for source X1 is thus B 1 = B 1 + B 1 bits/vector. The rates used by terminals 1 and 2 in bits/sample are given by R1 = B1/M1 and R2 = B2/M2, respectively.
Figure 1
Figure 1

The proposed source-split transform coding (SP-DTC) system for two-terminal distributed quantization of two correlated vectors.

Let U 1 = U 1 , 1 , , U 1 , M 1 T , U 1 = U 1 , 1 , , U 1 , M 1 T and U 2 = U 2 , 1 , , U 2 , M 2 T . Also, let the bit-rates allocated to quantizing these transform coefficients be r 1 = r 1 , 1 , , r 1 , M 1 T , r 1 = r 1 , 1 , , r 1 , M 1 T , and r 2 = r 2 , 1 , , r 2 , M 2 T respectively, and define r = r 1 , r 1 , r 2 T . Given a total of B bits for encoding both X1 and X2, the design of a SP-DTC involves determining the values of the transforms T 1 , T 1 , and T 2 , and a bit allocation among the transform coefficients U = U 1 , U 1 , U 2 T such that the total MSE
D r = E X 1 - X ^ 1 2 + X 2 - X ^ 2 2
(6)
is minimized. By writing the quantization MSEs of U 1 , i and U2,jas d 1 , i r 1 , i , r 1 , r 2 , and d 2 , j r 2 , j , r 1 , respectively, i = 1, . . ., M1, j = 1, . . ., M2, the total MSE can be expressed as
D ( r ) = i = 1 M 1 d 1 , i r 1 , i , r 1 , r 2 + j = 1 M 2 d 2 , j r 2 , j , r 1 .
(7)

The bit allocation problem can now be stated as follows:

Given a total bit-budget of B bits
min r D ( r )
(8)
subject to
m = 1 2 M 1 + M 2 r m B , r m 0 , m = 1 , , 2 M 1 + M 2 ,

where r = r 1 , , r 2 M 1 + M 2 T . The explicit solution of this minimization problem is unfortunately intractable due to the inter-dependence of the three transform codes involved.

However, an explicit solution can be found for a variant of this problem obtained by fixing B 1 , B 1 and B2, so that the number of bits allocated to each transform code is fixed and it is only required to optimize the bit allocation among the quantizers within each transform code. For simplicity, we refer to this problem as the constrained bit-allocation problem. In the following, an explicit solution to this problem is derived. Based on the result, we then present a tree-search algorithm to solve the unconstrained problem (8). Under both RD-WZQ and SWC-HRSQ models, the optimal transforms for Gaussian sources are CKLTs. Therefore, we refer to the solution to problem (8) as the SP-DKLT.

3.1 Solution to the constrained bit-allocation problem

3.1.1 RD optimal quantization

Let B 1 , B 1 , and B2 be fixed in Figure 1 and let the coefficient quantization be represented by the RD-WZQ model (for components of U 1 , this reduces to the non-distributed RD-optimal quantization). From Theorem 1, it follows that the MMSE optimal transform (in the sense of providing the best linear approximation as decoder side information for terminal 2) T 1 is the KLT of X1. Let the eigenvalues of X 1 be λ 1 = λ 1 , 1 , , λ 1 , M 1 . Then, using (2), the optimal bit allocation for U 1 , m can be given by
r 1 , m = ρ m λ 1 , B 1 , N 1 , m = 1 , , M 1 .
(9)
for some N 1 M 1 . Let the quantized value of U 1 , m be Û 1 , m . We note that E U 1 , m 2 = λ 1 , m for m = 1, . . ., M1 and E U 1 , m - Û 1 , m 2 = d * λ 1 , B 1 , N 1 for m = 1 , , N 1 . In RD theoretic sense, the quantized value (up to a scaling factor) of the mean-zero Gaussian variable U 1 , m can be given by Y 1 , m = U 1 , m + Z 1 , m , m = 1 , , N 1 , where Z 1 , m is a mean-zero Gaussian random-variable independent of U 1 , m such that
E Z 1 , m 2 = λ 1 , m d * λ 1 , B 1 , N 1 λ 1 , m - d * λ 1 , B 1 , N 1 ,
(10)
see [[16], Section 10.3.2]. Therefore, we can write
Y 1 = K 1 ( N 1 ) T X 1 + Z 1 ,
(11)
where K 1 ( N 1 ) denotes the M 1 × N 1 matrix consisting of first N 1 columns of K 1 . The covariance matrix of "quantization noise" vector Z 1 = Z 1 , 1 , , Z 1 , N 1 T is given by Z 1 = diag Z 1 , 1 , , Z 1 , N 1 . According to (11), Y 1 and X1 are jointly Gaussian, and it follows that
Y 1 = K 1 N 1 T X 1 K 1 N 1 + Z 1 .
(12)
Furthermore, X2 and Y 1 are jointly Gaussian with the conditional covariance matrix
X 2 | Y 1 = X 2 - X 1 X 2 T K 1 N 1 Y 1 - 1 K 1 N 1 T X 1 X 2 .
(13)
Next consider TC X2 given Y 1 as decoder side-information. From Theorem 1, it follows that the E X 2 - X ^ 2 2 is minimized by choosing T2 as the CKLT of X2 given Y 1 and by applying RD optimal WZ quantization to each element of U 2 = T 2 T X 2 given decoder side information Y 1 based on a bit-allocation specified by the eigenvalues of X 2 | Y 1 , λ 2 = λ 2 , 1 , , λ 2 , M 2 . The optimal bit allocation for U2,mis given by
r 2 , m = ρ m λ 2 , B 2 , N 2 , m = 1 , , M 2 ,
(14)
for some N2≤ M2. The resulting MSE is given by
D 2 B 1 , B 2 = E X 2 - X ^ 2 2 = N 2 d * λ 2 , B 2 , N 2 + m = N 2 + 1 M 2 λ 2 , m .
(15)
As before, the quantized value of U2 up to a scaling factor, can be represented by [[8], Theorem 3],
Y 2 = K 2 N 2 T X 2 + Z 2 ,
(16)
where K 2 N 2 denotes the M2 × N2 matrix consisting of first N2 columns of K2 and the quantization noise Z 2 N 2 is a mean zero iid Gaussian vector independent of X2. The covariance matrix of Z2 is given by Z 2 = diag Z 2 , 1 , , Z 2 , N 2 , where E Z 2 , m 2 , m = 1, . . ., N2 are given by
E Z 2 , m 2 = λ 2 , m d * λ 2 , B 2 , N 2 λ 2 , m - d * λ 2 , B 2 , N 2 .
(17)
The covariance matrix of Y2 is
Y 2 = K 2 N 2 T X 2 K 2 N 2 + Z 2 .
(18)
Therefore X1 and V = Y 1 Y 2 T are jointly Gaussian with the cross-covariance matrix
X 1 | V = X 1 - V X 1 T V - 1 V X 1 ,
(19)
where
V X 1 = K 1 N 1 X 1 X 2 X 2 X 1
and
V = Y 1 K 1 N 1 X 1 X 2 X 2 T X 2 X 2 X 1 K 1 N 1 T Y 2 .
Finally, consider quantizing X1, given V = Y 1 Y 2 T N 1 + N 2 as the decoder side-information. As before, E X 1 - X ^ 1 2 is minimized by choosing T 1 as the CKLT of X2 given V, and RD optimal WZ quantization of each element of U 1 = T 1 T X 1 given V, based on a bit-allocation specified by the eigenvalues of X 1 | V , λ 1 = λ 1 , m , , λ M 1 T . The bit rate allocated to quantizing U 1 , m given by
r 1 , m = ρ m λ 1 , B 1 , N 1 , m = 1 , , M 1 ,
(20)
for some N 1 M 1 and the resulting MSE is
D 1 B 1 , B 1 , B 2 = E X 1 - X ^ 1 2 = N 1 d * λ 1 , B 1 , N 1 + m = N 1 + 1 M 1 λ 1 , m .
(21)
Given a rate tuple B 1 , B 1 , B 2 , the MMSE achievable with a SP-DKLT code for two jointly Gaussian vectors is given by
D B 1 , B 1 , B 2 = D 1 B 1 , B 1 , B 2 + D 2 B 1 , B 2 .
(22)

3.1.2 High-resolution scalar quantization and SW coding

Due to Theorem 2, the expressions for bit-allocations given by (9), (14) and (20) applies to SWC-HRSQ model as well. However, the resulting MSE and hence the quantization noise variances are different to those of the RD-WZQ model. More specifically, since the decoder side-information in a SP-DTC depends on quantization noise of the other terminals, the optimal transforms T2 and T 1 and the associated bit allocations obtained with the SWC-HRSQ model are different to those obtained with the RD-WZQ model. In order to make the problem tractable, we assume that the quantization noise of SWC-HRSQ model also follows (11) and (16) (for a discussion on the validity of this assumption, see [17]). This assumption essentially allows us to compute the conditional covariance matrices X 2 | Y 1 and X 1 | V as in the previous case, and then apply (9), (14) and (20) to find the optimal transforms and the bit-allocations. However, due to (27), the quantization noise variance in (10) in this case is given by
E Z 1 , m 2 = π e / 6 λ 1 , m d * λ 1 , B 1 , N 1 λ 1 , m - π e / 6 d * λ 1 , B 1 , N 1 .
(23)

A similar expression exists for the quantization noise variance in (17).

3.2 A tree-search solution to the unconstrained bit-allocation problem

We note that the optimal solution to the unconstrained problem defined in (8) corresponds to the MMSE solution of the constrained problem over the set of rate-tuples S = B 1 , B 1 , B 2 : B 1 0 , B , B 1 0 , B , B 2 0 , B , B 1 + B 1 + B 2 B . This set is shown in Figure 2. One approach to locating the MMSE solution is to search over an appropriately discretized grid of points inside . As we will see, even though an exhaustive search on a fine grid can be prohibitively complex, a much simpler constrained tree-search algorithm exists which can be used to locate the required solution with a very high probability.
Figure 2
Figure 2

The solution space for the unconstrained bit-allocation problem. The tree-search algorithm uses a search-grid of regularly spaced points (i.e., a cubic lattice) with a separation of ΔB inside .

The proposed algorithm is a generalization of a class of bit-allocation algorithms in which a small fraction ΔB of the total bit-budget B is allocated to the "most deserving" quantizer among a set of quantizers in an incremental fashion, until the entire bit-budget is exhausted [[4], Section 8.4]. Unfortunately, this type of a greedy search cannot guarantee that the final solution is overall optimal and can yield poor results in our problem where the bit allocation among three sets of dependent quantizers must be achieved. On the other hand, if the increment ΔB is chosen small enough, a near-optimal solution can be found by resorting to a tree-search. Even though a full tree-search is intractable, a simple algorithm referred to as the (M, L)-algorithm[18] exists for detecting the minimum cost path in the tree with a high probability. We use this insight to formulate a tree-search algorithm for solving the unconstrained bit allocation problem, in which a set of constrained bit allocation problems are solved in each iteration.

In order to describe the proposed tree-search algorithm in detail, let ΔB be the incremental amount of bits to be allocated in each step of the search, where 0 < ΔB B. The algorithm is initialized by setting B 1 , B 1 , B 2 = 0 , 0 , 0 , i.e., the origin in Figure 2. Now if we are to allocate ΔB bits to only one of the three transform codes T 1 , T 1 or T2, then there are three possible choices for the rate-tuple B 1 , B 1 , B 2 , namely (ΔB, 0, 0), (0, ΔB, 0), and (0, 0, ΔB). For each of these choices, we can explicitly solve the constrained bit allocation problem as described in the previous section and find the MMSE solution. Each of these candidate solutions can be viewed as a node in a tree as shown in Figure 3. The root node of the tree corresponds to a SP-DTC of rate 0, and a node in the first level of nodes obtained in the first iteration of the algorithm corresponds to a SP-DTC of rate of ΔB bits per source pair (X1, X2). In the second iteration of the algorithm, we allocate ΔB more bits to each of the three candidate SP-DTCs (but to one of the SP-DTCs at a time) in the first level of nodes. Note that, for each SP-DTC we can allocate ΔB bits in three different ways, i.e., ΔB bits can be added to either B 1 , B 1 , or B2. This requires the solution of three constrained bit allocations problems for each of the 3 nodes in the first-level. As a result, the tree will be extended to a second level of 32 nodes, in which each node corresponds to a SP-DTC of 2ΔB bits per source-pair, as shown in Figure 3. We can repeat this procedure, allocating ΔB bits to each of terminal node of the tree in a given iteration, until all B bits are exhausted. After the final iteration, the tree would consist of L = BB levels with 3 L nodes in the last level (terminal nodes). Each terminal node corresponds to a candidate SP-DTC of rate B, and rate-tuples of these SP-DTCs lie on the plane B 1 + B 1 + B 2 = B in Figure 2. The MMSE terminal node of the tree is the optimal solution to the unconstrained bit allocation problem, provided that the latter solution is on the search-grid. If ΔB is chosen small enough, then we can ensure that the optimal solution is nearly on the search-grid. Suppose that, in each iteration, the algorithm saves the MSE of the solution to the constrained bit-allocation problem associated with each node. In theory, the optimal solution can be found by an exhaustive tree-search, using the MSE of a node [given by (22)] as the path-cost. In order to practically implement the tree-search, we use the (M, L)-algorithm, in which the parameter M can be chosen to reduce the complexity at the expense of decreased accuracy (i.e., the probability of detecting the lowest cost path in the tree). In the (M, L) algorithm [[18], p. 216] for a tree of depth L, one only retains the M best (lowest MSE) nodes in each iteration. When M = 1 we have a completely greedy search. On the other hand when M n = 3 n in the n th iteration, we have a full-tree search which has a complexity that grows exponentially with the iteration number. When M (1 ≤ M ≤ 3 L ) is a prescribed constant, the complexity is linear in M, independent of the number of iterations. In obtaining the simulation results presented in Section 4, M = 27 and L = 135 (ΔB = 0.2) were found to be sufficient to obtain near optimal results. For example, it was observed that even for M = 81 and L = 405, nearly the same result was obtained.
Figure 3
Figure 3

Bit allocation tree with the values of the rate-tuple B 1 , B 1 , B 2 after two iterations of the tree-search algorithm.

4 Numerical results and discussion

Source model A: Let the components of X1 be M1 consecutive samples of a first-order Gauss-Markov process with a unit-variance and the correlation coefficient |ρ| < 1, i.e., X1,m= ρX1,(m-1)+ Z m , m = 2, . . ., M1, where Z m , m = 1, . . ., M1 are mean-zero iid Gaussian variables such that E Z m 2 = 1 - ρ 2 . The auto-covariance matrix X 1 is a Teoplitz matrix with the first row 1 , ρ , ρ 2 , , ρ M 1 - 1 . Now define the components of X2 to be noisy observations of the components of X1, i.e., X2,m= γX1,m+ W m , where |γ| < 1 and W m is a mean-zero, iid Gaussian variable with E W m 2 = 1 - γ 2 , m = 1, . . ., M1 (M2 = M1). It follows that, X 2 is a Teoplitz matrix with the first row 1 , γ 2 ρ , γ 2 ρ 2 , , γ 2 ρ M 1 - 1 . Furthermore, the cross-covariance matrix X 1 X 2 = γ 2 X 1 . Note that X1 and X2 are not statistically similar and the components of X1 are more correlated than those of X2.

Source model B: Consider a spatial Gaussian random field in which the correlation function decays with distance d according to the squared exponential model [19]. We define the random vectors X1 and X2 to be observations picked-up by a pair of sensor arrays placed in this random filed. In this case, the auto-covariance matrix of X1 is given by X 1 i j = exp - α d i j 2 , where α is a constant and d ij is the distance between X1,iand X1,j. The auto-covariance matrix of X2 also has a similar form. For simplicity assume that the sensors in each array are placed on a M × M square grid of unit spacing (i.e., M1 = M2 = M2), the two arrays are on parallel planes separated by a distance r, and the two grids are aligned so that the distance between X1iand X2iis r for all i. With this setup, the distance between X1iand X2jis d i j 2 + r 2 , and the cross-covariance matrix is given by X 1 X 2 i j = θ exp - α d i j 2 , where θ = exp {- (αr)2}. This sensor structure ensures that X1 and X2 are statistically similar. However, X 1 X 2 can be chosen independently (by choosing array separation r) of X 1 and X 2 .

4.1 RD performance

We compute the rate-pairs (R1, R2) achievable with a SP-DKLT code for a given a total MSE D, by fixing R1 (or R2) and then searching for minimum R2 (or R1) required to achieve the MSE D [given by (6)]. The rate-pairs achievable for D = 0.01 with SP-DKLT coding of vectors from source model A with ρ = 0.9, γ = 0.9, are plotted in Figure 4. These values of ρ and γ result in a source cross-covariance matrix with the largest element 0.9. In Figure 4, the curve "SP-DKLT (X1 split)" corresponds to a system in which the input to terminal 1 (which applies source splitting) is X1 as shown in Figure 1. The curve "SP-DKLT (X2 split)" corresponds to a system in which the input to the terminal 1 is X2. Note that the two curves are not symmetric in rates and they coincide if R1 and R2 are inter-changed in one of the curves. This is because X1 and X2 have different auto-covariance matrices, and hence inter-changing the rates is equivalent to inter-changing the terminals. Importantly, this result indicates that when the two sources are not statistically identical, which source is chosen for splitting does not affect the SP-DKLT performance. Table 1 lists the best bit allocations found by the tree-search algorithm for SP-DKLT codes shown in Figure 4. Note that, for the same (B1, B2), the rate-split between B 1 and B 2 when X1 is applied to the terminal 1 is not identical to that when X2 is applied to the terminal 1.
Figure 4
Figure 4

Comparison of rate-regions achievable with different TC approaches in quantizing 16-dimensional vectors ( M 1 = M 2 = 16) of source model A ( ρ = 0.9, γ = 0.9). "SP-DKLT (X2 split)" refers to the case when X2 is used as the input to terminal 1 (and hence transmitted at rate R1) which applies source-splitting.

Table 1

Bit allocations found by the tree-search algorithm for 16-dimensional SP-DKLT coding of source model A (ρ = 0.9, γ = 0.9)

X1 Split

X2 Split

X 1

X 2

 

X 2

X 1

 

B 1

B 1

B 1

B 2

B

B 1

B 1

B 1

B 2

B

0

14.8

14.8

96

110.8

0

22

22

96

118

0

15

15

80

95

0

22.4

22.4

80

102.4

0

15.8

15.8

64

79.8

0

22.6

22.6

64

86.6

0

19

19

48

67

0

24.4

24.4

48

72.4

0

22

22

44

66

0

25.6

25.6

44

69.6

3.2

22.8

26

40

66

0

26.8

26.8

40

66.8

10

20

30

36

66

0

30

30

36

66

16.6

16.4

33

33

66

2.8

30.2

33

33

66

18.6

15.4

34

32

66

4.2

29.8

34

32

66

23.2

12.8

36

30

66

7.6

28.4

36

30

66

34.2

5.8

40

27.2

67.2

17.4

22.6

40

26

66

44

0

44

25.8

69.8

32

12

44

22

66

48

0

48

24.4

72.4

43.8

4.2

48

19.4

68.4

64

0

64

22.6

86.6

64

0

64

16

90

80

0

80

22.2

102.2

80

0

80

15.2

95.2

96

0

96

22

118

96

0

96

14.8

110.8

Figure 4 also shows the rate region achievable if each source is independently compressed using the KLT (i.e., only intra-vector correlation is utilized), labeled IKLT, and the OPTA lower bound for distributed TC predicted by the iterative DKLT algorithm [8]. The performance of both distributed and non-distributed TC of source model A degrades as ρ decreases, since both auto- and cross-covariance matrices of X1 and X2 are functions of ρ. Next consider the source model B for which the lowest achievable rate-pairs corresponding to D = 0.005 are plotted in Figure 5. The source parameter α = 0.32 results in auto-covariance matrices whose largest off-diagonal element is 0.9. Also recall that θ is the largest element in the source cross-covariance matrix. Note that changing θ only affects the cross-covariance matrix, and hence has no effect on the best achievable rates for independent coding of the two sources. On the other hand, as θ increases, the rates achievable with distributed coding do improve. Since in source model B, the two sources are statistically similar, the curves in Figure 5 are symmetric in rates and the optimal bit allocation does not depend on which source is chosen for splitting.
Figure 5
Figure 5

Comparison of rate-regions achievable with different TC approaches in quantizing 16-dimensional vectors ( M 1 = M 2 = 16) of source model B for α = 0.32 and different values of θ.

The RD performance in Figures 4 and 5 indicate that SP-DKLT codes can significantly outperform IKLT codes at all rates when there is sufficient correlation between the two distributed sources. The performance of SP-DKLT coding necessarily approaches OPTA (DKLT) bound when either R1 or R2 is sufficiently high. That is, the terminal with the higher bit rate can independently transform code its input with negligible distortion, and the other terminal can then apply WZ-TC at the minimum rate achievable with "almost unquantized" decoder side-information. However, for both source-models the rate-region achievable with source-splitting is strictly inside that of DKLT. In other words, there are some rate-pairs inside the DKLT rate-region for a given MSE D, which cannot to be achieved by a SP-DKLT code. A closely related issue is that, for a range of values of (R1, R2), the sumrate R1 + R2 of SP-DKLT codes remains constant and reaches its minimum. For example, it can be seen from Figure 4 and Table 1 that the sum-rate is about 4.125 bits when the rate of X1 is in the range 1.375 - 2.5 bits/sample. From Table 1, it can be seen that when the sum-rate is greater than its minimum value, the optimal SP-DKLT code approaches a WZ transform code, i.e., no source-splitting occurs. This situation, which also exists in Figure 5, suggests that optimal SP-DKLT codes for the sum-rate at which a given D can be achieved, are equivalent to time-sharing [12] of two "corner points". Figure 6 illustrates this situation for optimal SP-DKLT codes at D = 0.005 for source model B (θ = 0.9 in Figure 5). It should however be noted that, unlike source-splitting, time-sharing between the two terminals requires synchronization of their encoders [11].
Figure 6
Figure 6

The optimal SP-DKLT codes at D = 0.005 for source model B with α = 0.32 and θ = 0.9. The minimum sum-rate is 2.5 bits/sample, which can also be achieved by time sharing of codes C1 and C2.

4.2 Design examples

In this section, we focus on the practical design of SP-DKLT codes for a given pair of rates (R1, R2) based on both scalar and block-quantization. RD-WZQ model used in Section 3.1.1 implies infinite block-length WZ-VQ of each coefficient. A practically realizable approach to block WZ quantization is SWC-TCQ [20]. Experimental results obtained with LDPC codes of block length up to 106 bits and TCQs up to 8,192 states are presented in [20] for quadratic Gaussian WZ quantization, which indicate that performance very close to the theoretical limit can be achieved with SWC-TCQ. Motivated by these results, we aim to implement SP-DTCs which can approach theoretical performance predicted in Section 3.1.1 using TCQ and SW coding for encoding transform coefficients. However, the SWC-TCQ design procedure followed in [20] is to first design a TCQ whose MSE satisfies a constraint (by choosing a sufficiently high rate) and then to estimate the output conditional entropy (which is the target rate of the SW code) of the resulting TCQ. This is sufficient for verifying the achievable rate pairs for a given MSE which is the goal of [20]. Our problem is different in that the rate of the SW code is specified by the solution to the bit-allocation problem and our goal is to design a TCQ which minimizes the MSE, subject to a constraint on the output conditional entropy. This requires an alternative formulation of the design procedure, which we refer to as CEC-TCQ. In previous work on non-distributed quantization, entropy constrained TCQ (EC-TCQ) has been investigated in [2124]. CEC-TCQ is a modification of EC-TCQ in [21, 22] to accommodate block SW-coding of the TCQ output relative to a decoder side-information sequence. Our formulation of CEC-TCQ follows the supersetentropy formulation of EC-TCQ in [22].

Suppose that a sequence of source samples {U n } has to be quantized, given that the sequence {Y n }, is available at the decoder as side-information, where n = 1, 2, . . . denotes the discrete-time. Similar to an ordinary TCQ [25], a CEC-TCQ uses a size 2 R TCQ + 1 scalar codebook to quantize the input sequence U1, U2, . . ., into a RTCQ bits/sample output sequence Û1, Û2, . . . . However, CEC-TCQ output satisfies the additional property that the conditional entropy H (Û n |Y n ) = E{- log2P (Û n |Y n )} ≤ R for some given R. It follows from [9] that if the CEC-TCQ output is SW-coded relative to the decoder side-information sequence {Y n } then LR bits are sufficient to (almost) losslessly transmit a sequence of L source samples as L → ∞. The optimal CEC-TCQ minimizes the MSE E{(U n - Û n )2}, subject to the constraint E{- log2P (Û n |Y n )} ≤ R, or equivalently, minimizes the Lagrangian
J = lim L n = 1 L E U n - Û n 2 + β E - log 2 P Û n | Y n
(24)
where β > 0 is the Lagrange multiplier. This implies that, given a specific sequence of input samples u1, u2, . . ., the CEC-TCQ encoder should use the Viterbi algorithm based on the path-cost function
n u n - û n 2 + β E - log 2 P û n | Y n .
(25)
In a rate RTCQ TCQ, each codeword c k , k = 1 , , 2 R TCQ + 1 , in the codebook is labeled with RTCQ-bit binary string [25]. Let b i , i = 1 , , 2 R TCQ be these binary labels. Then, to compute (25), the cost βE{- log2P (b i |Y)} must also be stored for each binary label, where Y is the random variable representing the decoder side-information. For a fixed value of β, we can use a slight modification of the algorithm in [21] for optimizing the CEC-TCQ codebook, by replacing the codeword entropies E{- log2P(b i )} by the conditional entropies E{- log2P (b i |Y)}, and by using a training sequence of (U n , Y n ) pairs. In order to approximate the expectations by sample averages computed from training data, the side-information variable Y is discretized to Ŷ η 1 , η Y , where is a large enough positive integer. Then E{- log2P (B = b i |Y)} can be approximated by
Ĥ b i = - k = 1 Y log 2 P B = b i | Ŷ = η k P Ŷ = η k | B = b i
(26)

where B b 1 , , b 2 R TCQ is the binary-labeled output of the TCQ. Given a TCQ code-book, the probabilities P(B = b i |Ŷ = η k ) and P(Ŷ = η k |B = b i ) can be estimated using the training set [it is sufficient to estimate p i, k = P(B = b i , Ŷ = η k ), k = 1 , Y , i = 1 , , N ]. To complete the design, it is necessary to search for the value of β for which E{- log2P (Û n |Y n )} ≈ R by repeating the codebook optimization for an appropriately chosen sequence of β values.

For block WZ-code designs, the transforms and the bit allocations are found by RD-WZQ model (Section 3.1.1) and WZ quantizers are implemented using CEC-TCQ followed by binary SW coding. More specifically, the rate found by the bit allocation algorithm for each transform coefficient is used as the conditional entropy constraint in the design of a CEC-TCQ for that coefficient. As described in Section 2.3, the CEC-TCQ designs are based on scalar-side information obtained by a linear transform of the vector side-information at the decoder, see Theorem 3. All CEC-TCQ designs are based on the 8-state trellis used in JPEG2000 [[26], Figure 3.16]. For trellis encoding and decoding, a sequence length of 256 source samples has been used. For design and testing quantizers, sample sequences of length 5 × 105 have been used. Since, the main focus this paper is the design of transforms and the quantizers, we assume ideal SW coding of the binary output of each CEC-TCQ, so that our results do not depend on any particular SW coding method. In a practical implementation (e.g., [20]), near optimal performance can be obtained by employing a sufficiently long SW code (note that sequence length for SW-coding can be chosen arbitrary larger than the sequence length used for TCQ encoding). This type of coding is well suited for applications such as distributed image compression, where the coding is inherently block-based.

We also consider SP-DKLT code designs based on scalar quantization. In this case, the transforms and bit allocations are found by using the SWC-HRSQ model (Section 3.1.2). While it is possible to use the step-size predicted by SWC-HRSQ model to design uniform quantizers, we found that such quantizers in reality do not satisfy the required entropy constraint at lower rates. We instead use conditional entropy constrained scalar quantizers (CEC-SQ), designed by modifying the algorithm in [27] to accommodate a conditional entropy constraint similar to CEC-TCQ approach above.

The reconstruction signal-to-noise ratio (RSNR) [with MSE as given by (6)] of SP-DKLT code designs for source model B is shown in the rows labeled Design in Table 2 where SP-DKLT/CECSQ and SP-DKLT/CECTCQ refer to scalar quantization and TCQ based designs respectively. The rows labeled Analytical show the performance predicted by the SWC-HRSQ and RD-WZQ models upon which the transforms and bit-allocations are based (note however that the performance predicted by SWC-HRSQ model is not necessarily an upper-bound for CEC-SQ designs which are not constrained to be uniform quantizers). We compare the performance of our SP-DKLT code designs with IKLT codes for which the bit-allocations are obtained by using either entropy coded high-rate quantization model (for scalar quantizer design) [[4], Section 9.9] or RD-optimal quantization model (for block quantizer design) [[16], Section 10.3.3] for Gaussian variables. The IKLT codes with scalar quantization have been implemented by using entropy constrained scalar quantizers (EC-SQ) while those with block quantizers have been implemented by using EC-TCQ [23], where we assume ideal entropy coding of the quantizer outputs. In Table 2, IKLT/ECSQ and IKLT/ECTCQ respectively refer to these designs.
Table 2

RSNR (in dB) of KLT-based transform code designs for quantizing 16-dimensional vectors (M1 = M2 = 16) of source model B (α = 0.32, θ = 0.9) at R1 = R2 = R bits/sample

R

IKLT

SP-DKLT

 

(bits/sample)

EC-SQ

EC-TCQ

CEC-SQ

CEC-TCQ

 

0.5

10.3

11.7

12.4

14.0

(Analytical)

 

10.3

11.0

11.6

12.7

(design)

1

16.6

18.0

19.1

20.6

 
 

16.4

17.3

18.6

19.6

 

1.5

21.6

23.0

23.8

25.6

 
 

21.7

22.5

23.3

24.4

 

2

25.7

27.1

28.2

29.8

 
 

25.2

26.6

27.8

28.6

 

Analytical values refer to SNR of the quantization model assumed for determining the optimal transforms and the bit-allocation

From a practical view point, the use of DCT instead of KLT is interesting [26]. We therefore consider the design of SP-DTCs based on the DCT, referred to as source-split distributed DCT (SP-DDCT) codes. Since DCT is a fixed transform, we only need to optimize the bit allocations. To do this, we assume that DCT is approximately a decorrelating transform for Gaussian vectors [4]. Then, the bit-allocations given by (9), (14), and (20) are still valid provided that the eigenvalues in these expressions are replaced by the variances of the corresponding DCT coefficients. The rest of the design procedure is the same as that with SP-DKLT. The RSNR of DCT based designs are presented in Table 3 (again, the performance predicted by SWC-HRSQ model is not an upper bound for corresponding practical codes). The results show that, for this particular source model, even the scalar quantization based SP-DDCT codes outperform TCQ-based IDCT codes.
Table 3

SNR (in dB) of DCT-based transform code designs for quantizing 16-dimensional vectors (M1 = M2 = 16) of source model B (α = 0.32, θ = 0.9) at R1 = R2 = R bits/sample

R

IDCT

SP-DDCT

 

(bits/sample)

EC-SQ

EC-TCQ

CEC-SQ

CEC-TCQ

 

0.5

7.9

9.1

11.7

12.6

(Analytical)

 

8.0

8.4

11.0

12.0

(design)

1

11.9

13.2

15.9

17.8

 
 

11.9

12.6

16.6

17.0

 

1.5

15.3

16.8

19.7

21.9

 
 

15.3

16.1

20.5

21.3

 

2

18.9

20.3

23.6

25.6

 
 

18.7

19.4

24.5

25.1

 

Analytical values refer to SNR of the quantization model assumed for determining the bit-allocation.

5 Concluding remarks

Rate-distortion analysis and experimental results demonstrate that SP-DTC is a promising practical approach to implementing distributed VQ of high-dimensional correlated vectors. The comparisons shown in Table 2, as well as similar comparisons for source model A and the source model in [[8], Example 6], indicate that these codes can substantially outperform the independent transform codes, when there is sufficient inter-vector correlation. This approach has also been demonstrated to be effective for DCT-based systems. Therefore, the proposed approach can be potentially used in applications such as stereo image compression when inter-camera communication is impractical. Our RD analysis however indicates that the achievable rate-region of SP-DKLT codes for jointly Gaussian sources is strictly inside that predicted by the DKLT of [8]. An interesting avenue of future work is to find implementable distributed transforms codes which can achieve the rate-pairs below the "time-sharing" line in Figure 6. Another issue is the extension of the proposed approach to more than two vector sources. In principle, source-splitting can be easily applied to more than two sources. However, with more than two vector sources, the complexity of the bit-allocation will be significantly higher.

1 Appendix

1.1 Proof of Theorem 2

The optimality of CKLT is proved in [5]. To prove the optimality of the bit allocation, consider high-rate scalar quantization of the transform coefficient U m and ideal SW coding of the quantizer output Û m at the rate r m = H (Û m | Y) bits/sample, m = 1, . . ., M1, where H (·|·) denotes the conditional entropy [16]. In this case, the asymptotically optimal scalar quantizer for each coefficient is known to be uniform [5]. For high-rate uniform quantization, H (Û m | Y) ≈ h(U m | Y) - log2 m ), where Δ m is the quantizer step-size and h(·|·) is the conditional differential entropy [[16], Section 8.3]. Since the conditional variance of the transform coefficient U m , given the side-information Y is E U m 2 | Y = λ m , and (U m , Y) are jointly Gaussian, it follows that h(U m | Y) = (1/2) log2 (2πeλ m ) [16], and hence Δ m = 2 π e λ m 2 - r m . Therefore, the MSE of high-rate uniform quantization followed by ideal SW coding of U m is
d m SWC - HRSQ = Δ m 2 12 = π e 6 λ m 2 - 2 r m .
(27)
Since (27) and (1) are the same within a constant factor of πe/ 6 (which is identical for all transform coefficients), it is easy to verify that the optimal bit-allocation solution under SWC-HRSQ model is also given by (2). However, the MSE of m th coefficient in this case is
d m = π e 6 λ m 2 - 2 ρ m = π e 6 d * λ , B , N , m = 1 , , N λ m , m = N + 1 , , M
(28)
and hence the overall MSE is given by (5). Furthermore,
Δ m = Δ = 2 π e d * λ , B , N

for m = 1, . . ., N.

1.2 Proof of Theorem 3

For jointly Gaussian and mean-zero X and Y, there exists a matrix A and a mean-zero Gaussian vector W1 independent of Y such that X = AY + W1, where A = X Y Y - 1 , W 1 = X | Y = T Λ T T , and Λ is the diagonal matrix of eigenvalues of ∑X|Y. Furthermore U = T T AY + W2, where W2 = T T W1 is an uncorrelated Gaussian vector since W 2 = T T W 1 T = Λ (note that for CKLT, T-1 = T). Therefore ∑U|Y= Λ. The MMSE estimate of U given Y is Ũ = E{U|Y} = T T E{X | Y} = T T AY. Thus, U = Ũ + W2 and U|Ũ = Λ, and it follows that U i is independent of Ũ j if ji and var(U i | Ũ i ) = var(U i | Y), where var(·|·) denotes the conditional variance. Now, since h(U i | Y) = h(U i | Ũ i ), we conclude that Ũ i is a sufficient statistic [16] for decoder side-information Y in WZ quantization of U i .

Declarations

Authors’ Affiliations

(1)
Department of Electrical and Computer Engineering, University of Manitoba, Winnipeg, Manitoba, R3T 5V6, Canada

References

  1. Xiong Z, Liveris AD, Cheng S: Distributed source coding for sensor networks. IEEE Signal Process Mag 2004, 21(5):80-94.View ArticleGoogle Scholar
  2. Huang JY, Schultheiss P: Block quantization of correlated random vectors. IEEE Trans Commun 1963, 11(9):289-296.View ArticleGoogle Scholar
  3. Goyal V: Theoretical foundations of transform coding. IEEE Signal Process Mag 2001, 18(5):9-21.View ArticleGoogle Scholar
  4. Gersho A, Gray RM: Vector Quantization and Signal Compression. Kluwer Academic Publishers, Norwell MA, USA; 1992.View ArticleGoogle Scholar
  5. Rebollo-Monedero D, Rane S, Aaron A, Girod B: High-rate quantization and transform coding with side information at the decoder. Signal Process 2006, 88(11):3160-3179.View ArticleGoogle Scholar
  6. Vosoughi A, Scaglione A: Precoding and decoding paradigms for distributed vector data compression. IEEE Trans Signal Process 2007, 55(4):1445-1459.MathSciNetView ArticleGoogle Scholar
  7. Chen X, Tuncel E: Low-delay prediction and transform-based Wyner-Ziv coding. IEEE Trans Signal Process 2011, 59(2):653-666.MathSciNetView ArticleGoogle Scholar
  8. Gastpar M, Dragotti PL, Vetterli M: The distributed Karhunen-Loéve transform. IEEE Trans Inf Theory 2006, 52: 5177-5196.MathSciNetView ArticleGoogle Scholar
  9. Slepian D, Wolf JK: Noiseless coding of correlated information sources. IEEE Trans Inf Theory 1973, 19(4):471-480.MathSciNetView ArticleGoogle Scholar
  10. Gish H, Peirce JP: Asymptotically efficient quantizing. IEEE Trans Inf Theory 1968, 14: 676-683.View ArticleGoogle Scholar
  11. Rimoldi B, Urbanke R: Asynchronous Slepian-Wolf coding via source-splitting. In IEEE Int Symp Inform Theory (ISIT). Ulm, Germany; 1997:271.View ArticleGoogle Scholar
  12. Zamir R, Shamai S, Erez U: Nested linear/lattice codes for structured multiterminal bining. IEEE Trans Inf Theory 2002, 48(6):1250-1276.MathSciNetView ArticleGoogle Scholar
  13. Wagner AB, Tavildar S, Viswanath P: Rate region of the quadratic Gaussian two-encoder source-coding problem. IEEE Trans Inf Theory 2008, 54(5):1938-1961.MathSciNetView ArticleGoogle Scholar
  14. Wyner AD, Ziv J: The rate-distortion function for source coding with side information. IEEE Trans Inf Theory 1976, 22: 1-10.MathSciNetView ArticleGoogle Scholar
  15. Yang Y, Stankovic V, Xiong Z, Zhao W: On multiterminal source code design. IEEE Trans Inf Theory 2008, 54(5):2278-2302.MathSciNetView ArticleGoogle Scholar
  16. Cover TM, Thomas JA: Elements of Information Theory. John Wiley, New York, USA; 1991.View ArticleGoogle Scholar
  17. Marco D, Neuhoff DL: The validity of additive noise model for uniform scalar quantizers. IEEE Trans Inf Theory 2005, 51(5):1739-1755.MathSciNetView ArticleGoogle Scholar
  18. Berger T: Rate Distortion Theory: A Mathematical Basis for Data Compression. Prentice-Hall, Englewood Cliffs NJ, USA; 1971.Google Scholar
  19. Vuran MC, Akan OB, Akylidz IF: Spatio-temporal correlation: theory and applications for wireless networks. Comput Netw 2004, 45: 245-259.View ArticleGoogle Scholar
  20. Yang Y, Cheng S, Xiong Z, Zhao W: Wyner-Ziv coding based on TCQ and LDPC codes. IEEE Trans Commun 2009, 57(2):376-387.View ArticleGoogle Scholar
  21. Fischer TR, Wang M: Entropy-cosntrianed trellis-coded quantization. IEEE Trans Inf Theory 1992, 38(2):415-426.View ArticleGoogle Scholar
  22. Marcellin MW: On entropy-cosntrianed trellis-coded quantization. IEEE Trans Commun 1994, 42: 14-16.View ArticleGoogle Scholar
  23. Marcellin MW: Transform coding of images using trellis-coded quantization. In Proc ICASSP. Albuquerque NM, USA; 1990:2241-2244.Google Scholar
  24. Farvardin N, Ran X, Lee CC: Adaptive DCT coding of images using entropy-cosntrianed trellis-coded quantization. In Proc ICASSP. Minneapolis MN, USA; 1993:397-400.Google Scholar
  25. Marcellin MW, Fischer TR: Trellis coded quantization memoryless and Gauss-Markov sources. IEEE Trans Commun 1990, 38: 82-93.MathSciNetView ArticleGoogle Scholar
  26. Taubman DS, Marcellin MW: JPEG 2000: Image Compression Fundamentals, Standrads and Practice. Kluwer Academic Publishers, Norvell MA, USA; 2004.Google Scholar
  27. Chou P, Lookabaugh T, Gray RM: Entropy-constrained vector quantization. IEEE Trans Acoust Speech Signal Process 1989, 37: 31-42.MathSciNetView ArticleGoogle Scholar

Copyright

© Yahampath; licensee Springer. 2012

This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Advertisement