By Topic

On Joint Source and Channel Coding Using Trellis Coded CPM: Analytical Bounds on the Channel Distortion

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Zihuai Lin ; Aalborg Univ., Aalborg ; Tor Aulin

Joint source and channel coding (JSCC) using trellis coded quantization (TCQ) in conjunction with trellis coded continuous phase modulation (CPM) is studied. The channel is assumed to be the additive white gaussian noise (AWGN) channel. Analytical bounds on the channel distortion for the investigated systems with maximum-likelihood sequence detection (MLSD) are developed. The bounds are based on the transfer function technique, which was modified and generalized to include continuous-amplitude discrete-time signals. For a memoryless uniform source, the constructed bounds for the investigated systems are shown to be asymptotically tight for increasing channel signal-to-noise ratio (SNR) values. For a memoryless nonuniform source, the constructed bounds are not as tight as the one for the uniform source, however, it still can be used as an indication to how the system performs. It is concluded that the minimum Euclidean distance of the system alone is not enough to evaluate the performance of the considered systems. The number of error events having minimum Euclidean distance and the total distortion caused by those error events also affect the asymptotic performance. This work provides an analysis tool for the investigated systems. The analysis method is very general. It may be applied to any trellis based JSCC schemes.

Published in:

IEEE Transactions on Information Theory  (Volume:53 ,  Issue: 9 )