{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T11:10:10Z","timestamp":1747653010897,"version":"3.40.5"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T00:00:00Z","timestamp":1744761600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T00:00:00Z","timestamp":1744761600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s11760-025-04049-z","type":"journal-article","created":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T13:59:31Z","timestamp":1744811971000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Distributed coding with sorting and assignment"],"prefix":"10.1007","volume":"19","author":[{"given":"Soumia","family":"Debbache","sequence":"first","affiliation":[]},{"given":"Said","family":"Benierbah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,16]]},"reference":[{"issue":"4","key":"4049_CR1","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1109\/TIT.1973.1055037","volume":"19","author":"D Slepian","year":"1973","unstructured":"Slepian, D., Wolf, J.: Noiseless coding of correlated information sources. IEEE Trans. Inf. Theory 19(4), 471\u2013480 (1973)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"4049_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIT.1976.1055508","volume":"22","author":"A Wyner","year":"1976","unstructured":"Wyner, A., Ziv, J.: The rate-distortion function for source coding with side information at the decoder. IEEE Trans. Inf. Theory 22(1), 1\u201310 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"4049_CR3","doi-asserted-by":"crossref","unstructured":"Aaron, A., Zhang, R., Girod, B.: Wyner-ziv coding of motion video. In: Conference Record of the Thirty-Sixth Asilomar Conference on Signals, Systems and Computers, vol 1, pp. 240\u2013244. IEEE (2002)","DOI":"10.1109\/ACSSC.2002.1197184"},{"key":"4049_CR4","doi-asserted-by":"crossref","unstructured":"Pereira, F., Brites, C., Ascenso, J., Tagliasacchi, M.: Wyner-ziv video coding: A review of the early architectures and further developments. In: 2008 IEEE International Conference on Multimedia and Expo, pp. 625\u2013628. IEEE (2008)","DOI":"10.1109\/ICME.2008.4607512"},{"key":"4049_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/9781118705957","volume-title":"Distributed Source Coding: Theory and Practice","author":"S Wang","year":"2017","unstructured":"Wang, S., Fang, Y., Cheng, S.: Distributed Source Coding: Theory and Practice. John Wiley & Sons, UK (2017)"},{"key":"4049_CR6","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.image.2019.03.016","volume":"76","author":"J Zhou","year":"2019","unstructured":"Zhou, J., Fu, Y., Yang, Y., Ho, A.T.: Distributed video coding using interval overlapped arithmetic coding. Signal Process. Image Commun. 76, 118\u2013124 (2019)","journal-title":"Signal Process. Image Commun."},{"key":"4049_CR7","doi-asserted-by":"crossref","unstructured":"Varshney, L.R., Goyal, V.K.: Toward a source coding theory for sets. In: Data Compression Conference (DCC\u201906), pp. 13\u201322. IEEE (2006).","DOI":"10.1109\/DCC.2006.78"},{"key":"4049_CR8","unstructured":"Artigas, X., Ascenso, J., Dalai, M., Klomp, S., Kubasov, D., Ouaret, M.: The discover codec: architecture, techniques and evaluation. In: Picture Coding Symposium (PCS\u201907) (2007)"},{"issue":"11","key":"4049_CR9","doi-asserted-by":"publisher","first-page":"2301","DOI":"10.1049\/iet-ipr.2018.5942","volume":"14","author":"S Benierbah","year":"2020","unstructured":"Benierbah, S., Khamadja, M.: Symbol positions-based slepian\u2013wolf coding with application to distributed video coding. IET Image Proc. 14(11), 2301\u20132309 (2020)","journal-title":"IET Image Proc."},{"issue":"1","key":"4049_CR10","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/JPROC.2004.839619","volume":"93","author":"B Girod","year":"2005","unstructured":"Girod, B., Aaron, A.M., Rane, S., Rebollo-Monedero, D.: Distributed video coding. Proc. IEEE 93(1), 71\u201383 (2005)","journal-title":"Proc. IEEE"},{"key":"4049_CR11","doi-asserted-by":"crossref","unstructured":"Ozy\u0131lkan, E., Erkip, E.: Distributed compression in the era of machine learning: a review of recent advances. In: 2024 58th Annual Conference on Information Sciences and Systems (CISS), pp. 1\u20136. IEEE (2024)","DOI":"10.1109\/CISS59072.2024.10480175"},{"key":"4049_CR12","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1109\/JSAIT.2024.3393429","volume":"5","author":"E Ozyilkan","year":"2024","unstructured":"Ozyilkan, E., Ball\u00e9, J., Erkip, E.: Neural distributed compressor discovers binning. IEEE J. Select Areas Inf. Theory 5, 246\u2013260 (2024). https:\/\/doi.org\/10.1109\/JSAIT.2024.3393429","journal-title":"IEEE J. Select Areas Inf. Theory"},{"key":"4049_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, X., Shao, J., ZhangM J.: Low-complexity deep video compression with a distributed coding architecture. In:\u00a02023 IEEE International Conference on Multimedia and Expo (ICME). IEEE, (2023) pp 2537\u20132542","DOI":"10.1109\/ICME55011.2023.00432"},{"issue":"7","key":"4049_CR14","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/TCSVT.2003.815165","volume":"13","author":"T Wiegand","year":"2003","unstructured":"Wiegand, T., Sullivan, G.J., Bjontegaard, G., Luthra, A.: Overview of the h.264\/avc video coding standard. IEEE Trans. Circuits Syst. Video Technol. 13(7), 560\u2013576 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"11","key":"4049_CR15","doi-asserted-by":"publisher","first-page":"3123","DOI":"10.1016\/j.sigpro.2006.03.012","volume":"86","author":"D Varodayan","year":"2006","unstructured":"Varodayan, D., Aaron, A., Girod, B.: Rate-adaptive codes for distributed source coding. Signal Process. 86(11), 3123\u20133130 (2006)","journal-title":"Signal Process."},{"key":"4049_CR16","unstructured":"Burrows, M.: A block-sorting lossless data compression algorithm. SRS Research Report 124 (1994)"},{"issue":"11","key":"4049_CR17","doi-asserted-by":"publisher","first-page":"1837","DOI":"10.1109\/83.877207","volume":"9","author":"N Memon","year":"2000","unstructured":"Memon, N., Neuhoff, D.L., Shende, S.: An analysis of some common scanning techniques for lossless image coding. IEEE Trans. Image Process. 9(11), 1837\u20131848 (2000)","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"4049_CR18","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1109\/PROC.1965.3680","volume":"53","author":"D Slepian","year":"1965","unstructured":"Slepian, D.: Permutation modulation. Proc. IEEE 53(3), 228\u2013236 (1965)","journal-title":"Proc. IEEE"},{"issue":"1","key":"4049_CR19","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1109\/TIT.1972.1054729","volume":"18","author":"T Berger","year":"1972","unstructured":"Berger, T., Jelinek, F., Wolf, J.: Permutation codes for sources. IEEE Trans. Inf. Theory 18(1), 160\u2013169 (1972)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"4049_CR20","doi-asserted-by":"crossref","unstructured":"Steinruecken, C.: Compressing combinatorial objects. In: 2016 Data Compression Conference (DCC), pp. 389\u2013396. IEEE (2016)","DOI":"10.1109\/DCC.2016.77"},{"key":"4049_CR21","first-page":"1","volume":"1","author":"LR Varshney","year":"2006","unstructured":"Varshney, L.R., Goyal, V.K.: Ordered and disordered source coding. Sort 1, 1 (2006)","journal-title":"Sort"},{"issue":"3","key":"4049_CR22","doi-asserted-by":"publisher","first-page":"1485","DOI":"10.1109\/TIT.2015.2392093","volume":"61","author":"C Steinruecken","year":"2015","unstructured":"Steinruecken, C.: Compressing sets and multisets of sequences. IEEE Trans. Inf. Theory 61(3), 1485\u20131490 (2015)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"4049_CR23","doi-asserted-by":"crossref","unstructured":"Heckel, R., Shomorony, I., Ramchandran, K., David, N.: Fundamental limits of DNA storage systems. In: 2017 IEEE International Symposium on Information Theory (ISIT), pp. 3130\u20133134. IEEE (2017)","DOI":"10.1109\/ISIT.2017.8007106"},{"key":"4049_CR24","unstructured":"Severo, D., Townsend, J., Khisti, A.J., Makhzani, A., Ullrich, K.: Your dataset is a multiset and you should compress it like one. In: NeurIPS 2021 Workshop on Deep Generative Models and Downstream Applications (2021)"},{"issue":"6","key":"4049_CR25","doi-asserted-by":"publisher","first-page":"2199","DOI":"10.1109\/18.782173","volume":"45","author":"S Datta","year":"1999","unstructured":"Datta, S., McLaughlin, S.W.: An enumerative method for runlength-limited codes: permutation codes. IEEE Trans. Inf. Theory 45(6), 2199\u20132204 (1999)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"4049_CR26","doi-asserted-by":"crossref","unstructured":"Cheng, X., Sian\u2013Jheng, L., Jie, S.: Sortcomp (sort-and-compress)-towards a universal lossless compression scheme for matrix and tabular data. In: 2022 Data Compression Conference (DCC), pp. 01\u201310. IEEE (2022)","DOI":"10.1109\/DCC52660.2022.00046"},{"issue":"7","key":"4049_CR27","doi-asserted-by":"publisher","first-page":"2961","DOI":"10.1109\/18.959273","volume":"47","author":"VK Goyal","year":"2001","unstructured":"Goyal, V.K., Savari, S.A., Wang, W.: On optimal permutation codes. IEEE Trans. Inf. Theory 47(7), 2961\u20132971 (2001)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"4049_CR28","doi-asserted-by":"crossref","unstructured":"Makur, A.: Information capacity of Bsc and Bec permutation channels. In: 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 1112\u20131119. IEEE (2018)","DOI":"10.1109\/ALLERTON.2018.8636070"},{"issue":"7","key":"4049_CR29","doi-asserted-by":"publisher","first-page":"5156","DOI":"10.1109\/TIT.2017.2789292","volume":"64","author":"M Kovacevic","year":"2018","unstructured":"Kovacevic, M., Tan, V.Y.: Codes in the space of multisets\u2014coding for permutation channels with impairments. IEEE Trans. Inf. Theory 64(7), 5156\u20135169 (2018)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"4049_CR30","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1109\/TIT.1987.1057313","volume":"33","author":"R Ahlswede","year":"1987","unstructured":"Ahlswede, R., Kaspi, A.: Optimal coding strategies for certain permuting channels. IEEE Trans. Inf. Theory 33(3), 310\u2013314 (1987)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5\u20136","key":"4049_CR31","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1561\/2200000073","volume":"11","author":"G Peyr\u00e9","year":"2019","unstructured":"Peyr\u00e9, G., Cuturi, M., et al.: Computational optimal transport: With applications to data science. Found. Trends Mach. Learn. 11(5\u20136), 355\u2013607 (2019)","journal-title":"Found. Trends Mach. Learn."},{"issue":"12","key":"4049_CR32","doi-asserted-by":"publisher","first-page":"2590","DOI":"10.1109\/LCOMM.2017.2745545","volume":"21","author":"O Kolade","year":"2017","unstructured":"Kolade, O., Versfeld, J., Van Wyk, M.: Soft-decision decoding of permutation block codes in AWGN and Rayleigh fading channels. IEEE Commun. Lett. 21(12), 2590\u20132593 (2017)","journal-title":"IEEE Commun. Lett."},{"key":"4049_CR33","doi-asserted-by":"crossref","unstructured":"Vinck, A.H., Haering, J., Wadayama, T.: Coded m-FSK for power line communications. In: 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060), pp. 137 IEEE (2000)","DOI":"10.1109\/ISIT.2000.866429"},{"issue":"1\u20132","key":"4049_CR34","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1002\/nav.3800020109","volume":"2","author":"HW Kuhn","year":"1955","unstructured":"Kuhn, H.W.: The hungarian method for the assignment problem. Naval Res. Logist. Quart. 2(1\u20132), 83\u201397 (1955)","journal-title":"Naval Res. Logist. Quart."},{"key":"4049_CR35","unstructured":"Idel, M.: A review of matrix scaling and sinkhorn\u2019s normal form for matrices and positive maps. arXiv preprint arXiv:1609.06349 (2016)"},{"key":"4049_CR36","doi-asserted-by":"publisher","first-page":"4431","DOI":"10.1109\/ACCESS.2016.2604358","volume":"4","author":"J Song","year":"2016","unstructured":"Song, J., Shen, P., Wang, K., Zhang, L., Song, H.: Can gray code improve the performance of distributed video coding? IEEE Access 4, 4431\u20134441 (2016)","journal-title":"IEEE Access"},{"issue":"1","key":"4049_CR37","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/TCOM.1982.1095369","volume":"30","author":"J Fletcher","year":"1982","unstructured":"Fletcher, J.: An arithmetic checksum for serial transmissions. IEEE Trans. Commun. 30(1), 247\u2013252 (1982)","journal-title":"IEEE Trans. Commun."},{"key":"4049_CR38","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.32.1.013031","author":"DE Boudechiche","year":"2023","unstructured":"Boudechiche, D.E., Benierbah, S., Khamadja, M.: Improving distributed video coding with deep learning. J. Electron. Imag. (2023). https:\/\/doi.org\/10.1117\/1.JEI.32.1.013031","journal-title":"J. Electron. Imag."}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-025-04049-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-025-04049-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-025-04049-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T10:43:31Z","timestamp":1747651411000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-025-04049-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,16]]},"references-count":38,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["4049"],"URL":"https:\/\/doi.org\/10.1007\/s11760-025-04049-z","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"type":"print","value":"1863-1703"},{"type":"electronic","value":"1863-1711"}],"subject":[],"published":{"date-parts":[[2025,4,16]]},"assertion":[{"value":"10 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 April 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}}],"article-number":"497"}}