Chapter 1.6 : Information Theory

 
 

Chapter 1.6 : Information Theory

Christopher M. Bishop, PRML, Chapter 1 Introdcution

1. Information h(x)

Given a random variable and we ask how much information is received when we observe a specific value for this variable.

  • The amount of information can be viewed as the “degree of surprise” on learning the value of .
  • information : where the negative sign ensures that information is positive or zero.
  • the units of :
    • using logarithms to the base of 2: the units of are bits (‘binary digits’).
    • using logarithms to the base of , i.e., natural logarithms: the units of are nats.

2. Entropy H(x): average amount of information

2.1 Entropy H(x)

Firstly we interpret the concept of entropy in terms of the average amount of information needed to specify the state of a random variable.

Now suppose that a sender wishes to transmit the value of a random variable to a receiver. The average amount of information that they transmit in the process is obtained by taking the expectation of (1.92) with respect to the distribution and is given as

  • discrete entropy for discrete random variable by
  • or differential/continuous entropy for continuous random variable by
  • Note that and so we shall take whenever we encounter a value for such that .
  • The nonuniform distribution has a smaller entropy than the uniform one.

2.2 Noiseless coding theorem (Shannon, 1948)

The noiseless coding theorem states that the entropy is a lower bound on the number of bits needed to transmit the state of a random variable.

2.3 Alternative view of entropy H(x)

Secondly, let us introduces the concept of entropy in physics in the context of equilibrium thermodynamics and later given a deeper interpretation as a measure of disorder through developments in statistical mechanics.

Consider a set of identical objects that are to be divided amongst a set of bins, such that there are objects in the bin. Consider the number of different ways of allocating the objects to the bins.

  • There are ways to choose the first object, ways to choose the second object, and so on, leading to a total of ways to allocate all objects to the bins.
  • However, we don’t wish to distinguish between rearrangements of objects within each bin. In the bin there are ways of reordering the objects, and so the total number of ways of allocating the objects to the bins is given by which is called the multiplicity.
  • The entropy is then defined as the logarithm of the multiplicity scaled by an appropriate constant
  • We now consider the limit , in which the fractions are held fixed, and apply Stirling’s approximation
  • which gives

    i.e.,

  • where we have used , and is the probability of an object being assigned to the bin.
  • microstate: In physics terminology, the specific arrangements of objects in the bins is called a microstate,
  • macrostate: the overall distribution of occupation numbers, expressed through the ratios , is called macrostate.
  • The multiplicity is also known as the weight of the macrostate.
  • We can interpret the bins as the states of a discrete random variable , where . The entropy of the random variable X is then

2.4 Comparison between discrete entropy and continuous entropy

H(x) Discrete Distribution X Continuous Distribution X
Maximum Uniform X Gaussian X
+/- could be negative
  • Maximum entropy H(x) :

    • In the case of discrete distributions, the maximum entropy configuration corresponded to an equal distribution of probabilities across the possible states of the variable.
    • For a continuous variable, the distribution that maximizes the differential entropy is the Gaussian [see Page 54 in PRML].
  • Is Negative or Positive?
    • The discrete entropy in (1.93) is always , because . It will equal its minimum value of when one of the and all other .
    • The differential entropy can be negative, because in (1.110) for .

      If we evaluate the differential entropy of the Gaussian, we obtain This result also shows that the differential entropy, unlike the discrete entropy, can be negative, because in (1.110) for .

2.5 Conditional entropy H(y|x)

  • Conditional entropy:
    Suppose we have a joint distribution from which we draw pairs of values of and . If a value of is already known, then the additional information needed to specify the corresponding value of is given by . Thus the average additional information needed to specify y can be written as
    which is called the conditional entropy of y given x.
  • It is easily seen, using the product rule, that the conditional entropy satisfies the relation where is the differential entropy (i.e., continuous entropy) of , and is the differential entropy of the marginal distribution .
  • From (1.112) we get to know that

    the information needed to describe and is given by the sum of the information needed to describe alone plus the additional information required to specify given .

3. Relative entropy or KL divergence

3.1 Relative entropy or KL divergence

Problem: How to relate the notion of entropy to pattern recognition?
Description: Consider some unknown distribution , and suppose that we have modeled this using an approximating distribution .

  • Relative entropy or Kullback-Leibler divergence, or KL divergence between the distributions and : If we use to construct a coding scheme for the purpose of transmitting values of to a receiver, then the average additional amount of information (in nats) required to specify the value of (assuming we choose an efficient coding scheme) as a result of using instead of the true distribution is given by
    and

  • It can be rewritten as [see Ref-1]

  • Cross Entropy: where is called the cross entropy,

    • Understanding of Cross Entropy: One can show that the cross entropy is the average number of bits (or nats) needed to encode data coming from a source with distribution when we use model to define our codebook.
    • Understanding of (“Regular”) Entropy: Hence the “regular” entropy , is the expected number of bits if we use the true model.
    • Understanding of Relative Entropy: So the KL divergence is the difference between these (shown in 2.111). In other words, the KL divergence is the average number of extra bits (or nats) needed to encode the data, due to the fact that we used approximation distribution to encode the data instead of the true distribution .
  • Asymmetric: Note that KL divergence is not a symmetrical quantity, that is to say .

  • KL divergence is a way to measure the dissimilarity of two probability distributions, and [see Ref-1].

3.2 Information inequality [see Ref-1]

The “extra number of bits” interpretation should make it clear that , and that the KL is only equal to zero i.f.f. . We now give a proof of this important result.

Proof:

  • 1) Convex functions: To do this we first introduce the concept of convex functions. A function is said to be convex if it has the property that every chord lies on or above the function, as shown in Figure 1.31.

    • Convexity then implies
  • 2) Jensen’s inequality:
    • Using the technique of proof by induction(数学归纳法), we can show from (1.114) that a convex function satisfies where and , for any set of points . The result (1.115) is known as Jensen’s inequality.
    • If we interpret the as the probability distribution over a discrete variable taking the values , then (1.115) can be written For continuous variables, Jensen’s inequality takes the form
  • 3) Apply Jensen’s inequality in the form (1.117) to the KL divergence (1.113) to give where we have used the fact that is a convex function (In fact, is a strictly convex function, so the equality will hold if, and only if, for all ), together with the normalization condition .
  • 4) Similarly, Let be the support of , and apply Jensen’s inequality in the form (1.115) to the discrete form KL divergence (2.110) to get [see Ref-1] where the first inequality follows from Jensen’s. Since is a strictly concave (i.e., the inverse of convex) function, we have equality in Equation (2.115) iff for some . We have equality in Equation (2.116) iff , which implies .
  • 5) Hence iff for all .

3.3 How to use KL divergence

Note that:

  • we can interpret the KL divergence as a measure of the dissimilarity of the two distributions and .
  • If we use a distribution that is different from the true one, then we must necessarily have a less efficient coding, and on average the additional information that must be transmitted is (at least) equal to the Kullback-Leibler divergence between the two distributions.

Problem description:

  • Suppose that data is being generated from an unknown distribution that we wish to model.
  • We can try to approximate this distribution using some parametric distribution , governed by a set of adjustable parameters , for example a multivariate Gaussian.
  • One way to determine is to minimize the KL divergence between and with respect to .
  • We cannot do this directly because we don’t know . Suppose, however, that we have observed a finite set of training points , for , drawn from . Then the expectation with respect to can be approximated by a finite sum over these points, using (1.35), so that (???don’t know how to derive it)
  • the first term is the negative log likelihood function for under the distribution evaluated using the training set.
  • Thus we see that minimizing this KL divergence is equivalent to maximizing the likelihood function.

3.4 Mutual information

Now consider the joint distribution between two sets of variables and given by .

Mutual information between the variables and :

  • If and are independent, p(x, y) = p(x)p(y).
  • If and are not independent, we can gain some idea of whether they are “close” to being independent by considering the KL divergence between the joint distribution and the product of the marginals, given by which is called the mutual information between the variables and .
  • Using the sum and product rules of probability, we see that the mutual information is related to the conditional entropy
    through

Understanding of Mutual information:

  • Thus we can view the mutual information as the reduction in the uncertainty about by virtue of being told the value of (or vice versa).
  • From a Bayesian perspective, we can view as the prior distribution for and as the posterior distribution after we have observed new data . The mutual information therefore represents the reduction in uncertainty about as a consequence of the new observation .

Reference

[1]: Section 2.8.2, Page 57, Kevin P. Murphy. 2012. Machine Learning: A Probabilistic Perspective. The MIT Press.

 

CCJ PRML Study Note - Chapter 1.6 : Information Theory的更多相关文章

  1. 信息熵 Information Theory

    信息论(Information Theory)是概率论与数理统计的一个分枝.用于信息处理.信息熵.通信系统.数据传输.率失真理论.密码学.信噪比.数据压缩和相关课题.本文主要罗列一些基于熵的概念及其意 ...

  2. Tree - Information Theory

    This will be a series of post about Tree model and relevant ensemble method, including but not limit ...

  3. information entropy as a measure of the uncertainty in a message while essentially inventing the field of information theory

    https://en.wikipedia.org/wiki/Claude_Shannon In 1948, the promised memorandum appeared as "A Ma ...

  4. Better intuition for information theory

    Better intuition for information theory 2019-12-01 21:21:33 Source: https://www.blackhc.net/blog/201 ...

  5. 信息论 | information theory | 信息度量 | information measures | R代码(一)

    这个时代已经是多学科相互渗透的时代,纯粹的传统学科在没落,新兴的交叉学科在不断兴起. life science neurosciences statistics computer science in ...

  6. Beginning Scala study note(5) Pattern Matching

    The basic functional cornerstones of Scala: immutable data types, passing of functions as parameters ...

  7. TIJ——Chapter Fourteen:Type Information

    Runtime type information(RTTI) allows you to discover and use type information while a program is ru ...

  8. Beginning Scala study note(9) Scala and Java Interoperability

    1. Translating Java Classes to Scala Classes Example 1: # a class declaration in Java public class B ...

  9. Beginning Scala study note(8) Scala Type System

    1. Unified Type System Scala has a unified type system, enclosed by the type Any at the top of the h ...

随机推荐

  1. MySQL时间戳和时间格式转换函数

    MySQL时间戳和时间格式转换函数:unix_timestamp and from_unixtime unix_timestamp将时间转化成时间戳格式.from_unixtime将时间戳转化成时间格 ...

  2. android学习笔记47——读写SD卡上的文件

    读写SD卡上的文件 通过Context的openFileInput.openFileOutput来打开文件输入流.输出流时,程序打开的都是应用程序的数据文件夹里的文件,其存储的文件大小可能都比较有限- ...

  3. PHP中的中文截取乱码问题_gb2312_utf-8

    一.字符串编码为gb2312,一个中文占俩字节 public static function chinesesubstr($str, $start, $len) { // $str指字符串,$star ...

  4. 基于List集合映射

    1. 实体类中使用List集合 public class Grade { private int id; private String name; private List<Student> ...

  5. Servlet概述及其生命周期

    Servlet和传统CGI程序相比的优点:   1. 只需要启动一个操作系统进程以及加载一个JVM,大大降低了系统的开销 2. 如果多个请求需要做同样处理的时候,这时只需要加载一个类,这也大大降低了开 ...

  6. 最大熵的Java实现

    这是一个最大熵的简明Java实现,提供训练与预测接口.训练采用GIS训练算法,附带示例训练集.本文旨在介绍最大熵的原理.分类和实现,不涉及公式推导或其他训练算法,请放心食用. 最大熵理论 简介 最大熵 ...

  7. MySQL作业

    创建作业事件 MONTH STARTS '2015-01-01 05:30:01' ON COMPLETION NOT PRESERVE ENABLE DO CALL sp_moveLoginReco ...

  8. Xcode5创建自己的静态库详解

    首先声明: 本人屌丝一枚,如有不对不妥之处,请大牛指正! 1.静态库工程的建立: Xcode New一个新的project,选择IOS下面的Framework&Library,下面有一个Coc ...

  9. .Net调用非托管代码数据类型不一致的问题

    什么是Net互操作?.Net不能直接操作非托管代码,这时就需要互操作了.   c#中调用非托管c++函数,此函数又包含指向某个结构的指针,譬如指向c#中的byte数组.对于这样的参数,考虑到非托管变量 ...

  10. java socket通讯(一) 入门示例

    一.入门 要想学习socket通讯,首先得知道tcp/ip和udp连接,具体可参考浅谈TCP/IP 和 UDP的区别 二.示例 首先新建了一个java工程,包括两个部分,客户端SocketClient ...