• 제목/요약/키워드: Hamming Code

검색결과 92건 처리시간 0.03초

A Modified Product Code Over ℤ4 in Steganography with Large Embedding Rate

  • Zhang, Lingyu;Chen, Deyuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권7호
    • /
    • pp.3353-3370
    • /
    • 2016
  • The way of combination of Product Perfect Codes (PPCs) is based on the theory of short codes constructing long codes. PPCs have larger embedding rate than Hamming codes by expending embedding columns in a coding block, and they have been proven to enhance the performance of the F5 steganographic method. In this paper, the proposed modified product codes called MPCs are introduced as an efficient way to embed more data than PPCs by increasing 2r2-1-r2 embedding columns. Unlike PPC, the generation of the check matrix H in MPC is random, and it is different from PPC. In addition a simple solving way of the linear algebraic equations is applied to figure out the problem of expending embedding columns or compensating cases. Furthermore, the MPCs over ℤ4 have been proposed to further enhance not only the performance but also the computation speed which reaches O(n1+σ). Finally, the proposed ℤ4-MPC intends to maximize the embedding rate with maintaining less distortion , and the performance surpasses the existing improved product perfect codes. The performance of large embedding rate should have the significance in the high-capacity of covert communication.

A Two-Step Screening Algorithm to Solve Linear Error Equations for Blind Identification of Block Codes Based on Binary Galois Field

  • Liu, Qian;Zhang, Hao;Yu, Peidong;Wang, Gang;Qiu, Zhaoyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권9호
    • /
    • pp.3458-3481
    • /
    • 2021
  • Existing methods for blind identification of linear block codes without a candidate set are mainly built on the Gauss elimination process. However, the fault tolerance will fall short when the intercepted bit error rate (BER) is too high. To address this issue, we apply the reverse algebra approach and propose a novel "two-step-screening" algorithm by solving the linear error equations on the binary Galois field, or GF(2). In the first step, a recursive matrix partition is implemented to solve the system linear error equations where the coefficient matrix is constructed by the full codewords which come from the intercepted noisy bitstream. This process is repeated to derive all those possible parity-checks. In the second step, a check matrix constructed by the intercepted codewords is applied to find the correct parity-checks out of all possible parity-checks solutions. This novel "two-step-screening" algorithm can be used in different codes like Hamming codes, BCH codes, LDPC codes, and quasi-cyclic LDPC codes. The simulation results have shown that it can highly improve the fault tolerance ability compared to the existing Gauss elimination process-based algorithms.

차세대 이동통신을 위한 TCM 복호기 구현에 관한 연구 (A Study on the Implementation of the TCM DECODER for Next Generation Mobile Communication)

  • 은도현;최윤석;조훈상;김응배;이순흠
    • 한국정보통신학회논문지
    • /
    • 제5권1호
    • /
    • pp.41-51
    • /
    • 2001
  • 본 연구를 통하여 동일 대역폭 효율하에서 해밍거리를 이용하여 복호를 하는 기존의 콘볼루션 부호보다 유클리드 거리를 이용하여 복호를 하는 트랠리스 부호화 변조기법의 성능이 우수함을 확인하고 이를 바탕으로 기존의 콘볼루션 복호기보다 더 우수한 TCM 복호기 칩을 개발하였다. 본 논문에서는 TCM 복호기를 하드웨어로 구현하기 위하여 우선 현재 사용중인 콘볼루션 부호와 트랠리스 부호화 변조기법(TCM)의 송수신기 부분을 각각 C-언어로 경판정 방식의 해밍거리를 이용한 콘볼루션 부호보다는 유클리드 거리를 이용한 TCM 기법이 적용되었을 때 성능이 더 우수하다는 깃을 확인하였다. 이 결과를 바탕으로 연판정 방식을 이용하고 구속장이 3, 5, 7인 TCM 복호기 칩을 AHDL 언어를 이용하여 설계하였다. 그리고 Altera사의 MAX+plus II version 8.2 장비를 이용하여 설계된 TCM 복호기 칩이 올바르게 동작하는지를 검증하였다.

  • PDF

New Decoding Scheme for LDPC Codes Based on Simple Product Code Structure

  • Shin, Beomkyu;Hong, Seokbeom;Park, Hosung;No, Jong-Seon;Shin, Dong-Joon
    • Journal of Communications and Networks
    • /
    • 제17권4호
    • /
    • pp.351-361
    • /
    • 2015
  • In this paper, a new decoding scheme is proposed to improve the error correcting performance of low-density parity-check (LDPC) codes in high signal-to-noise ratio (SNR) region by using post-processing. It behaves as follows: First, a conventional LDPC decoding is applied to received LDPC codewords one by one. Then, we count the number of word errors in a predetermined number of decoded codewords. If there is no word error, nothing needs to be done and we can move to the next group of codewords with no delay. Otherwise, we perform a proper post-processing which produces a new soft-valued codeword (this will be fully explained in the main body of this paper) and then apply the conventional LDPC decoding to it again to recover the unsuccessfully decoded codewords. For the proposed decoding scheme, we adopt a simple product code structure which contains LDPC codes and simple algebraic codes as its horizontal and vertical codes, respectively. The decoding capability of the proposed decoding scheme is defined and analyzed using the parity-check matrices of vertical codes and, especially, the combined-decodability is derived for the case of single parity-check (SPC) codes and Hamming codes used as vertical codes. It is also shown that the proposed decoding scheme achieves much better error correcting capability in high SNR region with little additional decoding complexity, compared with the conventional LDPC decoding scheme.

라이시안 로그노말 페이딩 채널 모델에서 채널 부호를 사용한 이동 성층권 통신 시스템의 성능 분석 (Performance Analysis of a Mobile Stratospheric Communication System with Channel Codings over Rician Log-Normal Fading Channel Models)

  • 강병권
    • 융합신호처리학회논문지
    • /
    • 제3권4호
    • /
    • pp.67-73
    • /
    • 2002
  • 최근 들어 개인 이동 통신 또는 대용량 고속 통신의 서비스 향상을 위하여 성층권 통신에 대한 관심이 높아지고 있다. 실제로 ITU에서는 성층권 통신 시스템을 IMT-2000의 지상 기지국 또는 중계국으로 사용하는 것에 대한 가능성을 지속적으로 연구하고 있는 상황이다(1). 그러나, 이러한 성층권 통신은 실제로 채널을 측정한 데이터가 없어 정확한 성능 예측이 어렵고, 성층권에 시험용 비행선을 위치시키는 것도 막대한 예산이 필요하다. 본 논문에서는 성층권의 채널 모델로서 Corazza(2)가 제안하고, 유문희(3)등에 의하여 개선된 채널 데이터를 사용하여 라이시안 로그 노말 페이딩 채널을 모델링하고, 이러한 채널에서의 이동 성층권 통신 시스템의 성능을 평가하고자 한다. 사용한 통신 방식은 BPSK 변조 방식이며, 개방 지역(open area), 시골 지역(rural area),도심 지역(urban area)의 경우에 대하여 각각 세가지 앙각, 즉 이동체에서 비행선을 바라본 각도 20$^\cire$, 45$^\cire$, 80$^\cire$ 에 대하여 성능을 구하였다. 또한, 각 경우에 대하여 해밍 부호(7,4), BCH 부호(15,7)와 제한길이(constraint length)가 3이고 부호화율이 R=1/2인 콘볼루션 부호 등을 적용하여 성능의 향상 효과를 분석하였다.

  • PDF

2n 차 최대무게 다항식에 대응하는 90/150 RCA (90/150 RCA Corresponding to Maximum Weight Polynomial with degree 2n)

  • 최언숙;조성진
    • 한국전자통신학회논문지
    • /
    • 제13권4호
    • /
    • pp.819-826
    • /
    • 2018
  • 일반화된 해밍무게는 선형부호의 중요한 파라미터의 하나로써 암호시스템에 적용할 때 부호의 성능을 결정한다. 그리고 격자도를 이용하여 블록부호를 연판정으로 복호할 때 구현에 필요한 상태복잡도를 평가하는 척도가 되기도 함으로써 그 중요성이 한층 부각되고 있다. 특별히 삼항다항식을 기반으로 하는 유한체 상의 비트-병렬 곱셈기에 대한 연구가 진행되어왔다. 셀룰라오토마타(Cellular Automata, 이하 CA)는 국소적 상호작용에 의해 상태가 동시에 업데이트되는 성질이 있어서 LFSR보다 랜덤성이 우수하다. 본 논문에서는 효과적인 암호시스템 설계에 있어 중요한 요소 중 하나인 의사난수열 생성기의 효과적 합성에 관하여 다룬다. 먼저 간단한 90/150 전이규칙 블록의 특성 다항식의 성질을 분석하고, 이 규칙블록을 이용하여 삼항다항식 $x^2^n+x^{2^n-1}+1$($n{\geq}2$)에 대응하는 가역 90/150 CA와 $2^n$차 최대무게다항식에 대응하는 90/150 가역 CA(RCA)의 합성알고리즘을 제안한다.

하이브리드 적응적 부호화 알고리즘을 이용한 저전력 스캔 테스트 방식 (Low Power Scan Test Methodology Using Hybrid Adaptive Compression Algorithm)

  • 김윤홍;정준모
    • 한국콘텐츠학회논문지
    • /
    • 제5권4호
    • /
    • pp.188-196
    • /
    • 2005
  • 본 논문에서는 테스트 시간과 전력소모를 감축할 수 있는 새로운 테스트 데이터 압축 및 저전력 스캔 테스트 방법을 제안하였다. 제안된 방법은 수정된 스캔 셀 재배열과 하이브리드 적응적 부호화 방법을 사용하여 scan-in전력과 테스트 데이터 량을 줄였으며 하이브리드 테스트 데이터 압축방법은 Golomb Code와 런길이(run-length) 코드를 테스트 데이터내의 런(run) 길이에 따라서 적응적으로 적용하는 방법이다. 또한 scan-in 전력소모를 최소화하기 위해서 스캔 벡터내의 열 해밍거리를 이용하였다. ISCAS89 벤치마크 회로에 적용하여 실험한 결과, 모든 경우에 있어서 테스트 데이터 및 전력소모를 효율적으로 감소시켰으며 압축률은 17%-26%, 평균 전력소모는 8%-22%, 최고전력소모는 13%-60% 정도의 향상률을 보였다.

  • PDF

Fast Search with Data-Oriented Multi-Index Hashing for Multimedia Data

  • Ma, Yanping;Zou, Hailin;Xie, Hongtao;Su, Qingtang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권7호
    • /
    • pp.2599-2613
    • /
    • 2015
  • Multi-index hashing (MIH) is the state-of-the-art method for indexing binary codes, as it di-vides long codes into substrings and builds multiple hash tables. However, MIH is based on the dataset codes uniform distribution assumption, and will lose efficiency in dealing with non-uniformly distributed codes. Besides, there are lots of results sharing the same Hamming distance to a query, which makes the distance measure ambiguous. In this paper, we propose a data-oriented multi-index hashing method (DOMIH). We first compute the covariance ma-trix of bits and learn adaptive projection vector for each binary substring. Instead of using substrings as direct indices into hash tables, we project them with corresponding projection vectors to generate new indices. With adaptive projection, the indices in each hash table are near uniformly distributed. Then with covariance matrix, we propose a ranking method for the binary codes. By assigning different bit-level weights to different bits, the returned bina-ry codes are ranked at a finer-grained binary code level. Experiments conducted on reference large scale datasets show that compared to MIH the time performance of DOMIH can be improved by 36.9%-87.4%, and the search accuracy can be improved by 22.2%. To pinpoint the potential of DOMIH, we further use near-duplicate image retrieval as examples to show the applications and the good performance of our method.

Optimal sensor placement under uncertainties using a nondirective movement glowworm swarm optimization algorithm

  • Zhou, Guang-Dong;Yi, Ting-Hua;Zhang, Huan;Li, Hong-Nan
    • Smart Structures and Systems
    • /
    • 제16권2호
    • /
    • pp.243-262
    • /
    • 2015
  • Optimal sensor placement (OSP) is a critical issue in construction and implementation of a sophisticated structural health monitoring (SHM) system. The uncertainties in the identified structural parameters based on the measured data may dramatically reduce the reliability of the condition evaluation results. In this paper, the information entropy, which provides an uncertainty metric for the identified structural parameters, is adopted as the performance measure for a sensor configuration, and the OSP problem is formulated as the multi-objective optimization problem of extracting the Pareto optimal sensor configurations that simultaneously minimize the appropriately defined information entropy indices. The nondirective movement glowworm swarm optimization (NMGSO) algorithm (based on the basic glowworm swarm optimization (GSO) algorithm) is proposed for identifying the effective Pareto optimal sensor configurations. The one-dimensional binary coding system is introduced to code the glowworms instead of the real vector coding method. The Hamming distance is employed to describe the divergence of different glowworms. The luciferin level of the glowworm is defined as a function of the rank value (RV) and the crowding distance (CD), which are deduced by non-dominated sorting. In addition, nondirective movement is developed to relocate the glowworms. A numerical simulation of a long-span suspension bridge is performed to demonstrate the effectiveness of the NMGSO algorithm. The results indicate that the NMGSO algorithm is capable of capturing the Pareto optimal sensor configurations with high accuracy and efficiency.

A study on Iris Recognition using Wavelet Transformation and Nonlinear Function

  • Hur, Jung-Youn;Truong, Le Xuan
    • 한국지능시스템학회:학술대회논문집
    • /
    • 한국퍼지및지능시스템학회 2004년도 추계학술대회 학술발표 논문집 제14권 제2호
    • /
    • pp.553-559
    • /
    • 2004
  • In todays security industry, personal identification is also based on biometric. Biometric identification is performed basing on the measurement and comparison of physiological and behavioral characteristics, Biometric for recognition includes voice dynamics, signature dynamics, hand geometry, fingerprint, iris, etc. Iris can serve as a kind of living passport or living password. Iris recognition system is the one of the most reliable biometrics recognition system. This is applied to client/server system such as the electronic commerce and electronic banking from stand-alone system or networks, ATMs, etc. A new algorithm using nonlinear function in recognition process is proposed in this paper. An algorithm is proposed to determine the localized iris from the iris image received from iris input camera in client. For the first step, the algorithm determines the center of pupil. For the second step, the algorithm determines the outer boundary of the iris and the pupillary boundary. The localized iris area is transform into polar coordinates. After performing three times Wavelet transformation, normalization was done using sigmoid function. The converting binary process performs normalized value of pixel from 0 to 255 to be binary value, and then the converting binary process is compare pairs of two adjacent pixels. The binary code of the iris is transmitted to the by server. the network. In the server, the comparing process compares the binary value of presented iris to the reference value in the University database. Process of recognition or rejection is dependent on the value of Hamming Distance. After matching the binary value of presented iris with the database stored in the server, the result is transmitted to the client.

  • PDF