Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper, we present a method for hiding information in a conventional two-dimensional (2D) code that maintains backward compatibility with conventional 2D code readers. This is achieved by segmenting each cell into subcells that store confidential information.
Multiple Bit Upsets (MBUs) have become increasingly more frequent with continued increase in memory density. The existing adjacent error correcting codes suffer from high probability of miscorrection for non-adjacent double errors. Miscorrection of a nonadjacent double error as an adjacent double error can reduce the reliability of the memory incorporating such codes. A constraint driven methodology...
This paper continues the investigation of the combinatorial formulation of the joint source-channel coding problem. In particular, the connections are drawn to error-reducing codes, isometric embeddings and list-decodable codes. The optimal performance for the repetition construction is derived and is shown to be achievable by low complexity Markov decoders. The compound variation of the problem is...
Codes that correct limited-magnitude errors for multi-level cell nonvolatile memories, such as flash memories and phase-change memories, have received interest in recent years. This work proposes a new coding scheme that generalizes a known result [2] and works for arbitrary error distributions. In this scheme, every cell's discrete level ℓ is mapped to its binary representation (bm−1, …, b1,b0),...
The Grassmanian Gq(n; k) is the set of all k-dimensional subspaces of vector space Fnq. The coding of elements of Grassmanian was considered in many papers [1]–[7], and has the application in network coding [8]–[19]. The enumerative coding of the elements of Grassmanian Gq(n; k) is association every element of the Grassmanian with its number, i. e. the number from [0;…; |Gq(n; k)| − 1]. The algorithm...
In this paper, we present a novel algorithm for secure audio watermarking in image using BCH coding based on wavelet transform. In this context, the security is quantified from an information-theoretic point of view via the equivocation about the secret parameters. Firstly, the equivocation is estimated by means of tools from information theory for WOA scenario. Then, the audio watermark encoded by...
This paper proposes a watermarking method for audio and video signals with editing and/or switching capability on a short time basis, in which watermarked information with error correction coding (ECC) is split into audio and video. Collection of information decoded from both audio and video signals is used to recover the embedded information. According to a simple calculation for a case when the...
Aiming at poor channel reliability and topology dynamic variation in the wireless sensor network transmission. Based on the existing error correction algorithm, a new improved error control mechanism is proposed in this paper based on network coding, and the simulation experiment also shows its feasibility.
On an acyclic network, generic linear network codes are known to have the strongest optimality in terms of linear independence. This paper characterizes other properties of generic codes on a given acyclic network. We first show that every generic code is variable-rate generic with the additional property that the coding coefficients in relation to data-generating edges need not be changed. We next...
Physical Unclonable Functions (PUFs) are an alternative to conventional secure key storage in embedded devices. PUFs exploit unique sub-micron manufacturing variations in each device to generate characteristic responses. Each response is subject to noise, so a so called fuzzy embedder is required to use a PUF for reliable key reproduction. Index-Based Syndrome coding (IBS) is an information theoretically...
With the rapid advances in the area of memory product, it has become more and more important to maintain its reliability while increasing the density and speed performance. Particularly, flash memory products have inherent difficulties in lengthening the limited lifetime due to the degradation of memory cell reliability caused by repeated read and/or write operations. To increase the benefits of high...
Cryptography may mitigate the privacy problem in biometric recognition systems. However, cryptography technologies lack error-tolerance and biometric samples cannot be reproduced exactly, rising the robustness problem. The biometric template protection system needs a good feature extraction algorithm to be a good classifier. But, an even effective feature extractor can give a very low-quality biometric...
There is a strong relation between sparse signal recovery and error control coding. It is known that burst errors are block sparse in nature. So, here we attempt to solve burst error correction problem using block sparse signal recovery methods. We construct partial Fourier based encoding and decoding matrices using results on difference sets. These constructions offer guaranteed and efficient error...
Matroidal error correcting networks were recently introduced in [1] as a generalisation of the notion of matroidal networks introduced by Dougherty et al. to network-error correction. An acyclic network (with arbitrary sink demands) was shown to possess a scalar linear error correcting network code if and only if it is a matroidal error correcting network associated with a representable matroid. Therefore,...
NAND multi-level cell (MLC) flash memories are widely used due to low cost and high capacity. However, the increased number of levels in MLC results in larger interference and errors. The errors in MLC flash memories tend to be directional and limited-magnitude. Many related works focus on asymmetric errors, but bidirectional errors also occur because of the bidirectional interference and the adjustment...
The various codes are used for the error detection and correction in the field of communication. Some are for the single bit error and some are for the multiple bits error. Reed-Muller algorithm realizes the ability of multiple bits error detection and correction. With the superior error correction capability, these codes have initiated wide scale interests in satellite communication, wireless communication,...
Packet-Level Forward Error Correction (PL-FEC) techniques are widely applied to multimedia communications. To deal with the burst loss problem in packet transmissions over networks, PL-FEC 1-D interleaved parity codes are used in Real-time Transport Protocol (RTP), which uses User Datagram Protocol (UDP) to transport packets. However, the codes' error correction performance, encoding rate, decoding...
Video streaming over wireless networks is subjected to instability of channel quality, which results in packet loss and reduced video quality at the user side. To mitigate the effect of packet loss, we proposed a framework using scalable video and unequal error protection for multicast and unicast streaming. A fast algorithm in the framework determines the optimal error protection for each NAL unit...
Bit-patterned media is a novel technology for magnetic data storage that is poised to increase recording density beyond 1 Tb/sq. in. However, a significant concern in BPMR is the stringent requirements for synchronization between write clock and island position, errors in which may manifest as insertions and deletions. In this paper, we introduce a method for compensating for synchronization errors...
To improve the robustness of video transmission over heterogeneous wireless network various error resilient tools are deployed. The impact of bit errors on the perceived video quality depends on several factors, such as error resilience of the data format, error concealment mechanism used and characteristics of the bit error pattern. In this paper the impact of bit error is analyzed and various error...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.