1,622 research outputs found
Blind Recognition of Parameters of Reed Solomon Code from Intercepted Erroneous Codewords
Error correcting codes are designed for reliable transmission of digital information over a noisy channel. Several papers have been published on blind identification of binary FEC codes but papers reported on the identification of non-binary error correcting codes are less. Due to its strong error correction capability, RS (Reed-Solomon) code is being used widely. So technique for blind recognition of RS code is required to analyse intercepted signal as well as for intelligent communication. This paper presents a technique for extraction of parameters of Reed-Solomon code from intercepted demodulated bitstream. The proposed algorithm is very simple and hence it is very practical for hardware implementation. Our approach has been verified using MATLAB simulation
Virheenkorjauskoodien tunnistus signaalitiedustelussa
Error correction coding is an integral part of a digital communication system. In signals intelligence the aim is to recover the transmitted messages and part of this task is identifying the used error correction coding method.
The purpose of this study is to present a overview of different identification methods of forward error correcting codes and test the performance of these codes in a controlled setting.
The codes that are discussed in this work are block codes and convolutional codes with a main focus on low density parity check (LDPC) codes and turbo codes. Test cases for LDPC code identification are presented and remarks about the performance and limits are made.Virheenkorjauskoodit ovat oleellinen osa digitaalista tietoliikennejÀrjestelmÀÀ. Signaalitiedustelussa tavoite on selvittÀÀ lÀhetetty viesti ja osa tÀtÀ tehtÀvÀÀ on kÀytetyn virheenkorjauskoodin selvittÀminen.
TÀmÀn työn tarkoituksena on esittÀÀ yleiskatsaus erilaisiin virheenkorjaukoodien tunnistusmenetelmiin ja testata nÀiden menetelmien suorituskykyÀ kontroloiduissa olosuhteissa.
Virheenkorjauskoodit, joita kÀsitellÀÀn tÀssÀ työssÀ ovat lohkokoodit ja konvoluutiokoodit ja pÀÀpaino on low density parity check (LDPC) -koodeissa ja turbokoodeissa. LDPC-koodin tunnistamismenetelmien testitulokset esitetÀÀn ja menetelmien suorituskykyÀ ja rajoitteita tarkastellaan
Classification Based on Euclidean Distance Distribution for Blind Identification of Error Correcting Codes in Noncooperative Contexts
International audienc
Recommended from our members
MOCZ for Blind Short-Packet Communication: Practical Aspects
We investigate practical aspects of a recently introduced blind (noncoherent) communication scheme, called modulation on conjugate-reciprocal zeros (MOCZ). MOCZ is suitable for a reliable transmission of sporadic and short-packets at ultra-low latency and high spectral efficiency via unknown multipath channels, which are assumed to be static over the receive duration of one packet. The information is modulated on the zeros of the transmitted discrete-time baseband signalâs zâ transform. Because of ubiquitous impairments between the transmitter and receiver clocks, a carrier frequency offset occurs after down-conversion to the baseband. This results in a common rotation of the zeros. To identify fractional rotations of the base angle in the zero-pattern, we propose an oversampled direct zero-testing decoder to identify the most likely one. Integer rotations correspond to cyclic shifts of the binary message, which we determine by cyclically permutable codes (CPC). Additionally, the embedding of CPCs into cyclic codes, enables additive error-correction which reduces the bit-error-rate tremendously. Furthermore, we exploit the trident structure in the signalâs autocorrelation for an energy based detector to estimate timing offsets and the effective channel delay spread. We finally demonstrate how this joint data and channel estimation can be largely improved by receive antenna diversity at low SNR
Spread spectrum-based video watermarking algorithms for copyright protection
Merged with duplicate record 10026.1/2263 on 14.03.2017 by CS (TIS)Digital technologies know an unprecedented expansion in the last years. The consumer can
now benefit from hardware and software which was considered state-of-the-art several years
ago. The advantages offered by the digital technologies are major but the same digital
technology opens the door for unlimited piracy. Copying an analogue VCR tape was certainly
possible and relatively easy, in spite of various forms of protection, but due to the analogue
environment, the subsequent copies had an inherent loss in quality. This was a natural way of
limiting the multiple copying of a video material. With digital technology, this barrier
disappears, being possible to make as many copies as desired, without any loss in quality
whatsoever. Digital watermarking is one of the best available tools for fighting this threat.
The aim of the present work was to develop a digital watermarking system compliant with the
recommendations drawn by the EBU, for video broadcast monitoring. Since the watermark
can be inserted in either spatial domain or transform domain, this aspect was investigated and
led to the conclusion that wavelet transform is one of the best solutions available. Since
watermarking is not an easy task, especially considering the robustness under various attacks
several techniques were employed in order to increase the capacity/robustness of the system:
spread-spectrum and modulation techniques to cast the watermark, powerful error correction
to protect the mark, human visual models to insert a robust mark and to ensure its invisibility.
The combination of these methods led to a major improvement, but yet the system wasn't
robust to several important geometrical attacks. In order to achieve this last milestone, the
system uses two distinct watermarks: a spatial domain reference watermark and the main
watermark embedded in the wavelet domain. By using this reference watermark and techniques
specific to image registration, the system is able to determine the parameters of the attack and
revert it. Once the attack was reverted, the main watermark is recovered. The final result is a
high capacity, blind DWr-based video watermarking system, robust to a wide range of attacks.BBC Research & Developmen
- âŠ