4,436 research outputs found
The Perfect Binary One-Error-Correcting Codes of Length 15: Part II--Properties
A complete classification of the perfect binary one-error-correcting codes of
length 15 as well as their extensions of length 16 was recently carried out in
[P. R. J. \"Osterg{\aa}rd and O. Pottonen, "The perfect binary
one-error-correcting codes of length 15: Part I--Classification," IEEE Trans.
Inform. Theory vol. 55, pp. 4657--4660, 2009]. In the current accompanying
work, the classified codes are studied in great detail, and their main
properties are tabulated. The results include the fact that 33 of the 80
Steiner triple systems of order 15 occur in such codes. Further understanding
is gained on full-rank codes via switching, as it turns out that all but two
full-rank codes can be obtained through a series of such transformations from
the Hamming code. Other topics studied include (non)systematic codes, embedded
one-error-correcting codes, and defining sets of codes. A classification of
certain mixed perfect codes is also obtained.Comment: v2: fixed two errors (extension of nonsystematic codes, table of
coordinates fixed by symmetries of codes), added and extended many other
result
Implementing Brouwer's database of strongly regular graphs
Andries Brouwer maintains a public database of existence results for strongly
regular graphs on vertices. We implemented most of the infinite
families of graphs listed there in the open-source software Sagemath, as well
as provided constructions of the "sporadic" cases, to obtain a graph for each
set of parameters with known examples. Besides providing a convenient way to
verify these existence results from the actual graphs, it also extends the
database to higher values of .Comment: 18 pages, LaTe
Wet paper codes and the dual distance in steganography
In 1998 Crandall introduced a method based on coding theory to secretly embed
a message in a digital support such as an image. Later Fridrich et al. improved
this method to minimize the distortion introduced by the embedding; a process
called wet paper. However, as previously emphasized in the literature, this
method can fail during the embedding step. Here we find sufficient and
necessary conditions to guarantee a successful embedding by studying the dual
distance of a linear code. Since these results are essentially of combinatorial
nature, they can be generalized to systematic codes, a large family containing
all linear codes. We also compute the exact number of solutions and point out
the relationship between wet paper codes and orthogonal arrays
On unbalanced Boolean functions with best correlation immunity
It is known that the order of correlation immunity of a nonconstant
unbalanced Boolean function in variables cannot exceed ; moreover,
it is if and only if the function corresponds to an equitable
-partition of the -cube with an eigenvalue of the quotient matrix.
The known series of such functions have proportion , , or of
the number of ones and zeros. We prove that if a nonconstant unbalanced Boolean
function attains the correlation-immunity bound and has ratio of the
number of ones and zeros, then is divisible by . In particular, this
proves the nonexistence of equitable partitions for an infinite series of
putative quotient matrices. We also establish that there are exactly
equivalence classes of the equitable partitions of the -cube with quotient
matrix and classes, with . These
parameters correspond to the Boolean functions in variables with
correlation immunity and proportion and , respectively (the case
remains unsolved). This also implies the characterization of the
orthogonal arrays OA and OA.Comment: v3: final; title changed; revised; OA(512,11,2,6) discusse
- …