Collusion Secure Fingerprinting. CMLab

Size: px
Start display at page:

Download "Collusion Secure Fingerprinting. CMLab"

Transcription

1 Collusion Secure Fingerprinting CMLab

2 2 Outline Introduction Collusion attack Collusion-resilient fingerprinting Combinatorial designed code Error correction code Orthogonal signals Research issues

3 3 Introduction Two types of fingerprinting Type I: Embed fingerprints to contents Embed Type II: Extract fingerprints from contents Extract Extract

4 4 Introduction - Type I Fingerprinting What The process of assigning a unique key for each user' s content Why To identify the person who acquired a particular copy To prevent users from destroying the identification information To trace the traitors How Watermarking the contents with the unique keys

5 5 Introduction - Type II Fingerprinting What Extract unique and robust image descriptors from contents Why For the detection of replicas For content-based image retrieval How Select the features that best describe a given content

6 6 Introduction Talk focus Type I fingerprinting Some related terms Collusion attack Traitor tracing

7 Introduction- The Future of Multimedia Security What will be the major security problem at the dawn of the 22nd century? Ans: Trust (E. J. Delp, Multimedia security: the 22nd century approach, 2005) Who and what I do trust? Is the sensor valid? Is the data valid? Has the data been modified?

8 Introduction-Fingerprinting Successful application Hollywood film industry 2004 Oscars Successfully captured a few pirates (in the voting group) leaking the movie to the market The Last Samurai Carmine Caridi Russell Internet Challenging problem Collusion attack

9 9 Introduction Collusion attack A coalition of traitors collude to destroy the identification information and leak the content (keys) Collusion attack Extraction Pirate code

10 10 Introduction Traitor tracing Find at least one of the colluders {,,,, } Can not frame innocent users {,..} Related researches: From Broadcast Encryption to Fingerprinting

11 11 Collusion attack Broadcast encryption e.g. u 1 : {k 1,k 3,k 7 } u 2 :{k 3,k 5,k 7 } pirate decoder box: {k 1,k 5,k 7 } Digital fingerprinting Linear & non-linear collusion attacks Copy-and-paste attack

12 12 Collusion attack P d of the T N statistics under different attacks Z. J. Wang, M. Wu, H. Zhao, W. Trappe, & K. J. R. Liu, 2003 #of users: 100 code length : P fp : 1% y s d x+n T N y T 2 s / d s 2

13 13 Collusion attack Analyze the statistical features to improve the detection performance H. V. Zhao, M. Wu, Z. J. Wang, & K. J. R. Liu, 2004 e.g. Observe the histograms of sample means of extracted fingerprints under the average, minimum and randomized negative attacks, respectively 2 W 1 9, M 10000, K 45

14 14 Collusion-resilient fingerprinting Boneh-Shaw scheme D. Boneh & J. Shaw, Collusion-secure fingerprinting for digital data, CRYPTO 95 Watermarking the digital data (e.g. software, documents, music, and videos) with fingerprints Based on the Marking Assumption Too long (too many keys) B. Chor et al. claimed: It is much less efficient than our schemes

15 15 Collusion-resilient fingerprinting Marking Assumption Any coalition of c users is only capable of creating an object whose fingerprint lies in the feasible set of the coalition Feasible set F( C; ) F( C; ) { w( {?}} s.t. w, u C} ( is the code, C is the collusion coalition, R is the set of undetectable positions, and w is the pirate code) e.g. A: B: F= l R w ( u) R

16 16 Collusion-resilient fingerprinting <Definition>Totally c-secure code A code is totally c -secure if thereexists a tracingalgorithm A satisfying thefollowing condition:if a coalition C users generatesa word x then A( x) C. of at most c C U x c x A UC

17 17 Collusion-resilient fingerprinting Lemma Boneh & Shaw: There are no totally c-secure codes Clearly, it is enough to show that there are no totally 2 - secure codes. let be an arbitrary ( l,n) - code let w define themajority word M (1) (1) (2) (1) (3) wi, if wi wi or wi wi (2) (2) (3) Mi wi, if wi wi?, otherwise. One can readily verify that themajority word M { u,u 1 (1) 2,w }{, u (2) 1 If is a totally c - secure code then C for all colatiitons C,w 3 (3),u }{, u }. However, theintersection of thecoalitionsis empty. by thelast lemma, thecode be threedistinct codewords assigned to users u,u,u 2,u 3 1,... C r of MAJ ( w at most (1),w (2) 1 c... C users each.,w (3) ) by Γ is not toally2 - secure. r F( C 1, respectively is feasible for all threecoalitions 1 2 )... F( C 3 r )

18 18 Collusion-resilient fingerprinting n-secure code with -error 0 (n,d): l=d(n-1)=o(n 3 log(n/ )) too long! e.g. 0 (4,3) A: Random B: permutation C: D: Given 1)if weight ( x 2) if weight( x 3)for all s l x {01},, find a subset of B 1 B ) n-1 ) d 0 then output then output 2 ton-1do :let k thecoalition that produced "user 1is guilty" "user n is guilty" weight ( x B s ). x. if weight ( x B s-1 ) k 2 k 2 log 2n then output "user s is guilty"

19 19 Collusion-resilient fingerprinting c-secure code with -error of log length (L,N,n,d) Compose 0 (n,d) with an (L,N)-code C x=((1) (2) (L)) (i) 0 0 =alphabet size of C l=o(c 4 log(n/ )log(1/ )) l Given x {01},, find a member of thecoalition that produced 1) Apply algorithm1 toeach of for each component i outputsof that y 2) Find the word of i algorithm1.set position (tiesare broken arbitrarity). 3) Let u be theuser whose codeword is derived from wc output "user u is guilty" thel componentsof x. 1,...,Larbitrarily chooseoneof y i tobe the thischosen output.note is a number between 1and n. Next,form the word y wc which matches y in themost number x. y 1...y L.

20 Collusion-resilient fingerprinting Three main trends of collusion-resilient fingerprint codes Combinatorial designed code Error correction code Orthogonal signals

21 21 Collusion-resilient fingerprinting Combinatorial designs D. R. Stinson & R. Wei, Combinatorial properties and constructions of traceability schemes and frameproof codes, 1997 Give combinational descriptions of the following two objects in terms of set systems Traceability schemes for broadcast encryption Frameproof codes for digital fingerprinting <Definition> t-(v, k,λ) design A t-( v,k,λ)design is a set system( X, B), where B k for every BB, and every t - subset of exactly blocks in B. X X v, occurs in

22 22 Collusion-resilient fingerprinting t-design (t-(v,k,)) 2-design : BIBD (Balanced incomplete block design) (9,3,1)-BIBD {0,1,6},{0,2,5},{0,3,4},{1,2,4},{3,5,6},{1,5,7}, {5,4,8},{4,6,7},{6,2,8},{2,3,7},{3,1,8},{0,7,8} e.g. J. Dittmann, P. Schmitt, E. Saar and J. Ueberberg, Combining Digital Watermarks and Collusion Secure Fingerprints for Digital Images, detecting code

23 23 Collusion-resilient fingerprinting <Definition> c-traceability Scheme (c-ts(k,n,l)) Suppose any exposed user U is produced by C and denotedby c-ts( k,n,l). C is a member of thecoalition C whenever a piratedecoder c. Then thescheme is called a c - traceability scheme and it is C U c F F <Definition> c-frame Proof Codes (c-fpc(l,n)) A ( l,n) - code Γ is called a c - frameproof code if, for every C Γ such that C c, we have F( C) Γ C. Wesay that Γ is a c-fpc( l,n). C x c

24 Collusion-resilient fingerprinting 24 <Theorem> a c-fpc(v,b) a set system( X,Β) such that B theredoes not exist a block d i1 b and for any subset of B i B d i1 B i d c B B\{B blocks 1,B 2 B,B 1,...,B 2 d X,...,B d v, B, } such that

25 Collusion-resilient fingerprinting 25 <Theorem> a c-ts( k, b,v) a set system( X,Β) such that B b and B k-subset B B\{B F,B k for every choice of 1 2 d j1,...,b for every BB, with theproperty hat t d d B j c blocks, theredoes } such that B,B 1 F B j 2,...,B d not exist a block F B X for 1 v, B and for any j d

26 Collusion-resilient fingerprinting <Theorem>If there exists a c-ts(k,b,v), then there exists a c-fpc(v,b). <proof> Let ( X, Β) be We provethat ( Suppose and a Then block theset system corresponding toa c-ts( k,b,v). no; then there exist B B B Β\{B j X, Β) is a c-fpc( v,b). 1 B B, B 2 d,..., B for 1 26 d j c blocks, d. B, B 1 } such that B 2,..., B d i1 d B i B,.

27 27 Collusion-resilient fingerprinting Theorem t where c where c ( k <Theorem> v ( k Theorem t ( v, k,1)design 1) /( t 1) /( t 1) ( v, k,1)design 1) c-fpc( v,( c-ts ( k,( 1,3mod6 2 FPC( v, v( v 1) / 6) ) /( v 1,4 mod12 3 FPC( v, v( v 1) /12) v 1,5 mod20 4 FPC( v, v( v 1) / 20) v t v t ) /( k t k t )), ), v), <Theorem> primepower q 2 2 q TS ( q 1, q q 1, q q 1) It needs tricks to construct a suitable code

28 Collusion-resilient fingerprinting Error correcting code (ECC) Field A field F is a set that has two operations defined on it: addition and multiplication, such that the following axioms are satisfied. The set is an abelian group under addition The field is closed under multiplication, and the set of nonzero elements is an abelian group under multiplication The distribution law (a+b)c=ac+bc holds for all a, b, c in the field (An abelian group, also called a commutative group, is a group satisfying the requirement that the product of elements does not depend on their order)

29 Collusion-resilient fingerprinting Galois field A field with q elements Denoted by GF(q) The smallest field Must have zero and one GF(2)

30 Collusion-resilient fingerprinting A linear code is a subspace of GF(q) n The theory of vector spaces can be used to study these codes Any set of basis vectors for the subspace can be used as rows to form a k n matrix G called the generator matrix of the code The row space of G is the linear code C, any codeword is a linear combination of the rows of G The set of q k codewords is called an (n,k) linear code The dimension of the whole space GF(q) n is n There are q k codewords

31 Collusion-resilient fingerprinting Encoding Any one-to-one paring of k-tuples and codewords can be used as an encoding procedure c=ig c: codeword i: information word G: generator matrix

32 Collusion-resilient fingerprinting Example G i c ig

33 Collusion-resilient fingerprinting parity-check matrix H A generator matrix of C s dual code H T C=0 e.g. H specifies that for each codeword, digits 1 and 2 should sum to zero and digits 3 and 4 should sum to zero

34 Collusion-resilient fingerprinting G I P k T H [ P I ] nk G H Hx = 0 xc the syndrome of the received z = x + e is defined to be: Hz = H(x + e) = Hx + He = 0 + He = He

35 Collusion-resilient fingerprinting Syndrome decoding Syndrome Coset Leader 0: e 1 : e 6 : e e e e e e e 1 +e 4, e 2 +e 5, e 3 +e 6

36 36 Collusion-resilient fingerprinting Error correcting code (ECC) Has systematic encoding and decoding algorithms Distance-based decoding criterion Resilient to attacks for multimedia data Robust than the t-design codes

37 37 Collusion-resilient fingerprinting <Definition> c-ta codes (c-traceability codes) A code C if w desc( C for all z C C <Theorem> is a c - TA code if i ) then there exists i C i x for all coalitionsc c x C w i such that i of size at most c, I( x,w) z I( z,w) Suppose that C is an ( l,n) - code having minimum Hamming distance d l(1-1/c 2 ).Then C is c - TA code. Larger minimum distances imply higher tracing ability Unfortunately, it s not easy to find practical ECCs with so large minimum distances!!

38 38 Collusion-resilient fingerprinting e.g. 2-TA: (15,3,11) 4 -BCH (120,2,96) 4 -code It s not easy to find practical ECCs with so large minimum distances Reed-Solomon code (l,k,d)-rs over GF(q m ) : d=l-k+1=q m -1-k+1=q m -k A code for sequential traitor tracing R. Safavi-Naini & Y. Wang, 2003 ( Tr( x s 1 ), Tr( x s 2 ),..., Tr( x s q k )) k * GF( q ), { 1, 2,..., q} k / 21 k 2 t, s q,and r such that ( Tr( x) r t, q r x x q x q (mod s) x q k )

39 39 Collusion-resilient fingerprinting Assign one of the q versions for each movie segment (q-ary code) H. Jin, J. Lotspiech, & S. Nusser (IBM Almaden research), 2004

40 40 Collusion-resilient fingerprinting Orthogonal signals W. Trappe, M. Wu, Z. J. Wang, and K. J. R. Liu, Anti-collusion fingerprinting for multimedia, 2003 Orthogonal fingerprint Orthogonal modulation w j =u j # of fingerprints=# of ortho. bases Modulate the code based on BIBD by noiselike signals w j B i1 b ij u i # of fingerprints>># of orthogonal bases

41 41 Collusion-resilient fingerprinting <Theorem> Let (X,A) be a (v,k,1)-bibd and M the corresponding incidence matrix. If the codevectors are assigned as the bit complement of the columns of M, then the resulting scheme is a (k-1)-resilient AND-ACC. (7,3,1)-BIBD {{0,1,3},{0,2,5},{0,4,6},{1,2,4},{1,5,6},{2,3,6},{3,4,5}}

42 42 Collusion-resilient fingerprinting The bit-complement of the incidence matrix for a (7,3,1)- BIBD Modulate the codewords by 7 orthogonal bases

43 43 Collusion-resilient fingerprinting If user 1 and user 2 are colluders Average attack: the pirate code is (w 1 +w 2 )/2 The coefficient vector is (-1,0,0,0,1,0,1) 1 occurs in the fifth and seventh location uniquely identifies users 1 and 2 as colluders Experiments (16,4,1)-BIBD 20 users c=3

44 44 Collusion-resilient fingerprinting Tree-structured detection T N y T s U i 2 / d su i 2

45 45 Collusion-resilient fingerprinting Orthogonal signals Z. J. Wang, M. Wu, H. Zhao, W. Trappe, and K. J. Liu, 2003~ Gaussian signals (suitable for multimedia content) Performance is limited if the number of Gaussian signals is larger

46 46 Collusion-resilient fingerprinting Joint fingerprint embedding and decryption based on coefficient set scrambling D. Kundur & K. Karthik, 2004

47 47 Collusion-resilient fingerprinting PSNR=22dB Original, encrypted, and fingerprinted images PSNR=34dB

48 48 Collusion-resilient fingerprinting Make the colluded copy useless U. Celik, G. Sharma, & A. M. Tekalp, Collusion-resilient fingerprinting by random pre-warping, 2004 The host signal is warped randomly prior to watermarking

49 Collusion-resilient fingerprinting 49

50 50 Collusion-resilient fingerprinting Fingerprint multicast in secure video streaming H. V. Zhao & K. J. R. Liu, 2006 Tree-structure-based fingerprint scheme

51 51 Collusion-resilient fingerprinting MPEG-2-based joint fingerprint design and distribution scheme for video on demand applications The fingerprint embedding and distribution process at the server s side

52 Collusion-resilient fingerprinting 52 Hierarchical traceability code Y. T. Lin & J. L. Wu, w 0 w 1 w b- w 0 w... 1 w b Fingerprint-segment 1 (fs 1 ) Fingerprint-segment 2 (fs 2 )... Fingerprint-segment h (fs h ) b 1 u x b The fingerprint of u x is w 0 w i1 w i2 w i3 w i4 w 1

53 Collusion-resilient fingerprinting 53 Discriminate different groups Pseudorandomly modulate each group by a different sequence w i w i w... i group group group 2 j s j j, b level 1 level 2... level j level h ( ) w 1 w 2 b j Group b j w b w b w 1 w 2. Group 4. w 1 w 2 Group 3 s j,4 ( ) w b w 1 w 2 Group 1 w 1 w 2 Group 2 w b s j,1 ( ) s j,2 ( ) w b s j,3 ( )

54 54 Collusion-resilient fingerprinting Traitor-within-traitor behavior forensics H. V. Zhao & K. J. R. Liu, 2006 Investigate the precollusion processing strategies for selfish colluders to minimize their risk

55 55 Collusion-resilient fingerprinting Traitor-within-traitor behavior forensics

56 56 Collusion-resilient fingerprinting Traitor-within-traitor behavior forensics

57 57 Collusion-resilient fingerprinting Concatenated collusion-secure code Y. T. Lin & J. L. Wu, 2007 Outer code: resisting collusion attacks Inner code: satisfying the Strict Marking Assumption codeword 1 codeword 2 codeword i The outer code... codeword 1 codeword 2 codeword q The inner code... codeword n o... The ith outer codeword... A q-ary symbol... Each q-ary symbol is encoded by the inner code One example of the nested codewords

58 58 Collusion-resilient fingerprinting Outer code: encoding group numbers Inner code: encoding member numbers and symbols Group # Codeword g The octal outer code q Member # m The binary inner code e.g. g=1 m=2 outer code

59 59 Collusion-resilient fingerprinting Video fingerprinting for large user group S. He & M. Wu, 2007 A small (the correlation between fingerprint sequences), i.e. a large minimum distance, leads to higher detection accuracy

60 60 Collusion-resilient fingerprinting Two schemes ECCFP with building-block Video Group of frames Directly apply ECCFP q-ary symbol Embedding Permuted subsequences embedding (PSE) Binary symbol

61 61 Collusion-resilient fingerprinting Collusion resistance under interleaving collusion (copy-and-paste attack) Outer code: RS (62,2,61) 64 for 64 2 users Inner code: RS (6,2,5) 8 for 64 symbols

62 Collusion-resilient fingerprinting Collusion-resistant video fingerprinting based on temporal oscillation Y. T. Lin, C. H. Hwang, & J. L. Wu, 2008 Protect the traceable code Make the colluded version of the video useless

63 Collusion-resilient fingerprinting Original video Shot change detection Curve fingerprints producing Motion analysis Spatial warping Temporal fingerprint embedding Traceability code embedding Traceability fingerprint Fingerprinted video

64 Collusion-resilient fingerprinting Oscillation User1: User2: User3: User4: Number of colluders f ( i) f ( i 1) Average attack (PSNR) i 2 Oscillation= f() i, where f(i) is the i embedding curve function Copy-and-paste attack (Oscillation) db db db

65 Collusion-resilient fingerprinting Fingerprinting while demodulating S. Lian & Z. Wang, 2008 The multimedia content is modulated by pseudorandom sequences at the server side The encrypted content is then demodulated under the control of the fingerprint code at the customer side

66 Collusion-resilient fingerprinting Fingerprinting while demodulating

67 67 Research issues Collusion-resilient fingerprint scheme Robust against collusion attacks Fingerprint - Hard to be removed by collusion attacks Content - Useless after being attacked Traceability code Short l Large n Large c Tracing algorithm & detection strategy High hit ratio Low false alarm rate Fast Low computational overhead Applications Broadcast environment Streaming data

68 68 Collusion-resilient fingerprinting Dan Boneh Associate Professor, Computer Science and Electrical Engineering, Stanford University.

69 69 Collusion attack K. J. Ray Liu Min Wu Z. J. Wang H. V. Zhou

PERFORMANCE STUDY OF ECC-BASED COLLUSION-RESISTANT MULTIMEDIA FINGERPRINTING

PERFORMANCE STUDY OF ECC-BASED COLLUSION-RESISTANT MULTIMEDIA FINGERPRINTING PERFORMANCE STUDY OF ECC-BASED COLLUSION-RESISTANT MULTIMEDIA FINGERPRINTING Shan He and Min Wu ECE Department, University of Maryland, College Park ABSTRACT * Digital fingerprinting is a tool to protect

More information

Practical fingerprinting system for images

Practical fingerprinting system for images 46 5, 057004 May 2007 Practical fingerprinting system for images Yu-Tzu Lin National Taiwan University Communications and Multimedia Laboratory Department of Computer Science and Information Engineering

More information

Zero-Based Code Modulation Technique for Digital Video Fingerprinting

Zero-Based Code Modulation Technique for Digital Video Fingerprinting Zero-Based Code Modulation Technique for Digital Video Fingerprinting In Koo Kang 1, Hae-Yeoun Lee 1, Won-Young Yoo 2, and Heung-Kyu Lee 1 1 Department of EECS, Korea Advanced Institute of Science and

More information

Anti-Collusion Fingerprinting for Multimedia

Anti-Collusion Fingerprinting for Multimedia Anti-Collusion Fingerprinting for Multimedia Wade Trappe, Min Wu, Zhen Wang, and K. J. Ray Liu Department of Electrical and Computer Engineering University of Maryland, College Park, MD 20742 E-mail: wxt,

More information

Digital Television Lecture 5

Digital Television Lecture 5 Digital Television Lecture 5 Forward Error Correction (FEC) Åbo Akademi University Domkyrkotorget 5 Åbo 8.4. Error Correction in Transmissions Need for error correction in transmissions Loss of data during

More information

ECE 6640 Digital Communications

ECE 6640 Digital Communications ECE 6640 Digital Communications Dr. Bradley J. Bazuin Assistant Professor Department of Electrical and Computer Engineering College of Engineering and Applied Sciences Chapter 8 8. Channel Coding: Part

More information

Encryption Data in Wireless Sensor Network

Encryption Data in Wireless Sensor Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

ECE 6640 Digital Communications

ECE 6640 Digital Communications ECE 6640 Digital Communications Dr. Bradley J. Bazuin Assistant Professor Department of Electrical and Computer Engineering College of Engineering and Applied Sciences Chapter 8 8. Channel Coding: Part

More information

MULTIMEDIA content can be easily distributed over

MULTIMEDIA content can be easily distributed over 302 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 3, SEPTEMBER 2009 Robust MC-CDMA-Based Fingerprinting Against Time-Varying Collusion Attacks Byung-Ho Cha, Student Member, IEEE,

More information

Outline. Communications Engineering 1

Outline. Communications Engineering 1 Outline Introduction Signal, random variable, random process and spectra Analog modulation Analog to digital conversion Digital transmission through baseband channels Signal space representation Optimal

More information

Nonlinear Multi-Error Correction Codes for Reliable MLC NAND Flash Memories Zhen Wang, Mark Karpovsky, Fellow, IEEE, and Ajay Joshi, Member, IEEE

Nonlinear Multi-Error Correction Codes for Reliable MLC NAND Flash Memories Zhen Wang, Mark Karpovsky, Fellow, IEEE, and Ajay Joshi, Member, IEEE IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 20, NO. 7, JULY 2012 1221 Nonlinear Multi-Error Correction Codes for Reliable MLC NAND Flash Memories Zhen Wang, Mark Karpovsky, Fellow,

More information

Distributed Source Coding: A New Paradigm for Wireless Video?

Distributed Source Coding: A New Paradigm for Wireless Video? Distributed Source Coding: A New Paradigm for Wireless Video? Christine Guillemot, IRISA/INRIA, Campus universitaire de Beaulieu, 35042 Rennes Cédex, FRANCE Christine.Guillemot@irisa.fr The distributed

More information

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors Single Error Correcting Codes (SECC) Basic idea: Use multiple parity bits, each covering a subset of the data bits. No two message bits belong to exactly the same subsets, so a single error will generate

More information

Commutative reversible data hiding and encryption

Commutative reversible data hiding and encryption SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 3; 6:396 43 Published online March 3 in Wiley Online Library (wileyonlinelibrary.com)..74 RESEARCH ARTICLE Xinpeng Zhang* School of Communication

More information

THE use of balanced codes is crucial for some information

THE use of balanced codes is crucial for some information A Construction for Balancing Non-Binary Sequences Based on Gray Code Prefixes Elie N. Mambou and Theo G. Swart, Senior Member, IEEE arxiv:70.008v [cs.it] Jun 07 Abstract We introduce a new construction

More information

Digital Communications I: Modulation and Coding Course. Term Catharina Logothetis Lecture 12

Digital Communications I: Modulation and Coding Course. Term Catharina Logothetis Lecture 12 Digital Communications I: Modulation and Coding Course Term 3-8 Catharina Logothetis Lecture Last time, we talked about: How decoding is performed for Convolutional codes? What is a Maximum likelihood

More information

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1 Wireless Networks: Physical Layer: Modulation, FEC Guevara Noubir Noubir@ccsneuedu S, COM355 Wireless Networks Lecture 3, Lecture focus Modulation techniques Bit Error Rate Reducing the BER Forward Error

More information

Chapter 4 Cyclotomic Cosets, the Mattson Solomon Polynomial, Idempotents and Cyclic Codes

Chapter 4 Cyclotomic Cosets, the Mattson Solomon Polynomial, Idempotents and Cyclic Codes Chapter 4 Cyclotomic Cosets, the Mattson Solomon Polynomial, Idempotents and Cyclic Codes 4.1 Introduction Much of the pioneering research on cyclic codes was carried out by Prange [5]inthe 1950s and considerably

More information

Revision of Lecture Eleven

Revision of Lecture Eleven Revision of Lecture Eleven Previous lecture we have concentrated on carrier recovery for QAM, and modified early-late clock recovery for multilevel signalling as well as star 16QAM scheme Thus we have

More information

Digital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use?

Digital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use? Digital Transmission using SECC 6.02 Spring 2010 Lecture #7 How many parity bits? Dealing with burst errors Reed-Solomon codes message Compute Checksum # message chk Partition Apply SECC Transmit errors

More information

MATHEMATICS IN COMMUNICATIONS: INTRODUCTION TO CODING. A Public Lecture to the Uganda Mathematics Society

MATHEMATICS IN COMMUNICATIONS: INTRODUCTION TO CODING. A Public Lecture to the Uganda Mathematics Society Abstract MATHEMATICS IN COMMUNICATIONS: INTRODUCTION TO CODING A Public Lecture to the Uganda Mathematics Society F F Tusubira, PhD, MUIPE, MIEE, REng, CEng Mathematical theory and techniques play a vital

More information

Hamming Codes as Error-Reducing Codes

Hamming Codes as Error-Reducing Codes Hamming Codes as Error-Reducing Codes William Rurik Arya Mazumdar Abstract Hamming codes are the first nontrivial family of error-correcting codes that can correct one error in a block of binary symbols.

More information

6. FUNDAMENTALS OF CHANNEL CODER

6. FUNDAMENTALS OF CHANNEL CODER 82 6. FUNDAMENTALS OF CHANNEL CODER 6.1 INTRODUCTION The digital information can be transmitted over the channel using different signaling schemes. The type of the signal scheme chosen mainly depends on

More information

Digital Image Watermarking by Spread Spectrum method

Digital Image Watermarking by Spread Spectrum method Digital Image Watermarking by Spread Spectrum method Andreja Samčovi ović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Belgrade, november 2014. I Spread Spectrum Techniques

More information

Channel Coding/Decoding. Hamming Method

Channel Coding/Decoding. Hamming Method Channel Coding/Decoding Hamming Method INFORMATION TRANSFER ACROSS CHANNELS Sent Received messages symbols messages source encoder Source coding Channel coding Channel Channel Source decoder decoding decoding

More information

Performance of Reed-Solomon Codes in AWGN Channel

Performance of Reed-Solomon Codes in AWGN Channel International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 4, Number 3 (2011), pp. 259-266 International Research Publication House http://www.irphouse.com Performance of

More information

Robust Reed Solomon Coded MPSK Modulation

Robust Reed Solomon Coded MPSK Modulation ITB J. ICT, Vol. 4, No. 2, 2, 95-4 95 Robust Reed Solomon Coded MPSK Modulation Emir M. Husni School of Electrical Engineering & Informatics, Institut Teknologi Bandung, Jl. Ganesha, Bandung 432, Email:

More information

Basics of Error Correcting Codes

Basics of Error Correcting Codes Basics of Error Correcting Codes Drawing from the book Information Theory, Inference, and Learning Algorithms Downloadable or purchasable: http://www.inference.phy.cam.ac.uk/mackay/itila/book.html CSE

More information

Lab/Project Error Control Coding using LDPC Codes and HARQ

Lab/Project Error Control Coding using LDPC Codes and HARQ Linköping University Campus Norrköping Department of Science and Technology Erik Bergfeldt TNE066 Telecommunications Lab/Project Error Control Coding using LDPC Codes and HARQ Error control coding is an

More information

FREDRIK TUFVESSON ELECTRICAL AND INFORMATION TECHNOLOGY

FREDRIK TUFVESSON ELECTRICAL AND INFORMATION TECHNOLOGY 1 Information Transmission Chapter 5, Block codes FREDRIK TUFVESSON ELECTRICAL AND INFORMATION TECHNOLOGY 2 Methods of channel coding For channel coding (error correction) we have two main classes of codes,

More information

Error Control Codes. Tarmo Anttalainen

Error Control Codes. Tarmo Anttalainen Tarmo Anttalainen email: tarmo.anttalainen@evitech.fi.. Abstract: This paper gives a brief introduction to error control coding. It introduces bloc codes, convolutional codes and trellis coded modulation

More information

International Journal of Engineering Research in Electronics and Communication Engineering (IJERECE) Vol 1, Issue 5, April 2015

International Journal of Engineering Research in Electronics and Communication Engineering (IJERECE) Vol 1, Issue 5, April 2015 Implementation of Error Trapping Techniqe In Cyclic Codes Using Lab VIEW [1] Aneetta Jose, [2] Hena Prince, [3] Jismy Tom, [4] Malavika S, [5] Indu Reena Varughese Electronics and Communication Dept. Amal

More information

A Source and Channel-Coding Framework for Vector-Based Data Hiding in Video

A Source and Channel-Coding Framework for Vector-Based Data Hiding in Video 630 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 10, NO. 4, JUNE 2000 A Source and Channel-Coding Framework for Vector-Based Data Hiding in Video Debargha Mukherjee, Member, IEEE,

More information

Digital Communication Systems ECS 452

Digital Communication Systems ECS 452 Digital Communication Systems ECS 452 Asst. Prof. Dr. Prapun Suksompong prapun@siit.tu.ac.th 5. Channel Coding 1 Office Hours: BKD, 6th floor of Sirindhralai building Tuesday 14:20-15:20 Wednesday 14:20-15:20

More information

ETSI TS V1.1.2 ( )

ETSI TS V1.1.2 ( ) Technical Specification Satellite Earth Stations and Systems (SES); Regenerative Satellite Mesh - A (RSM-A) air interface; Physical layer specification; Part 3: Channel coding 2 Reference RTS/SES-25-3

More information

COMBINING GALOIS WITH COMPLEX FIELD CODING FOR HIGH-RATE SPACE-TIME COMMUNICATIONS. Renqiu Wang, Zhengdao Wang, and Georgios B.

COMBINING GALOIS WITH COMPLEX FIELD CODING FOR HIGH-RATE SPACE-TIME COMMUNICATIONS. Renqiu Wang, Zhengdao Wang, and Georgios B. COMBINING GALOIS WITH COMPLEX FIELD CODING FOR HIGH-RATE SPACE-TIME COMMUNICATIONS Renqiu Wang, Zhengdao Wang, and Georgios B. Giannakis Dept. of ECE, Univ. of Minnesota, Minneapolis, MN 55455, USA e-mail:

More information

Visual Secret Sharing Based Digital Image Watermarking

Visual Secret Sharing Based Digital Image Watermarking www.ijcsi.org 312 Visual Secret Sharing Based Digital Image Watermarking B. Surekha 1, Dr. G. N. Swamy 2 1 Associate Professor, Department of ECE, TRR College of Engineering, Hyderabad, Andhra Pradesh,

More information

A New Compression Method for Encrypted Images

A New Compression Method for Encrypted Images Technology, Volume-2, Issue-2, March-April, 2014, pp. 15-19 IASTER 2014, www.iaster.com Online: 2347-5099, Print: 2348-0009 ABSTRACT A New Compression Method for Encrypted Images S. Manimurugan, Naveen

More information

ENERGY-EFFICIENT ALGORITHMS FOR SENSOR NETWORKS

ENERGY-EFFICIENT ALGORITHMS FOR SENSOR NETWORKS ENERGY-EFFICIENT ALGORITHMS FOR SENSOR NETWORKS Prepared for: DARPA Prepared by: Krishnan Eswaran, Engineer Cornell University May 12, 2003 ENGRC 350 RESEARCH GROUP 2003 Krishnan Eswaran Energy-Efficient

More information

Recovering Lost Sensor Data through Compressed Sensing

Recovering Lost Sensor Data through Compressed Sensing Recovering Lost Sensor Data through Compressed Sensing Zainul Charbiwala Collaborators: Younghun Kim, Sadaf Zahedi, Supriyo Chakraborty, Ting He (IBM), Chatschik Bisdikian (IBM), Mani Srivastava The Big

More information

IMPERIAL COLLEGE of SCIENCE, TECHNOLOGY and MEDICINE, DEPARTMENT of ELECTRICAL and ELECTRONIC ENGINEERING.

IMPERIAL COLLEGE of SCIENCE, TECHNOLOGY and MEDICINE, DEPARTMENT of ELECTRICAL and ELECTRONIC ENGINEERING. IMPERIAL COLLEGE of SCIENCE, TECHNOLOGY and MEDICINE, DEPARTMENT of ELECTRICAL and ELECTRONIC ENGINEERING. COMPACT LECTURE NOTES on COMMUNICATION THEORY. Prof. Athanassios Manikas, version Spring 22 Digital

More information

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 44 Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 45 CHAPTER 3 Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING

More information

High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive

High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive Chetan Nanjunda Mathur, Karthik Narayan and K.P. Subbalakshmi Department of Electrical and Computer Engineering

More information

Exercises to Chapter 2 solutions

Exercises to Chapter 2 solutions Exercises to Chapter 2 solutions 1 Exercises to Chapter 2 solutions E2.1 The Manchester code was first used in Manchester Mark 1 computer at the University of Manchester in 1949 and is still used in low-speed

More information

A Combinatorial Framework for Frequency Hopping Multiple Access

A Combinatorial Framework for Frequency Hopping Multiple Access Fourteenth International Workshop on Algebraic and Combinatorial Coding Theory September 7 13, 2014, Svetlogorsk (Kaliningrad region), Russia pp. 271 276 A Combinatorial Framework for Frequency Hopping

More information

Decoding of Block Turbo Codes

Decoding of Block Turbo Codes Decoding of Block Turbo Codes Mathematical Methods for Cryptography Dedicated to Celebrate Prof. Tor Helleseth s 70 th Birthday September 4-8, 2017 Kyeongcheol Yang Pohang University of Science and Technology

More information

Communication Theory II

Communication Theory II Communication Theory II Lecture 13: Information Theory (cont d) Ahmed Elnakib, PhD Assistant Professor, Mansoura University, Egypt March 22 th, 2015 1 o Source Code Generation Lecture Outlines Source Coding

More information

SOME CONSTRUCTIONS OF MUTUALLY ORTHOGONAL LATIN SQUARES AND SUPERIMPOSED CODES

SOME CONSTRUCTIONS OF MUTUALLY ORTHOGONAL LATIN SQUARES AND SUPERIMPOSED CODES Discrete Mathematics, Algorithms and Applications Vol 4, No 3 (2012) 1250022 (8 pages) c World Scientific Publishing Company DOI: 101142/S179383091250022X SOME CONSTRUCTIONS OF MUTUALLY ORTHOGONAL LATIN

More information

Performance of Combined Error Correction and Error Detection for very Short Block Length Codes

Performance of Combined Error Correction and Error Detection for very Short Block Length Codes Performance of Combined Error Correction and Error Detection for very Short Block Length Codes Matthias Breuninger and Joachim Speidel Institute of Telecommunications, University of Stuttgart Pfaffenwaldring

More information

Local prediction based reversible watermarking framework for digital videos

Local prediction based reversible watermarking framework for digital videos Local prediction based reversible watermarking framework for digital videos J.Priyanka (M.tech.) 1 K.Chaintanya (Asst.proff,M.tech(Ph.D)) 2 M.Tech, Computer science and engineering, Acharya Nagarjuna University,

More information

code V(n,k) := words module

code V(n,k) := words module Basic Theory Distance Suppose that you knew that an English word was transmitted and you had received the word SHIP. If you suspected that some errors had occurred in transmission, it would be impossible

More information

Space engineering. Space data links - Telemetry synchronization and channel coding. ECSS-E-ST-50-01C 31 July 2008

Space engineering. Space data links - Telemetry synchronization and channel coding. ECSS-E-ST-50-01C 31 July 2008 ECSS-E-ST-50-01C Space engineering Space data links - Telemetry synchronization and channel coding ECSS Secretariat ESA-ESTEC Requirements & Standards Division Noordwijk, The Netherlands Foreword This

More information

ENGN8637, Semster-1, 2018 Project Description Project 1: Bit Interleaved Modulation

ENGN8637, Semster-1, 2018 Project Description Project 1: Bit Interleaved Modulation ENGN867, Semster-1, 2018 Project Description Project 1: Bit Interleaved Modulation Gerard Borg gerard.borg@anu.edu.au Research School of Engineering, ANU updated on 18/March/2018 1 1 Introduction Bit-interleaved

More information

Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction

Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 12, NO. 5, May. 2018 2348 Copyright c 2018 KSII Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction Peng-Cheng

More information

Lecture 2. 1 Nondeterministic Communication Complexity

Lecture 2. 1 Nondeterministic Communication Complexity Communication Complexity 16:198:671 1/26/10 Lecture 2 Lecturer: Troy Lee Scribe: Luke Friedman 1 Nondeterministic Communication Complexity 1.1 Review D(f): The minimum over all deterministic protocols

More information

ARTICLE IN PRESS. Signal Processing

ARTICLE IN PRESS. Signal Processing Signal Processing 9 (1) 467 479 Contents lists available at ScienceDirect Signal Processing journal homepage: www.elsevier.com/locate/sigpro Watermarking via zero assigned filter banks Zeynep Yücel,A.Bülent

More information

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia Information Hiding Phil Regalia Department of Electrical Engineering and Computer Science Catholic University of America Washington, DC 20064 regalia@cua.edu Baltimore IEEE Signal Processing Society Chapter,

More information

Error Protection: Detection and Correction

Error Protection: Detection and Correction Error Protection: Detection and Correction Communication channels are subject to noise. Noise distorts analog signals. Noise can cause digital signals to be received as different values. Bits can be flipped

More information

Some constructions of mutually orthogonal latin squares and superimposed codes

Some constructions of mutually orthogonal latin squares and superimposed codes University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2012 Some constructions of mutually orthogonal

More information

Improvement Of Block Product Turbo Coding By Using A New Concept Of Soft Hamming Decoder

Improvement Of Block Product Turbo Coding By Using A New Concept Of Soft Hamming Decoder European Scientific Journal June 26 edition vol.2, No.8 ISSN: 857 788 (Print) e - ISSN 857-743 Improvement Of Block Product Turbo Coding By Using A New Concept Of Soft Hamming Decoder Alaa Ghaith, PhD

More information

Problem Sheet 1 Probability, random processes, and noise

Problem Sheet 1 Probability, random processes, and noise Problem Sheet 1 Probability, random processes, and noise 1. If F X (x) is the distribution function of a random variable X and x 1 x 2, show that F X (x 1 ) F X (x 2 ). 2. Use the definition of the cumulative

More information

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Kamaldeep Joshi, Rajkumar Yadav, Sachin Allwadhi Abstract Image steganography is the best aspect

More information

Advanced channel coding : a good basis. Alexandre Giulietti, on behalf of the team

Advanced channel coding : a good basis. Alexandre Giulietti, on behalf of the team Advanced channel coding : a good basis Alexandre Giulietti, on behalf of the T@MPO team Errors in transmission are fowardly corrected using channel coding e.g. MPEG4 e.g. Turbo coding e.g. QAM source coding

More information

ERROR CONTROL CODING From Theory to Practice

ERROR CONTROL CODING From Theory to Practice ERROR CONTROL CODING From Theory to Practice Peter Sweeney University of Surrey, Guildford, UK JOHN WILEY & SONS, LTD Contents 1 The Principles of Coding in Digital Communications 1.1 Error Control Schemes

More information

A Reversible Data Hiding Scheme Based on Prediction Difference

A Reversible Data Hiding Scheme Based on Prediction Difference 2017 2 nd International Conference on Computer Science and Technology (CST 2017) ISBN: 978-1-60595-461-5 A Reversible Data Hiding Scheme Based on Prediction Difference Ze-rui SUN 1,a*, Guo-en XIA 1,2,

More information

Application of QAP in Modulation Diversity (MoDiv) Design

Application of QAP in Modulation Diversity (MoDiv) Design Application of QAP in Modulation Diversity (MoDiv) Design Hans D Mittelmann School of Mathematical and Statistical Sciences Arizona State University INFORMS Annual Meeting Philadelphia, PA 4 November 2015

More information

A New Adaptive Two-Stage Maximum- Likelihood Decoding Algorithm for Linear Block Codes

A New Adaptive Two-Stage Maximum- Likelihood Decoding Algorithm for Linear Block Codes IEEE TRANSACTIONS ON COMMUNICATIONS 0 A New Adaptive Two-Stage Maximum- Likelihood Decoding Algorithm for Linear Block Codes Xianren Wu 1, Hamid R. Sadjadpour 2 (contact author) and Zhi Tian 1 Suggested

More information

International Journal of Research and Review E-ISSN: ; P-ISSN:

International Journal of Research and Review   E-ISSN: ; P-ISSN: International Journal of Research and Review www.ijrrjournal.com E-ISSN: 2349-9788; P-ISSN: 2454-2237 Research Paper An Improvement of Scrambling Technique by Using Modified Selected Mapping in W.A.F.W.

More information

Physical-Layer Network Coding Using GF(q) Forward Error Correction Codes

Physical-Layer Network Coding Using GF(q) Forward Error Correction Codes Physical-Layer Network Coding Using GF(q) Forward Error Correction Codes Weimin Liu, Rui Yang, and Philip Pietraski InterDigital Communications, LLC. King of Prussia, PA, and Melville, NY, USA Abstract

More information

Permutation group and determinants. (Dated: September 19, 2018)

Permutation group and determinants. (Dated: September 19, 2018) Permutation group and determinants (Dated: September 19, 2018) 1 I. SYMMETRIES OF MANY-PARTICLE FUNCTIONS Since electrons are fermions, the electronic wave functions have to be antisymmetric. This chapter

More information

The ternary alphabet is used by alternate mark inversion modulation; successive ones in data are represented by alternating ±1.

The ternary alphabet is used by alternate mark inversion modulation; successive ones in data are represented by alternating ±1. Alphabets EE 387, Notes 2, Handout #3 Definition: An alphabet is a discrete (usually finite) set of symbols. Examples: B = {0,1} is the binary alphabet T = { 1,0,+1} is the ternary alphabet X = {00,01,...,FF}

More information

Control Channel Jamming: Resilience and Identification of Traitors

Control Channel Jamming: Resilience and Identification of Traitors Control Channel Jamming: Resilience and Identification of Traitors Agnes Chan, Xin Liu, Guevara Noubir, Bishal Thapa College of Computer and Information Scinece Northeastern University, Boston, MA 02115

More information

LDPC Decoding: VLSI Architectures and Implementations

LDPC Decoding: VLSI Architectures and Implementations LDPC Decoding: VLSI Architectures and Implementations Module : LDPC Decoding Ned Varnica varnica@gmail.com Marvell Semiconductor Inc Overview Error Correction Codes (ECC) Intro to Low-density parity-check

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 2, February 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Hybrid ARQ Using Serially Concatenated Block Codes for Real-Time Communication - An Iterative Decoding Approach

Hybrid ARQ Using Serially Concatenated Block Codes for Real-Time Communication - An Iterative Decoding Approach Hybrid ARQ Using Serially Concatenated Block Codes for Real-Time Communication - An Iterative Decoding Approach ELISABETH UHLEMANN School of Information Science, Computer and Electrical Engineering, Halmstad

More information

PD-SETS FOR CODES RELATED TO FLAG-TRANSITIVE SYMMETRIC DESIGNS. Communicated by Behruz Tayfeh Rezaie. 1. Introduction

PD-SETS FOR CODES RELATED TO FLAG-TRANSITIVE SYMMETRIC DESIGNS. Communicated by Behruz Tayfeh Rezaie. 1. Introduction Transactions on Combinatorics ISSN (print): 2251-8657, ISSN (on-line): 2251-8665 Vol. 7 No. 1 (2018), pp. 37-50. c 2018 University of Isfahan www.combinatorics.ir www.ui.ac.ir PD-SETS FOR CODES RELATED

More information

Implementation of Reed Solomon Encoding Algorithm

Implementation of Reed Solomon Encoding Algorithm Implementation of Reed Solomon Encoding Algorithm P.Sunitha 1, G.V.Ujwala 2 1 2 Associate Professor, Pragati Engineering College,ECE --------------------------------------------------------------------------------------------------------------------

More information

Performance Evaluation of Error Correcting Techniques for OFDM Systems

Performance Evaluation of Error Correcting Techniques for OFDM Systems Performance Evaluation of Error Correcting Techniques for OFDM Systems Yasir Javed Qazi Email: p060059@gmail.com Safwan Muhammad Email:safwan.mu11@gmail.com Jawad Ahmed Malik Email: reply.jawad@gmail.com

More information

Lecture 17 Components Principles of Error Control Borivoje Nikolic March 16, 2004.

Lecture 17 Components Principles of Error Control Borivoje Nikolic March 16, 2004. EE29C - Spring 24 Advanced Topics in Circuit Design High-Speed Electrical Interfaces Lecture 17 Components Principles of Error Control Borivoje Nikolic March 16, 24. Announcements Project phase 1 is posted

More information

Chapter 10 Error Detection and Correction 10.1

Chapter 10 Error Detection and Correction 10.1 Data communication and networking fourth Edition by Behrouz A. Forouzan Chapter 10 Error Detection and Correction 10.1 Note Data can be corrupted during transmission. Some applications require that errors

More information

Ad Hoc Networks - Routing and Security Issues

Ad Hoc Networks - Routing and Security Issues Ad Hoc Networks - Routing and Security Issues Mahalingam Ramkumar Mississippi State University, MS January 25, 2005 1 2 Some Basic Terms Basic Terms Ad Hoc vs Infrastructured AHN MANET (Mobile Ad hoc NETwork)

More information

Low Correlation Zone Signal Sets

Low Correlation Zone Signal Sets Low Correlation Zone Signal Sets Guang Gong Department of Electrical & Computer Engineering University of Waterloo CANADA Joint work with Solomon W. Golomb and Hong-Yeop Song Outline of Presentation Outline

More information

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method ISSN (e): 2250 3005 Vol, 04 Issue, 10 October 2014 International Journal of Computational Engineering Research (IJCER) Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption

More information

6.450: Principles of Digital Communication 1

6.450: Principles of Digital Communication 1 6.450: Principles of Digital Communication 1 Digital Communication: Enormous and normally rapidly growing industry, roughly comparable in size to the computer industry. Objective: Study those aspects of

More information

White Paper FEC In Optical Transmission. Giacomo Losio ProLabs Head of Technology

White Paper FEC In Optical Transmission. Giacomo Losio ProLabs Head of Technology White Paper FEC In Optical Transmission Giacomo Losio ProLabs Head of Technology 2014 FEC In Optical Transmission When we introduced the DWDM optics, we left out one important ingredient that really makes

More information

Spreading Codes and Characteristics. Error Correction Codes

Spreading Codes and Characteristics. Error Correction Codes Spreading Codes and Characteristics and Error Correction Codes Global Navigational Satellite Systems (GNSS-6) Short course, NERTU Prasad Krishnan International Institute of Information Technology, Hyderabad

More information

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction Pauline Puteaux and William Puech; LIRMM Laboratory UMR 5506 CNRS, University of Montpellier; Montpellier, France Abstract

More information

Capacity of collusion secure fingerprinting a tradeoff between rate and efficiency

Capacity of collusion secure fingerprinting a tradeoff between rate and efficiency Capacity of collusion secure fingerprinting a tradeoff between rate and efficiency Gábor Tardos School of Computing Science Simon Fraser University and Rényi Institute, Budapest tardos@cs.sfu.ca Abstract

More information

The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code

The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code Yaoyu Wang Nanjing University yaoyu.wang.nju@gmail.com June 10, 2016 Yaoyu Wang (NJU) Error correction with EEC June

More information

Performance Optimization of Hybrid Combination of LDPC and RS Codes Using Image Transmission System Over Fading Channels

Performance Optimization of Hybrid Combination of LDPC and RS Codes Using Image Transmission System Over Fading Channels European Journal of Scientific Research ISSN 1450-216X Vol.35 No.1 (2009), pp 34-42 EuroJournals Publishing, Inc. 2009 http://www.eurojournals.com/ejsr.htm Performance Optimization of Hybrid Combination

More information

Review: Theorem of irrelevance. Y j φ j (t) where Y j = X j + Z j for 1 j k and Y j = Z j for

Review: Theorem of irrelevance. Y j φ j (t) where Y j = X j + Z j for 1 j k and Y j = Z j for Review: Theorem of irrelevance Given the signal set { a 1,..., a M }, we transmit X(t) = j k =1 a m,jφ j (t) and receive Y (t) = j=1 Y j φ j (t) where Y j = X j + Z j for 1 j k and Y j = Z j for j>k. Assume

More information

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

International Journal of Digital Application & Contemporary research Website:   (Volume 1, Issue 7, February 2013) Performance Analysis of OFDM under DWT, DCT based Image Processing Anshul Soni soni.anshulec14@gmail.com Ashok Chandra Tiwari Abstract In this paper, the performance of conventional discrete cosine transform

More information

HYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM

HYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 6, June 2013 pp. 2521 2531 HYBRID MATRIX CODING AND ERROR-CORRECTION CODING

More information

A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme *

A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 27, 1265-1282 (2011) A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme * CHE-WEI

More information

Design of Reed Solomon Encoder and Decoder

Design of Reed Solomon Encoder and Decoder Design of Reed Solomon Encoder and Decoder Shital M. Mahajan Electronics and Communication department D.M.I.E.T.R. Sawangi, Wardha India e-mail: mah.shital@gmail.com Piyush M. Dhande Electronics and Communication

More information

BER Analysis of BPSK and QAM Modulation Schemes using RS Encoding over Rayleigh Fading Channel

BER Analysis of BPSK and QAM Modulation Schemes using RS Encoding over Rayleigh Fading Channel BER Analysis of BPSK and QAM Modulation Schemes using RS Encoding over Rayleigh Fading Channel Faisal Rasheed Lone Department of Computer Science & Engineering University of Kashmir Srinagar J&K Sanjay

More information

Simulink Modelling of Reed-Solomon (Rs) Code for Error Detection and Correction

Simulink Modelling of Reed-Solomon (Rs) Code for Error Detection and Correction Simulink Modelling of Reed-Solomon (Rs) Code for Error Detection and Correction Okeke. C Department of Electrical /Electronics Engineering, Michael Okpara University of Agriculture, Umudike, Abia State,

More information

CH 4. Air Interface of the IS-95A CDMA System

CH 4. Air Interface of the IS-95A CDMA System CH 4. Air Interface of the IS-95A CDMA System 1 Contents Summary of IS-95A Physical Layer Parameters Forward Link Structure Pilot, Sync, Paging, and Traffic Channels Channel Coding, Interleaving, Data

More information

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT Degrees of Freedom of Multi-hop MIMO Broadcast Networs with Delayed CSIT Zhao Wang, Ming Xiao, Chao Wang, and Miael Soglund arxiv:0.56v [cs.it] Oct 0 Abstract We study the sum degrees of freedom (DoF)

More information

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access Spread Spectrum Chapter 18 FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access Single Carrier The traditional way Transmitted signal

More information