Information Theory & Coding: Prof. Dhenuka Patel
Information Theory & Coding: Prof. Dhenuka Patel
Advantages:
• The cyclic codes have a very good performance in detecting single-bit errors,
double errors, an odd number of errors, and burst errors.
• They can easily be implemented in hardware and software. They are especially
fast when implemented in hardware.
Types of Errors:
• If the signal is carrying binary encoded data, following changes can alter the
meaning of the data.
• These errors can be divided into two types: Single-bit error and Burst error.
Single bit Error
• The term single-bit error means that only one bit of given data unit (such as a
byte, character, or data unit) is changed from 1 to 0 or from 0 to 1 as shown in
figure.
• Single bit errors are least likely type of errors in serial data transmission.
• It is one of the oldest error correcting codes that was introduced in 1960s by
Irving S. Reed and Gustave Solomon.
•A RS encoder accepts a block of data and adds redundant bits (parity bits) before
transmitting it over noisy channels.
• On receiving the data, a decoder corrects the error depending upon the code
characteristics.
Reed Solomon Codes
Reed Solomon Codes
Working of Reed Solomon Codes
• The message is represented as a polynomial P(x), and then multiplied with the
generator polynomial g(x).
• The sender sends this encoded message along with the generator polynomial
g(x).
Reed Solomon Codes
Decoding using Reed Solomon Code
• At the receiving end, the following decoding procedure is used:−
• The receiver receives the message r(x) and divides it by the generator
polynomial g(x).
• If r(x)/g(x) = 0, then it implies no error.
• If r(x)/g(x) ≠ 0, then the error polynomial is evaluated using the expression:
r(x) = p(x) * g(x) + e(x)
• The error polynomial gives the error positions.
Reed Solomon Codes
Reed Solomon code
Applications of Reed Solomon Codes
i. Storage devices(CD, DVD, etc.)
ii. Satellite communication
iii. Digital television
iv. QR code
v. Bar code
Cryptography
• Cryptography is a method of protecting information and communications
through the use of codes, so that only those for whom the information is
intended can read and process it.
• The prefix "crypt-" means "hidden“ -- and the suffix "-graphy" stands for
"writing.“
• To create cipher text, mathematical concepts and a set of rule-based
calculations called algorithm are used. So that it becomes hard to decipher the
text.
Cryptography
• However, in today's computer-centric world, cryptography is most often
associated with scrambling plaintext (ordinary text) into cipher text (a process
called encryption), then back again (known as decryption). Individuals who
practice this field are known as Cryptographers.
• These deterministic algorithms are used for cryptographic key generation,
digital signing, verification to protect data privacy, web browsing on the
internet, and confidential communications such as credit card transactions and
email.
Cryptography
•Authentication: the sender and receiver can confirm each other's identity and
the origin/destination of the information.
Introduction of Convolution Codes
• It is an alternative to Block code where ‘n’ output at any given time unit depends
on ‘k’ input at that time unit as well as ‘m’ previous input block.
• Encoded output depends on present and previous bits i.e unlike block codes,
where the output codeword is dependent only on the present inputs, in
convolutional codes, output stream depends not only the present input bits but
also only previous input bits stored in memory.
• The encoder consists of two parts:-
i. Memory i.e a flip-flop
ii. A logic circuit/function
Introduction of Convolution Codes
Introduction of Convolution Codes
Viterbi decoding Algorithm
•If the output sequence is not corrupted, it is easy to recover the sequence of
states that produced it by matching the symbols in the output string to a
sequence of transitions between states.
Viterbi decoding Algorithm
Example:
Suppose our FSM has four states, and our alphabet is {0,1}. The behaviour of the
FSM is summarised by the following two figures.