Adversarial Torn-paper Codes

نویسندگان

چکیده

We study the adversarial torn-paper channel. This problem is motivated by applications in DNA data storage where strands that carry information may break into smaller pieces which are received out of order. Our model extends previously researched probabilistic setting to worst-case. develop code constructions for any parameters channel non-vanishing asymptotic rate possible and show our achieve asymptotically optimal while allowing efficient encoding decoding. Finally, we extend results related settings included multi-strand storage, presence substitution errors, or incomplete coverage.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Codes for Adversarial Wiretap Channels

In [13] we proposed a (ρr, ρw)-adversarial wiretap channel model (AWTP) in which the adversary can adaptively choose to see a fraction ρr of the codeword sent over the channel, and modify a fraction ρw of the codeword by adding arbitrary noise values to them. In this paper we give the first efficient construction of a capacity achieving code family that provides perfect secrecy for this channel.

متن کامل

Efficient Wet Paper Codes

Wet paper codes were proposed as a tool for constructing steganographic schemes with an arbitrary selection channel that is not shared between the sender and the recipient. In this paper, we describe new approaches to wet paper codes that enjoy low computational complexity and improved embedding efficiency (number of message bits per embedding change). Some applications of wet paper codes to st...

متن کامل

Adversarial Error Resilience in Distributed Storage Using MRD Codes and MDS Array Codes

This paper presents a novel coding scheme for distributed storage systems containing nodes with adversarial errors. The key challenge in such systems is the propagation of the erroneous data from a single corrupted node to the rest of the system during node repair process. We present a concatenated coding scheme which is based on two types of codes: maximum rank distance (MRD) code as an outer ...

متن کامل

Supplementary Document for paper: Convex Adversarial Collective Classification

1 Proofs of Theorems Lemma 1. For K=2, any fixed j and 0 ≤ x ij , y k i ≤ 1, ˆ y k i ∈ {0, 1}, if A k j =

متن کامل

An approach to automatic reconstruction of apictorial hand torn paper document

Digital automation in reconstruction of apictorial hand torn paper document increases efficacy and reduces human effort. Reconstruction of torn document has importance in various fields like archaeology, art conservation and forensic sciences. The devised novel technique for hand torn paper document, consists of pre-processing, feature extraction and reconstruction phase. Torn fragment’s bounda...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Theory

سال: 2023

ISSN: ['0018-9448', '1557-9654']

DOI: https://doi.org/10.1109/tit.2023.3292895