Self Synchronising T-codes to Replace Huffman Codes

نویسنده

  • Gavin R Higgie
چکیده

This paper describes recent work on the T-Codes, which are a new class of variable length codes with superlative selfsynchronizing properties. The T-Code construction algorithm i s outlined, and it is shown that in situations where codeword synchronization is important the T-Codes can be used instead of Huffman codes, giving excellent self-synchronizing properties without sacrificing coding efficiency. Background When corruption occurs in a streani of data which is coded with variable length codes, the decoder can lose track of where codeword boundaries are located in the data stream, and so. the effect of the corruption can extend over a large number of received symbols. Variable length code sets can be chosen such that the receiver is able to determine the correct location of these codeword boundaries relatively quickly after a corruption, but this is usually done by choosing codes in which certain bit sequences occur only at the end of codewords. The receiver must look for these special sequences in the received data stream. In some cases it is possible to choose codes which will self-synchronize as a result of the normal decoding process, but these are relatively difficult to find. T-Codes The original discovery of the T-Codes was published in 1984 by Titchener [l]. This work gave an algorithm for-generating families i f T-Code code sets, and showed that all code sets generated in accordance with this algorithm are self-synchronizing by nature. These properties are not derived from having specific synchronizing bit sequences, but rather the synchronizing information is spread throughout the code as an inherent part of its construction. The construction of the codes is such that when codeword synchronization is lost as a result of a corruption, the receiver will automatically resynchronize on a subsequent codeword boundary without any special measures being taken. This will happen even when the loss or corruption is not recognized as such. When a data loss or corruption is known to have occurred, an algorithm is available for the receiver to determine the point at which subsequent codeword synchronization is re-established. T-Code Construction Algorithm The T-Code construction algorithm is very simple. Code sets are constructed by augmenting lower level T-Code code sets, with the lowest level being the code set 0 and 1. The augmentation process consists of writing out a list with two copies of the lower level code

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The construction of binary Huffman equivalent codes with a greater number of synchronising codewords

An inherent problem with a Variable-Length Code (VLC) is that even a single bit error can cause a loss of synchronisation, and thus lead to error propagation. Codeword synchronisation has been extensively studied as a means to overcome this drawback and efficiently stop error propagation. In this paper, we first present the sufficient and necessary conditions for the existence of binary Huffman...

متن کامل

T - Complexity and T - Information Theory – an Executive Summary , 2 nd revised version

This paper describes the derivation of the T-complexity and T-information theory from the decomposition of finite strings, based on the duality of strings and variable-length T-codes. It further outlines its similarity to the string parsing algorithm by Lempel and Ziv. In its first version [15], it was intended as a summary of work published mainly by Titchener and Nicolescu. Apart from minor c...

متن کامل

Self-dual codes over F2 + uF2 with an automorphism of odd order

We complete the classification of all Lee-extremal and Lee-optimal self-dual codes over F2 + uF2 of lengths 9 through 20 that have a nontrivial odd order automorphism begun in [W.C. Huffman, On the decomposition of self-dual codes over F2 + uF2 with an automorphism of odd prime order, Finite Fields Appl., in press]. Along the way, we find all Lee-extremal self-dual codes over F2 + uF2 of length...

متن کامل

A Reversible Image Steganographic Algorithm Based on Slantlet Transform

In this paper we present a reversible image steganography technique based on Slantlet transform (SLT) and using advanced encryption standard (AES) method. The proposed method first encodes the message using two source codes, viz., Huffman codes and a self-synchronizing variable length code known as, T-code. Next, the encoded binary string is encrypted using an improved AES method. The encrypted...

متن کامل

On the decomposition of self-dual codes over F2+uF2 with an automorphism of odd prime order

We present a general theory of decomposing self-dual codes over F2 +uF2 that have an automorphism of odd prime order. Using this decomposition we classify all Lee-extremal/optimal self-dual codes of lengths 9 to 16 with an odd order automorphism and partially classify those of lengths 17 to 20. In particular we find 945 inequivalent Lee-extremal self-dual codes of length 20. © 2006 Elsevier Inc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008