Data Stream Algorithms for Codeword Testing
نویسندگان
چکیده
Motivated by applications in storage systems and property testing, we study data stream algorithms for local testing and tolerant testing of codes. Ideally, we would like to know whether there exist asymptotically good codes that can be local/tolerant tested with onepass, poly-log space data stream algorithms. We show that for the error detection problem (and hence, the local testing problem), there exists a one-pass, log-space data stream algorithm for a broad class of asymptotically good codes, including the Reed-Solomon (RS) code and expander codes. In our technically more involved result, we give a one-pass, O(e log n)-space algorithm for RS (and related) codes with dimension k and block length n that can distinguish between the cases when the Hamming distance between the received word and the code is at most e and at least a · e for some absolute constant a > 1. For RS codes with random errors, we can obtain e ≤ O(n/k). For folded RS codes, we obtain similar results for worst-case errors as long as e ≤ (n/k)1−ε for any constant ε > 0. These results follow by reducing the tolerant testing problem to the error detection problem using results from group testing and the list decodability of the code. We also show that using our techniques, the space requirement and the upper bound of e ≤ O(n/k) cannot be improved by more than logarithmic factors.
منابع مشابه
Polynomial Fitting of Data Streams with Applications to Codeword Testing
Given a stream of (x, y) points, we consider the problem of finding univariate polynomials that best fit the data. Over finite fields, this problem encompasses the well-studied problem of decoding Reed-Solomon codes while over the reals it corresponds to the well-studied polynomial regression problem. We present one-pass algorithms for two natural problems: i) find the polynomial of a given deg...
متن کاملEnhanced Data Security Transmission of H.264/AVC Video Stream
For the purpose of highly secure data transmission and privacy, sometime there is need of storage and encryption of digital video.During the encryption of video, the data hiding can be performed. In this paper proposed scheme is the secure data transmission with directly hiding data in the encrypted version of H.264/AVC videos is presented, which includes three parts are H.264/AVC video encrypt...
متن کاملA New Chase-type Soft-decision Decoding Algorithm for Reed-Solomon Codes
This paper addresses three relevant issues arising in designing Chase-type algorithms for ReedSolomon codes: 1) how to choose the set of testing patterns; 2) given the set of testing patterns, what is the optimal testing order in the sense that the most-likely codeword is expected to appear earlier; and 3) how to identify the most-likely codeword. A new Chase-type soft-decision decoding algorit...
متن کاملStream ciphers and the eSTREAM project
Stream ciphers are an important class of symmetric cryptographic algorithms. The eSTREAM project contributed significantly to the recent increase of activity in this field. In this paper, we present a survey of the eSTREAM project. We also review recent time/memory/data and time/memory/key trade-offs relevant for the generic attacks on stream ciphers.
متن کاملSelf-Synchronizing Reversible Variable Length Codes
A reversible variable-length code (RVLC) is a code in which the bit stream formed by a portion of a codeword, or by the overlapped portion of two or more adjacent codewords, is not a valid codeword. A self-synchronizing RVLC allows for a sequence of codewords to be decoded either backwards or forwards without any external synchronization. In this article, we present an algorithm for constructin...
متن کامل