Sets of disjoint snakes based on a Reed-Muller code and covering the hypercube
نویسندگان
چکیده
A snake-in-the-box code (or snake) of word length n is a simple circuit in an n-dimensional cube Qn , with the additional property that any two non-neighboring words in the circuit differ in at least two positions. To construct such snakes a straightforward, non-recursive method is developed based on special linear codes with minimum distance 4. An extension of this method is used for the construction of covers of Qn consisting of 2m−1 vertex-disjoint snakes, for 2m−1 < n ≤ 2m . These covers turn out to have a symmetry group of order 2m .
منابع مشابه
Steganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images
In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...
متن کاملOn the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions
Let Rt,n denote the set of t-resilient Boolean functions of n variables. First, we prove that the covering radius of the binary ReedMuller code RM(2, 6) in the sets Rt,6, t = 0, 1, 2 is 16. Second, we show that the covering radius of the binary Reed-Muller code RM(2, 7) in the set R3,7 is 32. We derive a new lower bound for the covering radius of the Reed-Muller code RM(2, n) in the set Rn−4,n....
متن کاملOn the Calculation of Generalized Reed-muller Canonical Expansions from Disjoint Cube Representation of Boolean Functions
A new algorithm is shown that converts disjoint cube representation of Boolean functions into fixed-polarity Generalized Reed-Muller Expansions (GRME). Since the known fast algorithm Ihal generates the GRME based on the factorization or thc Reed-Muller transform matrix always starts from the truth table (minterms) of Boolean function, then the described method has the advantages due to smaller ...
متن کاملOn the Covering Radius of the Second Order Reed-Muller Code of Length 128
In 1981, Schatz proved that the covering radius of the binary ReedMuller code RM(2, 6) is 18. For RM(2, 7), we only know that its covering radius is between 40 and 44. In this paper, we prove that the covering radius of the binary Reed-Muller code RM(2, 7) is at most 42. Moreover, we give a sufficient and necessary condition for Boolean functions of 7-variable to achieve the second-order nonlin...
متن کاملCovering the Hypercube with a Bounded Number of Disjoint Snakes
We present a construction of an induced cycle in the n-dimensional hypercube I[n] (n ≥ 2), and a subgroup Hn of I[n] considered as the group Z2 , such that |Hn| ≤ 16 and the induced cycle uses exactly one element of every coset of Hn. This proves that for any n ≥ 2 the vertices of I[n] can be covered using at most 16 vertex-disjoint induced cycles.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Des. Codes Cryptography
دوره 48 شماره
صفحات -
تاریخ انتشار 2008