期刊文献+

纠错码在数字通信中的应用 被引量:5

Applications of error--correcting codes in digital communication
下载PDF
导出
摘要 随着通信系统数字化和VLSI技术的进展,纠错码得到了日益广泛的重视和应用,成为数字通信系统设计中的一项重要技术。文中介绍纠错码性能的理论限在各种数字通信中的具体应用,以及用VLSI芯片实现编译码器的发展近况。 With the digitalization of communication systems and the development of VLSI tech- niques, error--correcting codes are being widely used and become a very important technique in the design of digital communication systems. In this paper, we shall introduce the theoreti- cal performance bounds of error--correcting codes, their applications in various digital commu- nication systems and the recent progress of the implementation of encoder/decoders with VLSI chips.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 1993年第2期100-118,共19页 Journal of Xidian University
基金 国家自然科学基金
关键词 纠错码 数字通信 VLSI 集成电路 error-correcting codes digital communication VLSI
  • 相关文献

同被引文献17

  • 1[3]李小文.TD-SCDMA第三代移动通信系统、信令及实现[M].E京:人民邮电出版社,2005.
  • 2Zou W Y,IEEE Trans Broadcasting,1995年,41卷,1期,1页
  • 3Barni M, Bartolini F, Furon T. A general framework for robust watermarking security[J]. Signal Process- ing, 2003, 83(10): 2069-2084.
  • 4Chor B, Fiat A, Moninaor. Tracing traitors[C]// Proceedings o[ International Cryptologyr 94. Berlin: Springer-Verlag, 1994: 257-262.
  • 5Domingo-Ferrer J, Herrera-Joancomarti J. A simple collusion-secure fingerprinting schemes for images [C]//Proceedings of the International Symposium on Information Technology: Coding and Computing. New York: IEEE, 2000: 128-132.
  • 6Pfitzmann B. Trials of traced traitors[C]//The First International Workshop, Information Hiding 96. Berlin: Springer-Verlag, 1996: 49-64.
  • 7Schaathun H G, Fernandez M. Boneh-shaw finger- printing and soft decision decoding[C] // Proceedings of 2005 IEEE Information Theory Workshop. New York:IEEE, 2006= 183-186.
  • 8Nuidal K, Fujitsu S, Hagiwara M, et al. An improvement of tardos's collusion-secure fingerprinting codes with very short lengths [C]//Proceedings of Appl Algebra Eng Commun Comput. Berlin: Springer-Verlag, 2007:80-89.
  • 9Safavi-Naini R, Wang Y. Collusion secure q-ary fin- gerprinting for perceptual content [C] // Proceedings of ACM Workshop on Security and Privacy in Digital Rights Management. Berlin: Springer Verlag, 2002: 57-75.
  • 10Schaathun H G. The boneh-shaw fingerprinting scheme is better than we thought[J]. IEEE Transactions on Information Forensics and Security, 2006, 1 (2) : 248-255.

引证文献5

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部