Proceedings of the 45th Annual Southeast Regional Conference 2007
DOI: 10.1145/1233341.1233415
|View full text |Cite
|
Sign up to set email alerts
|

How 'unused' codewords make a redundant code

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
5
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 4 publications
1
5
0
Order By: Relevance
“…Factually a single system may include multiple forms of redundancyredundancy of circuits, of information and mechanical componentsdesigners are required to relate and balance various redundant components in order to optimize the overall systems, but a rigorous method is missing so far. The present frame yields a simplified mode to calculate heterogeneous redundant resources which is consistent with the calculus of redundancy devised by Shannon, the proof is in Rocchi (2007).…”
Section: Fall-out 41 Mathematical Developmentssupporting
confidence: 57%
“…Factually a single system may include multiple forms of redundancyredundancy of circuits, of information and mechanical componentsdesigners are required to relate and balance various redundant components in order to optimize the overall systems, but a rigorous method is missing so far. The present frame yields a simplified mode to calculate heterogeneous redundant resources which is consistent with the calculus of redundancy devised by Shannon, the proof is in Rocchi (2007).…”
Section: Fall-out 41 Mathematical Developmentssupporting
confidence: 57%
“…• one composed of 400 images used to build the statistic distribution of the 2 16 binary strings from which to select the 25,589 having the highest probabilities;…”
Section: Resultsmentioning
confidence: 99%
“…Among the t u possible sequences r = t u − 2 n of them will be unused and considered illegal in the normal encodings seen so far (e.g., References 3-5). The redundancy 16 induced by the r sequences is exploited in the framework 6 to reversibly embed watermark bits in the stream of symbols from Ψ making use of illegal sequences.…”
Section: Original Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…The passive redundancy (i.e., the number of sequences of s symbols from Ψ not representing any binary string of length n) of this encoding according to [20] is:…”
Section: The Proposed Frameworkmentioning
confidence: 99%