CN108259138A - A kind of safe transmission method repeatedly fed back using fountain codes - Google Patents
A kind of safe transmission method repeatedly fed back using fountain codes Download PDFInfo
- Publication number
- CN108259138A CN108259138A CN201810381053.0A CN201810381053A CN108259138A CN 108259138 A CN108259138 A CN 108259138A CN 201810381053 A CN201810381053 A CN 201810381053A CN 108259138 A CN108259138 A CN 108259138A
- Authority
- CN
- China
- Prior art keywords
- input information
- original input
- symbol
- decoding
- feedback
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0057—Block codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/0001—Systems modifying transmission characteristics according to link quality, e.g. power backoff
- H04L1/0009—Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the channel coding
Abstract
The invention belongs to field of communication technology, more particularly to a kind of safe transmission method repeatedly fed back using fountain codes.The present invention achievees the purpose that legitimate channel advantage is constantly accumulated so that legitimate receipt end translates the maximization of rate gap with listener-in, so as to fulfill relatively safer transmission using feedback update fountain codes encoding-decoding process.Compared to common fountain codes safe transmission method, the present invention with channel close-coupled, entire encoding-decoding process is carried out on the basis of transmitting is ensured, will not sacrifice transmission reliability because security performance is pursued;And only need to carry out the feedback of a small amount of number, be not in that largely feedback leads to the situation of channel congestion in similar traditional communication;And to channel conditions require it is low, either it is wired, under wireless environment all have very strong adaptability and practicability.
Description
Technical field
The invention belongs to fields of communication technology, are related to a kind of safe transmission method using fountain codes, more particularly to a kind of
The safe transmission method repeatedly fed back using fountain codes.
Background technology
With the rapid development of communication technology, people enjoy information propagate convenience with it is quick while also to communication system
The service ability and range of system propose higher requirement, limited network bandwidth and the web database technology increased rapidly and download
The contradiction of a pair of of urgent need to resolve is formd between scale.It is since the TCP in traditional automatic request for repetition is assisted that fountain codes are introduced into earliest
In view, with the increase of transmission range, error rate, packet loss increased dramatically, and also exponentially grade increases the information content of re-transmission, and then
Communication system performance is caused to decline.Further, since the performance of fountain codes and feature have very by force with safety of physical layer transmission
Agreeing with property, under the coding mechanism, receiving terminal receives coded identification on demand, and legitimate receipt end is simply by the presence of channel advantage
It can take the lead in completing decoding.Therefore, fountain codes can fully ensure that legitimate receipt end transmission reliability, and realize one on this basis
Fixed safety gain.
Fountain codes have the characteristics that:
1)Without cbr (constant bit rate):Transmitting terminal encoder persistently generates coded identification, and receiving terminal only needs to obtain sufficient amount of coding
Symbol can solve and fully enter information symbol;
2)Efficiently:Receiving terminal generally receives completely can recover initial data slightly larger than the encoded symbol of incoming symbol quantity;
3)Linear complexity:The time and original data symbol quantity that the coding method encoding and decoding are spent are in a linear relationship;
4)With channel quality close coupling:The decoding process and result of this kind of coding/decoding method are directly related with channel quality, work as letter
Road quality will take the lead in completing decoding process when being dominant.
With the birth of the practical fountain codes LT codes such as LT codes, Raptor codes, fountain codes are also of increasing concern, and obtain
More and more applications.On the basis of fountain codes is made full use of to realize transmitting, safe transmission problem is further considered certainly
The higher for so becoming the field is pursued.Traditional fountain codes safe transmission method is very high to channel conditions requirement, and legitimate channel must
There need be sufficiently large quality-advantage that could meet certain safety index requirement.This requirement is not easy to full in actual environment
Foot, when legitimate channel and close tapping channel quality, tradition fountain codes safe transmission method can not ensure sufficiently strong safety
Property.Therefore, under the premise of not by other safety measures, the method for seeking safe transmission in itself from coding has very strong reality
Border operational capability and value.
Invention content
The problem of high, the present invention require legal channel quality advantage based on the secure coding method of fountain codes for tradition
A kind of safe transmission method repeatedly fed back using fountain codes is proposed, introducing feedback, which optimizes traditional encoding-decoding process, to be set
Meter expands legitimate channel advantage in the case where not depending on other technologies, reduces listener-in end incoming symbol solution extracting rate.
To achieve these goals, the present invention uses following technical scheme:
A kind of safe transmission method repeatedly fed back using fountain codes, is included the following steps:
Step 1:Original input information assemble of symbol and the distribution of coding degree, the original input information symbol are initialized in transmitting terminal
Set includes multiple original input information symbols;
Step 2:Transmitting terminal chooses the original input information symbol in encoding-decoding process according to the decoding cases at legitimate receipt end
Mechanism and the distribution of coding degree optimize update, and the optimization update includes generating original input information symbol needed for coded identification
Selection and coding degree distribution angle value range adjustment;
Step 3:Encoding-decoding process is divided into multiple by transmitting terminal using the feedback information moment for receiving the transmission of legitimate receipt end as boundary
The encoding and decoding stage, according to original input information symbol selection mechanism updated in step 2 and coding in each encoding and decoding stage
Degree distribution is encoded;
Step 4:Encoded in legitimate receipt end receiving step 3 generation coded identification go forward side by side the trade last stage decoding;
Step 5:It generates new feedback information during each encoding and decoding stage triggering feedback occurrence condition and terminates the encoding and decoding stage,
New feedback information is sent to transmitting terminal to carry out step 2 by legitimate receipt end, and the feedback information has included legitimate receipt end
The original input information symbol situation solved;
Step 6:When the decoding of whole original input information symbols is completed at legitimate receipt end, send feedback command termination and be transmitted across
Journey, and export decoding result.
Further, the feedback occurrence condition is poor for legitimate receiver in each encoding and decoding stage and listener-in's solution extracting rate
At the time of being worth relative maximum.
Further, the step 2 includes:
Step 2.1:The original input information that the value range that coding degree is distributed is become not solved by legitimate receipt end also currently
The quantity of symbol;
Step 2.2:It will be removed in original input information assemble of symbol by the original input information symbol that legitimate receipt end solves
It goes, coded identification is used in the remaining subset for not solving generation original input information assemble of symbol in original input information symbol
Generation.
Further, the coding in the step 3 includes:
Step 3.1:The updated original input information symbol selection mechanism of optimization and coding degree point obtained in obtaining step 2
Cloth;
Step 3.2:The original input information symbol selection mechanism generation obtained according to step 3.1 participates in the original encoded the current generation
Begin input information symbol set;
Step 3.3:The coding degree distribution generation angle value obtained according to step 3.1;
Step 3.4:It is chosen from the original input information assemble of symbol that step 3.2 obtains and angle value number is generated in equivalent steps 3.3
The original input information symbol of amount;
Step 3.5:The original input information symbol that step 3.4 is chosen carries out mould two plus operation generation coded identification.
Further, the decoding in the step 4 includes:
Step 4.1:Find out the coded identification and original input information associated with coded identification this described symbol that angle value is 1
Number, termination is decoded if not finding out;
Step 4.2:The original input information symbol that step 4.1 is obtained and coded identification associated there carry out exclusive or behaviour
Make, and delete the coded identification and be associated with original input information symbol this described;
Step 4.3:Repeat step 4.1, step 4.2;
Step 4.4:Legitimate receipt end determines that the encoding and decoding in this stage are according to the quantity of original input information symbol solved
No termination sends feedback information to transmitting terminal when the encoding and decoding in this stage terminate;
Step 4.5:Step 4.1- steps 4.4 are repeated, until legitimate receipt end solves all original input information symbols.
Further, the feedback mechanism in the step 5 includes:
Step 5.1:Using traditional fountain codes concept and combined standard tree analysis principle, obtain receiving terminal solution extracting rate and encoded with receiving
The variation relation of symbolic number determines that each encoding and decoding stage legitimate receipt end sends the opportunity of feedback, i.e., with the variation relation
When solution extracting rate is most fast with reception coding symbol number variation, legitimate receipt end solves extracting rate difference relative maximum with listener-in end,
Feedback information is sent at this time to transmitting terminal;
Step 5.2:Continue the decoding result of receiving step 4, when reaching the feedback opportunity that step 5.1 determines, terminate current compile
Decoding stage simultaneously generates feedback information, and the feedback information includes the original input information symbol that has solved of legitimate receipt end and should
The quantity of the original input information symbol;
Step 5.3:Feedback information is sent to transmitting terminal.
Compared with prior art, the device have the advantages that:
The present invention achievees the purpose that legitimate channel advantage is constantly accumulated so that close using feedback update fountain codes encoding-decoding process
Method receiving terminal solves the maximization of extracting rate gap with listener-in, so as to fulfill relatively safer transmission.Compared to common fountain
Code safe transmission method, the method have the advantages that:
1st, the present invention with channel close-coupled, entire encoding-decoding process is carried out on the basis of transmitting is ensured,
Transmission reliability will not be sacrificed because security performance is pursued;
2nd, the present invention only needs to carry out the feedback of a small amount of number, is not in that largely feedback causes channel to be gathered around in similar traditional communication
The situation of plug;
3rd, the present invention to channel conditions require it is low, either it is wired, under wireless environment all have very strong adaptability and practicality
Property.
4th, the method for the present invention introduces feedback and traditional encoding-decoding process is optimized, in the feelings for not depending on other technologies
Expand legitimate channel advantage under condition, realize the safe transmission of original input information symbol.
Description of the drawings
Fig. 1 is a kind of basic flow chart of safe transmission method repeatedly fed back using fountain codes of the embodiment of the present invention.
Fig. 2 is a kind of basic procedure of safe transmission method repeatedly fed back using fountain codes of another embodiment of the present invention
Figure.
Fig. 3 is a kind of safe transmission method repeatedly fed back using fountain codes of the embodiment of the present invention in wire communication field
Application schematic diagram in scape.
Fig. 4 is a kind of safe transmission method repeatedly fed back using fountain codes of the embodiment of the present invention in wireless communication field
Application schematic diagram in scape.
Specific embodiment
Below in conjunction with the accompanying drawings with specific embodiment the present invention will be further explained explanation:
Embodiment one:
As shown in Figure 1, a kind of safe transmission method repeatedly fed back using fountain codes of the embodiment of the present invention, including following step
Suddenly:
Step S101:Original input information assemble of symbol and the distribution of coding degree, the original input information are initialized in transmitting terminal
Assemble of symbol includes multiple original input information symbols.
Step S102:Transmitting terminal accords with the original input information in encoding-decoding process according to the decoding cases at legitimate receipt end
Number selection mechanism and the distribution of coding degree optimize update, and the optimization update includes being originally inputted letter needed for generation coded identification
Cease the selection of symbol and the adjustment of coding degree distribution angle value range.
Step S103:Transmitting terminal using receive legitimate receipt end transmission the feedback information moment as boundary, by encoding-decoding process
It is divided into multiple encoding and decoding stages, is chosen in each encoding and decoding stage according to original input information symbol updated in step S102
Mechanism and the distribution of coding degree are encoded.
Step S104:Encoded in the receiving step S103 of legitimate receipt end generation coded identification go forward side by side the trade last stage solution
Code.
Step S105:It generates new feedback information during each encoding and decoding stage triggering feedback occurrence condition and terminates the volume solution
New feedback information is sent to transmitting terminal to carry out step S102 by code stage, legitimate receipt end, and the feedback information, which includes, to be closed
The original input information symbol situation that method receiving terminal has solved.
Step S106:When the decoding of whole original input information symbols is completed at legitimate receipt end, it is whole to send feedback command
Only transmission process, and export decoding result.
Embodiment two:
As shown in Fig. 2, a kind of safe transmission method repeatedly fed back using fountain codes of another embodiment of the present invention, including following
Step:
Step S201:Original input information assemble of symbol and the distribution of coding degree, the original input information are initialized in transmitting terminal
Assemble of symbol includes multiple original input information symbols.
Step S202:Transmitting terminal accords with the original input information in encoding-decoding process according to the decoding cases at legitimate receipt end
Number selection mechanism and the distribution of coding degree optimize update, and the optimization update includes being originally inputted letter needed for generation coded identification
Cease the selection of symbol and the adjustment of coding degree distribution angle value range.
The step S202 includes:
Step S2021:The value range that coding degree is distributed is become currently also not being originally inputted letter by what legitimate receipt end solved
Cease the quantity of symbol.
Step S2022:The original input information that will have been solved in original input information assemble of symbol by legitimate receipt end
Symbol removes, and is used to compile in the remaining subset for not solving generation original input information assemble of symbol in original input information symbol
The generation of code sign.
Step S203:Transmitting terminal using receive legitimate receipt end transmission the feedback information moment as boundary, by encoding-decoding process
It is divided into multiple encoding and decoding stages, is chosen in each encoding and decoding stage according to original input information symbol updated in step S202
Mechanism and the distribution of coding degree are encoded.
Coding in the step S203 includes:
Step S2031:The updated original input information symbol selection mechanism of optimization and coding obtained in obtaining step S202
Degree distribution.
Step S2032:The original input information symbol selection mechanism generation obtained according to step S2031 participates in the current generation
The original input information assemble of symbol of coding.
Step S2033:The coding degree distribution generation angle value obtained according to step S2031.
Step S2034:It is chosen in equivalent steps S2033 from the original input information assemble of symbol that step S2032 is obtained
Generate the original input information symbol of angle value quantity.
Step S2035:The original input information symbol that step S2034 is chosen carries out mould two plus operation generation coding symbol
Number.
Step S204:Encoded in the receiving step S203 of legitimate receipt end generation coded identification go forward side by side the trade last stage solution
Code;
Decoding in the step S204 includes:
Step S2041:Find out the coded identification and original input information associated with coded identification this described that angle value is 1
Symbol decodes termination if not finding out.
Step S2042:The obtained original input information symbols of step S2041 and coded identification associated there are carried out
Xor operation, and delete the coded identification and be associated with original input information symbol this described.
Step S2043:Repeat step S2041, step S2042.
Step S2044:Legitimate receipt end determines the volume in this stage according to the quantity of original input information symbol solved
Whether decoding terminates, and feedback information is sent when the encoding and decoding in this stage terminate to transmitting terminal.
Step S2045:Step S2041- step S2044 are repeated, until legitimate receipt end accords with all original input informations
It number solves.
Step S205:It generates new feedback information during each encoding and decoding stage triggering feedback occurrence condition and terminates the volume solution
New feedback information is sent to transmitting terminal to carry out step S202 by code stage, legitimate receipt end, and the feedback information, which includes, to be closed
The original input information symbol situation that method receiving terminal has solved.
Feedback mechanism in the step S205 includes:
Step S2051:Using traditional fountain codes concept and combined standard tree analysis principle, obtain receiving terminal solution extracting rate and compiled with receiving
The variation relation of code symbol number determines that each encoding and decoding stage legitimate receipt end sends the opportunity of feedback with the variation relation,
I.e. when solution extracting rate is most fast with reception coding symbol number variation, legitimate receipt end and listener-in end solution extracting rate difference are opposite most
Greatly, feedback information is sent at this time to transmitting terminal.
Step S2052:Continue the decoding result of receiving step S204, when reaching the feedback opportunity that step S2051 is determined,
It terminates the current codec stage and generates feedback information, the feedback information is originally inputted letter including what legitimate receipt end had solved
Cease symbol and the quantity of the original input information symbol.
Step S2053:Feedback information is sent to transmitting terminal.
Step S206:When the decoding of whole original input information symbols is completed at legitimate receipt end, it is whole to send feedback command
Only transmission process, and export decoding result.
What deserves to be explained is entire encoding-decoding process is divided into multiple stages, each encoding and decoding stage to feed back the moment as boundary
Next code process is no longer participate in by the original input information symbol that legitimate receipt end solves;According to coded identification solution extracting rate with connecing
The variation relation of number of coded symbols is received, determines that the feedback at legitimate receipt end is happened at legitimate receiver in each encoding and decoding stage
At the time of extracting rate difference relative maximum being solved with listener-in end;After each encoding and decoding stage feeds back, the stage be immediately finished and
Transmitting terminal synchronizes optimization update to original input information symbol selection mechanism and coding the degree distribution of encoding-decoding process;Work as conjunction
When method receiving terminal solves whole original input information symbols, transmitting terminal stops coded identification transmission at once.
Embodiment three:
As shown in figure 3, the embodiment of the present invention it is a kind of using the safe transmission method that fountain codes are repeatedly fed back in wire communication field
Application in scape.Cable network channel quality is preferable, transmission channel can be regarded to an erasure channel as, user is it is possible that receive
Correct data, it is also possible to because the reasons such as network congestion do not receive data packet.Method based on the present invention can be simultaneously
Ensure the reliability and security of communication, this method includes the following steps:
Step S301:Original input information assemble of symbol and the distribution of coding degree are initialized, original input information symbol can here
Random generation, the distribution of coding degree is using classical robust solitary wave distribution(Robust Soliton Distribution, RSD).
Step S302:Feedback mechanism according to the present invention calculates the number of coded symbols received in the current codec stage
And the original input information symbol quantity solved.It will be triggered when the number of coded symbols that receiving terminal receives reaches calculated value
Feedback, the calculated value are obtained with receiving the variation relation of coding symbol number by solving extracting rate, are connect to send the opportunity of feedback
The coding symbol number of receipts.
In this step, receiving terminal original input information symbolic solution extracting rate is derived according to the property of traditional fountain codes first
Variation relation with receiving coding symbol number.It is then calculated under current channel condition according to above-mentioned variation relation, legitimate receipt
At the time of end is with listener-in's decoding rate disparity.The opportunity that the moment occurs as feedback.Here simulated annealing may be used
Algorithm can also seek extreme value using other suitable optimization algorithms.It should be noted that in this step, codec parameters,
Including solution extracting rate and the variation relation for receiving coding symbol number and all feedback moment, can be calculated in advance.
Step S303:Encoding and decoding are carried out according to the codec parameters that step S302 is obtained, compile solution with traditional fountain codes herein
Code process is consistent.
Step S304:Feedback information is generated when legitimate receipt end reaches feedback trigger condition and is sent to transmitting terminal;
In the step, feedback information includes legitimate receipt end to each decoded concrete condition of original input information symbol.
Step S305:Transmitting terminal adjusts original input information symbol according to feedback information and coding degree is distributed;
In the step, next code process will be no longer participate in by the original input information symbol that legitimate receipt end solves.In addition,
The distribution of coding degree regenerates the distribution of coding degree according to the quantity of remaining original input information symbol.
Step S306:If legitimate receipt end does not solve whole original input information symbols also, continue from step S302
Start to repeat more than encoding-decoding process.
Example IV:
As shown in figure 4, a kind of of the embodiment of the present invention is wirelessly communicating field using the safe transmission method that fountain codes are repeatedly fed back
Application in scape.Due to the opening of wireless channel, listener-in is easy to access legitimate channel and steals private information.Present invention side
Method can reduce the quality-advantage demand of legitimate channel, and safer transmission is realized under the conditions of equivalent channel.This method is overall
Process is similar with example three, includes the following steps:
Step S401:Original input information assemble of symbol and the distribution of coding degree are initialized, original input information symbol can here
Random generation, the distribution of coding degree is using classical robust solitary wave distribution(Robust Soliton Distribution, RSD).
Step S402:Matrix scrambling is carried out to original input information symbol, remakes CRC(Cyclic redundancy check)Processing;
In the step, matrix scrambling is rapid fading in order to prevent, and CRC processing is in order to ensure receiving terminal normally receives completely
Coded identification, it is ensured that the trouble-free operation of coding and feedback mechanism can also use other mechanism.Here international standard may be used
Common CRC-16 methods.
Step S403:Feedback mechanism according to the present invention calculates the number of coded symbols received in the current codec stage
And the original input information symbol quantity solved.It will be triggered when the number of coded symbols that receiving terminal receives reaches calculated value
Feedback, the calculated value are obtained with receiving the variation relation of coding symbol number by solving extracting rate, are connect to send the opportunity of feedback
The coding symbol number of receipts;
In this step, derive receiving terminal original input information symbolic solution extracting rate with connecing according to the property of traditional fountain codes first
Receive the variation relation of coding symbol number.Then calculated under current channel condition according to above-mentioned variation relation, legitimate receipt end with
At the time of listener-in solves extracting rate disparity.The opportunity that the moment occurs as feedback.Here simulated annealing may be used,
Extreme value can also be sought using other suitable optimization algorithms.It should be noted that in this step, codec parameters, including
Extracting rate and the variation relation for receiving coding symbol number and all feedback moment are solved, can be calculated in advance.
Step S404:Encoding and decoding are carried out according to the codec parameters that step S403 is obtained, compile solution with traditional fountain codes herein
Code process is consistent;
Comprising dematrix scramble and solution CRC module in the step, the matrix scrambling in step S402 and CRC processing are corresponded to.
Step S405:Feedback information is generated when legitimate receipt end reaches feedback trigger condition and is sent to transmitting terminal;
In the step, feedback information includes legitimate receipt end to each decoded concrete condition of original input information symbol.
Step S406:Transmitting terminal adjusts original input information symbol according to feedback information and coding degree is distributed;
In the step, next code process will be no longer participate in by the original input information symbol that legitimate receipt end solves.In addition,
The distribution of coding degree will regenerate the distribution of coding degree according to remaining original input information symbol quantity.
Step S407:If legitimate receipt end does not solve whole original input information symbols also, continue from step S402
Start to repeat more than encoding-decoding process.
What deserves to be explained is the transmitting terminal is specially the encoder-side of sender, the legitimate receipt end is specially to close
The decoder end of method recipient, the listener-in end are specially the decoder end of listener-in.
Particular embodiments described above all contrasts to the principle of the present invention, technical solution and application process in detail
Explanation.It should be noted that above example is indivedual application scenarios of the present invention, art technology or researcher make
With the various changes towards actual demand can be carried out during the method for the present invention, the core concept scope of the present invention is not departed from.
Therefore, the present invention is actually also intended to changes or modifications towards concrete application comprising these.
Claims (6)
1. a kind of safe transmission method repeatedly fed back using fountain codes, which is characterized in that include the following steps:
Step 1:Original input information assemble of symbol and the distribution of coding degree, the original input information symbol are initialized in transmitting terminal
Set includes multiple original input information symbols;
Step 2:Transmitting terminal chooses the original input information symbol in encoding-decoding process according to the decoding cases at legitimate receipt end
Mechanism and the distribution of coding degree optimize update, and the optimization update includes generating original input information symbol needed for coded identification
Selection and coding degree distribution angle value range adjustment;
Step 3:Encoding-decoding process is divided into multiple by transmitting terminal using the feedback information moment for receiving the transmission of legitimate receipt end as boundary
The encoding and decoding stage, according to original input information symbol selection mechanism updated in step 2 and coding in each encoding and decoding stage
Degree distribution is encoded;
Step 4:Encoded in legitimate receipt end receiving step 3 generation coded identification go forward side by side the trade last stage decoding;
Step 5:It generates new feedback information during each encoding and decoding stage triggering feedback occurrence condition and terminates the encoding and decoding stage,
New feedback information is sent to transmitting terminal to carry out step 2 by legitimate receipt end, and the feedback information has included legitimate receipt end
The original input information symbol situation solved;
Step 6:When the decoding of whole original input information symbols is completed at legitimate receipt end, send feedback command termination and be transmitted across
Journey, and export decoding result.
2. a kind of safe transmission method repeatedly fed back using fountain codes according to claim 1, which is characterized in that described
At the time of feeding back occurrence condition for legitimate receiver in each encoding and decoding stage and listener-in's solution extracting rate difference relative maximum.
3. a kind of safe transmission method repeatedly fed back using fountain codes according to claim 1, which is characterized in that described
Step 2 includes:
Step 2.1:The original input information that the value range that coding degree is distributed is become not solved by legitimate receipt end also currently
The quantity of symbol;
Step 2.2:It will be removed in original input information assemble of symbol by the original input information symbol that legitimate receipt end solves
It goes, coded identification is used in the remaining subset for not solving generation original input information assemble of symbol in original input information symbol
Generation.
4. a kind of safe transmission method repeatedly fed back using fountain codes according to claim 1, which is characterized in that described
Coding in step 3 includes:
Step 3.1:The updated original input information symbol selection mechanism of optimization and coding degree point obtained in obtaining step 2
Cloth;
Step 3.2:The original input information symbol selection mechanism generation obtained according to step 3.1 participates in the original encoded the current generation
Begin input information symbol set;
Step 3.3:The coding degree distribution generation angle value obtained according to step 3.1;
Step 3.4:It is chosen from the original input information assemble of symbol that step 3.2 obtains and angle value number is generated in equivalent steps 3.3
The original input information symbol of amount;
Step 3.5:The original input information symbol that step 3.4 is chosen carries out mould two plus operation generation coded identification.
5. a kind of safe transmission method repeatedly fed back using fountain codes according to claim 1, which is characterized in that described
Decoding in step 4 includes:
Step 4.1:Find out the coded identification and original input information associated with coded identification this described symbol that angle value is 1
Number, termination is decoded if not finding out;
Step 4.2:The original input information symbol that step 4.1 is obtained and coded identification associated there carry out exclusive or behaviour
Make, and delete the coded identification and be associated with original input information symbol this described;
Step 4.3:Repeat step 4.1, step 4.2;
Step 4.4:Legitimate receipt end determines that the encoding and decoding in this stage are according to the quantity of original input information symbol solved
No termination sends feedback information to transmitting terminal when the encoding and decoding in this stage terminate;
Step 4.5:Step 4.1- steps 4.4 are repeated, until legitimate receipt end solves all original input information symbols.
6. a kind of safe transmission method repeatedly fed back using fountain codes according to claim 1, which is characterized in that described
Feedback mechanism in step 5 includes:
Step 5.1:Using traditional fountain codes concept and combined standard tree analysis principle, obtain receiving terminal solution extracting rate and encoded with receiving
The variation relation of symbolic number determines that each encoding and decoding stage legitimate receipt end sends the opportunity of feedback, i.e., with the variation relation
When solution extracting rate is most fast with reception coding symbol number variation, legitimate receipt end solves extracting rate difference relative maximum with listener-in end,
Feedback information is sent at this time to transmitting terminal;
Step 5.2:Continue the decoding result of receiving step 4, when reaching the feedback opportunity that step 5.1 determines, terminate current compile
Decoding stage simultaneously generates feedback information, and the feedback information includes the original input information symbol that has solved of legitimate receipt end and should
The quantity of the original input information symbol;
Step 5.3:Feedback information is sent to transmitting terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810381053.0A CN108259138A (en) | 2018-04-25 | 2018-04-25 | A kind of safe transmission method repeatedly fed back using fountain codes |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810381053.0A CN108259138A (en) | 2018-04-25 | 2018-04-25 | A kind of safe transmission method repeatedly fed back using fountain codes |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108259138A true CN108259138A (en) | 2018-07-06 |
Family
ID=62748323
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810381053.0A Pending CN108259138A (en) | 2018-04-25 | 2018-04-25 | A kind of safe transmission method repeatedly fed back using fountain codes |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108259138A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108718225A (en) * | 2018-08-25 | 2018-10-30 | 中国人民解放军战略支援部队信息工程大学 | A kind of safe transmission method based on the interference of fountain codes key coded identification |
CN109412750A (en) * | 2018-09-19 | 2019-03-01 | 西安交通大学 | Anti- eavesdropping transmission method based on fountain codes in a kind of multimedia communication |
CN114978419A (en) * | 2022-04-26 | 2022-08-30 | 青海师范大学 | Data coding and decoding method based on improved on-line fountain codes for underwater acoustic network |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103051424A (en) * | 2013-01-07 | 2013-04-17 | 北京理工大学 | Wireless transmission method for varied error protective fountain code |
CN103716134A (en) * | 2013-11-21 | 2014-04-09 | 浙江大学 | Encoding method of fountain codes with gradually-increased degrees under condition of one-time feedback |
US20140307665A1 (en) * | 2011-12-07 | 2014-10-16 | Huawei Technologies Co., Ltd. | Unicast communication method, apparatus, and system |
CN104539387A (en) * | 2014-11-28 | 2015-04-22 | 杜秀娟 | Hop-by-hop reliable transmission control method for underwater wireless sensor network |
CN107222284A (en) * | 2017-07-27 | 2017-09-29 | 西安交通大学 | A kind of fountain coding anti-eavesdropping transmission method in Internet of Things based on channel feedback |
-
2018
- 2018-04-25 CN CN201810381053.0A patent/CN108259138A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140307665A1 (en) * | 2011-12-07 | 2014-10-16 | Huawei Technologies Co., Ltd. | Unicast communication method, apparatus, and system |
CN103051424A (en) * | 2013-01-07 | 2013-04-17 | 北京理工大学 | Wireless transmission method for varied error protective fountain code |
CN103716134A (en) * | 2013-11-21 | 2014-04-09 | 浙江大学 | Encoding method of fountain codes with gradually-increased degrees under condition of one-time feedback |
CN104539387A (en) * | 2014-11-28 | 2015-04-22 | 杜秀娟 | Hop-by-hop reliable transmission control method for underwater wireless sensor network |
CN107222284A (en) * | 2017-07-27 | 2017-09-29 | 西安交通大学 | A kind of fountain coding anti-eavesdropping transmission method in Internet of Things based on channel feedback |
Non-Patent Citations (1)
Title |
---|
汪立康,彭建华,易鸣: "一种基于反馈的喷泉码安全传输方法", 《计算机应用研究》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108718225A (en) * | 2018-08-25 | 2018-10-30 | 中国人民解放军战略支援部队信息工程大学 | A kind of safe transmission method based on the interference of fountain codes key coded identification |
CN108718225B (en) * | 2018-08-25 | 2021-03-23 | 中国人民解放军战略支援部队信息工程大学 | Safe transmission method based on fountain code key coding symbol interference |
CN109412750A (en) * | 2018-09-19 | 2019-03-01 | 西安交通大学 | Anti- eavesdropping transmission method based on fountain codes in a kind of multimedia communication |
CN109412750B (en) * | 2018-09-19 | 2020-03-31 | 西安交通大学 | Anti-eavesdrop transmission method based on fountain codes in multimedia communication |
CN114978419A (en) * | 2022-04-26 | 2022-08-30 | 青海师范大学 | Data coding and decoding method based on improved on-line fountain codes for underwater acoustic network |
CN114978419B (en) * | 2022-04-26 | 2023-02-10 | 青海师范大学 | Data coding and decoding method based on improved on-line fountain codes for underwater acoustic network |
US11722245B2 (en) | 2022-04-26 | 2023-08-08 | Qinghai Normal University | Data encoding and decoding method for underwater acoustic networks (UANs) based on improved online fountain code |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108259138A (en) | A kind of safe transmission method repeatedly fed back using fountain codes | |
CN107196732B (en) | Anti-eavesdrop coding method based on fountain codes coding | |
CN105490771B (en) | A kind of building method of LT fountain codes coding degree distribution | |
CN103428227A (en) | IP covert communication method based on Huffman encoding | |
CN109510687A (en) | A kind of fountain code encoding method based on satellite communication | |
CN105306168A (en) | Method for guaranteeing secure transmission of wireless data based on fountain codes | |
CN101582744A (en) | Encoding and decoding method of RS fountain codes based on iterative approach | |
CN108183771A (en) | Data processing method, equipment and system in optical network system | |
CN101414833A (en) | Method and apparatus for encoding low-density generated matrix code | |
CN101420291A (en) | Combined decoding method for network and channel code in relay system | |
CN102594492A (en) | Code block dividing method and device | |
CN104135345A (en) | Cross-layer coding and decoding method applied to long-term evolution system | |
CN101540778B (en) | Method, device and system for transmitting data | |
CN109361492B (en) | High-performance decoding method combining physical layer network coding and polarization code | |
CN107222284B (en) | The anti-eavesdropping transmission method of fountain coding based on channel feedback in a kind of Internet of Things | |
CN108768902A (en) | It is a kind of improved based on fountain codes anti-eavesdrop method | |
CN109787719B (en) | Probability relay assisted polarization security coding method | |
CN107222294A (en) | A kind of improved fountain codes degree Distribution Algorithm | |
CN101286745A (en) | Coding method and device by interleaving | |
CN105915317B (en) | It can the decoded forward erasure correction code code coefficient Matrix Construction Method of Zigzag | |
CN109586850B (en) | Polarization code-based hierarchical data coordination method for continuous variable quantum key distribution system | |
CN102065289B (en) | Reliable video transmission method and device based on network coding | |
CN103812615A (en) | Coding method for Luby transform code in distributed communication system, and relay communication method | |
CN107257244A (en) | A kind of fountain code encoding method based under broadcast environment | |
CN104993905B (en) | The degree distribution optimization method and coding and decoding method of system LT code under erasure channel |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180706 |