CN108259138A - A kind of safe transmission method repeatedly fed back using fountain codes - Google Patents

A kind of safe transmission method repeatedly fed back using fountain codes Download PDF

Info

Publication number
CN108259138A
CN108259138A CN201810381053.0A CN201810381053A CN108259138A CN 108259138 A CN108259138 A CN 108259138A CN 201810381053 A CN201810381053 A CN 201810381053A CN 108259138 A CN108259138 A CN 108259138A
Authority
CN
China
Prior art keywords
input information
original input
symbol
decoding
feedback
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810381053.0A
Other languages
Chinese (zh)
Inventor
易鸣
汪立康
黄开枝
彭建华
金梁
楼洋明
钟州
周游
马克明
杨梅樾
靳彦青
王兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Information Engineering University of PLA Strategic Support Force
Original Assignee
Information Engineering University of PLA Strategic Support Force
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Information Engineering University of PLA Strategic Support Force filed Critical Information Engineering University of PLA Strategic Support Force
Priority to CN201810381053.0A priority Critical patent/CN108259138A/en
Publication of CN108259138A publication Critical patent/CN108259138A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0057Block codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/0001Systems modifying transmission characteristics according to link quality, e.g. power backoff
    • H04L1/0009Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the channel coding

Abstract

The invention belongs to field of communication technology, more particularly to a kind of safe transmission method repeatedly fed back using fountain codes.The present invention achievees the purpose that legitimate channel advantage is constantly accumulated so that legitimate receipt end translates the maximization of rate gap with listener-in, so as to fulfill relatively safer transmission using feedback update fountain codes encoding-decoding process.Compared to common fountain codes safe transmission method, the present invention with channel close-coupled, entire encoding-decoding process is carried out on the basis of transmitting is ensured, will not sacrifice transmission reliability because security performance is pursued;And only need to carry out the feedback of a small amount of number, be not in that largely feedback leads to the situation of channel congestion in similar traditional communication;And to channel conditions require it is low, either it is wired, under wireless environment all have very strong adaptability and practicability.

Description

A kind of safe transmission method repeatedly fed back using fountain codes
Technical field
The invention belongs to fields of communication technology, are related to a kind of safe transmission method using fountain codes, more particularly to a kind of The safe transmission method repeatedly fed back using fountain codes.
Background technology
With the rapid development of communication technology, people enjoy information propagate convenience with it is quick while also to communication system The service ability and range of system propose higher requirement, limited network bandwidth and the web database technology increased rapidly and download The contradiction of a pair of of urgent need to resolve is formd between scale.It is since the TCP in traditional automatic request for repetition is assisted that fountain codes are introduced into earliest In view, with the increase of transmission range, error rate, packet loss increased dramatically, and also exponentially grade increases the information content of re-transmission, and then Communication system performance is caused to decline.Further, since the performance of fountain codes and feature have very by force with safety of physical layer transmission Agreeing with property, under the coding mechanism, receiving terminal receives coded identification on demand, and legitimate receipt end is simply by the presence of channel advantage It can take the lead in completing decoding.Therefore, fountain codes can fully ensure that legitimate receipt end transmission reliability, and realize one on this basis Fixed safety gain.
Fountain codes have the characteristics that:
1)Without cbr (constant bit rate):Transmitting terminal encoder persistently generates coded identification, and receiving terminal only needs to obtain sufficient amount of coding Symbol can solve and fully enter information symbol;
2)Efficiently:Receiving terminal generally receives completely can recover initial data slightly larger than the encoded symbol of incoming symbol quantity;
3)Linear complexity:The time and original data symbol quantity that the coding method encoding and decoding are spent are in a linear relationship;
4)With channel quality close coupling:The decoding process and result of this kind of coding/decoding method are directly related with channel quality, work as letter Road quality will take the lead in completing decoding process when being dominant.
With the birth of the practical fountain codes LT codes such as LT codes, Raptor codes, fountain codes are also of increasing concern, and obtain More and more applications.On the basis of fountain codes is made full use of to realize transmitting, safe transmission problem is further considered certainly The higher for so becoming the field is pursued.Traditional fountain codes safe transmission method is very high to channel conditions requirement, and legitimate channel must There need be sufficiently large quality-advantage that could meet certain safety index requirement.This requirement is not easy to full in actual environment Foot, when legitimate channel and close tapping channel quality, tradition fountain codes safe transmission method can not ensure sufficiently strong safety Property.Therefore, under the premise of not by other safety measures, the method for seeking safe transmission in itself from coding has very strong reality Border operational capability and value.
Invention content
The problem of high, the present invention require legal channel quality advantage based on the secure coding method of fountain codes for tradition A kind of safe transmission method repeatedly fed back using fountain codes is proposed, introducing feedback, which optimizes traditional encoding-decoding process, to be set Meter expands legitimate channel advantage in the case where not depending on other technologies, reduces listener-in end incoming symbol solution extracting rate.
To achieve these goals, the present invention uses following technical scheme:
A kind of safe transmission method repeatedly fed back using fountain codes, is included the following steps:
Step 1:Original input information assemble of symbol and the distribution of coding degree, the original input information symbol are initialized in transmitting terminal Set includes multiple original input information symbols;
Step 2:Transmitting terminal chooses the original input information symbol in encoding-decoding process according to the decoding cases at legitimate receipt end Mechanism and the distribution of coding degree optimize update, and the optimization update includes generating original input information symbol needed for coded identification Selection and coding degree distribution angle value range adjustment;
Step 3:Encoding-decoding process is divided into multiple by transmitting terminal using the feedback information moment for receiving the transmission of legitimate receipt end as boundary The encoding and decoding stage, according to original input information symbol selection mechanism updated in step 2 and coding in each encoding and decoding stage Degree distribution is encoded;
Step 4:Encoded in legitimate receipt end receiving step 3 generation coded identification go forward side by side the trade last stage decoding;
Step 5:It generates new feedback information during each encoding and decoding stage triggering feedback occurrence condition and terminates the encoding and decoding stage, New feedback information is sent to transmitting terminal to carry out step 2 by legitimate receipt end, and the feedback information has included legitimate receipt end The original input information symbol situation solved;
Step 6:When the decoding of whole original input information symbols is completed at legitimate receipt end, send feedback command termination and be transmitted across Journey, and export decoding result.
Further, the feedback occurrence condition is poor for legitimate receiver in each encoding and decoding stage and listener-in's solution extracting rate At the time of being worth relative maximum.
Further, the step 2 includes:
Step 2.1:The original input information that the value range that coding degree is distributed is become not solved by legitimate receipt end also currently The quantity of symbol;
Step 2.2:It will be removed in original input information assemble of symbol by the original input information symbol that legitimate receipt end solves It goes, coded identification is used in the remaining subset for not solving generation original input information assemble of symbol in original input information symbol Generation.
Further, the coding in the step 3 includes:
Step 3.1:The updated original input information symbol selection mechanism of optimization and coding degree point obtained in obtaining step 2 Cloth;
Step 3.2:The original input information symbol selection mechanism generation obtained according to step 3.1 participates in the original encoded the current generation Begin input information symbol set;
Step 3.3:The coding degree distribution generation angle value obtained according to step 3.1;
Step 3.4:It is chosen from the original input information assemble of symbol that step 3.2 obtains and angle value number is generated in equivalent steps 3.3 The original input information symbol of amount;
Step 3.5:The original input information symbol that step 3.4 is chosen carries out mould two plus operation generation coded identification.
Further, the decoding in the step 4 includes:
Step 4.1:Find out the coded identification and original input information associated with coded identification this described symbol that angle value is 1 Number, termination is decoded if not finding out;
Step 4.2:The original input information symbol that step 4.1 is obtained and coded identification associated there carry out exclusive or behaviour Make, and delete the coded identification and be associated with original input information symbol this described;
Step 4.3:Repeat step 4.1, step 4.2;
Step 4.4:Legitimate receipt end determines that the encoding and decoding in this stage are according to the quantity of original input information symbol solved No termination sends feedback information to transmitting terminal when the encoding and decoding in this stage terminate;
Step 4.5:Step 4.1- steps 4.4 are repeated, until legitimate receipt end solves all original input information symbols.
Further, the feedback mechanism in the step 5 includes:
Step 5.1:Using traditional fountain codes concept and combined standard tree analysis principle, obtain receiving terminal solution extracting rate and encoded with receiving The variation relation of symbolic number determines that each encoding and decoding stage legitimate receipt end sends the opportunity of feedback, i.e., with the variation relation When solution extracting rate is most fast with reception coding symbol number variation, legitimate receipt end solves extracting rate difference relative maximum with listener-in end, Feedback information is sent at this time to transmitting terminal;
Step 5.2:Continue the decoding result of receiving step 4, when reaching the feedback opportunity that step 5.1 determines, terminate current compile Decoding stage simultaneously generates feedback information, and the feedback information includes the original input information symbol that has solved of legitimate receipt end and should The quantity of the original input information symbol;
Step 5.3:Feedback information is sent to transmitting terminal.
Compared with prior art, the device have the advantages that:
The present invention achievees the purpose that legitimate channel advantage is constantly accumulated so that close using feedback update fountain codes encoding-decoding process Method receiving terminal solves the maximization of extracting rate gap with listener-in, so as to fulfill relatively safer transmission.Compared to common fountain Code safe transmission method, the method have the advantages that:
1st, the present invention with channel close-coupled, entire encoding-decoding process is carried out on the basis of transmitting is ensured, Transmission reliability will not be sacrificed because security performance is pursued;
2nd, the present invention only needs to carry out the feedback of a small amount of number, is not in that largely feedback causes channel to be gathered around in similar traditional communication The situation of plug;
3rd, the present invention to channel conditions require it is low, either it is wired, under wireless environment all have very strong adaptability and practicality Property.
4th, the method for the present invention introduces feedback and traditional encoding-decoding process is optimized, in the feelings for not depending on other technologies Expand legitimate channel advantage under condition, realize the safe transmission of original input information symbol.
Description of the drawings
Fig. 1 is a kind of basic flow chart of safe transmission method repeatedly fed back using fountain codes of the embodiment of the present invention.
Fig. 2 is a kind of basic procedure of safe transmission method repeatedly fed back using fountain codes of another embodiment of the present invention Figure.
Fig. 3 is a kind of safe transmission method repeatedly fed back using fountain codes of the embodiment of the present invention in wire communication field Application schematic diagram in scape.
Fig. 4 is a kind of safe transmission method repeatedly fed back using fountain codes of the embodiment of the present invention in wireless communication field Application schematic diagram in scape.
Specific embodiment
Below in conjunction with the accompanying drawings with specific embodiment the present invention will be further explained explanation:
Embodiment one:
As shown in Figure 1, a kind of safe transmission method repeatedly fed back using fountain codes of the embodiment of the present invention, including following step Suddenly:
Step S101:Original input information assemble of symbol and the distribution of coding degree, the original input information are initialized in transmitting terminal Assemble of symbol includes multiple original input information symbols.
Step S102:Transmitting terminal accords with the original input information in encoding-decoding process according to the decoding cases at legitimate receipt end Number selection mechanism and the distribution of coding degree optimize update, and the optimization update includes being originally inputted letter needed for generation coded identification Cease the selection of symbol and the adjustment of coding degree distribution angle value range.
Step S103:Transmitting terminal using receive legitimate receipt end transmission the feedback information moment as boundary, by encoding-decoding process It is divided into multiple encoding and decoding stages, is chosen in each encoding and decoding stage according to original input information symbol updated in step S102 Mechanism and the distribution of coding degree are encoded.
Step S104:Encoded in the receiving step S103 of legitimate receipt end generation coded identification go forward side by side the trade last stage solution Code.
Step S105:It generates new feedback information during each encoding and decoding stage triggering feedback occurrence condition and terminates the volume solution New feedback information is sent to transmitting terminal to carry out step S102 by code stage, legitimate receipt end, and the feedback information, which includes, to be closed The original input information symbol situation that method receiving terminal has solved.
Step S106:When the decoding of whole original input information symbols is completed at legitimate receipt end, it is whole to send feedback command Only transmission process, and export decoding result.
Embodiment two:
As shown in Fig. 2, a kind of safe transmission method repeatedly fed back using fountain codes of another embodiment of the present invention, including following Step:
Step S201:Original input information assemble of symbol and the distribution of coding degree, the original input information are initialized in transmitting terminal Assemble of symbol includes multiple original input information symbols.
Step S202:Transmitting terminal accords with the original input information in encoding-decoding process according to the decoding cases at legitimate receipt end Number selection mechanism and the distribution of coding degree optimize update, and the optimization update includes being originally inputted letter needed for generation coded identification Cease the selection of symbol and the adjustment of coding degree distribution angle value range.
The step S202 includes:
Step S2021:The value range that coding degree is distributed is become currently also not being originally inputted letter by what legitimate receipt end solved Cease the quantity of symbol.
Step S2022:The original input information that will have been solved in original input information assemble of symbol by legitimate receipt end Symbol removes, and is used to compile in the remaining subset for not solving generation original input information assemble of symbol in original input information symbol The generation of code sign.
Step S203:Transmitting terminal using receive legitimate receipt end transmission the feedback information moment as boundary, by encoding-decoding process It is divided into multiple encoding and decoding stages, is chosen in each encoding and decoding stage according to original input information symbol updated in step S202 Mechanism and the distribution of coding degree are encoded.
Coding in the step S203 includes:
Step S2031:The updated original input information symbol selection mechanism of optimization and coding obtained in obtaining step S202 Degree distribution.
Step S2032:The original input information symbol selection mechanism generation obtained according to step S2031 participates in the current generation The original input information assemble of symbol of coding.
Step S2033:The coding degree distribution generation angle value obtained according to step S2031.
Step S2034:It is chosen in equivalent steps S2033 from the original input information assemble of symbol that step S2032 is obtained Generate the original input information symbol of angle value quantity.
Step S2035:The original input information symbol that step S2034 is chosen carries out mould two plus operation generation coding symbol Number.
Step S204:Encoded in the receiving step S203 of legitimate receipt end generation coded identification go forward side by side the trade last stage solution Code;
Decoding in the step S204 includes:
Step S2041:Find out the coded identification and original input information associated with coded identification this described that angle value is 1 Symbol decodes termination if not finding out.
Step S2042:The obtained original input information symbols of step S2041 and coded identification associated there are carried out Xor operation, and delete the coded identification and be associated with original input information symbol this described.
Step S2043:Repeat step S2041, step S2042.
Step S2044:Legitimate receipt end determines the volume in this stage according to the quantity of original input information symbol solved Whether decoding terminates, and feedback information is sent when the encoding and decoding in this stage terminate to transmitting terminal.
Step S2045:Step S2041- step S2044 are repeated, until legitimate receipt end accords with all original input informations It number solves.
Step S205:It generates new feedback information during each encoding and decoding stage triggering feedback occurrence condition and terminates the volume solution New feedback information is sent to transmitting terminal to carry out step S202 by code stage, legitimate receipt end, and the feedback information, which includes, to be closed The original input information symbol situation that method receiving terminal has solved.
Feedback mechanism in the step S205 includes:
Step S2051:Using traditional fountain codes concept and combined standard tree analysis principle, obtain receiving terminal solution extracting rate and compiled with receiving The variation relation of code symbol number determines that each encoding and decoding stage legitimate receipt end sends the opportunity of feedback with the variation relation, I.e. when solution extracting rate is most fast with reception coding symbol number variation, legitimate receipt end and listener-in end solution extracting rate difference are opposite most Greatly, feedback information is sent at this time to transmitting terminal.
Step S2052:Continue the decoding result of receiving step S204, when reaching the feedback opportunity that step S2051 is determined, It terminates the current codec stage and generates feedback information, the feedback information is originally inputted letter including what legitimate receipt end had solved Cease symbol and the quantity of the original input information symbol.
Step S2053:Feedback information is sent to transmitting terminal.
Step S206:When the decoding of whole original input information symbols is completed at legitimate receipt end, it is whole to send feedback command Only transmission process, and export decoding result.
What deserves to be explained is entire encoding-decoding process is divided into multiple stages, each encoding and decoding stage to feed back the moment as boundary Next code process is no longer participate in by the original input information symbol that legitimate receipt end solves;According to coded identification solution extracting rate with connecing The variation relation of number of coded symbols is received, determines that the feedback at legitimate receipt end is happened at legitimate receiver in each encoding and decoding stage At the time of extracting rate difference relative maximum being solved with listener-in end;After each encoding and decoding stage feeds back, the stage be immediately finished and Transmitting terminal synchronizes optimization update to original input information symbol selection mechanism and coding the degree distribution of encoding-decoding process;Work as conjunction When method receiving terminal solves whole original input information symbols, transmitting terminal stops coded identification transmission at once.
Embodiment three:
As shown in figure 3, the embodiment of the present invention it is a kind of using the safe transmission method that fountain codes are repeatedly fed back in wire communication field Application in scape.Cable network channel quality is preferable, transmission channel can be regarded to an erasure channel as, user is it is possible that receive Correct data, it is also possible to because the reasons such as network congestion do not receive data packet.Method based on the present invention can be simultaneously Ensure the reliability and security of communication, this method includes the following steps:
Step S301:Original input information assemble of symbol and the distribution of coding degree are initialized, original input information symbol can here Random generation, the distribution of coding degree is using classical robust solitary wave distribution(Robust Soliton Distribution, RSD).
Step S302:Feedback mechanism according to the present invention calculates the number of coded symbols received in the current codec stage And the original input information symbol quantity solved.It will be triggered when the number of coded symbols that receiving terminal receives reaches calculated value Feedback, the calculated value are obtained with receiving the variation relation of coding symbol number by solving extracting rate, are connect to send the opportunity of feedback The coding symbol number of receipts.
In this step, receiving terminal original input information symbolic solution extracting rate is derived according to the property of traditional fountain codes first Variation relation with receiving coding symbol number.It is then calculated under current channel condition according to above-mentioned variation relation, legitimate receipt At the time of end is with listener-in's decoding rate disparity.The opportunity that the moment occurs as feedback.Here simulated annealing may be used Algorithm can also seek extreme value using other suitable optimization algorithms.It should be noted that in this step, codec parameters, Including solution extracting rate and the variation relation for receiving coding symbol number and all feedback moment, can be calculated in advance.
Step S303:Encoding and decoding are carried out according to the codec parameters that step S302 is obtained, compile solution with traditional fountain codes herein Code process is consistent.
Step S304:Feedback information is generated when legitimate receipt end reaches feedback trigger condition and is sent to transmitting terminal;
In the step, feedback information includes legitimate receipt end to each decoded concrete condition of original input information symbol.
Step S305:Transmitting terminal adjusts original input information symbol according to feedback information and coding degree is distributed;
In the step, next code process will be no longer participate in by the original input information symbol that legitimate receipt end solves.In addition, The distribution of coding degree regenerates the distribution of coding degree according to the quantity of remaining original input information symbol.
Step S306:If legitimate receipt end does not solve whole original input information symbols also, continue from step S302 Start to repeat more than encoding-decoding process.
Example IV:
As shown in figure 4, a kind of of the embodiment of the present invention is wirelessly communicating field using the safe transmission method that fountain codes are repeatedly fed back Application in scape.Due to the opening of wireless channel, listener-in is easy to access legitimate channel and steals private information.Present invention side Method can reduce the quality-advantage demand of legitimate channel, and safer transmission is realized under the conditions of equivalent channel.This method is overall Process is similar with example three, includes the following steps:
Step S401:Original input information assemble of symbol and the distribution of coding degree are initialized, original input information symbol can here Random generation, the distribution of coding degree is using classical robust solitary wave distribution(Robust Soliton Distribution, RSD).
Step S402:Matrix scrambling is carried out to original input information symbol, remakes CRC(Cyclic redundancy check)Processing;
In the step, matrix scrambling is rapid fading in order to prevent, and CRC processing is in order to ensure receiving terminal normally receives completely Coded identification, it is ensured that the trouble-free operation of coding and feedback mechanism can also use other mechanism.Here international standard may be used Common CRC-16 methods.
Step S403:Feedback mechanism according to the present invention calculates the number of coded symbols received in the current codec stage And the original input information symbol quantity solved.It will be triggered when the number of coded symbols that receiving terminal receives reaches calculated value Feedback, the calculated value are obtained with receiving the variation relation of coding symbol number by solving extracting rate, are connect to send the opportunity of feedback The coding symbol number of receipts;
In this step, derive receiving terminal original input information symbolic solution extracting rate with connecing according to the property of traditional fountain codes first Receive the variation relation of coding symbol number.Then calculated under current channel condition according to above-mentioned variation relation, legitimate receipt end with At the time of listener-in solves extracting rate disparity.The opportunity that the moment occurs as feedback.Here simulated annealing may be used, Extreme value can also be sought using other suitable optimization algorithms.It should be noted that in this step, codec parameters, including Extracting rate and the variation relation for receiving coding symbol number and all feedback moment are solved, can be calculated in advance.
Step S404:Encoding and decoding are carried out according to the codec parameters that step S403 is obtained, compile solution with traditional fountain codes herein Code process is consistent;
Comprising dematrix scramble and solution CRC module in the step, the matrix scrambling in step S402 and CRC processing are corresponded to.
Step S405:Feedback information is generated when legitimate receipt end reaches feedback trigger condition and is sent to transmitting terminal;
In the step, feedback information includes legitimate receipt end to each decoded concrete condition of original input information symbol.
Step S406:Transmitting terminal adjusts original input information symbol according to feedback information and coding degree is distributed;
In the step, next code process will be no longer participate in by the original input information symbol that legitimate receipt end solves.In addition, The distribution of coding degree will regenerate the distribution of coding degree according to remaining original input information symbol quantity.
Step S407:If legitimate receipt end does not solve whole original input information symbols also, continue from step S402 Start to repeat more than encoding-decoding process.
What deserves to be explained is the transmitting terminal is specially the encoder-side of sender, the legitimate receipt end is specially to close The decoder end of method recipient, the listener-in end are specially the decoder end of listener-in.
Particular embodiments described above all contrasts to the principle of the present invention, technical solution and application process in detail Explanation.It should be noted that above example is indivedual application scenarios of the present invention, art technology or researcher make With the various changes towards actual demand can be carried out during the method for the present invention, the core concept scope of the present invention is not departed from. Therefore, the present invention is actually also intended to changes or modifications towards concrete application comprising these.

Claims (6)

1. a kind of safe transmission method repeatedly fed back using fountain codes, which is characterized in that include the following steps:
Step 1:Original input information assemble of symbol and the distribution of coding degree, the original input information symbol are initialized in transmitting terminal Set includes multiple original input information symbols;
Step 2:Transmitting terminal chooses the original input information symbol in encoding-decoding process according to the decoding cases at legitimate receipt end Mechanism and the distribution of coding degree optimize update, and the optimization update includes generating original input information symbol needed for coded identification Selection and coding degree distribution angle value range adjustment;
Step 3:Encoding-decoding process is divided into multiple by transmitting terminal using the feedback information moment for receiving the transmission of legitimate receipt end as boundary The encoding and decoding stage, according to original input information symbol selection mechanism updated in step 2 and coding in each encoding and decoding stage Degree distribution is encoded;
Step 4:Encoded in legitimate receipt end receiving step 3 generation coded identification go forward side by side the trade last stage decoding;
Step 5:It generates new feedback information during each encoding and decoding stage triggering feedback occurrence condition and terminates the encoding and decoding stage, New feedback information is sent to transmitting terminal to carry out step 2 by legitimate receipt end, and the feedback information has included legitimate receipt end The original input information symbol situation solved;
Step 6:When the decoding of whole original input information symbols is completed at legitimate receipt end, send feedback command termination and be transmitted across Journey, and export decoding result.
2. a kind of safe transmission method repeatedly fed back using fountain codes according to claim 1, which is characterized in that described At the time of feeding back occurrence condition for legitimate receiver in each encoding and decoding stage and listener-in's solution extracting rate difference relative maximum.
3. a kind of safe transmission method repeatedly fed back using fountain codes according to claim 1, which is characterized in that described Step 2 includes:
Step 2.1:The original input information that the value range that coding degree is distributed is become not solved by legitimate receipt end also currently The quantity of symbol;
Step 2.2:It will be removed in original input information assemble of symbol by the original input information symbol that legitimate receipt end solves It goes, coded identification is used in the remaining subset for not solving generation original input information assemble of symbol in original input information symbol Generation.
4. a kind of safe transmission method repeatedly fed back using fountain codes according to claim 1, which is characterized in that described Coding in step 3 includes:
Step 3.1:The updated original input information symbol selection mechanism of optimization and coding degree point obtained in obtaining step 2 Cloth;
Step 3.2:The original input information symbol selection mechanism generation obtained according to step 3.1 participates in the original encoded the current generation Begin input information symbol set;
Step 3.3:The coding degree distribution generation angle value obtained according to step 3.1;
Step 3.4:It is chosen from the original input information assemble of symbol that step 3.2 obtains and angle value number is generated in equivalent steps 3.3 The original input information symbol of amount;
Step 3.5:The original input information symbol that step 3.4 is chosen carries out mould two plus operation generation coded identification.
5. a kind of safe transmission method repeatedly fed back using fountain codes according to claim 1, which is characterized in that described Decoding in step 4 includes:
Step 4.1:Find out the coded identification and original input information associated with coded identification this described symbol that angle value is 1 Number, termination is decoded if not finding out;
Step 4.2:The original input information symbol that step 4.1 is obtained and coded identification associated there carry out exclusive or behaviour Make, and delete the coded identification and be associated with original input information symbol this described;
Step 4.3:Repeat step 4.1, step 4.2;
Step 4.4:Legitimate receipt end determines that the encoding and decoding in this stage are according to the quantity of original input information symbol solved No termination sends feedback information to transmitting terminal when the encoding and decoding in this stage terminate;
Step 4.5:Step 4.1- steps 4.4 are repeated, until legitimate receipt end solves all original input information symbols.
6. a kind of safe transmission method repeatedly fed back using fountain codes according to claim 1, which is characterized in that described Feedback mechanism in step 5 includes:
Step 5.1:Using traditional fountain codes concept and combined standard tree analysis principle, obtain receiving terminal solution extracting rate and encoded with receiving The variation relation of symbolic number determines that each encoding and decoding stage legitimate receipt end sends the opportunity of feedback, i.e., with the variation relation When solution extracting rate is most fast with reception coding symbol number variation, legitimate receipt end solves extracting rate difference relative maximum with listener-in end, Feedback information is sent at this time to transmitting terminal;
Step 5.2:Continue the decoding result of receiving step 4, when reaching the feedback opportunity that step 5.1 determines, terminate current compile Decoding stage simultaneously generates feedback information, and the feedback information includes the original input information symbol that has solved of legitimate receipt end and should The quantity of the original input information symbol;
Step 5.3:Feedback information is sent to transmitting terminal.
CN201810381053.0A 2018-04-25 2018-04-25 A kind of safe transmission method repeatedly fed back using fountain codes Pending CN108259138A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810381053.0A CN108259138A (en) 2018-04-25 2018-04-25 A kind of safe transmission method repeatedly fed back using fountain codes

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810381053.0A CN108259138A (en) 2018-04-25 2018-04-25 A kind of safe transmission method repeatedly fed back using fountain codes

Publications (1)

Publication Number Publication Date
CN108259138A true CN108259138A (en) 2018-07-06

Family

ID=62748323

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810381053.0A Pending CN108259138A (en) 2018-04-25 2018-04-25 A kind of safe transmission method repeatedly fed back using fountain codes

Country Status (1)

Country Link
CN (1) CN108259138A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108718225A (en) * 2018-08-25 2018-10-30 中国人民解放军战略支援部队信息工程大学 A kind of safe transmission method based on the interference of fountain codes key coded identification
CN109412750A (en) * 2018-09-19 2019-03-01 西安交通大学 Anti- eavesdropping transmission method based on fountain codes in a kind of multimedia communication
CN114978419A (en) * 2022-04-26 2022-08-30 青海师范大学 Data coding and decoding method based on improved on-line fountain codes for underwater acoustic network

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103051424A (en) * 2013-01-07 2013-04-17 北京理工大学 Wireless transmission method for varied error protective fountain code
CN103716134A (en) * 2013-11-21 2014-04-09 浙江大学 Encoding method of fountain codes with gradually-increased degrees under condition of one-time feedback
US20140307665A1 (en) * 2011-12-07 2014-10-16 Huawei Technologies Co., Ltd. Unicast communication method, apparatus, and system
CN104539387A (en) * 2014-11-28 2015-04-22 杜秀娟 Hop-by-hop reliable transmission control method for underwater wireless sensor network
CN107222284A (en) * 2017-07-27 2017-09-29 西安交通大学 A kind of fountain coding anti-eavesdropping transmission method in Internet of Things based on channel feedback

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140307665A1 (en) * 2011-12-07 2014-10-16 Huawei Technologies Co., Ltd. Unicast communication method, apparatus, and system
CN103051424A (en) * 2013-01-07 2013-04-17 北京理工大学 Wireless transmission method for varied error protective fountain code
CN103716134A (en) * 2013-11-21 2014-04-09 浙江大学 Encoding method of fountain codes with gradually-increased degrees under condition of one-time feedback
CN104539387A (en) * 2014-11-28 2015-04-22 杜秀娟 Hop-by-hop reliable transmission control method for underwater wireless sensor network
CN107222284A (en) * 2017-07-27 2017-09-29 西安交通大学 A kind of fountain coding anti-eavesdropping transmission method in Internet of Things based on channel feedback

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
汪立康,彭建华,易鸣: "一种基于反馈的喷泉码安全传输方法", 《计算机应用研究》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108718225A (en) * 2018-08-25 2018-10-30 中国人民解放军战略支援部队信息工程大学 A kind of safe transmission method based on the interference of fountain codes key coded identification
CN108718225B (en) * 2018-08-25 2021-03-23 中国人民解放军战略支援部队信息工程大学 Safe transmission method based on fountain code key coding symbol interference
CN109412750A (en) * 2018-09-19 2019-03-01 西安交通大学 Anti- eavesdropping transmission method based on fountain codes in a kind of multimedia communication
CN109412750B (en) * 2018-09-19 2020-03-31 西安交通大学 Anti-eavesdrop transmission method based on fountain codes in multimedia communication
CN114978419A (en) * 2022-04-26 2022-08-30 青海师范大学 Data coding and decoding method based on improved on-line fountain codes for underwater acoustic network
CN114978419B (en) * 2022-04-26 2023-02-10 青海师范大学 Data coding and decoding method based on improved on-line fountain codes for underwater acoustic network
US11722245B2 (en) 2022-04-26 2023-08-08 Qinghai Normal University Data encoding and decoding method for underwater acoustic networks (UANs) based on improved online fountain code

Similar Documents

Publication Publication Date Title
CN108259138A (en) A kind of safe transmission method repeatedly fed back using fountain codes
CN107196732B (en) Anti-eavesdrop coding method based on fountain codes coding
CN105490771B (en) A kind of building method of LT fountain codes coding degree distribution
CN103428227A (en) IP covert communication method based on Huffman encoding
CN109510687A (en) A kind of fountain code encoding method based on satellite communication
CN105306168A (en) Method for guaranteeing secure transmission of wireless data based on fountain codes
CN101582744A (en) Encoding and decoding method of RS fountain codes based on iterative approach
CN108183771A (en) Data processing method, equipment and system in optical network system
CN101414833A (en) Method and apparatus for encoding low-density generated matrix code
CN101420291A (en) Combined decoding method for network and channel code in relay system
CN102594492A (en) Code block dividing method and device
CN104135345A (en) Cross-layer coding and decoding method applied to long-term evolution system
CN101540778B (en) Method, device and system for transmitting data
CN109361492B (en) High-performance decoding method combining physical layer network coding and polarization code
CN107222284B (en) The anti-eavesdropping transmission method of fountain coding based on channel feedback in a kind of Internet of Things
CN108768902A (en) It is a kind of improved based on fountain codes anti-eavesdrop method
CN109787719B (en) Probability relay assisted polarization security coding method
CN107222294A (en) A kind of improved fountain codes degree Distribution Algorithm
CN101286745A (en) Coding method and device by interleaving
CN105915317B (en) It can the decoded forward erasure correction code code coefficient Matrix Construction Method of Zigzag
CN109586850B (en) Polarization code-based hierarchical data coordination method for continuous variable quantum key distribution system
CN102065289B (en) Reliable video transmission method and device based on network coding
CN103812615A (en) Coding method for Luby transform code in distributed communication system, and relay communication method
CN107257244A (en) A kind of fountain code encoding method based under broadcast environment
CN104993905B (en) The degree distribution optimization method and coding and decoding method of system LT code under erasure channel

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180706