Liu Jian, Wang Xiao-jun, Zhou Xi-yuan. Blind Recognition of Convolutional Coding Based on Walsh-Hadamard Transform[J]. Journal of Electronics & Information Technology, 2010, 32(4): 884-888. doi: 10.3724/SP.J.1146.2009.00359
Citation:
Liu Jian, Wang Xiao-jun, Zhou Xi-yuan. Blind Recognition of Convolutional Coding Based on Walsh-Hadamard Transform[J]. Journal of Electronics & Information Technology, 2010, 32(4): 884-888. doi: 10.3724/SP.J.1146.2009.00359
Liu Jian, Wang Xiao-jun, Zhou Xi-yuan. Blind Recognition of Convolutional Coding Based on Walsh-Hadamard Transform[J]. Journal of Electronics & Information Technology, 2010, 32(4): 884-888. doi: 10.3724/SP.J.1146.2009.00359
Citation:
Liu Jian, Wang Xiao-jun, Zhou Xi-yuan. Blind Recognition of Convolutional Coding Based on Walsh-Hadamard Transform[J]. Journal of Electronics & Information Technology, 2010, 32(4): 884-888. doi: 10.3724/SP.J.1146.2009.00359
In order to solve the problem of the blind recognition of channel coding, a method of blind recognition of (n, 1, m) convolutional coding in the high bit error rate condition is proposed. Firstly, the mathematical model of the blind recognition is given, and then the application field of walsh-hadamard transform is enlarged. The authors show that putting the intercepted codes walsh-hadamard transform can be used to solve the problem of blind recognition of convolutional codes, which is usually applied to adaptive communication, information interception and cryptanalysis. The simulation experiments show the proposed methods can recognize the convolutional coding parameters effectively.
Lu Pei-zhong, Shen Li, Zou Yan, and Luo Xiang-yang. Blindrecognition of punctured convolutional codes[J].Science inChina Ser. F Information Sciences.2005, 48(4):484-498[2]Begin G and Haccoun D. High-rate punctured convolutionalcodes: Structure properties and construction techniques [J].IEEE Transactions on Communicaitons.1989, 37(11):1381-1385[3]邹艳,陆佩忠. 关键方程的新推广[J]. 计算机学报,2006, 29(5):712-718.Zou Yan and Lu Pei-zhong. A new generalization of keyequation[J]. Chinese Journal of Computers, 2006, 29(5):712-718.[4]Wang Feng-hua, Huang Zhi-tao, and Zhou Yi-yu. A methodfor blind recognition of convolution code based euclideanalgorithm[C].// IEEE International Conference on WirelessCommunications. Shanghai: IEEE Press, 2007: 1414-1417.[5]王新梅,肖国镇. 纠错码原理与方法[M]. 西安:西安电子科技大学出版社, 1991: 378-415.Wang Xin-mei and Xiao Guo-zhen. Theory and Method ofError-Correcting Codes[M]. Xian: Xidian University Press,1991: 378-415.[6]刘玉君. 信道编码(修订版)[M]. 郑州:河南科学技术出版社,2001: 190-256.Liu Yu-jun. Channel Coding[M]. Zhengzhou: Henan SciencePress, 2001: 190-256.[7]邹艳,陆佩忠,朱雪岭. 软判决快速相关攻击新算法与应用[J].计算机研究与发展,2007,44(4):581-588.Zou Yan, Lu Pei-zhong and Zhu Xue-line. A novel algorithmof soft fast correlation attack and applications [J]. Journal ofComputer Research and Developrent, 2007, 44(4): 581-588.