Please wait a minute...
Chin. Phys. B, 2008, Vol. 17(10): 3609-3615    DOI: 10.1088/1674-1056/17/10/013
GENERAL Prev   Next  

Implementation of LT codes based on chaos

Zhou Qian(周茜), Li Liang(李亮), Chen Zeng-Qiang(陈增强), and Zhao Jia-Xiang(赵加祥)
College of Information Technical Science, Nankai University, Tianjin 300071, China
Abstract  Fountain codes provide an efficient way to transfer information over erasure channels like the Internet. LT codes are the first codes fully realizing the digital fountain concept. They are asymptotically optimal rateless erasure codes with highly efficient encoding and decoding algorithms. In theory, for each encoding symbol of LT codes, its degree is randomly chosen according to a predetermined degree distribution, and its neighbours used to generate that encoding symbol are chosen uniformly at random. Practical implementation of LT codes usually realizes the randomness through pseudo-randomness number generator like linear congruential method. This paper applies the pseudo-randomness of chaotic sequence in the implementation of LT codes. Two Kent chaotic maps are used to determine the degree and neighbour(s) of each encoding symbol. It is shown that the implemented LT codes based on chaos perform better than the LT codes implemented by the traditional pseudo-randomness number generator.
Keywords:  digital fountain      fountain codes      LT codes      Kent chaotic map  
Received:  02 April 2008      Revised:  14 April 2008      Accepted manuscript online: 
PACS:  05.45.Vx (Communication using chaos)  
  05.45.Pq (Numerical simulations of chaotic systems)  
  84.40.Ua (Telecommunications: signal transmission and processing; communication satellites)  
Fund: Project supported in part by the National Natural Science Foundation of China (Grant Nos 60774088 and 10772135), the Program for New Century Excellent Talents in University of China (NCET), and the Foundation of the Application Base and Frontier Technology Research Project of Tianjin (Grant Nos 08JCZDJC21900 and 07CYBJC05800).

Cite this article: 

Zhou Qian(周茜), Li Liang(李亮), Chen Zeng-Qiang(陈增强), and Zhao Jia-Xiang(赵加祥) Implementation of LT codes based on chaos 2008 Chin. Phys. B 17 3609

[1] FPGA implementation and image encryption application of a new PRNG based on a memristive Hopfield neural network with a special activation gradient
Fei Yu(余飞), Zinan Zhang(张梓楠), Hui Shen(沈辉), Yuanyuan Huang(黄园媛), Shuo Cai(蔡烁), and Sichun Du(杜四春). Chin. Phys. B, 2022, 31(2): 020505.
[2] Acoustic wireless communication based on parameter modulation and complex Lorenz chaotic systems with complex parameters and parametric attractors
Fang-Fang Zhang(张芳芳), Rui Gao(高瑞), and Jian Liu(刘坚). Chin. Phys. B, 2021, 30(8): 080503.
[3] A novel method of constructing high-dimensional digital chaotic systems on finite-state automata
Jun Zheng(郑俊), Han-Ping Hu(胡汉平). Chin. Phys. B, 2020, 29(9): 090502.
[4] A novel image encryption scheme based on Kepler's third law and random Hadamard transform
Yu-Ling Luo(罗玉玲), Rong-Long Zhou(周戎龙), Jun-Xiu Liu(刘俊秀), Sen-Hui Qiu(丘森辉), Yi Cao(曹弋). Chin. Phys. B, 2017, 26(12): 120504.
[5] A novel color image encryption scheme using fractional-order hyperchaotic system and DNA sequence operations
Li-Min Zhang(张立民), Ke-Hui Sun(孙克辉), Wen-Hao Liu(刘文浩), Shao-Bo He(贺少波). Chin. Phys. B, 2017, 26(10): 100504.
[6] An image encryption scheme based on three-dimensional Brownian motion and chaotic system
Xiu-Li Chai(柴秀丽), Zhi-Hua Gan(甘志华), Ke Yuan(袁科), Yang Lu(路杨), Yi-Ran Chen(陈怡然). Chin. Phys. B, 2017, 26(2): 020504.
[7] A self-cited pixel summation based image encryption algorithm
Guo-Dong Ye(叶国栋), Xiao-Ling Huang(黄小玲), Leo Yu Zhang(张愉), Zheng-Xia Wang(王政霞). Chin. Phys. B, 2017, 26(1): 010501.
[8] A novel color image encryption algorithm based on genetic recombination and the four-dimensional memristive hyperchaotic system
Xiu-Li Chai(柴秀丽), Zhi-Hua Gan(甘志华), Yang Lu(路杨), Miao-Hui Zhang(张苗辉), Yi-Ran Chen(陈怡然). Chin. Phys. B, 2016, 25(10): 100503.
[9] Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords
Xie Qi (谢琪), Hu Bin (胡斌), Chen Ke-Fei (陈克非), Liu Wen-Hao (刘文浩), Tan Xiao (谭肖). Chin. Phys. B, 2015, 24(11): 110505.
[10] Secure communication based on spatiotemporal chaos
Ren Hai-Peng (任海鹏), Bai Chao (白超). Chin. Phys. B, 2015, 24(8): 080503.
[11] An efficient three-party password-based key agreement protocol using extended chaotic maps
Shu Jian (舒剑). Chin. Phys. B, 2015, 24(6): 060509.
[12] Signal reconstruction in wireless sensor networks based on a cubature Kalman particle filter
Huang Jin-Wang (黄锦旺), Feng Jiu-Chao (冯久超). Chin. Phys. B, 2014, 23(7): 070504.
[13] Hyper-chaos encryption using convolutional masking and model free unmasking
Qi Guo-Yuan (齐国元), Sandra Bazebo Matondo. Chin. Phys. B, 2014, 23(5): 050507.
[14] A fast image encryption algorithm based on only blocks in cipher text
Wang Xing-Yuan (王兴元), Wang Qian (王倩). Chin. Phys. B, 2014, 23(3): 030503.
[15] Gradient method for blind chaotic signal separation based on proliferation exponent
Lü Shan-Xiang (吕善翔), Wang Zhao-Shan (王兆山), Hu Zhi-Hui (胡志辉), Feng Jiu-Chao (冯久超). Chin. Phys. B, 2014, 23(1): 010506.
No Suggested Reading articles found!