Journal of Applied and Industrial Mathematics

, Volume 9, Issue 4, pp 540–546 | Cite as

Construction of linear and robust codes that is based on the scaling function coefficients of wavelet transforms



Wavelet transforms are used in many areas such as computer graphics, image and signal processing, and speech recognition. We propose a way of applying the wavelet transform in coding theory. Wavelet analysis is a special type of linear transformation of signals and physical data on the basis of which it is possible to construct a linear code. The error protection schemes, based on linear codes, do not provide the same level of protection against all possible errors, but concentrate their detecting abilities on a specific set of errors. This dependence of the abilities of a linear code on the distribution of errors may distort the data to be protected in the case when the error does not belong to the set of undetectable errors. To reduce the probability of error masking, the robust codes are used. Robust codes are nonlinear codes independent of the type and dimension of the error. Some methods are suggested for constructing the linear and robust codes that is based on wavelet transforms.


robust code linear code wavelet decomposition scaling function probability of error detection 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    A. N. Yakovlev, Introduction to Wavelet Transforms (Novosib. Gos. Tekhn. Univ., Novosibirsk, 2003) [in Russian].Google Scholar
  2. 2.
    I. Daubechies, Ten Lectures on Wavelets (SIAM, 1992; Regulyarn. i Khaotich. Dinamika, Izhevsk, 2001).MATHGoogle Scholar
  3. 3.
    C. K. Chui, An Introduction to Wavelets (Academic Press, London, 1992; Mir,Moscow, 2001).MATHGoogle Scholar
  4. 4.
    I. Ya. Novikov, V. Yu. Protasov, and M. A. Skopina, Theory of Spikes (Fizmatlit, Moscow, 2006) [inRussian].Google Scholar
  5. 5.
    V. I. Vorob’ev and V. G. Gribunin, Theory and Practice of Wavelet Transform (VUS, St.-Petersburg, 1999) [in Russian].Google Scholar
  6. 6.
    Yu. K. Dem’yanovich and V. A. Khodakovskii, Introduction toWavelet Theory: Lectures (Petersburg State Transport University, St.-Petersburg, 2007) [in Russian].Google Scholar
  7. 7.
    Yu. K. Dem’yanovich and O. M. Kosogorov, “Algorithms of Parallel Wavelet-Spline Adaptive Contraction,” in High-Performance Parallel Computations on Cluster Systems: Proceedings of the 6th International Workshop, Vol. 1 (St.-Petersburg Gos. Univ., St.-Petersburg, 2007), pp. 169–175.Google Scholar
  8. 8.
    Yu. K. Dem’yanovich and O. M. Kosogorov, “On ParallelWavelet-Spline Adaptive Contraction,” in Control Processes and Stability: Proceedings of the 38th International Conference of PhD-Students and Students (St.-Petersburg Gos. Univ., St.-Petersburg, 2007), pp. 152–155.Google Scholar
  9. 9.
    Yu. K. Demyanovich and A. B. Levina, “On Wavelet Decompositions of Linear Spaces over Arbitrary Field and Some Applications,” Mat. Model. 20 (11), 104–108 (2008).MATHMathSciNetGoogle Scholar
  10. 10.
    A. B. Levina, “Using the FirstOrder Splines in Ciphering,” Vestnik St.-Petersburg Gos. Univ. Ser. 10: Prikl. Mat. Inform. Protsessy Upravlen. No. 3, 81–93 (2009).Google Scholar
  11. 11.
    A. B. Levina, Spline-Wavelets and Some Applications of Them (LAP LAMBERT Acad. Publ., Saarbrucken, 2011).Google Scholar
  12. 12.
    M. G. Karpovsky and A. Taubin, “A New Class of Nonlinear Systematic Error Detecting Codes,” IEEE Trans. Inform. Theory 50 (8), 1818–1820 (2004).MATHMathSciNetCrossRefGoogle Scholar
  13. 13.
    K. J. Kulikowski, M. G. Karpovsky, and A. Taubin, “Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection,” in Lecture Notes in Computer Science, Vol. 4236: Fault Diagnosis and Tolerance in Cryptography, The Third InternationalWorkshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings, Ed. by L. Breveglieri, I. Koren, D. Naccache, and J.-P. Seifert (Springer, Berlin, 2006), pp. 185–195.Google Scholar
  14. 14.
    K. J. Kulikowski, M. G. Karpovsky, and A. Taubin, “Robust Codes and Robust, Fault Tolerant Architectures of the Advanced Encryption Standard,” J. System Architecture 53, 138–149 (2007).CrossRefGoogle Scholar
  15. 15.
    Z. Wang, M. G. Karpovsky, and K. J. Kulikowski, “Design of Memories with Concurrent Error Detection and Correction by Nonlinear SEC-DED Codes,” J. Electronic Testing 5 (5), 559–580 (2010).CrossRefGoogle Scholar
  16. 16.
    Z. Wang and M. G. Karpovsky, “Algebraic Manipulation Detection Codes and Their Application for Design of Secure Cryptographic Devices,” in Proceedings of the IEEE 17th International On-Line Testing Symposium (IOLTS), 13–15 July 2011, Athens, Greece (IEEE, 2011), pp. 234–239.CrossRefGoogle Scholar

Copyright information

© Pleiades Publishing, Ltd. 2015

Authors and Affiliations

  1. 1.ITMO UniversitySt. PetersburgRussia

Personalised recommendations