Abstract

Fountain coding is a new paradigm for enhancing wireless communications security. In this paper, we investigate how to dynamically construct the fountain code to prevent information leakage and reduce the decoding delay at the legitimate receiver. To be specific, a method is developed to determine how many source packets should be used and which source packets should be chosen to participate in the fountain coding process, taking into account the channel quality, delay constraint, as well as the priorities of various source packets. We also apply the proposed scheme to practical image transmission, and demonstrate the advantages of our scheme via numerical simulations.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call