SlideShare a Scribd company logo
Lecture:1 Date: 7/9/2010
Rahul K. Kher
Assistant Professor,
Department of Electronics & Communication
Engg.
710402: Information Theory &
Coding
Course Contents
 Three segments: Source Coding, Channel
Coding and Cryptography
 Concept and need of coding: Entropy,
Redundancy of data etc.
 Source coding techniques:
Unique decodable codes (UDC)
Instantaneous decodable codes (IDC)
Huffman and Shannon-Fano codes
Arithmetic Coding
Lossless vs. lossy coding (compression)
 Channel coding techniques:
Linear Block codes
Cyclic codes
Hamming codes
BCH codes
Reed-Solomon codes
Convolutional Coding and decoding algorithms
 Cryptography
Concept and need of coding
A simple coding Example
2-out-of-5 code
 The message "173" has the following code:
110001000101100.
 How do we decode the 2-out-of-5 code?
 Of course, the first five binary digits correspond to
the first decimal one, and after decoding them, we
proceed to the second group of five binary digits,
etc.
 A helpful mnemonic rule: use 01247 as a "weight"
of the five columns, and add the weights of all l's in
your words. Examples: 110001 0+1 = 1 and
011001 1+2 = 3.
 Unfortunately, 0 is an exception.
Unique Decoding
 Definition. For each coding K (of source
symbols), we define the coding of source
messages as the rule K*, which to each word x1,
x2, …xm in the source alphabet assigns the word
K* (x1 x2... xm) = K(x1) K(x2)... K(xm) obtained
by concatenation of the code words K(xi), i = 1,
..., m.
 The coding K is said to be uniquely decodable
provided that arbitrary two distinct source
messages have distinct codes. In other words,
provided that K* is one-to-one.
 For example, the 2-out-of-5 code is uniquely
decodable. The assignment of a binary word to
"173" is a sample of coding source messages.
 In contrast, the following coding
 a 00 ; b 10 ; c 101; d 110 ; e
1001
is not uniquely decodable: try to decode 10110.
 We now introduce two important types of uniquely
decodable codes: Block codes and Instantaneous
codes
 Instantaneous codes: codes of variable word
lengths decodable symbol per symbol.
A coding is called instantaneous provided that no
code word is a prefix of another code word; i.e., if a
source symbol has a code b1 b2 ... bn then no
other source symbol has a code
b1 b2 ... bn bn+1 ...bm.
 Block codes, are the special case of
instantaneous codes with constant word length.
A coding using only pairwise distinct code words of
a certain length n is called a block coding of length
n.
Examples
 The Morse code is an example of instantaneous
code with the code alphabet { • , — , space }.
 An important example of a block code is the octal
code:
 Suppose that we are to find a binary coding for
the alphabet {0,1,2,3}, and we observe that 0
appears much more often in source messages
than any other symbols. Then the following
coding seems reasonable:
 0 0; 1 01; 2 011; 3 111
Some important Block codes
 Octal codes:
 Hexadecimal codes:
 ASCII codes:
A very important code used for a standard binary
representation of alphabetic and numeric symbols is
the ASCII code. It has 27 = 128 source symbols
encoded into binary words of length 8: the first
seven symbols carry the information, and the eighth
one is set in such a way that the parity is even (i.e.,
each code word contains an even number of l's).
The role of this eighth symbol is to enable detection
of single errors. For example, the letter A has code
Similarly, the letter “a” has code: 1 100 001
710402_Lecture 1.ppt

More Related Content

PPTX
Lecture 3.pptx
PPTX
Lecture 3.pptx
PPT
Information Theory MSU-EEE.ppt
PDF
Basics of coding theory
PDF
Shan.pdfFully Homomorphic Encryption (FHE)
PPT
3F4ecc.ppten cje cen cne cdn en c e cnec cen
PPT
Stallings Kurose and Ross
PPT
3F4ecc.ppt
Lecture 3.pptx
Lecture 3.pptx
Information Theory MSU-EEE.ppt
Basics of coding theory
Shan.pdfFully Homomorphic Encryption (FHE)
3F4ecc.ppten cje cen cne cdn en c e cnec cen
Stallings Kurose and Ross
3F4ecc.ppt

Similar to 710402_Lecture 1.ppt (20)

PPTX
Digital Fundamental - Binary Codes-Logic Gates
PPT
Huffman Coding
PPT
Huffman coding
PDF
DigitalLogic_CharacterCodes.pdf advanced
PPT
Digital Communication: Channel Coding
PDF
Sienna 12 huffman
PPTX
Reed Soloman and convolution codes
PPT
huffman ppt
PPT
Huffmans code
PPT
Komdat-Kompresi Data
PPT
Huffman Coding.ppt
PPTX
linear block code.pptxjdkdidjdjdkdkidndndjdj
PPTX
Information Theory and coding - Lecture 3
PPT
Compression Ii
PPT
Compression Ii
PPTX
linear codes and cyclic codes
PPTX
Presentation ppt 3.pptx
PDF
coding.pdf
PPTX
Fundamental Limits on Performance in InformationTheory.pptx
PPTX
Digital image processing- Compression- Different Coding techniques
Digital Fundamental - Binary Codes-Logic Gates
Huffman Coding
Huffman coding
DigitalLogic_CharacterCodes.pdf advanced
Digital Communication: Channel Coding
Sienna 12 huffman
Reed Soloman and convolution codes
huffman ppt
Huffmans code
Komdat-Kompresi Data
Huffman Coding.ppt
linear block code.pptxjdkdidjdjdkdkidndndjdj
Information Theory and coding - Lecture 3
Compression Ii
Compression Ii
linear codes and cyclic codes
Presentation ppt 3.pptx
coding.pdf
Fundamental Limits on Performance in InformationTheory.pptx
Digital image processing- Compression- Different Coding techniques

More from Pratik Gohel (20)

PPTX
introduction to ARM C programming language
PPT
EDGEDETECTION algorithm and theory for image processing
PPT
Introduction to Asic Design and VLSI Design
PPT
Information and Theory coding Lecture 18
PPT
introduction to machine learning 3c.pptx
PPTX
introduction to machine learning 3c-feature-extraction.pptx
PPTX
introduction to machine learning 3d-collab-filtering.pptx
PPT
13486500-FFT.ppt
PPTX
Introduction to embedded System.pptx
PPT
Lecture 3.ppt
PPTX
UNIT-2.pptx
PPTX
Interdependencies of IoT and cloud computing.pptx
PDF
Chapter1.pdf
PPTX
6-IoT protocol.pptx
PPTX
IOT gateways.pptx
PPTX
AVRTIMER.pptx
PPTX
C Programming for ARM.pptx
PPTX
ARM Introduction.pptx
PDF
PPT
machine learning.ppt
introduction to ARM C programming language
EDGEDETECTION algorithm and theory for image processing
Introduction to Asic Design and VLSI Design
Information and Theory coding Lecture 18
introduction to machine learning 3c.pptx
introduction to machine learning 3c-feature-extraction.pptx
introduction to machine learning 3d-collab-filtering.pptx
13486500-FFT.ppt
Introduction to embedded System.pptx
Lecture 3.ppt
UNIT-2.pptx
Interdependencies of IoT and cloud computing.pptx
Chapter1.pdf
6-IoT protocol.pptx
IOT gateways.pptx
AVRTIMER.pptx
C Programming for ARM.pptx
ARM Introduction.pptx
machine learning.ppt

Recently uploaded (20)

PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
composite construction of structures.pdf
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
Well-logging-methods_new................
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
OOP with Java - Java Introduction (Basics)
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
DOCX
573137875-Attendance-Management-System-original
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
Construction Project Organization Group 2.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
web development for engineering and engineering
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
bas. eng. economics group 4 presentation 1.pptx
composite construction of structures.pdf
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Well-logging-methods_new................
Foundation to blockchain - A guide to Blockchain Tech
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
OOP with Java - Java Introduction (Basics)
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Internet of Things (IOT) - A guide to understanding
UNIT 4 Total Quality Management .pptx
CYBER-CRIMES AND SECURITY A guide to understanding
573137875-Attendance-Management-System-original
Structs to JSON How Go Powers REST APIs.pdf
Construction Project Organization Group 2.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
web development for engineering and engineering

710402_Lecture 1.ppt

  • 1. Lecture:1 Date: 7/9/2010 Rahul K. Kher Assistant Professor, Department of Electronics & Communication Engg. 710402: Information Theory & Coding
  • 2. Course Contents  Three segments: Source Coding, Channel Coding and Cryptography  Concept and need of coding: Entropy, Redundancy of data etc.  Source coding techniques: Unique decodable codes (UDC) Instantaneous decodable codes (IDC) Huffman and Shannon-Fano codes Arithmetic Coding Lossless vs. lossy coding (compression)
  • 3.  Channel coding techniques: Linear Block codes Cyclic codes Hamming codes BCH codes Reed-Solomon codes Convolutional Coding and decoding algorithms  Cryptography
  • 4. Concept and need of coding
  • 5. A simple coding Example 2-out-of-5 code
  • 6.  The message "173" has the following code: 110001000101100.  How do we decode the 2-out-of-5 code?  Of course, the first five binary digits correspond to the first decimal one, and after decoding them, we proceed to the second group of five binary digits, etc.  A helpful mnemonic rule: use 01247 as a "weight" of the five columns, and add the weights of all l's in your words. Examples: 110001 0+1 = 1 and 011001 1+2 = 3.  Unfortunately, 0 is an exception.
  • 7. Unique Decoding  Definition. For each coding K (of source symbols), we define the coding of source messages as the rule K*, which to each word x1, x2, …xm in the source alphabet assigns the word K* (x1 x2... xm) = K(x1) K(x2)... K(xm) obtained by concatenation of the code words K(xi), i = 1, ..., m.  The coding K is said to be uniquely decodable provided that arbitrary two distinct source messages have distinct codes. In other words, provided that K* is one-to-one.
  • 8.  For example, the 2-out-of-5 code is uniquely decodable. The assignment of a binary word to "173" is a sample of coding source messages.  In contrast, the following coding  a 00 ; b 10 ; c 101; d 110 ; e 1001 is not uniquely decodable: try to decode 10110.  We now introduce two important types of uniquely decodable codes: Block codes and Instantaneous codes
  • 9.  Instantaneous codes: codes of variable word lengths decodable symbol per symbol. A coding is called instantaneous provided that no code word is a prefix of another code word; i.e., if a source symbol has a code b1 b2 ... bn then no other source symbol has a code b1 b2 ... bn bn+1 ...bm.  Block codes, are the special case of instantaneous codes with constant word length. A coding using only pairwise distinct code words of a certain length n is called a block coding of length n.
  • 10. Examples  The Morse code is an example of instantaneous code with the code alphabet { • , — , space }.
  • 11.  An important example of a block code is the octal code:
  • 12.  Suppose that we are to find a binary coding for the alphabet {0,1,2,3}, and we observe that 0 appears much more often in source messages than any other symbols. Then the following coding seems reasonable:  0 0; 1 01; 2 011; 3 111
  • 13. Some important Block codes  Octal codes:  Hexadecimal codes:
  • 14.  ASCII codes: A very important code used for a standard binary representation of alphabetic and numeric symbols is the ASCII code. It has 27 = 128 source symbols encoded into binary words of length 8: the first seven symbols carry the information, and the eighth one is set in such a way that the parity is even (i.e., each code word contains an even number of l's). The role of this eighth symbol is to enable detection of single errors. For example, the letter A has code Similarly, the letter “a” has code: 1 100 001