TY - JOUR
T1 - Codes Correcting a Burst of Deletions or Insertions
AU - Schoeny, Clayton
AU - Wachter-Zeh, Antonia
AU - Gabrys, Ryan
AU - Yaakobi, Eitan
N1 - Publisher Copyright:
© 1963-2012 IEEE.
PY - 2017/4
Y1 - 2017/4
N2 - This paper studies codes that correct a burst of deletions or insertions. Namely, a code will be called a b-burst-deletion/insertion-correcting code if it can correct a burst of deletions/insertions of any b consecutive bits. While the lower bound on the redundancy of such codes was shown by Levenshtein to be asymptotically log(n) + b? 1, the redundancy of the best code construction by Cheng et al. is b(log(n/b + 1)). In this paper, we close on this gap and provide codes with redundancy at most log(n) + (b ? 1) log(log(n)) + b ? log(b). We first show that the models of insertions and deletions are equivalent and thus it is enough to study codes correcting a burst of deletions. We then derive a non-Asymptotic upper bound on the size of b-burst-deletion-correcting codes and extend the burst deletion model to two more cases: 1) a deletion burst of at most b consecutive bits and 2) a deletion burst of size at most b (not necessarily consecutive). We extend our code construction for the first case and study the second case for b = 3, 4.
AB - This paper studies codes that correct a burst of deletions or insertions. Namely, a code will be called a b-burst-deletion/insertion-correcting code if it can correct a burst of deletions/insertions of any b consecutive bits. While the lower bound on the redundancy of such codes was shown by Levenshtein to be asymptotically log(n) + b? 1, the redundancy of the best code construction by Cheng et al. is b(log(n/b + 1)). In this paper, we close on this gap and provide codes with redundancy at most log(n) + (b ? 1) log(log(n)) + b ? log(b). We first show that the models of insertions and deletions are equivalent and thus it is enough to study codes correcting a burst of deletions. We then derive a non-Asymptotic upper bound on the size of b-burst-deletion-correcting codes and extend the burst deletion model to two more cases: 1) a deletion burst of at most b consecutive bits and 2) a deletion burst of size at most b (not necessarily consecutive). We extend our code construction for the first case and study the second case for b = 3, 4.
KW - Insertions
KW - burst correcting codes
KW - deletions
UR - http://www.scopus.com/inward/record.url?scp=85017656728&partnerID=8YFLogxK
U2 - 10.1109/TIT.2017.2661747
DO - 10.1109/TIT.2017.2661747
M3 - Article
AN - SCOPUS:85017656728
SN - 0018-9448
VL - 63
SP - 1971
EP - 1985
JO - IEEE Transactions on Information Theory
JF - IEEE Transactions on Information Theory
IS - 4
M1 - 7837631
ER -