According to the technical specification of QR code, QR code employs
Reed-Solomon code to correct the errors when a portion of QR code was defaced or some QR code modules were wrongly decoded.
Next, students are required as an assignment to work with the actual
Reed-Solomon code used on Voyager II.
Verification algorithms, such as hash, CRC, and the
Reed-Solomon code, are used to verify whether query minutiae have security problems.
Kumar, "Soft-decision decoding of
reed-solomon codes using successive error-and-ersure decoding," in Proceedings of the 2008 IEEE Global Telecommunications Conference, GLOBECOM2008, pp.
For the attack scenario of bit flipping by increasing or decreasing values of one or more spectral components of pixels by one unit,
Reed-Solomon codes were selected.
The proposed scheme consists of channel coding performed by
Reed-Solomon codes at the user nodes and punctured convolutional code acting as network code at the common relay.
Ma, "Progressive list-enlarged algebraic soft decoding of
Reed-Solomon codes," IEEE Communications Letters, vol.
of Denmark) present chapters on the basics of information theory, finite-state sources, channels and linear codes,
Reed-Solomon codes and their decoding, and source coding that are suitable for a one-semester course.
Many good quantum error-correcting codes were constructed from BCH codes, Reed-Muller codes,
Reed-Solomon codes and algebraic geometric codes, see [2-6].
There are several expressions available in the literature giving the performances for
Reed-Solomon codes. One of them is an upper bound derived in [17]:
Day; "The Ubiquitous
Reed-Solomon Codes," by Barry A.
Subsequent chapters cover areas including block designs, error-correcting codes,
Reed-Solomon codes, algebraic cryptography, RSA ciphers, and graph theory.