Method and device for building a variable-length error code

ABSTRACT

The invention relates to a variable-length error-correcting (VLEC) code technique, in which the main steps are: defining all the needed parameters, generating a code having a fixed length L1, storing in a set W thus obtained all the possible L1-tuples distant of the minimum diverging distance d[min] from the codewords (one extra-bit being affixed at the end of all words if the new set W thus obtained is not empty), deleting all words of W that do not satisfy a distance criterion with all codewords, and verifying that all words of the final set W satisfy another distance criterion. Assuming that most good codes do not have jump of length, the method according to the invention allows to reduce the set of examined VLEC codes. Following this hypothesis, a new construction method, called no hole optimization, is defined, in which it is avoided to add more than one bit at the end of each word of the set W. The new algorithm does not consider very unlikely code structures and thus allows to gain in complexity.  
                                           SOURCE SYMBOL   PROBABILITY                   e   0.1270         t   0.0906         a   0.0817         o   0.0751         i   0.0697         n   0.0674         s   0.0633         h   0.0609         r   0.0599         d   0.0425         l   0.0403         c   0.0278         u   0.0276         m   0.0241         w   0.0236         f   0.0223         g   0.0202         y   0.0197         p   0.0193         b   0.0149         v   0.0098         k   0.0077         j   0.0015         x   0.0015         q   0.0010         z   0.0007

FIELD OF THE INVENTION

The present invention relates to a method of building a variable length error code, said method comprising the steps of:

-   -   (1) initializing the needed parameters: minimum and maximum         length of codewords L₁ and L_(max) respectively, free distance         d_(free) between each codeword (said distance d_(free) being for         a VLEC code C the minimum Hamming distance in the set of all         arbitrary extended codes), required number of codewords S;     -   (2) generating a fixed length code C of length L₁ and minimal         distance b_(min), with b_(min)=min {b_(k); k=1, 2, . . . , R},         b_(k)=the distance associated to the codeword length L_(k) of         code C and defined as the minimum Hamming distance between all         codewords of C with length L_(k), and R=the number of different         codeword lengths in C, said generating step creating a set W of         n-bit long words distant of d;     -   (3) listing and storing in the set W all the possible L₁-tuples         at the distance of d_(min) from the codewords of C (said         distance d_(min) for a VLEC code C being the minimum value of         all the diverging distances between all possible couples of         different-length codewords of C), and, if said set W is not         empty, doubling the number of words in W by affixing at the end         of all words one extra bit, said storing step therefore         replacing the set W by a new one having twice more words than         the previous one and the length of each one of these words being         L₁+1;     -   (4) deleting all the words of the set W that do not satisfy the         c_(min) distance with all codewords of C, said distance c_(min)         being the minimum converging distance of the code C;     -   (5) in the case where no word is found or the maximum number of         bits is reached, reducing the constraint of distance for finding         more words;     -   (6) controlling that all words of the set W are distant of         b_(min), the found words being then added to the code C;     -   (7) if the required number of codewords has not been reached,         repeating the steps (1) to (6) until the method finds either no         further possibility to continue or the required number of         codewords;     -   (8) if the number of codewords of C is greater than S,         calculating on the basis of the structure of the VLEC code, the         average length AL obtained by weighting each codeword length         with the probability of the source, said AL becoming the         AL_(min), if it is lower than AL_(min), with AL_(min)=the         minimum value of AL, and the corresponding code structure being         kept in memory.

BACKGROUND OF THE INVENTION

A classical communication chain, illustrated in FIG. 1, comprises, for coding the signals coming from a source S, a source coder 1 (SCOD) followed by a channel coder 2 (CCOD) and, after the transmission of the coded signals thus obtained through a channel 3, a channel decoder 4 (CDEC) and a source decoder 5 (SDEC). The decoded signals are intended to be sent towards a receiver. Variable-length codes (VLC) are classically used in source coding for their compression capabilities, and the associated channel coding techniques combat the effects of the real transmission channel (such as fading, noise, etc.). However, since source coding is intended to remove redundancy and channel coding to re-introduce it, it has been investigated how to efficiently coordinate these techniques in order to improve the overall system while keeping the complexity at an acceptable level.

Among the solutions proposed in such an approach, the variable-length error correcting (VLEC) codes present the advantage to be variable-length while providing error correction capabilities, but building these codes is rather time consuming for short alphabets (and become even prohibitive for higher length alphabets sources), and the construction complexity is also a drawback, as it will be seen.

First, some definitions and properties of the classical VLC must be recalled. A code C is a set of S codewords {c₁, c₂, C₃, . . . , c_(i), . . . c_(S)}, for each of which a length l_(i)=|c_(i)| is defined, with l_(l)≦l₂≦l₃≦ . . . ≦l_(i)≦ . . . ≦l_(S) without any loss of generality. The number of different codeword lengths in the code C is called R, with obviously R≦S, and these lengths are denoted as L₁, L₂, L₃, . . . , L_(i), . . . L_(R), with L₁<L₂<L₃< . . . <L_(R). A variable-length code, or VLC, is then the structure denoted by (s₁@L₁, s₂@L₂, s₃@L₃, . . . , s_(R)@L_(R)), which corresponds to s_(i) codewords of length L₁, s₂ codewords of length L₂, s₃ codewords of length L₃, . . . , and s_(R) codewords of length L_(R). When using a VLC, the compression efficiency, for a given source, is related to the number of bits necessary to transmit symbols from said source. The measure used to estimate this efficiency is often the average length AL of the code (i.e. the average number of bits needed to transmit a word), said average length being given, when each symbol a_(i) is mapped to the codeword c_(i), by the following relation (1): $\begin{matrix} {{AL} = {\sum\limits_{i = 1}^{i = s}{l_{i} \cdot {P\left( a_{i} \right)}}}} & (1) \end{matrix}$ which is equivalent to the relation (2): $\begin{matrix} {{AL} = {\sum\limits_{i = 1}^{R}{L_{i} \cdot \left( {\sum\limits_{j = {{r{(i)}} + 1}}^{j = {r{({i + 1})}}}{P\left( a_{i} \right)}} \right)}}} & (2) \end{matrix}$ where, for a data source A, the S source symbols are denoted by {a₁, a₂, a₃, . . . , a_(s)} and P(a_(i)) is the respective probability of occurrence of each of these symbols, with ΣP(a_(i))=1 (from i=1 to i=S). If AL_(min) denotes the minimal value for the average length AL, it is easy to see that when AL_(min) is reached, the symbols are indexed in such a way that P(a₁)≧P(a₂)≧P(a₃)≧ . . . ≧P(a_(i))≧ . . . P(a_(s)). In order to encode the data in such a way that the receiver can decode the coded information, the VLC must satisfy the following properties: to be non-singular (all the codewords are distinct, i.e. no more than one source symbol is allocated to one codeword) and to be uniquely decodable (i.e. it is possible to map any string of codewords unambiguously back to the correct source symbols, without any error).

An introduction and a presentation of different distances that are useful when reviewing some general properties of the VLC codes will then help to recall the notion of error-correcting property used in the VLEC code theory:

-   -   (a) Hamming weight and distance: if w is a word of length n with         w=(w₁, w₂, . . . , w_(n)), the Hamming weight of w, or simply         weight, is the number W(w) of non-zero symbols in w:         $\begin{matrix}         {{W(w)} = {\sum\limits_{i = 1}^{i = n}\frac{w_{i}}{w_{i}}}} & (3)         \end{matrix}$         and, if w₁ and w₂ are two words of equal length n with         w_(i)=(w_(i1), w_(i2), w_(i3), . . . , w_(in)) and i=1 or 2, the         Hamming distance (or, simply, distance) between w₁ and w₂ is the         number of positions in which w₁ and w₂ differ (for example, for         the binary case, it is easy to see that:         H(w ₁ , w ₂)=W(w ₁ +w ₂)  (4)         where the addition is modulo-2). However, the Hamming distance         is by definition restricted to fixed-length codes, and other         definitions will be defined before considering VLEC codes.

(b) let f_(i)=w₁ ^(i) w₂ ^(i) . . . . w_(n) ^(i) be a concatenation of n words of a VLEC code C, then the set F_(N)={f_(i):|f_(i)|=N} is called the extended code of C of order N.

-   -   (c) minimum block distance and overall minimum block distance:         the minimum block distance b_(k) associated to the codeword         length L_(k) of a VLEC code C is defined as the minimum Hamming         distance between all distinct codewords of C with the same         length L_(k):         b_(k)=min {H(c_(i), c_(j)): c_(i), c_(j) ε C, i≠j,         |c_(i)|=|c_(j)|=L_(k)} for k=1, . . . , R  (5)         and the overall minimum block distance b_(min) of said VLEC code         C, which is the minimum block distance value for every possible         length L_(k), is defined by:         b_(min)=min {b_(k): k=1, . . . R}  (6)     -   (d) diverging distance and minimum diverging distance: the         diverging distance between two codewords of different length         c_(i) = x_(i₁)x_(i₂)  …  x_(i_(l_(i)))  and  c_(j) = x_(j₁)x_(j₂)  …  x_(j_(l_(i)))         of a VLEC code C, where c_(i), c_(j) ε C, l_(i)=|c_(j)| and         l_(j)=|c_(j)| with l_(i)>l_(j), is defined by: $\begin{matrix}         {{D\left( {c_{i},c_{j}} \right)} = {H\left( {{x_{i_{1}}x_{i_{2}}\quad\ldots\quad x_{i_{l_{i}}}},{x_{j_{1}}x_{j_{2}}\quad\ldots\quad x_{j_{l_{j}}}}} \right)}} & (7)         \end{matrix}$         i.e. it is also the Hamming distance between a l_(j)-length         codeword and the l_(j)-length prefix of a longer codeword, and         the minimum diverging distance d_(min) of said VLEC code C is         the minimum value of all the diverging distances between all         possible couples of codewords of C of unequal length:         d_(min)=min {D(c_(i),c_(j)):c_(i)c_(j)εC,|c_(i)|≠|c_(j)|}  (8)     -   (e) converging distance and minimum converging distance: the         converging distance between two codewords of different length         c_(i) = x_(i₁)x_(i₂)  …  x_(i_(l_(i)))  and  c_(j) = x_(j₁)x_(j₂)  …  x_(j_(l_(i)))         of a VLEC code C, where |c_(i)|=l_(i)>|c_(j)|=l_(j), is defined         by: $\begin{matrix}         {{C\left( {c_{i},c_{j}} \right)} = {H\left( {{x_{i_{l_{i} - l_{j + 1}}}x_{i_{l_{i} - l_{j + 2}}}\quad\ldots\quad x_{i_{l_{i}}}},{x_{j_{1}}x_{j_{2}}\quad\ldots\quad x_{i_{l_{j}}}}} \right)}} & (9)         \end{matrix}$         i.e. it is also the Hamming distance between a l_(j)-length         codeword and the l_(j)-length suffix of a longer codeword, and         the minimum converging distance of said VLEC code C is the         minimum value of all the converging distances between all         possible couples of C of unequal length:         c_(min)=min{C(c_(i),c_(j)): c_(i), c_(j) ε         C,|c_(i)|≠|c_(j)|}  (10)     -   (f) free distance: the free distance d_(free) of a code is the         minimum Hamming distance in the set of all arbitrary long paths         that diverge from some common state S_(i) and converge again in         another common state S_(j), with j>i:         d_(free)=min {H(f_(i), f_(j)): f_(i), f_(j) ε F_(N), N=1, 2, . .         . , ∞}  (11)

Following the structure model used for a VLC, it is therefore possible to describe the structure of the VLEC code C by the notation: S_(i)@ L₁, b₁; S₂ @ L₂, b₂; . . . ; SR @ L_(R), b_(R); d_(min), c_(min)  (12) where there are s_(i) codewords of length L_(i) with minimum block distance b_(i), for all i=1, 2, . . . R, (it is recalled that R is the number of different codeword lengths) and minimum diverging and converging distances d_(min) and c_(min). The most important parameter of a VLEC code is its free distance d_(free), which influences greatly its performance in terms of error-correcting capabilities, and it can be shown that the free distance of a VLEC code is bounded by: d _(free)≧min(b _(min) , d _(min) +c _(min))  (13)

These definitions being recalled, the state-of-the-art in VLEC codes construction will be now described more easily. The first types of VLEC codes, called α-prompt codes and introduced in 1974, and an extension of this family, called a_(t) ₁ _(,t) _(2, . . . ,) _(t) _(R) -prompt codes, have both the same essential property: if one denotes by α(c_(i)) the set of words that are closer to c_(i) than to any codeword c_(j), with j≠i, no sequence in α(c_(i)) is a prefix of a sequence in another α(c_(i)). The construction of these codes is very simple, and the construction algorithm is adjustable by the number of codewords at each length, which makes possible to find the best prompt code for a given source and a given d_(free). However, this best code performs poorly in terms of compression performance.

A more recent construction, allowing the construction of a VLEC code from the generator matrix of a fixed-length linear block code, was proposed in the document “Variable-length error-correcting codes” by V. Buttigieg, Ph.D. Thesis, University of Manchester, England, 1995. Called code-anticode construction, this algorithm relies on line combinations and column permutations to form an anticode at the rightmost column. Once the code-anticode generator matrix is obtained, the VLEC code is simply obtained by a matrix multiplication.

This technique has however several drawbacks. First, there is no explicit method to find the needed line combinations and column permutations to obtain the anticode. Moreover, the construction does not take into account the source statistics and, consequently, often reveals itself sub-optimal (one can find a code with smaller average length by a post-processing on the VLEC code). In the same document, the author has then proposed an improved method, called Heuristic method, that is based on a computer search for building a VLEC code giving the better known compression rate for a specified source and a given protection against errors, i.e. a code C with specified overall minimum block, diverging and converging distances (and hence a minimum value for due) and with codeword lengths matched to the source statistics so as to obtain a minimum average codeword length for the chosen free distance and the specified source (in practice, one takes: b_(min)=d_(min)+c_(min)=d_(free), and: d_(min)=[d_(free)/2].

The main steps of this Heuristic method, which uses the following parameters: minimum length L₁ of codewords, maximum length L_(max) of codewords, free distance d_(free) between each codeword, number S of codewords required, are now described with reference to the flowcharts of FIGS. 2 to 4.

To start the computer search (“Start”), all the needed parameters must be first specified: L₁ (the minimum codeword length, which must be at least equal to or greater than the minimum diverging distance required), L_(max) (the maximum codeword length), the different distances between codewords (d_(free), b_(min), d_(min), c_(min)), and S (the number of codewords required by the given source), and some relations are set when choosing these parameters:

-   -   L_(l)≦d_(min)     -   b_(min)=d_(free)     -   d_(min)+c_(min)=d_(free)

The first phase of the algorithm, referenced 11, is then performed: it consists in the generation of a fixed length code (put initially in C) of length L₁ and minimal distance b_(min), with a maximum number of codewords. This phase is in fact an initialization, performed for instance by means of an algorithm such as the greedy algorithm (GA), presented in FIG. 5, or the majority voting algorithm (MVA), presented in FIG. 7, or a new proposed variation, denoted by GAS (Greedy Algorithm by Step), which consists in a variation of the two above mentioned ones (the GAS consists in the search method used in the GA, where instead of deleting half of the codewords, only the last codeword of the group is deleted). These two algorithms are useful to create a set W of n-bit long words distant of d (in practice, it may be noted that the MVA finds more words than the GA, but it asks too much time for only a small improvement of the compression capacity, as shown in the tables of FIGS. 6 and 8, which compare, respectively for the GA and for the MVA, the best code structures obtained with different values of d_(free) for the 26-symbol English source defined in the table of FIG. 9.

The second phase of the algorithm, corresponding to the elements referenced 21 to 24 (21+22=operation “A0”; 23+24=operation “A2”) in FIG. 2, consists in listing and storing (step 21) in a set called W all the possible L₁-tuples at the distance of d_(min) from the codewords in C. If d_(min)≧b_(min), then W is empty. If this set W of all the words satisfying the minimum diverging distance to the current code is not empty (reply NO to the test 22: |W|=0 ?), the number of words in W is doubled by increasing the length of the words by one bit by affixing first a “0” and then a “1” to the rightmost position of all the words in W (step 24), except if the maximum number of bits is exceeded (reply YES to the test 23). At the output of said step 24, this modified set W has twice more words than the previous W, and the length of each one is L₁+1.

The third phase of the algorithm, corresponding to the elements 31 to 35 (=operation “A3” in FIG. 2), consists in deleting (step 31) all the words of set W that do not satisfy the c_(min) distance (minimum converging distance) with all the codewords of C (i.e. in keeping and storing in a new W only the words which satisfy said minimum converging distance, the other ones being discarded). At this point, the new set W is a set of words which, when compared to the codewords of C, satisfy the required minimum diverging and converging distances (both d_(min) and c_(min) distances) with the codewords of C. If that new set W is not empty (reply NO to the test 32: |W|=0 ?) one selects in W (step 33) the maximum number of words to satisfy the minimum block distance, in order to ensure that all the words of the set W, being of the same length, have a minimum distance at least equal to b_(min). At the end of this step 33, realized with the GA or the MVA (note that in this case, the initial set used for the GA or the MVA is the current W and not a n-tuples set), the words thus obtained are added (step 34) to the codewords already in C.

If no word is found (i.e. W is empty) at the end of the step 21 (reply YES to the test 22: |w|=0 ?) or if the maximum number of bits is reached or exceeded (reply YES to the test 23), one enters the fourth phase of the algorithm (steps 41 to 46, illustrated in FIG. 3 and also designated by the operation “A1” in said figure), which is used in order to unjam the process by inserting more liberty of choice, more particularly by affixing to all words in W extra bits (several bits at the same time) such that the new group contains more bits than the old one. If there are enough codewords in the last group (successive tests 41 and 42, for verifying the number of codewords in the last group, and if there are previous groups), some of them are deleted from this said group (as described above), such deletions allowing to reduce the distance constraint and to find more codewords than before. As a matter of fact, the classical Heuristic method thus described begins with the maximum of codewords with the short length, maps them with the high probability symbols and tries to obtain a good compression rate, but sometimes the size of the small lengths sets are incompatible with the required number of codewords S. In this optic, easing a few codewords provides more freedom degrees and allows to reach a position where the initial requirements on distance and number of symbols for the code can be met. This deletion process is repeated until it remains a maximum of one codeword for each length. If W is empty at the end of the step 31 (reply YES to the test 32: |W|=0 ?), the steps 23, 24, 31, 32 are repeated. If the required number of codewords has not been reached (reply NO to the test 35 provided at the end of this third phase), the steps 21 to 24 and 31 to 35 must be repeated until said steps find that either there are no further possible words to be found or the required number of codewords is reached.

If said required number of codewords has been reached (i.e. the number of codewords of C is equal to or greater than S (reply YES to the test 35), the structure of the VLEC code thus obtained is used in a fifth part, including the steps 51 to 56 (illustrated in FIG. 4, and also designated by the operation “A4” in said figure), in order to calculate the average length AL. This is done by weighting each codeword length with the probability of the source, and comparing it to the current best one. If said average length AL of this VLEC code is lower than the minimized value of AL (=AL_(min)), this AL becomes the AL_(min), and this new AL value and the corresponding code structure are kept in the memory (step 51). These steps 51 and following (fifth part; operation “A4”) allow to come back, within the algorithm, towards previous groups, while the other phases of said algorithm are always performed on the current group. The stepsize for such a feeedback operation is one, i.e. this feedback action can be considered as exhaustive.

To continue this search of the best VLEC code, it is necessary to avoid keeping the same structure, which would lead to a loop in the algorithm. The last added group of the current code is deleted (steps 52, 53), the deletion of shorter length codewords allowing to find more longer length codewords (test 54: number of codewords in group greater than 1 ?), and some codewords (half the amount for the GVA; the “best” one for the MVA) of the previous group are deleted (step 55), in order to re-loop (step 56) the algorithm at the beginning of the step 21 (see FIG. 2) and find different VLEC structures (the number of deleted codewords depends on which method is used for selecting the words: if the GA method is used and one wants to obtain a linear code, it is necessary to delete half of the codewords, while with the MVA method only one codeword, the best one, is deleted, i.e. the one that allows to find the more codewords in the next group).

However, the Heuristic method thus described often considers very unlikely code structures or proceeds with such a care (in order not to miss anything) that a great complexity is observed in the implementation of said method, which moreover is rather time consuming and can thus become prohibitive.

SUMMARY OF THE INVENTION

It is therefore an object of the invention to propose an improved construction method with which it is possible to gain in complexity by avoiding these drawbacks.

To this end, the invention relates to a method of building a variable length error code as defined in the introductory paragraph of the description, said building method being moreover such that at most one bit is added at the end of each word of the set W.

It is also an object of the invention to propose a device for carrying out such a variable length error code building method.

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention will now be described, by way of example, with reference to the accompanying drawings in which:

FIG. 1 depicts a conventional communication channel;

FIGS. 2 to 4 are the three parts of a single flowchart illustrating the main steps of a conventional method used for building a VLEC code, called Heuristic method;

FIG. 5 illustrates an algorithm (called greedy algorithm, or GA) used for the initialization of the method of FIGS. 2 to 4, and FIG. 6 is a table giving various VLEC codes for a source constructed with the Heuristic construction using said algorithm of FIG. 5;

FIG. 7 illustrates another algorithm (called majority voting algorithm, or MVA) used for the initialization of the method of FIGS. 2 to 4, and FIG. 8 is another table giving various VLEC codes for a source constructed with the Heuristic construction using said algorithm of FIG. 7;

FIG. 9 is a table giving for the 26-symbol English source the correspondence between the source symbol and its probability;

FIGS. 10 and 11 are the two parts of a single flowchart according to the invention, illustrating an implementation of an improvement of the conventional method illustrated in FIGS. 2 to 4;

FIG. 12 is another table giving various VLEC codes for the same 26 symbol English source as considered in the tables of FIGS. 6 and 8 and using the GAS;

FIG. 13 is another table giving various VLEC codes for the same source as in FIG. 12 and using both the GAS previously mentioned and the building method according to the invention.

DETAILED DESCRIPTION OF THE INVENTION

Simulations show that, with the classical Heuristic method, almost none of the obtained best codes has a hole, i.e. a length jump in its structure length. It is therefore proposed, according to the invention, to consider that most good codes do not have jump of length and therefore to reduce accordingly the set of examined VLEC codes (which consequently reduces the simulation time and the complexity of implementation of the method, without modifying much the AL). Following this hypothesis, the method is, according to the invention, modified by avoiding to add more than one bit at the end of each word of the set W.

The corresponding implementation (improved Heuristic construction method, with no hole optimization) is illustrated in FIGS. 10 and 11, which show the two parts of a flowchart corresponding to a system allowing to carry out the improved method according to the invention (the elements that are identical to the ones observed in FIGS. 2 to 4 being designated with the same references).

The main differences with the flowchart of FIGS. 2 to 4 are the following ones:

-   -   (a) first, parts that, with respect to the classical Heuristic         technique, are useless for the implementation of the improved         method are cancelled:     -   (b) if W is empty at the end of the step 31 (reply YES to the         test 32: |W|=0 ?), the next phase is now (see FIG. 10) not the         repetition of the steps (23, 24, 31, 32), but the establishment         (in place of said repetition) of a direct connection 91 towards         the input (in FIG. 11) of the circuit carrying out the operation         55 (deletion of some codewords, or of the best one, before a         repetition of the steps 21 to 24 and 31 to 35), said operation         55 being therefore, as previously, followed by the operations 21         and following.     -   (c) the fourth phase of the method is now reduced to one step,         the operation 41 (FIG. 11), which is the test “Number of         codewords in last group=1?”. If the reply is NO, a direct link         101 is established with the input of the step 55 in view of         carrying out said operation 55, and then the operations 21 and         following. If the reply is YES, a connection 102 is established         with the input of the set of operations 52 to 54.

The results obtained with the present solution (called “noHole optimization method”) are presented in the table of FIG. 12 for the 26 symbol English source when using the GAS method for selecting codewords. It can be seen, when comparing with results presented in FIG. 13, that although the result is not completely optimal for d_(free)=3 (the code structure has a hole at length L=11), the AL rise is really acceptable when one considers that there is both strictly no degradation for the other d_(free) values and a gain of time between 2,5 and 4. The same remarks can be applied when comparing the present solution with the ones obtained in FIG. 7, where the MVA complexity effect is clear. Similarly, applying the noHole optimisation with the GA method for selecting codewords leads to a time gain at the only expense of a slight AL rise for d_(free)=3. Finally, FIG. 5 shows on the other hand that the current solution offers better AL for an acceptable gain of time, the noHole optimisation compensating almost entirely the complexity induced by the GAS. 

1. A method of building a variable length error code, said method comprising the steps of: (1) initializing the needed parameters: minimum and maximum length of codewords L₁ and L_(max) respectively, free distance d_(free) between each codeword (said distance d_(free) being for a VLEC code C the minimum Hamming distance in the set of all arbitrary extended codes), required number of codewords S; (2) generating (step 11) a fixed length code C of length L₁ and minimal distance b_(min), with b_(min)=min {b_(k); k=1, 2, . . . , R}, b_(k)=the distance associated to the codeword length L_(k) of code C and defined as the minimum Hamming distance between all codewords of C with length L_(k), and R=the number of different codeword lengths in C, said generating step 11 creating a set W of n-bit long words distant of d; (3) listing and storing (step 21) in the set W all the possible L₁-tuples at the distance of d_(min) from the codewords of C (said distance d_(min) for a VLEC code C being the minimum value of all the diverging distances between all possible couples of different-length codewords of C), and, if said set W is not empty, doubling the number of words in W by affixing at the end of all words one extra bit, said storing step therefore replacing the set W by a new one having twice more words than the previous one and the length of each one of these words being L₁+1; (4) deleting (step 31) all the words of the set W that do not satisfy the c_(min) distance with all codewords of C, said distance c_(min) being the minimum converging distance of the code C; (5) in the case where no word is found or the maximum number of bits is reached, reducing (step 41) the constraint of distance for finding more words; (6) controlling that all words of the set W are distant of b_(min), the found words being then added to the code C (step 34); (7) if (step 35) the required number of codewords has not been reached, repeating the steps (1) to (6) (i.e. the steps 21 to 35) until the method finds either no further possibility to continue or the required number of codewords; (8) if the number of codewords of C is greater than S, calculating (phase A4), on the basis of the structure of the VLEC code, the average length AL obtained by weighting each codeword length with the probability of the source, said AL becoming the AL_(min), if it is lower than AL_(min), with AL_(min)=the minimum value of AL, and the corresponding code structure being kept in memory; said building method being moreover such that at most one bit is added at the end of each word of the set W.
 2. A device for carrying out a variable length error code building method according to claim
 1. 