The Hadamard code is an error-correcting code named after Jacques Hadamard that is used for error detection and correction when transmitting messages over very noisy or unreliable channels. In 1971, the code was used to transmit photos of Mars back to Earth from the NASA space probe Mariner 9.[1] Because of its unique mathematical properties, the Hadamard code is not only used by engineers, but also intensely studied in coding theory, mathematics, and theoretical computer science. The Hadamard code is also known under the names Walsh code, Walsh family,[2] and Walsh–Hadamard code[3] in recognition of the American mathematician Joseph Leonard Walsh.

Classification
TypeLinear block code
Block length${\displaystyle n=2^{k}}$
Message length${\displaystyle k}$
Rate${\displaystyle k/2^{k}}$
Distance${\displaystyle d=2^{k-1}}$
Alphabet size${\displaystyle 2}$
Notation${\displaystyle [2^{k},k,2^{k-1}]_{2}}$-code
Classification
TypeLinear block code
Block length${\displaystyle n=2^{k}}$
Message length${\displaystyle k+1}$
Rate${\displaystyle (k+1)/2^{k}}$
Distance${\displaystyle d=2^{k-1}}$
Alphabet size${\displaystyle 2}$
Notation${\displaystyle [2^{k},k+1,2^{k-1}]_{2}}$-code
Matrix of the Augmented Hadamard code [32, 6, 16] for the Reed–Muller code (1, 5) of the NASA space probe Mariner 9
XOR operations
Here the white fields stand for 0
and the red fields for 1

The Hadamard code is an example of a linear code of length ${\displaystyle 2^{m}}$ over a binary alphabet. Unfortunately, this term is somewhat ambiguous as some references assume a message length ${\displaystyle k=m}$ while others assume a message length of ${\displaystyle k=m+1}$. In this article, the first case is called the Hadamard code while the second is called the augmented Hadamard code.

The Hadamard code is unique in that each non-zero codeword has a Hamming weight of exactly ${\displaystyle 2^{k-1}}$, which implies that the distance of the code is also ${\displaystyle 2^{k-1}}$. In standard coding theory notation for block codes, the Hadamard code is a ${\displaystyle [2^{k},k,2^{k-1}]_{2}}$-code, that is, it is a linear code over a binary alphabet, has block length ${\displaystyle 2^{k}}$, message length (or dimension) ${\displaystyle k}$, and minimum distance ${\displaystyle 2^{k}/2}$. The block length is very large compared to the message length, but on the other hand, errors can be corrected even in extremely noisy conditions.

The augmented Hadamard code is a slightly improved version of the Hadamard code; it is a ${\displaystyle [2^{k},k+1,2^{k-1}]_{2}}$-code and thus has a slightly better rate while maintaining the relative distance of ${\displaystyle 1/2}$, and is thus preferred in practical applications. In communication theory, this is simply called the Hadamard code and it is the same as the first order Reed–Muller code over the binary alphabet.[4]

Normally, Hadamard codes are based on Sylvester's construction of Hadamard matrices, but the term “Hadamard code” is also used to refer to codes constructed from arbitrary Hadamard matrices, which are not necessarily of Sylvester type. In general, such a code is not linear. Such codes were first constructed by Raj Chandra Bose and Sharadchandra Shankar Shrikhande in 1959.[5] If n is the size of the Hadamard matrix, the code has parameters ${\displaystyle (n,2n,n/2)_{2}}$, meaning it is a not-necessarily-linear binary code with 2n codewords of block length n and minimal distance n/2. The construction and decoding scheme described below apply for general n, but the property of linearity and the identification with Reed–Muller codes require that n be a power of 2 and that the Hadamard matrix be equivalent to the matrix constructed by Sylvester's method.

The Hadamard code is a locally decodable code, which provides a way to recover parts of the original message with high probability, while only looking at a small fraction of the received word. This gives rise to applications in computational complexity theory and particularly in the design of probabilistically checkable proofs. Since the relative distance of the Hadamard code is 1/2, normally one can only hope to recover from at most a 1/4 fraction of error. Using list decoding, however, it is possible to compute a short list of possible candidate messages as long as fewer than ${\displaystyle {\frac {1}{2}}-\epsilon }$ of the bits in the received word have been corrupted.

In code division multiple access (CDMA) communication, the Hadamard code is referred to as Walsh Code, and is used to define individual communication channels. It is usual in the CDMA literature to refer to codewords as “codes”. Each user will use a different codeword, or “code”, to modulate their signal. Because Walsh codewords are mathematically orthogonal, a Walsh-encoded signal appears as random noise to a CDMA capable mobile terminal, unless that terminal uses the same codeword as the one used to encode the incoming signal.[6]

## History

Hadamard code is the name that is most commonly used for this code in the literature. However, in modern use these error correcting codes are referred to as Walsh–Hadamard codes.

There is a reason for this:

Jacques Hadamard did not invent the code himself, but he defined Hadamard matrices around 1893, long before the first error-correcting code, the Hamming code, was developed in the 1940s.

The Hadamard code is based on Hadamard matrices, and while there are many different Hadamard matrices that could be used here, normally only Sylvester's construction of Hadamard matrices is used to obtain the codewords of the Hadamard code.

James Joseph Sylvester developed his construction of Hadamard matrices in 1867, which actually predates Hadamard's work on Hadamard matrices. Hence the name Hadamard code is disputed and sometimes the code is called Walsh code, honoring the American mathematician Joseph Leonard Walsh.

An augmented Hadamard code was used during the 1971 Mariner 9 mission to correct for picture transmission errors. The data words used during this mission were 6 bits long, which represented 64 grayscale values.

Because of limitations of the quality of the alignment of the transmitter at the time (due to Doppler Tracking Loop issues) the maximum useful data length was about 30 bits. Instead of using a repetition code, a [32, 6, 16] Hadamard code was used.

Errors of up to 7 bits per word could be corrected using this scheme. Compared to a 5-repetition code, the error correcting properties of this Hadamard code are much better, yet its rate is comparable. The efficient decoding algorithm was an important factor in the decision to use this code.

The circuitry used was called the "Green Machine". It employed the fast Fourier transform which can increase the decoding speed by a factor of three. Since the 1990s use of this code by space programs has more or less ceased, and the NASA Deep Space Network does not support this error correction scheme for its dishes that are greater than 26 m.

## Constructions

While all Hadamard codes are based on Hadamard matrices, the constructions differ in subtle ways for different scientific fields, authors, and uses. Engineers, who use the codes for data transmission, and coding theorists, who analyse extremal properties of codes, typically want the rate of the code to be as high as possible, even if this means that the construction becomes mathematically slightly less elegant.

On the other hand, for many applications of Hadamard codes in theoretical computer science it is not so important to achieve the optimal rate, and hence simpler constructions of Hadamard codes are preferred since they can be analyzed more elegantly.

### Construction using inner products

When given a binary message ${\displaystyle x\in \{0,1\}^{k}}$  of length ${\displaystyle k}$ , the Hadamard code encodes the message into a codeword ${\displaystyle {\text{Had}}(x)}$  using an encoding function ${\displaystyle {\text{Had}}:\{0,1\}^{k}\to \{0,1\}^{2^{k}}.}$  This function makes use of the inner product ${\displaystyle \langle x,y\rangle }$  of two vectors ${\displaystyle x,y\in \{0,1\}^{k}}$ , which is defined as follows:

${\displaystyle \langle x,y\rangle =\sum _{i=1}^{k}x_{i}y_{i}\ {\bmod {\ }}2\,.}$

Then the Hadamard encoding of ${\displaystyle x}$  is defined as the sequence of all inner products with ${\displaystyle x}$ :

${\displaystyle {\text{Had}}(x)={\Big (}\langle x,y\rangle {\Big )}_{y\in \{0,1\}^{k}}}$

As mentioned above, the augmented Hadamard code is used in practice since the Hadamard code itself is somewhat wasteful. This is because, if the first bit of ${\displaystyle y}$  is zero, ${\displaystyle y_{1}=0}$ , then the inner product contains no information whatsoever about ${\displaystyle x_{1}}$ , and hence, it is impossible to fully decode ${\displaystyle x}$  from those positions of the codeword alone. On the other hand, when the codeword is restricted to the positions where ${\displaystyle y_{1}=1}$ , it is still possible to fully decode ${\displaystyle x}$ . Hence it makes sense to restrict the Hadamard code to these positions, which gives rise to the augmented Hadamard encoding of ${\displaystyle x}$ ; that is, ${\displaystyle {\text{pHad}}(x)={\Big (}\langle x,y\rangle {\Big )}_{y\in \{1\}\times \{0,1\}^{k-1}}}$ .

### Construction using a generator matrix

The Hadamard code is a linear code, and all linear codes can be generated by a generator matrix ${\displaystyle G}$ . This is a matrix such that ${\displaystyle {\text{Had}}(x)=x\cdot G}$  holds for all ${\displaystyle x\in \{0,1\}^{k}}$ , where the message ${\displaystyle x}$  is viewed as a row vector and the vector-matrix product is understood in the vector space over the finite field ${\displaystyle \mathbb {F} _{2}}$ . In particular, an equivalent way to write the inner product definition for the Hadamard code arises by using the generator matrix whose columns consist of all strings ${\displaystyle y}$  of length ${\displaystyle k}$ , that is,

${\displaystyle G={\begin{pmatrix}\uparrow &\uparrow &&\uparrow \\y_{1}&y_{2}&\dots &y_{2^{k}}\\\downarrow &\downarrow &&\downarrow \end{pmatrix}}\,.}$

where ${\displaystyle y_{i}\in \{0,1\}^{k}}$  is the ${\displaystyle i}$ -th binary vector in lexicographical order. For example, the generator matrix for the Hadamard code of dimension ${\displaystyle k=3}$  is:

${\displaystyle G={\begin{bmatrix}0&0&0&0&1&1&1&1\\0&0&1&1&0&0&1&1\\0&1&0&1&0&1&0&1\end{bmatrix}}.}$

The matrix ${\displaystyle G}$  is a ${\displaystyle (k\times 2^{k})}$ -matrix and gives rise to the linear operator ${\displaystyle {\text{Had}}:\{0,1\}^{k}\to \{0,1\}^{2^{k}}}$ .

The generator matrix of the augmented Hadamard code is obtained by restricting the matrix ${\displaystyle G}$  to the columns whose first entry is one. For example, the generator matrix for the augmented Hadamard code of dimension ${\displaystyle k=3}$  is:

${\displaystyle G'={\begin{bmatrix}1&1&1&1\\0&0&1&1\\0&1&0&1\end{bmatrix}}.}$

Then ${\displaystyle {\text{pHad}}:\{0,1\}^{k}\to \{0,1\}^{2^{k-1}}}$  is a linear mapping with ${\displaystyle {\text{pHad}}(x)=x\cdot G'}$ .

For general ${\displaystyle k}$ , the generator matrix of the augmented Hadamard code is a parity-check matrix for the extended Hamming code of length ${\displaystyle 2^{k-1}}$  and dimension ${\displaystyle 2^{k-1}-k}$ , which makes the augmented Hadamard code the dual code of the extended Hamming code. Hence an alternative way to define the Hadamard code is in terms of its parity-check matrix: the parity-check matrix of the Hadamard code is equal to the generator matrix of the Hamming code.

### Construction using general Hadamard matrices

Hadamard codes are obtained from an n-by-n Hadamard matrix H. In particular, the 2n codewords of the code are the rows of H and the rows of −H. To obtain a code over the alphabet {0,1}, the mapping −1 ↦ 1, 1 ↦ 0, or, equivalently, x ↦ (1 − x)/2, is applied to the matrix elements. That the minimum distance of the code is n/2 follows from the defining property of Hadamard matrices, namely that their rows are mutually orthogonal. This implies that two distinct rows of a Hadamard matrix differ in exactly n/2 positions, and, since negation of a row does not affect orthogonality, that any row of H differs from any row of −H in n/2 positions as well, except when the rows correspond, in which case they differ in n positions.

To get the augmented Hadamard code above with ${\displaystyle n=2^{k-1}}$ , the chosen Hadamard matrix H has to be of Sylvester type, which gives rise to a message length of ${\displaystyle \log _{2}(2n)=k}$ .

## Distance

The distance of a code is the minimum Hamming distance between any two distinct codewords, i.e., the minimum number of positions at which two distinct codewords differ. Since the Walsh–Hadamard code is a linear code, the distance is equal to the minimum Hamming weight among all of its non-zero codewords. All non-zero codewords of the Walsh–Hadamard code have a Hamming weight of exactly ${\displaystyle 2^{k-1}}$  by the following argument.

Let ${\displaystyle x\in \{0,1\}^{k}}$  be a non-zero message. Then the following value is exactly equal to the fraction of positions in the codeword that are equal to one:

${\displaystyle \Pr _{y\in \{0,1\}^{k}}{\big [}({\text{Had}}(x))_{y}=1{\big ]}=\Pr _{y\in \{0,1\}^{k}}{\big [}\langle x,y\rangle =1{\big ]}\,.}$

The fact that the latter value is exactly ${\displaystyle 1/2}$  is called the random subsum principle. To see that it is true, assume without loss of generality that ${\displaystyle x_{1}=1}$ . Then, when conditioned on the values of ${\displaystyle y_{2},\dots ,y_{k}}$ , the event is equivalent to ${\displaystyle y_{1}\cdot x_{1}=b}$  for some ${\displaystyle b\in \{0,1\}}$  depending on ${\displaystyle x_{2},\dots ,x_{k}}$  and ${\displaystyle y_{2},\dots ,y_{k}}$ . The probability that ${\displaystyle y_{1}=b}$  happens is exactly ${\displaystyle 1/2}$ . Thus, in fact, all non-zero codewords of the Hadamard code have relative Hamming weight ${\displaystyle 1/2}$ , and thus, its relative distance is ${\displaystyle 1/2}$ .

The relative distance of the augmented Hadamard code is ${\displaystyle 1/2}$  as well, but it no longer has the property that every non-zero codeword has weight exactly ${\displaystyle 1/2}$  since the all ${\displaystyle 1}$ s vector ${\displaystyle 1^{2^{k-1}}}$  is a codeword of the augmented Hadamard code. This is because the vector ${\displaystyle x=10^{k-1}}$  encodes to ${\displaystyle {\text{pHad}}(10^{k-1})=1^{2^{k-1}}}$ . Furthermore, whenever ${\displaystyle x}$  is non-zero and not the vector ${\displaystyle 10^{k-1}}$ , the random subsum principle applies again, and the relative weight of ${\displaystyle {\text{Had}}(x)}$  is exactly ${\displaystyle 1/2}$ .

## Local decodability

A locally decodable code is a code that allows a single bit of the original message to be recovered with high probability by only looking at a small portion of the received word.

A code is ${\displaystyle q}$ -query locally decodable if a message bit, ${\displaystyle x_{i}}$ , can be recovered by checking ${\displaystyle q}$  bits of the received word. More formally, a code, ${\displaystyle C:\{0,1\}^{k}\rightarrow \{0,1\}^{n}}$ , is ${\displaystyle (q,\delta \geq 0,\epsilon \geq 0)}$ -locally decodable, if there exists a probabilistic decoder, ${\displaystyle D:\{0,1\}^{n}\rightarrow \{0,1\}^{k}}$ , such that (Note: ${\displaystyle \Delta (x,y)}$  represents the Hamming distance between vectors ${\displaystyle x}$  and ${\displaystyle y}$ ):

${\displaystyle \forall x\in \{0,1\}^{k},\forall y\in \{0,1\}^{n}}$ , ${\displaystyle \Delta (y,C(x))\leq \delta n}$  implies that ${\displaystyle Pr[D(y)_{i}=x_{i}]\geq {\frac {1}{2}}+\epsilon ,\forall i\in [k]}$

Theorem 1: The Walsh–Hadamard code is ${\displaystyle (2,\delta ,{\frac {1}{2}}-2\delta )}$ -locally decodable for all ${\displaystyle 0\leq \delta \leq {\frac {1}{4}}}$ .

Lemma 1: For all codewords, ${\displaystyle c}$  in a Walsh–Hadamard code, ${\displaystyle C}$ , ${\displaystyle c_{i}+c_{j}=c_{i+j}}$ , where ${\displaystyle c_{i},c_{j}}$  represent the bits in ${\displaystyle c}$  in positions ${\displaystyle i}$  and ${\displaystyle j}$  respectively, and ${\displaystyle c_{i+j}}$  represents the bit at position ${\displaystyle (i+j)}$ .

### Proof of lemma 1

Let ${\displaystyle C(x)=c=(c_{0},\dots ,c_{2^{n}-1})}$  be the codeword in ${\displaystyle C}$  corresponding to message ${\displaystyle x}$ .

Let ${\displaystyle G={\begin{pmatrix}\uparrow &\uparrow &&\uparrow \\g_{0}&g_{1}&\dots &g_{2^{n}-1}\\\downarrow &\downarrow &&\downarrow \end{pmatrix}}}$  be the generator matrix of ${\displaystyle C}$ .

By definition, ${\displaystyle c_{i}=x\cdot g_{i}}$ . From this, ${\displaystyle c_{i}+c_{j}=x\cdot g_{i}+x\cdot g_{j}=x\cdot (g_{i}+g_{j})}$ . By the construction of ${\displaystyle G}$ , ${\displaystyle g_{i}+g_{j}=g_{i+j}}$ . Therefore, by substitution, ${\displaystyle c_{i}+c_{j}=x\cdot g_{i+j}=c_{i+j}}$ .

### Proof of theorem 1

To prove theorem 1 we will construct a decoding algorithm and prove its correctness.

#### Algorithm

Input: Received word ${\displaystyle y=(y_{0},\dots ,y_{2^{n}-1})}$

For each ${\displaystyle i\in \{1,\dots ,n\}}$ :

1. Pick ${\displaystyle j\in \{0,\dots ,2^{n}-1\}}$  uniformly at random.
2. Pick ${\displaystyle k\in \{0,\dots ,2^{n}-1\}}$  such that ${\displaystyle j+k=e_{i}}$ , where ${\displaystyle e_{i}}$  is the ${\displaystyle i}$ -th standard basis vector and ${\displaystyle j+k}$  is the bitwise xor of ${\displaystyle j}$  and ${\displaystyle k}$ .
3. ${\displaystyle x_{i}\gets y_{j}+y_{k}}$ .

Output: Message ${\displaystyle x=(x_{1},\dots ,x_{n})}$

#### Proof of correctness

For any message, ${\displaystyle x}$ , and received word ${\displaystyle y}$  such that ${\displaystyle y}$  differs from ${\displaystyle c=C(x)}$  on at most ${\displaystyle \delta }$  fraction of bits, ${\displaystyle x_{i}}$  can be decoded with probability at least ${\displaystyle {\frac {1}{2}}+({\frac {1}{2}}-2\delta )}$ .

By lemma 1, ${\displaystyle c_{j}+c_{k}=c_{j+k}=x\cdot g_{j+k}=x\cdot e_{i}=x_{i}}$ . Since ${\displaystyle j}$  and ${\displaystyle k}$  are picked uniformly, the probability that ${\displaystyle y_{j}\not =c_{j}}$  is at most ${\displaystyle \delta }$ . Similarly, the probability that ${\displaystyle y_{k}\not =c_{k}}$  is at most ${\displaystyle \delta }$ . By the union bound, the probability that either ${\displaystyle y_{j}}$  or ${\displaystyle y_{k}}$  do not match the corresponding bits in ${\displaystyle c}$  is at most ${\displaystyle 2\delta }$ . If both ${\displaystyle y_{j}}$  and ${\displaystyle y_{k}}$  correspond to ${\displaystyle c}$ , then lemma 1 will apply, and therefore, the proper value of ${\displaystyle x_{i}}$  will be computed. Therefore, the probability ${\displaystyle x_{i}}$  is decoded properly is at least ${\displaystyle 1-2\delta }$ . Therefore, ${\displaystyle \epsilon ={\frac {1}{2}}-2\delta }$  and for ${\displaystyle \epsilon }$  to be positive, ${\displaystyle 0\leq \delta \leq {\frac {1}{4}}}$ .

Therefore, the Walsh–Hadamard code is ${\displaystyle (2,\delta ,{\frac {1}{2}}-2\delta )}$  locally decodable for ${\displaystyle 0\leq \delta \leq {\frac {1}{4}}}$ .

## Optimality

For k ≤ 7 the linear Hadamard codes have been proven optimal in the sense of minimum distance.[7]