{"trustable":true,"sections":[{"title":"","value":{"format":"HTML","content":"\u003cdiv class\u003d\"problem_par\"\u003e\u003cdiv class\u003d\"problem_par_epigraph\"\u003eLeia: I have placed information vital to the survival of the rebellion into the memory systems of this R2 unit. My father will know how to retrieve it. You must see this droid safely delivered to him on Alderaan.\u003c/div\u003e\u003c/div\u003e\u003cdiv class\u003d\"problem_par\"\u003e\u003cdiv class\u003d\"problem_par_normal\"\u003eEmperor Palpatine has been ruling the Empire for 25 years and Darth Vader has been the head of the Empire Armed Forces.\r\nHowever, the Rebel movement is strong like it never used to be.\r\nOne of the rebel leaders, Princess Leia from Alderaan, managed to get hold of secret blueprints of the Death Star, the imperial war station.\u003c/div\u003e\u003c/div\u003e\u003cdiv class\u003d\"problem_par\"\u003e\u003cdiv class\u003d\"problem_par_normal\"\u003eThe Princess was going to deliver the station plan to the secret base for further analysis and searching for vulnerable spots.\r\nBut her ship was attacked by the space destroyer \"Devastator\" headed by Darth Vader.\r\nAt the last moment Princess Leia managed to send her findings to one of the closest planet called Tatooine with her droid R2-D2.\r\nQuite conveniently, an old friend of her father Obi-Wan Kenobi lives on that planet.\u003c/div\u003e\u003c/div\u003e\u003cdiv class\u003d\"problem_par\"\u003e\u003cdiv class\u003d\"problem_par_normal\"\u003eR2-D2 realizes the importance of his mission.\r\nHe is going to encrypt the information so that the wrong people won’t get it.\u003c/div\u003e\u003c/div\u003e\u003cdiv class\u003d\"problem_par\"\u003e\u003cdiv class\u003d\"problem_par_normal\"\u003eThe memory of R2-D2 has many files with images.\r\nFirst he wanted to use a well-known encrypting algorithm. \r\nThe point of the method is to replace the least significant bits of the image with the encrypted message bits. \r\nThe difference is practically unnoticeable on the picture, so one won’t suspect that it contains a hidden message. \u003c/div\u003e\u003c/div\u003e\u003cdiv class\u003d\"problem_par\"\u003e\u003cdiv class\u003d\"problem_par_normal\"\u003eBut then R2-D2 decided that this method is quite well-known and the information won’t be protected enough.\r\nHe decided to change the least significant bits of the image so that the secret information was a continuous sequence of the bytes of the image file.\r\nHelp the droid determine if it is possible.\r\nAnd if it is, find the minimum number of bits to alter.\u003c/div\u003e\u003c/div\u003e"}},{"title":"Input","value":{"format":"HTML","content":"\u003cdiv class\u003d\"problem_par\"\u003e\u003cdiv class\u003d\"problem_par_normal\"\u003eThe first line of the input contains integers \u003ci\u003en\u003c/i\u003e and \u003ci\u003em\u003c/i\u003e (1 ≤ \u003ci\u003en\u003c/i\u003e, \u003ci\u003em\u003c/i\u003e ≤ 250\u0026nbsp;000)\u0026nbsp;—\r\nthe sizes of the image file and of the file with the secret information in bytes.\r\nOn the second line the content of the file with an image is given and the third line contains the secret information.\r\nThe files are given as a sequence of space-separated bytes.\r\nEach byte is written as a sequence of eight bits in the order from the most to the least significant bit.\u003c/div\u003e\u003c/div\u003e"}},{"title":"Output","value":{"format":"HTML","content":"\u003cdiv class\u003d\"problem_par\"\u003e\u003cdiv class\u003d\"problem_par_normal\"\u003ePrint \"No\", if it is impossible to encrypt information in this image.\r\nOtherwise, print in the first line \"Yes\", \r\nand in the second line — the number of bits to alter and the number of the byte in the file with the image, starting from which the secret information will be recorded.\r\nIf there are multiple possible variants, print the one where the secret information is written closer to the beginning of the image file.\u003c/div\u003e\u003c/div\u003e"}},{"title":"Sample","value":{"format":"HTML","content":"\u003ctable class\u003d\u0027vjudge_sample\u0027\u003e\n\u003cthead\u003e\n \u003ctr\u003e\n \u003cth\u003eInput\u003c/th\u003e\n \u003cth\u003eOutput\u003c/th\u003e\n \u003c/tr\u003e\n\u003c/thead\u003e\n\u003ctbody\u003e\n \u003ctr\u003e\n \u003ctd\u003e\u003cpre\u003e3 2\r\n11110001 11110001 11110000\r\n11110000 11110000\r\n\u003c/pre\u003e\u003c/td\u003e\n \u003ctd\u003e\u003cpre\u003eYes\r\n1 2\r\n\u003c/pre\u003e\u003c/td\u003e\n \u003c/tr\u003e\n\u003c/tbody\u003e\n\u003c/table\u003e\n\u003cbr\u003e\u003ctable class\u003d\u0027vjudge_sample\u0027\u003e\n\u003cthead\u003e\n \u003ctr\u003e\n \u003cth\u003eInput\u003c/th\u003e\n \u003cth\u003eOutput\u003c/th\u003e\n \u003c/tr\u003e\n\u003c/thead\u003e\n\u003ctbody\u003e\n \u003ctr\u003e\n \u003ctd\u003e\u003cpre\u003e3 1\r\n11110000 11110001 11110000\r\n11110000\r\n\u003c/pre\u003e\u003c/td\u003e\n \u003ctd\u003e\u003cpre\u003eYes\r\n0 1\r\n\u003c/pre\u003e\u003c/td\u003e\n \u003c/tr\u003e\n\u003c/tbody\u003e\n\u003c/table\u003e\n"}}]}