A Survey of Error Resilient Coding Schemes for Image/Video Transmission Based on Data Embedding
|
|
- Jasmine Sharp
- 8 years ago
- Views:
Transcription
1 A Survey of Error Resilient Coding Schemes for Image/Video Transmission Based on Data Embedding Li-Wei Kang*( 康 立 威 ) and Jin-Jang Leou # ( 柳 金 章 ) *Institute of Information Science Academia Sinica, Taipei 115, Taiwan # Department of Computer Science and Information Engineering National Chung Cheng University Chiayi 621, Taiwan Abstract For entropy-coded images/video, a transmission error in a codeword will result in a great degradation of the received images/video. Recently, several error resilient coding schemes based on data embedding are proposed, in which some important data for error resiliency can be embedded into the compressed bitstream at the encoder. At the decoder, the important data can be extracted for error resiliency so that high-quality images/video can be recovered. In this article, a survey of error resilient coding schemes for image/video transmission based on data embedding is presented. 1. Introduction For entropy-coded images/video, a transmission error in a codeword will not only affect the underlying codeword but also may affect subsequent codewords, resulting in a great degradation of the received images/video. To cope with the synchronization problem, many image/video coding standards [1]-[2] insert synchronization codewords (start codes) into the compressed image/video bitstream. For example, each of the two top layers of the H.264/AVC hierarchical structure, namely, picture and slice, is ahead with a fixed-length start code. After the decoder receives any start code, the decoder resynchronizes regardless of the preceding slippage. However, a transmission error may affect the underlying codeword and its subsequent codewords within the corrupted slice, as three illustrated examples shown in Figs. 1-3 Moreover, because of the use of motion-compensated interframe coding, -4-
2 the effect of a transmission error may be propagated to the subsequent frames, as an illustrated example shown in Fig. 4. (a) (b) Fig. 1. The error-free and corrupted JPEG images (the Y component) of the Lenna image with the block loss rate = 10%: (a) the error-free image and (b) the corresponding corrupted image. (a) (b) Fig. 2. The error-free and corrupted JPEG-2000 images of the Lenna image with bit rate = 0.4bpp and bit error rate = 0.1%: (a) the error-free image; (b) the corresponding corrupted image. (a) (b) Fig. 3. The error-free and corrupted MPEG-2 video frames (the Y component) of the first frame of the Flower sequence with the bit error rate = 0.1%: (a) the error-free video frame and (b) the corresponding corrupted video frame. -5-
3 (a) (b) Fig. 4. The error-free and corrupted H.263 video frames (the Y component) of the sixth frame of the Carphone sequence with the video packet loss rate = 20%: (a) the error-free video frame and (b) the corresponding corrupted video frame. In general, error resilient approaches include three categories [1]-[2], namely, (1) the error resilient encoding approach, (2) the error concealment approach [3]-[4], and (3) the encoder-decoder interactive error control approach. Recently, several error resilient coding approaches based on data embedding are proposed [5]-[29], in which some important data useful for error resiliency (error detection, correction, and/or concealment) performed at the decoder can be embedded into the compressed image/video bitstream. The embedded data should be almost invisible and cannot degrade the image/video quality greatly. At the decoder, the important data will be extracted for error resiliency so that high-quality images/video can be recovered from the corresponding corrupted ones. In this study, a survey of error resilient coding schemes based on data embedding is presented. The following issues should be addressed: at the encoder (1) what kind of important data in an image/video should be extracted and embedded, (2) where should the important data be embedded, (3) how to embed the important data, and (4) at the decoder, how to extract and use the important data for error resiliency. This paper is organized as follows. The error resilient coding schemes for image transmission based on data embedding is addressed in Section 2. The error resilient coding schemes for video transmission based on data embedding is addressed in Section 3, followed by concluding remarks. 2. Error Resilient Coding Schemes For Image Transmission For a still image, the important data for the image should be embedded into the -6-
4 same image [5]-[12]. For example, in [8], the important data for a block in a JPEG image will be embedded into the DCT coefficients of another (remote) block, called the masking block, in the same image. The major design criteria for data embedding in an image can be described as follows. (1) A block and its masking block should be as far as possible so that the two corresponding blocks will be seldom corrupted simultaneously. (2) A block and its masking block should not be in the same synchronization unit. (3) The masking blocks of the blocks in a synchronization unit should not be completely in the same another synchronization unit due to the two synchronization units may be corrupted simultaneously. For DCT-based or JPEG images [5]-[8], Yu and Yin [5] proposed a multimedia data recovery approach, in which a content-associative signature of a block in an image is generated and inserted imperceptibly into another block of the image. At the decoder, the embedded content-associative signature for each corrupted block is extracted and employed to conceal the corrupted block. Yin, Liu, and Yu [6] embedded the block type and edge direction index of a block in an image into the DCT coefficients of another block in the image by the odd-even data embedding scheme. At the decoder, the embedded data for each corrupted block are extracted and employed to conceal the corrupted block by the bilinear interpolation according to its edge direction. In [6], an effective data embedding scheme, called the odd-even data embedding scheme is proposed, which is widely employed by several error resilient coding schemes [6], [8], [13], [23], [25]-[28] and described as follows. If a data bit to be embedded is 0, the selected quantized DCT coefficient for data embedding will be forced to be an even number. If a data bit to be embedded is 1, the selected quantized DCT coefficient will be forced to be an odd number. Additionally, only the quantized DCT coefficients larger than a predefined positive integer threshold, T, are used to embed data bits. That is, if the data bit to be embedded is b j and the selected quantized DCT coefficient is C i, the odd-even data embedding scheme operates as Ci + 1 = Ci 1 Ci if C i > T, C i mod 2 b j, and C i > 0, C if C i > T, C i mod 2 b j, and C i < 0, i otherwise. -7-
5 The bilinear interpolation is effective for a corrupted block with regular edge direction, but not for a complex corrupted block. To solve this problem, Lin, Sow, and Chang [7] proposed a self-authentication-and-recovery image (SARI) system, in which a watermarked SARI image can detect manipulations, resynchronize the remaining bitstream following the corruption, and recover an approximated original image on the corrupted area by embedding two kinds of information watermarks (authentication information and recovery information), where the recovery information is generated from the down-scaled version of the original image. Additionally, Kang and Leou [8] proposed an error resilient coding scheme for JPEG image based on data embedding and side-match vector quantization (VQ). At the encoder, the important data (the VQ codebook index) for each block in a JPEG image are extracted and embedded into another masking block in the image by the odd-even data embedding scheme. At the decoder, after all the corrupted blocks in a JPEG image are detected, if the important data for a corrupted block can be extracted correctly from the corresponding masking block, the extracted important data will be used to conceal the corrupted block by the corresponding closest codeword in the codebook; otherwise, the side-match VQ technique is employed to conceal the corrupted block. If the employed codebook is designed well enough, the corrupted complex block will be also well concealed. An illustrated example is shown in Fig. 5, where BLR denotes the block loss rate and M denotes the quality factor for scaling quantization in JEPG. For wavelet-based or JPEG-2000 images [9]-[12], Kurosaki, Munadi, and Kiya [10] proposed an error concealment approach using the layer structure of JPEG-2000, in which the most significant layer is embedded into the least significant layer of the JPEG-2000 bitstream. When the most significant layer is affected by transmission errors, the corrupted data are concealed by the embedded data in the least significant layer. Lu [11] proposed a data embedding technique to offer error resiliency for wavelet-based image transmission. The authentication information generated from the structural digital signature is used for error detection, whereas the recovery information (an approximated version of the original image) is used for error concealment. Kang and Leou [12] proposed two error resilient coding schemes for -8-
6 wavelet-based image transmission based on data embedding and genetic algorithms (GA s), in which, as JPEG-2000, an image is decomposed into 6 wavelet levels (levels 0-5). For level 0, an error resilient coding scheme based on data embedding and side-match VQ [8] is employed. For level 1, the proposed basic scheme uses the embedded data (the mean value for each code block) to conceal the corrupted code block, whereas the proposed enhanced scheme uses a GA-based error concealment scheme to conceal the corrupted code block. For level 2, the embedded data for a corrupted code block are used to conceal the corrupted code block. For levels 3-5, the wavelet coefficients of each corrupted code block are simply replaced by zeros. An illustrated example is shown in Fig. 6. (a) (b) (c) (d) (e) (f) (g) Fig. 5. The error-free and concealed JPEG images (the Y component) of the Lenna image with BLR = 10% and M = 75: (a) the error-free image, (b) the error-free image with data embedding; (c)-(g) the concealed images by Zero-S, BNM, H.264, ERDE, and the proposed scheme, respectively. -9-
7 (a) (b) (c) (d) (e) (f) (g) (h) (i) Fig. 6. The error-free and concealed JPEG-2000 images of the Lenna image with bit rate = 0.4bpp, BER = 0.1%, and N ave = 3: (a) the error-free image; (b)-(c) the error-free images with data embedding by the proposed basic and enhanced schemes, respectively; (d) the corrupted image; (e)-(i) the concealed images by Zero-S, Mean-S, Inter, and the two proposed (basic and enhanced) schemes, respectively. 3. Error Resilient Coding Schemes For Video Transmission For a video, the important data for a video frame can be embedded into the same frame and/or the next frame(s) [13]-[29]. For example, in [25], for an H.263 I frame, the important data for each MB will be embedded into another MB(s) in the same I frame and/or the next P frame. For a P frame, the important data for all the MBs in a GOB will be embedded into the two corresponding masking GOBs in the next frame. The major design criteria for data embedding in a P frame can be described as follows. (1) The important data for the MBs in a GOB should be separately embedded into different masking GOBs in the next frame because a GOB and its masking GOBs may be corrupted simultaneously. (2) The masking GOBs for a GOB should not be consecutive ones because burst GOB losses may occur. For error detection [13]-[16], Gao and Lie [14] proposed an error detection scheme for MPEG-4 video transmission by embedding useful information (e.g., the -10-
8 types of motion vector information in MPEG-4 data-partitioned packet) at the encoder so that transmission errors can be detected by consistency-checking at the decoder. For error detection and/or correction/concealment [17]-[29], Song and Liu [20] proposed a data embedding scheme for H.263 video transmission in error-prone channels, in which some redundant information used to protect motion vectors and coding modes of MBs in one frame is embedded into the motion vectors in the next frame. Yilmaz and Alatan [23] proposed an error resilient H.263 video transmission codec utilizing imperceptible embedded information for error detection, resynchronization, and reconstruction. For an I frame, both a spatial error recovery technique embedding the edge orientation information of each MB and a resynchronization technique embedding the bit-length of each MB are proposed to recover the corrupted MBs. For a P frame, the embedded motion vector information is used to recover the corrupted MBs. Zeng [24] embedded the best suitable error concealment scheme for each MB at the encoder for H.263 video transmission. At the decoder, the best error concealment scheme for each corrupted MB is used to conceal it. In some recent error resilient coding schemes based on data embedding, a case that both an MB and its important data (embedded into another place) are corrupted simultaneously is not well treated. For example, in [20], a frame-based embedding scheme is proposed, based on the two assumptions that the next frame of a corrupted frame will be correctly received and at most one GOB will be corrupted in a frame. If any of the two assumptions is not valid, the important data for the corrupted frame cannot be correctly extracted. Note that the two assumptions are usually not valid in a noisy channel. In [23], the important data for a GOB is completely embedded into one masking GOB in the next frame. If the GOB and its masking GOB are corrupted simultaneously, the important data for the corrupted GOB cannot be correctly extracted. To cope with the above-mentioned problems, Kang and Leou [25] proposed an error resilient coding scheme for H.263 video transmission. At the encoder, for a P frame, the important data (the coding mode and motion vector information) for each GOB are extracted and embedded into the next frame by the MB-interleaving -11-
9 GOB-based data embedding scheme. If two non-adjacent GOBs in a frame are denoted by GOB A and GOB B, respectively, the important data extracted from the even-number MBs of GOB A and those extracted from the odd-number MBs of GOB B are interleaved by the even-odd order and concatenated to a mixed bitstream, which is embedded into its masking GOB in the next frame. On the other hand, the other corresponding bitstream is also similarly concatenated, which is embedded into another masking GOB in the next frame. At the decoder, for a corrupted GOB, if only one of its masking GOB is corrupted, the even (or odd) MBs of the corrupted GOB can be concealed by using the important data extracted from the good masking GOB first. Then the odd (or even) MBs can be concealed by the employed error concealment scheme [3] with more neighboring MB information. Because the corresponding two masking GOBs of a pair of GOBs are usually far apart, i.e., the corresponding two masking GOBs are seldom corrupted simultaneously. Hence, the important data for a corrupted GOB are usually completely available or at least partially available. Cooperating with the employed error detection and concealment scheme, the better concealed results will be obtained. To obtain more reliable error resiliency, Kang and Leou [27]-[28] proposed an error resilient coding scheme for H.264/AVC video transmission. At the encoder, for a P frame, two types of important data with different error recovery capabilities for each MB are extracted and embedded into the next frame by the proposed MB-interleaving slice-based data embedding scheme, in which the important data for all the MBs in a slice will be embedded into the four corresponding masking slices in the next frame. Here, the Type-I data for an MB contains the coding mode, the reference frame(s), and the motion vector(s) for the MB, whereas the Type-II data for the MB includes the best error concealment scheme among 15 pre-evaluated error concealment schemes for the MB. At the decoder, if the important data for a corrupted MB can be correctly extracted, the extracted important data will facilitate the employed error concealment schemes [3]-[4] to conceal the corrupted MB; otherwise, the employed error concealment schemes are simply used to conceal the corrupted MB. Finally, the approach that the important data are transmitted as extra side information (e.g., extra packets) and the approach with data embedding can be -12-
10 compared as follows. (1) If the important data are transmitted as extra packets, it may contain more extra overhead in maintaining the inter-packet synchronization between the important data packets and the image/video data packets. Furthermore, the delay jitter of the important data packets may also introduce extra delay in error concealment performed at the decoder, since it may need to wait for the important data packets when errors occur. However, if the important data are embedded, less extra overheads are needed. (2) If the important data transmitted as extra packets are variable-length coded, extra synchronization codewords will be required to protect these data. On the other hand, if the important data are embedded into the compressed image/video bitstream, they are protected explicitly without extra synchronization codewords. (3) Based on [27]-[28], the bit rate increments induced by transmitting the important data as extra packets are more significant than those induced by the approach with data embedding when image/video qualities are similar. However, when perceptibly invisible image/video quality degradation is allowed, the bit rate will be only slightly increased. An illustrated example is shown in Fig. 7. (a) (b) (c) (d) (e) (f) Fig. 7. The error-free and concealed H.263 video frames (the Y component) of a P-frame (the fourteenth frame) within the Foreman sequence at frame rate = 10 fps with VPLR = 30% and bit rate = 48kbps: (a) the error-free frame; (b)-(f) the concealed frames by Zero-S, TMN-11, DEVCS, ERDE, and the proposed scheme, respectively. 4. Concluding Remarks In this study, a survey of error resilient coding schemes based on data embedding -13-
11 is presented. For future researches, new important data helpful for image/video error resiliency, new data embedding schemes, and new error detection, correction, and concealment schemes can be investigated. References [1] Y. Wang and Q. F. Zhu, Error control and concealment for video communication: a review, Proceedings of the IEEE, vol. 86, no. 5, pp , May [2] Y. Wang, S. Wenger, J. Wen, and A. K. Katsaggelos, Error resilient video coding techniques, IEEE Signal Processing Magazine, vol. 17, no. 4, pp , July [3] L. W. Kang and J. J. Leou, A new hybrid error concealment scheme for MPEG-2 video transmission, in Proc. of IEEE Int. Workshop on Multimedia Signal Processing, St. Thomas, US Virgin Islands, Dec. 2002, pp [4] L. W. Kang and J. J. Leou, A hybrid error concealment scheme for MPEG-2 video transmission based on best neighborhood matching algorithm, in Proc. of IEEE Int. Conf. on Multimedia and Expo, Taipei, Taiwan, June [5] H. H. Yu and P. Yin, Multimedia data recovery using information hiding, in Proc. of IEEE Int. Global Telecommunications Conference, San Francisco, CA, USA, Nov. 2000, vol. 3, pp [6] P. Yin, B. Liu, and H. H. Yu, Error concealment using data hiding, in Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, May 2001, vol. 3, pp [7] C. Y. Lin, D. Sow, and S. F. Chang, Using self-authentication-and-recovery images for error concealment in wireless environments, in Proc. of SPIE, vol. 4518, Aug. 2001, pp [8] L. W. Kang and J. J. Leou, A new error resilient coding scheme for JPEG image transmission based on data embedding and vector quantization, in Proc. of IEEE Int. Symposium on Circuits and Systems, Bangkok, Thailand, May 2003, vol. 2, pp
12 [9] J. Wang and L. Ji, A region and data hiding based error concealment scheme for images, IEEE Trans. on Consumer Electronics, vol. 47, no. 2, pp , May [10] M. Kurosaki, K. Munadi, and H. Kiya, Error concealment using layer structure for JPEG2000 images, in Proc. of IEEE Asia-Pacific Conf. on Circuits and Systems, 2002, pp [11] C. S. Lu, Wireless multimedia error resilience via a data hiding technique, in Proc. of IEEE Int. Workshop on Multimedia Signal Processing, St. Thomas, US Virgin Islands, Dec. 2002, pp [12] L. W. Kang and J. J. Leou, Two error resilient coding schemes for wavelet-based image transmission based on data embedding and genetic algorithms, in Proc. of IEEE Int. Conf. on Image Processing, Barcelona, Spain, Sept. 2003, pp [13] T. H. Wang, T. H. Lee, and P. C. Chang, Error Detection by Parity Checks for H.263 Compatible Video Coding, in Proc. of IEEE Data Compression Conference, Snowbird, Utah, March 2001, p [14] Z. W. Gao and W. N. Lie, MPEG-4 video error detection by using data hiding techniques, in Proc. of IEEE Int. Symposium on Circuits and Systems, May 2002, vol. 3, pp [15] P. Zhou and Y. He, A fragile watermark error detection scheme for JVT, in Proc. of IEEE Int. Symposium on Circuits and Systems, Bangkok, Thailand, May 2003, vol. 2, pp [16] F. Bartolini, A. Manetti, A. Piva, and M. Barni, A data hiding approach for correcting errors in H.263 video transmitted over a noisy channel, in Proc. of IEEE Int. Workshop on Multimedia Signal Processing, Cannes, France, Oct. 2001, pp [17] D. L. Robie and R. M. Mersereau, Video error correction using data hiding techniques, in Proc. of IEEE Int. Workshop on Multimedia Signal Processing, Cannes, France, Oct. 2001, pp [18] D. L. Robie and R. M. Mersereau, Video error correction using steganography, EURASIP Journal on Applied Signal Processing, vol. 2002, no. -15-
13 2, pp , [19] D. L. Robie, N. Wu, and R. M. Mersereau, The use of steganography to enhance error detection and correction in MPEG-2 video, in Proc. of IEEE Asilomar Conf. on Signals, Systems and Computers, Nov. 2002, vol. 2, pp [20] J. Song, and K. J. R. Liu, A data embedded video coding scheme for error-prone channels, IEEE Trans. on Multimedia, vol. 3, no. 4, pp , [21] M. Carli, D. Bailey, M. Farias, and S. K. Mitra, Error control and concealment for video transmission using data hiding, in Proc. of IEEE Int. Symposium on Wireless Personal Multimedia Communications, Oct. 2002, vol. 2, pp [22] C. B. Adsumilli, M. Farias, M. Carli, and S. K. Mitra, A hybrid constrained unequal error protection and data hiding scheme for packet video transmission, in Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, April 2003, vol. 5, pp [23] A. Yilmaz and A. A. Alatan, Error concealment of video sequences by data hiding, in Proc. of IEEE Int. Conf. on Image Processing, Barcelona, Spain, Sept. 2003, pp [24] W. Zeng, Spatial-temporal error concealment with side information for standard video codecs, in Proc. of IEEE Int. Conf. on Multimedia and Expo, Baltimore, Maryland, USA, July 2003, pp [25] L. W. Kang and J. J. Leou, A new error resilient coding scheme for H.263 video transmission, in Proc. of IEEE Pacific-Rim Conf. on Multimedia, Hsinchu, Taiwan, Dec. 2002, pp [26] S. W. Lin, J. J. Leou, and L. W. Kang, An error resilient coding scheme for H.26L video transmission based on data embedding, Journal of Visual Communication and Image Representation, vol. 15, no. 2, pp , [27] L. W. Kang and J. J. Leou, An error resilient coding scheme for H.264 video transmission based on data embedding, in Proc. of 2004 IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, Montreal, Quebec, Canada, May 2004, vol. 3, pp
14 [28] L. W. Kang and J. J. Leou, An error resilient coding scheme for H.264/AVC video transmission based on data embedding, Journal of Visual Communication and Image Representation, vol. 16, no. 1, pp , [29] J. R. Chen, C. S. Lu, and K. C. Fan, A significant motion vector protection-based error-resilient scheme in H.264, to appear in Proc. of 2004 IEEE Int. Workshop on Multimedia Signal Processing, Siena, Italy, Sept
Video Coding Basics. Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu
Video Coding Basics Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu Outline Motivation for video coding Basic ideas in video coding Block diagram of a typical video codec Different
More informationVideo Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA nandakishore@qualcomm.com K.
More informationBandwidth Adaptation for MPEG-4 Video Streaming over the Internet
DICTA2002: Digital Image Computing Techniques and Applications, 21--22 January 2002, Melbourne, Australia Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet K. Ramkishor James. P. Mammen
More informationModule 8 VIDEO CODING STANDARDS. Version 2 ECE IIT, Kharagpur
Module 8 VIDEO CODING STANDARDS Version ECE IIT, Kharagpur Lesson H. andh.3 Standards Version ECE IIT, Kharagpur Lesson Objectives At the end of this lesson the students should be able to :. State the
More informationWATERMARKING FOR IMAGE AUTHENTICATION
WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data
More informationIndex Terms Audio streams, inactive frames, steganography, Voice over Internet Protocol (VoIP), packet loss. I. Introduction
Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Advanced Integrated Steganographic
More informationPerformance Analysis and Comparison of JM 15.1 and Intel IPP H.264 Encoder and Decoder
Performance Analysis and Comparison of 15.1 and H.264 Encoder and Decoder K.V.Suchethan Swaroop and K.R.Rao, IEEE Fellow Department of Electrical Engineering, University of Texas at Arlington Arlington,
More informationStudy and Implementation of Video Compression Standards (H.264/AVC and Dirac)
Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- sumedha.phatak@mavs.uta.edu Objective: A study, implementation and comparison of
More informationStudy and Implementation of Video Compression standards (H.264/AVC, Dirac)
Study and Implementation of Video Compression standards (H.264/AVC, Dirac) EE 5359-Multimedia Processing- Spring 2012 Dr. K.R Rao By: Sumedha Phatak(1000731131) Objective A study, implementation and comparison
More informationTransform-domain Wyner-Ziv Codec for Video
Transform-domain Wyner-Ziv Codec for Video Anne Aaron, Shantanu Rane, Eric Setton, and Bernd Girod Information Systems Laboratory, Department of Electrical Engineering Stanford University 350 Serra Mall,
More informationhttp://www.springer.com/0-387-23402-0
http://www.springer.com/0-387-23402-0 Chapter 2 VISUAL DATA FORMATS 1. Image and Video Data Digital visual data is usually organised in rectangular arrays denoted as frames, the elements of these arrays
More informationDepartment of Electrical and Computer Engineering, Northwestern University, e-mail: faggk,faisal,lkon,hongg@ece.nwu.edu,
ERROR RESILIENCE AND CONCEALMENT IN VIDEO CODING A. K. Katsaggelos, F. Ishtiaq, L. P. Kondi, M.-C. Hong, M. Banham +,J.Brailean + Department of Electrical and Computer Engineering, Northwestern University,
More information302 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 19, NO. 2, FEBRUARY 2009
302 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 19, NO. 2, FEBRUARY 2009 Transactions Letters Fast Inter-Mode Decision in an H.264/AVC Encoder Using Mode and Lagrangian Cost Correlation
More informationCombating Anti-forensics of Jpeg Compression
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): 1694-814 www.ijcsi.org 454 Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng
More informationImage Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
More informationA comprehensive survey on various ETC techniques for secure Data transmission
A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and
More informationA Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and
More information2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India
Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity
More informationVideo Transmission over Wireless LAN. Hang Liu Hang.liu@thomson.net
Video Transmission over Wireless LAN Hang Liu Hang.liu@thomson.net Page 1 Introduction! Introduction! Wi-Fi Multimedia and IEEE 802.11e for QoS Enhancement! Error Control Techniques Page 2 Introduction!
More informationIntroduction to image coding
Introduction to image coding Image coding aims at reducing amount of data required for image representation, storage or transmission. This is achieved by removing redundant data from an image, i.e. by
More informationReversible Data Hiding for Security Applications
Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.
More informationVolume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
More informationDYNAMIC REGION OF INTEREST TRANSCODING FOR MULTIPOINT VIDEO CONFERENCING
DYNAMIC REGION OF INTEREST TRANSCODING FOR MULTIPOINT VIDEO CONFERENCING Chia-Wen Lin Department of Computer Science and Information Engineering National Chung Cheng University Chiayi Taiwan R.O.C. cwlin@cs.ccu.edu.tw
More informationWatermarking Techniques for Protecting Intellectual Properties in a Digital Environment
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and
More informationWireless Ultrasound Video Transmission for Stroke Risk Assessment: Quality Metrics and System Design
Wireless Ultrasound Video Transmission for Stroke Risk Assessment: Quality Metrics and System Design A. Panayides 1, M.S. Pattichis 2, C. S. Pattichis 1, C. P. Loizou 3, M. Pantziaris 4 1 A.Panayides and
More informationIntra-Prediction Mode Decision for H.264 in Two Steps Song-Hak Ri, Joern Ostermann
Intra-Prediction Mode Decision for H.264 in Two Steps Song-Hak Ri, Joern Ostermann Institut für Informationsverarbeitung, University of Hannover Appelstr 9a, D-30167 Hannover, Germany Abstract. Two fast
More informationComplexity-rate-distortion Evaluation of Video Encoding for Cloud Media Computing
Complexity-rate-distortion Evaluation of Video Encoding for Cloud Media Computing Ming Yang, Jianfei Cai, Yonggang Wen and Chuan Heng Foh School of Computer Engineering, Nanyang Technological University,
More informationFriendly Medical Image Sharing Scheme
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer
More informationHow To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3
Recognizing Voice Over IP: A Robust Front-End for Speech Recognition on the World Wide Web. By C.Moreno, A. Antolin and F.Diaz-de-Maria. Summary By Maheshwar Jayaraman 1 1. Introduction Voice Over IP is
More informationQOS Requirements and Service Level Agreements. LECTURE 4 Lecturer: Associate Professor A.S. Eremenko
QOS Requirements and Service Level Agreements LECTURE 4 Lecturer: Associate Professor A.S. Eremenko Application SLA Requirements Different applications have different SLA requirements; the impact that
More informationEfficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation
Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation Sunil Karthick.M PG Scholar Department of ECE Kongu Engineering College Perundurau-638052 Venkatachalam.S Assistant Professor
More informationAsia-Pacific Advanced Network
Frame aggregations in the wireless LANs: A review paper Presented by: Anwar Saif Asia-Pacific Advanced Network Wireless communication 2009 Abstract The overhead induced by the IEEE 802.11 PHY and MAC layer
More informationSome Publications and Patents on Data Hiding, Steganalysis, Forensics and Security Yun Q. Shi 25 December, 2008
Some Publications and Patents on Data Hiding, Steganalysis, Forensics and Security Yun Q. Shi 25 December, 2008 Data hiding: strategy and robustness Book chapter 1. X. Kang, J. Huang and Y. Q. Shi, DWT
More informationSachin Dhawan Deptt. of ECE, UIET, Kurukshetra University, Kurukshetra, Haryana, India
Abstract Image compression is now essential for applications such as transmission and storage in data bases. In this paper we review and discuss about the image compression, need of compression, its principles,
More informationGenerating Robust Digital Signature for Image/Video Authentication
Generating Robust Digital Signature for Image/Video Authentication Ching-Yung Lin and Shih-Fu Chang Department of Electrical Engineering and New Media Technology Center Columbia University New York, NY
More informationJPEG Image Compression by Using DCT
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-4 E-ISSN: 2347-2693 JPEG Image Compression by Using DCT Sarika P. Bagal 1* and Vishal B. Raskar 2 1*
More informationMultimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
More informationA Fragile Watermark Error Detection Scheme For Wireless Video Communications
1 A Fragile Watermark Error Detection Scheme For Wireless Video Communications Minghua Chen, Yun He and Reginald L. Lagendijk State Key Lab. of Microwave and Digital Communications Department of Electrical
More informationFigure 1: Relation between codec, data containers and compression algorithms.
Video Compression Djordje Mitrovic University of Edinburgh This document deals with the issues of video compression. The algorithm, which is used by the MPEG standards, will be elucidated upon in order
More informationAn Incomplete Cryptography based Digital Rights Management with DCFF
An Incomplete Cryptography based Digital Rights Management with DCFF Ta Minh Thanh Department of Computer Science Tokyo Institute of Technology 2-12-2, Ookayama, Meguro, Tokyo, 152-8552, Japan. Email:thanhtm@ks.cs.titech.ac.jp
More informationROBUST AND SECURE DIGITAL SIGNATURE FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS
ROBUST AND SECURE DIGITAL SIGNATURE FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS J Sravanthi #1, Dr. MHM Krishna Prasad *2 # Dept. of Computer Science, UCEV Vizianagaram, Andhra Pradesh, India * Associate
More informationEfficient Coding Unit and Prediction Unit Decision Algorithm for Multiview Video Coding
JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 13, NO. 2, JUNE 2015 97 Efficient Coding Unit and Prediction Unit Decision Algorithm for Multiview Video Coding Wei-Hsiang Chang, Mei-Juan Chen, Gwo-Long
More informationVideo Encryption Exploiting Non-Standard 3D Data Arrangements. Stefan A. Kramatsch, Herbert Stögner, and Andreas Uhl uhl@cosy.sbg.ac.
Video Encryption Exploiting Non-Standard 3D Data Arrangements Stefan A. Kramatsch, Herbert Stögner, and Andreas Uhl uhl@cosy.sbg.ac.at Andreas Uhl 1 Carinthia Tech Institute & Salzburg University Outline
More informationQuality Estimation for Scalable Video Codec. Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden)
Quality Estimation for Scalable Video Codec Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden) Purpose of scalable video coding Multiple video streams are needed for heterogeneous
More informationDynamic Region of Interest Transcoding for Multipoint Video Conferencing
982 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 10, OCTOBER 2003 Dynamic Region of Interest Transcoding for Multipoint Video Conferencing Chia-Wen Lin, Member, IEEE, Yung-Chang
More informationTracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object
More informationInternet Video Streaming and Cloud-based Multimedia Applications. Outline
Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, yhe@ee.ryerson.ca Ling Guan, lguan@ee.ryerson.ca 1 Outline Internet video streaming Overview Video coding Approaches for video
More informationSecret Communication through Web Pages Using Special Space Codes in HTML Files
International Journal of Applied Science and Engineering 2008. 6, 2: 141-149 Secret Communication through Web Pages Using Special Space Codes in HTML Files I-Shi Lee a, c and Wen-Hsiang Tsai a, b, * a
More informationParametric Comparison of H.264 with Existing Video Standards
Parametric Comparison of H.264 with Existing Video Standards Sumit Bhardwaj Department of Electronics and Communication Engineering Amity School of Engineering, Noida, Uttar Pradesh,INDIA Jyoti Bhardwaj
More informationReview of Error Resilient Coding Techniques for Real-Time Video Communications
Review of Error Resilient Coding Techniques for Real-Time Video Communications Yao Wang, Stephan Wenger, Jiangtao Wen, and Aggelos K. Katsaggelos 1 Abstract In this paper we review error resilience techniques
More informationMEDICAL IMAGE COMPRESSION USING HYBRID CODER WITH FUZZY EDGE DETECTION
MEDICAL IMAGE COMPRESSION USING HYBRID CODER WITH FUZZY EDGE DETECTION K. Vidhya 1 and S. Shenbagadevi Department of Electrical & Communication Engineering, College of Engineering, Anna University, Chennai,
More informationMultiple Embedding Using Robust Watermarks for Wireless Medical Images
Multiple Embedding Using Robust Watermarks for Wireless Medical Images Dominic Osborne and Derek Abbott Centre for Biomedical Engineering (CBME) The University of Adelaide, SA 5005, Australia Matthew Sorell
More informationMultiple Description Coding (MDC) and Scalable Coding (SC) for Multimedia
Multiple Description Coding (MDC) and Scalable Coding (SC) for Multimedia Gürkan Gür PhD. Candidate e-mail: gurgurka@boun.edu.tr Dept. Of Computer Eng. Boğaziçi University Istanbul/TR ( Currenty@UNITN)
More informationSINCE 1997, the ITU-T s Video Coding Experts Group
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 7, JULY 2003 657 H.264/AVC in Wireless Environments Thomas Stockhammer, Miska M. Hannuksela, and Thomas Wiegand Abstract Video
More information(51) Int Cl.: H04N 7/24 (2011.01)
(19) TEPZZ_79 49 B_T (11) EP 1 792 492 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 04.12.13 Bulletin 13/49 (21) Application number: 08021. (22)
More informationMultimedia Data Hiding
Multimedia Data Hiding Introduction! Digital Watermarking / Multimedia Data Hiding Hide secondary data in digital image/video/audio/3d! Uses of hidden data: ownership verification, alteration detection
More informationComplexity-bounded Power Control in Video Transmission over a CDMA Wireless Network
Complexity-bounded Power Control in Video Transmission over a CDMA Wireless Network Xiaoan Lu, David Goodman, Yao Wang, and Elza Erkip Electrical and Computer Engineering, Polytechnic University, Brooklyn,
More informationMike Perkins, Ph.D. perk@cardinalpeak.com
Mike Perkins, Ph.D. perk@cardinalpeak.com Summary More than 28 years of experience in research, algorithm development, system design, engineering management, executive management, and Board of Directors
More informationInvisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique
Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique B.Sai Kiran M.Tech (VLSI), CMR Institute of Technology. Mr.Shahbaz Khan Associate Professor, CMR Institute of Technology.
More informationTHE EMERGING JVT/H.26L VIDEO CODING STANDARD
THE EMERGING JVT/H.26L VIDEO CODING STANDARD H. Schwarz and T. Wiegand Heinrich Hertz Institute, Germany ABSTRACT JVT/H.26L is a current project of the ITU-T Video Coding Experts Group (VCEG) and the ISO/IEC
More informationFigure 2 Left: original video frame; center: low-delay image plane; right: high-delay image plane.
To appear in Proceedings of the SPIE: Human Vision and Image Processing 1998 Effects of Temporal Jitter on Video Quality: Assessment Using Psychophysical Methods Yuan-Chi Chang a, Thom Carney b,c, Stanley
More informationACN2005 Term Project Improve VoIP quality
ACN2005 Term Project Improve VoIP quality By introducing TCP-Friendly protocol Burt C.F. Lien ( 連 矩 鋒 ) CSIE Department, National Taiwan University p93007@csie.ntu.edu.tw Abstract The most notorious of
More informationMULTIMEDIA applications involving the transmission
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 20, NO. 3, MARCH 2010 407 Unequal Error Protection for Robust Streaming of Scalable Video Over Packet Lossy Networks Ehsan Maani, Student
More informationTRANSPARENT ENCRYPTION FOR HEVC USING BIT-STREAM-BASED SELECTIVE COEFFICIENT SIGN ENCRYPTION. Heinz Hofbauer Andreas Uhl Andreas Unterweger
TRANSPARENT ENCRYPTION FOR HEVC USING BIT-STREAM-BASED SELECTIVE COEFFICIENT SIGN ENCRYPTION Heinz Hofbauer Andreas Uhl Andreas Unterweger University of Salzburg, Jakob Haringer Str. 2, 2 Salzburg, Austria
More informationChapter 3 ATM and Multimedia Traffic
In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very
More informationMOST error-correcting codes are designed for the equal
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 3, MARCH 2007 387 Transactions Letters Unequal Error Protection Using Partially Regular LDPC Codes Nazanin Rahnavard, Member, IEEE, Hossein Pishro-Nik,
More informationWhite paper. H.264 video compression standard. New possibilities within video surveillance.
White paper H.264 video compression standard. New possibilities within video surveillance. Table of contents 1. Introduction 3 2. Development of H.264 3 3. How video compression works 4 4. H.264 profiles
More informationReversible Data Hiding and Reversible Authentication Watermarking for Binary Images
Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images Sergio Vicente D. Pamboukian 1, Hae Yong Kim 2 1 Universidade Presbiteriana Mackenzie, Brazil. 2 Universidade de São
More informationClasses of multimedia Applications
Classes of multimedia Applications Streaming Stored Audio and Video Streaming Live Audio and Video Real-Time Interactive Audio and Video Others Class: Streaming Stored Audio and Video The multimedia content
More informationVideo compression: Performance of available codec software
Video compression: Performance of available codec software Introduction. Digital Video A digital video is a collection of images presented sequentially to produce the effect of continuous motion. It takes
More informationPerformance Analysis of Interleaving Scheme in Wideband VoIP System under Different Strategic Conditions
Performance Analysis of Scheme in Wideband VoIP System under Different Strategic Conditions Harjit Pal Singh 1, Sarabjeet Singh 1 and Jasvir Singh 2 1 Dept. of Physics, Dr. B.R. Ambedkar National Institute
More informationA Digital Audio Watermark Embedding Algorithm
Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, 3008, China tangxh@hziee.edu.cn,
More informationMULTI-RESOLUTION PERCEPTUAL ENCODING FOR INTERACTIVE IMAGE SHARING IN REMOTE TELE-DIAGNOSTICS. Javed I. Khan and D. Y. Y. Yun
MULTI-RESOLUTION PERCEPTUAL ENCODING FOR INTERACTIVE IMAGE SHARING IN REMOTE TELE-DIAGNOSTICS Javed I. Khan and D. Y. Y. Yun Laboratories of Intelligent and Parallel Systems Department of Electrical Engineering,
More informationRate control algorithms for video coding. Citation. Issued Date 2000. http://hdl.handle.net/10722/31094
Title Rate control algorithms for video coding Author(s) Ng, Cheuk-yan; 吳 卓 恩 Citation Issued Date 2000 URL http://hdl.handle.net/10722/31094 Rights The author retains all proprietary rights, (such as
More informationRESEARCH PROFILE: VIDEO TECHNOLOGIES FOR NETWORKED MULTIMEDIA APPLICATIONS
RESEARCH PROFILE: VIDEO TECHNOLOGIES FOR NETWORKED MULTIMEDIA APPLICATIONS Chia-Wen Lin ( 林 嘉 文 ) cwlin@cs.ccu.edu.tw Tel: (05) 272-0411 ext. 33120 Networked Video Lab Dept. CSIE National Chung Cheng University
More informationUnequal Packet Loss Resilience for Fine-Granular-Scalability Video
IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 3, NO. 4, DECEMBER 2001 381 Unequal Packet Loss Resilience for Fine-Granular-Scalability Video Mihaela van der Schaar Hayder Radha, Member, IEEE Abstract Several embedded
More informationAN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS
AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,
More informationQuality Optimal Policy for H.264 Scalable Video Scheduling in Broadband Multimedia Wireless Networks
Quality Optimal Policy for H.264 Scalable Video Scheduling in Broadband Multimedia Wireless Networks Vamseedhar R. Reddyvari Electrical Engineering Indian Institute of Technology Kanpur Email: vamsee@iitk.ac.in
More informationWe are presenting a wavelet based video conferencing system. Openphone. Dirac Wavelet based video codec
Investigating Wavelet Based Video Conferencing System Team Members: o AhtshamAli Ali o Adnan Ahmed (in Newzealand for grad studies) o Adil Nazir (starting MS at LUMS now) o Waseem Khan o Farah Parvaiz
More informationINTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010
Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication
More informationRegion of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR-2006-1
Region of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR-2006-1 Ying Liu and William A. Pearlman January 2006 Center for Image Processing Research Rensselaer Polytechnic
More informationVideo Coding Technologies and Standards: Now and Beyond
Hitachi Review Vol. 55 (Mar. 2006) 11 Video Coding Technologies and Standards: Now and Beyond Tomokazu Murakami Hiroaki Ito Muneaki Yamaguchi Yuichiro Nakaya, Ph.D. OVERVIEW: Video coding technology compresses
More informationH.264/AVC for Wireless Applications
Thomas STOCKHAMMER (1), and Thomas WIEGAND (8) (1) Institute for Communications Engineering (LNT), Munich University of Technology (TUM), D-80290 Munich, Germany, E- mail: stockhammer@ei.tum.de (2) Image
More informationRadio Resource Allocation in GSM/GPRS Networks
Radio Resource Allocation in GSM/GPRS Networks Jean-Lien C. Wu 1, Wei-Yeh Chen 2, and Hung-Huan Liu 1 1 Department of Electronic Engineering, National Taiwan University of Science and Technology, 43, Keelung
More informationVery Low Frame-Rate Video Streaming For Face-to-Face Teleconference
Very Low Frame-Rate Video Streaming For Face-to-Face Teleconference Jue Wang, Michael F. Cohen Department of Electrical Engineering, University of Washington Microsoft Research Abstract Providing the best
More informationError Detection and Data Recovery Architecture for Systolic Motion Estimators
Error Detection and Data Recovery Architecture for Systolic Motion Estimators L. Arun Kumar #1, L. Sheela *2 # PG Scholar, * Assistant Professor, Embedded System Technologies, Regional Center of Anna University
More informationA Survey of Video Processing with Field Programmable Gate Arrays (FGPA)
A Survey of Video Processing with Field Programmable Gate Arrays (FGPA) Heather Garnell Abstract This paper is a high-level, survey of recent developments in the area of video processing using reconfigurable
More informationOBJECTIVE VIDEO QUALITY METRICS: A PERFORMANCE ANALYSIS
OBJECTIVE VIDEO QUALITY METRICS: A PERFORMANCE ANALYSIS José Luis Martínez, Pedro Cuenca, Francisco Delicado and Francisco Quiles Instituto de Investigación en Informática Universidad de Castilla La Mancha,
More informationROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security
I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero
More informationANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP
ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos (gss7@sfu.ca) (sna14@sfu.ca)
More informationH.263 Based Video Codec for Real-Time Visual Communications Over Wireless Radio Networks
Based Video Codec for Real-Time Visual Communications Over Wireless Radio Networks Abstract Paramvir Bahl Microsoft Corporation Redmond, Washington, USA bahl@microsoft.com With the emergence of the International
More informationIntroduction to Medical Image Compression Using Wavelet Transform
National Taiwan University Graduate Institute of Communication Engineering Time Frequency Analysis and Wavelet Transform Term Paper Introduction to Medical Image Compression Using Wavelet Transform 李 自
More informationImage Transmission over IEEE 802.15.4 and ZigBee Networks
MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Image Transmission over IEEE 802.15.4 and ZigBee Networks Georgiy Pekhteryev, Zafer Sahinoglu, Philip Orlik, and Ghulam Bhatti TR2005-030 May
More informationQoS Guarantee for Wireless Transmission of Medical Imaging, Telemedicine. Lei Cao Dept. of Electrical Engineering The University of Mississippi
QoS Guarantee for Wireless Transmission of Medical Imaging, Telemedicine Lei Cao Dept. of Electrical Engineering The University of Mississippi Contents Telemedicine Services and Status Existing work in
More informationLog-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network
Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering
More informationData Link Layer Overview
Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,
More informationOverview: Video Coding Standards
Overview: Video Coding Standards Video coding standards: applications and common structure Relevant standards organizations ITU-T Rec. H.261 ITU-T Rec. H.263 ISO/IEC MPEG-1 ISO/IEC MPEG-2 ISO/IEC MPEG-4
More informationMULTI-STREAM VOICE OVER IP USING PACKET PATH DIVERSITY
MULTI-STREAM VOICE OVER IP USING PACKET PATH DIVERSITY Yi J. Liang, Eckehard G. Steinbach, and Bernd Girod Information Systems Laboratory, Department of Electrical Engineering Stanford University, Stanford,
More informationImage Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
More information1932-4553/$25.00 2007 IEEE
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, VOL. 1, NO. 2, AUGUST 2007 231 A Flexible Multiple Description Coding Framework for Adaptive Peer-to-Peer Video Streaming Emrah Akyol, A. Murat Tekalp,
More information