A Survey of Error Resilient Coding Schemes for Image/Video Transmission Based on Data Embedding

Size: px
Start display at page:

Download "A Survey of Error Resilient Coding Schemes for Image/Video Transmission Based on Data Embedding"

Transcription

1 A Survey of Error Resilient Coding Schemes for Image/Video Transmission Based on Data Embedding Li-Wei Kang*( 康 立 威 ) and Jin-Jang Leou # ( 柳 金 章 ) *Institute of Information Science Academia Sinica, Taipei 115, Taiwan # Department of Computer Science and Information Engineering National Chung Cheng University Chiayi 621, Taiwan Abstract For entropy-coded images/video, a transmission error in a codeword will result in a great degradation of the received images/video. Recently, several error resilient coding schemes based on data embedding are proposed, in which some important data for error resiliency can be embedded into the compressed bitstream at the encoder. At the decoder, the important data can be extracted for error resiliency so that high-quality images/video can be recovered. In this article, a survey of error resilient coding schemes for image/video transmission based on data embedding is presented. 1. Introduction For entropy-coded images/video, a transmission error in a codeword will not only affect the underlying codeword but also may affect subsequent codewords, resulting in a great degradation of the received images/video. To cope with the synchronization problem, many image/video coding standards [1]-[2] insert synchronization codewords (start codes) into the compressed image/video bitstream. For example, each of the two top layers of the H.264/AVC hierarchical structure, namely, picture and slice, is ahead with a fixed-length start code. After the decoder receives any start code, the decoder resynchronizes regardless of the preceding slippage. However, a transmission error may affect the underlying codeword and its subsequent codewords within the corrupted slice, as three illustrated examples shown in Figs. 1-3 Moreover, because of the use of motion-compensated interframe coding, -4-

2 the effect of a transmission error may be propagated to the subsequent frames, as an illustrated example shown in Fig. 4. (a) (b) Fig. 1. The error-free and corrupted JPEG images (the Y component) of the Lenna image with the block loss rate = 10%: (a) the error-free image and (b) the corresponding corrupted image. (a) (b) Fig. 2. The error-free and corrupted JPEG-2000 images of the Lenna image with bit rate = 0.4bpp and bit error rate = 0.1%: (a) the error-free image; (b) the corresponding corrupted image. (a) (b) Fig. 3. The error-free and corrupted MPEG-2 video frames (the Y component) of the first frame of the Flower sequence with the bit error rate = 0.1%: (a) the error-free video frame and (b) the corresponding corrupted video frame. -5-

3 (a) (b) Fig. 4. The error-free and corrupted H.263 video frames (the Y component) of the sixth frame of the Carphone sequence with the video packet loss rate = 20%: (a) the error-free video frame and (b) the corresponding corrupted video frame. In general, error resilient approaches include three categories [1]-[2], namely, (1) the error resilient encoding approach, (2) the error concealment approach [3]-[4], and (3) the encoder-decoder interactive error control approach. Recently, several error resilient coding approaches based on data embedding are proposed [5]-[29], in which some important data useful for error resiliency (error detection, correction, and/or concealment) performed at the decoder can be embedded into the compressed image/video bitstream. The embedded data should be almost invisible and cannot degrade the image/video quality greatly. At the decoder, the important data will be extracted for error resiliency so that high-quality images/video can be recovered from the corresponding corrupted ones. In this study, a survey of error resilient coding schemes based on data embedding is presented. The following issues should be addressed: at the encoder (1) what kind of important data in an image/video should be extracted and embedded, (2) where should the important data be embedded, (3) how to embed the important data, and (4) at the decoder, how to extract and use the important data for error resiliency. This paper is organized as follows. The error resilient coding schemes for image transmission based on data embedding is addressed in Section 2. The error resilient coding schemes for video transmission based on data embedding is addressed in Section 3, followed by concluding remarks. 2. Error Resilient Coding Schemes For Image Transmission For a still image, the important data for the image should be embedded into the -6-

4 same image [5]-[12]. For example, in [8], the important data for a block in a JPEG image will be embedded into the DCT coefficients of another (remote) block, called the masking block, in the same image. The major design criteria for data embedding in an image can be described as follows. (1) A block and its masking block should be as far as possible so that the two corresponding blocks will be seldom corrupted simultaneously. (2) A block and its masking block should not be in the same synchronization unit. (3) The masking blocks of the blocks in a synchronization unit should not be completely in the same another synchronization unit due to the two synchronization units may be corrupted simultaneously. For DCT-based or JPEG images [5]-[8], Yu and Yin [5] proposed a multimedia data recovery approach, in which a content-associative signature of a block in an image is generated and inserted imperceptibly into another block of the image. At the decoder, the embedded content-associative signature for each corrupted block is extracted and employed to conceal the corrupted block. Yin, Liu, and Yu [6] embedded the block type and edge direction index of a block in an image into the DCT coefficients of another block in the image by the odd-even data embedding scheme. At the decoder, the embedded data for each corrupted block are extracted and employed to conceal the corrupted block by the bilinear interpolation according to its edge direction. In [6], an effective data embedding scheme, called the odd-even data embedding scheme is proposed, which is widely employed by several error resilient coding schemes [6], [8], [13], [23], [25]-[28] and described as follows. If a data bit to be embedded is 0, the selected quantized DCT coefficient for data embedding will be forced to be an even number. If a data bit to be embedded is 1, the selected quantized DCT coefficient will be forced to be an odd number. Additionally, only the quantized DCT coefficients larger than a predefined positive integer threshold, T, are used to embed data bits. That is, if the data bit to be embedded is b j and the selected quantized DCT coefficient is C i, the odd-even data embedding scheme operates as Ci + 1 = Ci 1 Ci if C i > T, C i mod 2 b j, and C i > 0, C if C i > T, C i mod 2 b j, and C i < 0, i otherwise. -7-

5 The bilinear interpolation is effective for a corrupted block with regular edge direction, but not for a complex corrupted block. To solve this problem, Lin, Sow, and Chang [7] proposed a self-authentication-and-recovery image (SARI) system, in which a watermarked SARI image can detect manipulations, resynchronize the remaining bitstream following the corruption, and recover an approximated original image on the corrupted area by embedding two kinds of information watermarks (authentication information and recovery information), where the recovery information is generated from the down-scaled version of the original image. Additionally, Kang and Leou [8] proposed an error resilient coding scheme for JPEG image based on data embedding and side-match vector quantization (VQ). At the encoder, the important data (the VQ codebook index) for each block in a JPEG image are extracted and embedded into another masking block in the image by the odd-even data embedding scheme. At the decoder, after all the corrupted blocks in a JPEG image are detected, if the important data for a corrupted block can be extracted correctly from the corresponding masking block, the extracted important data will be used to conceal the corrupted block by the corresponding closest codeword in the codebook; otherwise, the side-match VQ technique is employed to conceal the corrupted block. If the employed codebook is designed well enough, the corrupted complex block will be also well concealed. An illustrated example is shown in Fig. 5, where BLR denotes the block loss rate and M denotes the quality factor for scaling quantization in JEPG. For wavelet-based or JPEG-2000 images [9]-[12], Kurosaki, Munadi, and Kiya [10] proposed an error concealment approach using the layer structure of JPEG-2000, in which the most significant layer is embedded into the least significant layer of the JPEG-2000 bitstream. When the most significant layer is affected by transmission errors, the corrupted data are concealed by the embedded data in the least significant layer. Lu [11] proposed a data embedding technique to offer error resiliency for wavelet-based image transmission. The authentication information generated from the structural digital signature is used for error detection, whereas the recovery information (an approximated version of the original image) is used for error concealment. Kang and Leou [12] proposed two error resilient coding schemes for -8-

6 wavelet-based image transmission based on data embedding and genetic algorithms (GA s), in which, as JPEG-2000, an image is decomposed into 6 wavelet levels (levels 0-5). For level 0, an error resilient coding scheme based on data embedding and side-match VQ [8] is employed. For level 1, the proposed basic scheme uses the embedded data (the mean value for each code block) to conceal the corrupted code block, whereas the proposed enhanced scheme uses a GA-based error concealment scheme to conceal the corrupted code block. For level 2, the embedded data for a corrupted code block are used to conceal the corrupted code block. For levels 3-5, the wavelet coefficients of each corrupted code block are simply replaced by zeros. An illustrated example is shown in Fig. 6. (a) (b) (c) (d) (e) (f) (g) Fig. 5. The error-free and concealed JPEG images (the Y component) of the Lenna image with BLR = 10% and M = 75: (a) the error-free image, (b) the error-free image with data embedding; (c)-(g) the concealed images by Zero-S, BNM, H.264, ERDE, and the proposed scheme, respectively. -9-

7 (a) (b) (c) (d) (e) (f) (g) (h) (i) Fig. 6. The error-free and concealed JPEG-2000 images of the Lenna image with bit rate = 0.4bpp, BER = 0.1%, and N ave = 3: (a) the error-free image; (b)-(c) the error-free images with data embedding by the proposed basic and enhanced schemes, respectively; (d) the corrupted image; (e)-(i) the concealed images by Zero-S, Mean-S, Inter, and the two proposed (basic and enhanced) schemes, respectively. 3. Error Resilient Coding Schemes For Video Transmission For a video, the important data for a video frame can be embedded into the same frame and/or the next frame(s) [13]-[29]. For example, in [25], for an H.263 I frame, the important data for each MB will be embedded into another MB(s) in the same I frame and/or the next P frame. For a P frame, the important data for all the MBs in a GOB will be embedded into the two corresponding masking GOBs in the next frame. The major design criteria for data embedding in a P frame can be described as follows. (1) The important data for the MBs in a GOB should be separately embedded into different masking GOBs in the next frame because a GOB and its masking GOBs may be corrupted simultaneously. (2) The masking GOBs for a GOB should not be consecutive ones because burst GOB losses may occur. For error detection [13]-[16], Gao and Lie [14] proposed an error detection scheme for MPEG-4 video transmission by embedding useful information (e.g., the -10-

8 types of motion vector information in MPEG-4 data-partitioned packet) at the encoder so that transmission errors can be detected by consistency-checking at the decoder. For error detection and/or correction/concealment [17]-[29], Song and Liu [20] proposed a data embedding scheme for H.263 video transmission in error-prone channels, in which some redundant information used to protect motion vectors and coding modes of MBs in one frame is embedded into the motion vectors in the next frame. Yilmaz and Alatan [23] proposed an error resilient H.263 video transmission codec utilizing imperceptible embedded information for error detection, resynchronization, and reconstruction. For an I frame, both a spatial error recovery technique embedding the edge orientation information of each MB and a resynchronization technique embedding the bit-length of each MB are proposed to recover the corrupted MBs. For a P frame, the embedded motion vector information is used to recover the corrupted MBs. Zeng [24] embedded the best suitable error concealment scheme for each MB at the encoder for H.263 video transmission. At the decoder, the best error concealment scheme for each corrupted MB is used to conceal it. In some recent error resilient coding schemes based on data embedding, a case that both an MB and its important data (embedded into another place) are corrupted simultaneously is not well treated. For example, in [20], a frame-based embedding scheme is proposed, based on the two assumptions that the next frame of a corrupted frame will be correctly received and at most one GOB will be corrupted in a frame. If any of the two assumptions is not valid, the important data for the corrupted frame cannot be correctly extracted. Note that the two assumptions are usually not valid in a noisy channel. In [23], the important data for a GOB is completely embedded into one masking GOB in the next frame. If the GOB and its masking GOB are corrupted simultaneously, the important data for the corrupted GOB cannot be correctly extracted. To cope with the above-mentioned problems, Kang and Leou [25] proposed an error resilient coding scheme for H.263 video transmission. At the encoder, for a P frame, the important data (the coding mode and motion vector information) for each GOB are extracted and embedded into the next frame by the MB-interleaving -11-

9 GOB-based data embedding scheme. If two non-adjacent GOBs in a frame are denoted by GOB A and GOB B, respectively, the important data extracted from the even-number MBs of GOB A and those extracted from the odd-number MBs of GOB B are interleaved by the even-odd order and concatenated to a mixed bitstream, which is embedded into its masking GOB in the next frame. On the other hand, the other corresponding bitstream is also similarly concatenated, which is embedded into another masking GOB in the next frame. At the decoder, for a corrupted GOB, if only one of its masking GOB is corrupted, the even (or odd) MBs of the corrupted GOB can be concealed by using the important data extracted from the good masking GOB first. Then the odd (or even) MBs can be concealed by the employed error concealment scheme [3] with more neighboring MB information. Because the corresponding two masking GOBs of a pair of GOBs are usually far apart, i.e., the corresponding two masking GOBs are seldom corrupted simultaneously. Hence, the important data for a corrupted GOB are usually completely available or at least partially available. Cooperating with the employed error detection and concealment scheme, the better concealed results will be obtained. To obtain more reliable error resiliency, Kang and Leou [27]-[28] proposed an error resilient coding scheme for H.264/AVC video transmission. At the encoder, for a P frame, two types of important data with different error recovery capabilities for each MB are extracted and embedded into the next frame by the proposed MB-interleaving slice-based data embedding scheme, in which the important data for all the MBs in a slice will be embedded into the four corresponding masking slices in the next frame. Here, the Type-I data for an MB contains the coding mode, the reference frame(s), and the motion vector(s) for the MB, whereas the Type-II data for the MB includes the best error concealment scheme among 15 pre-evaluated error concealment schemes for the MB. At the decoder, if the important data for a corrupted MB can be correctly extracted, the extracted important data will facilitate the employed error concealment schemes [3]-[4] to conceal the corrupted MB; otherwise, the employed error concealment schemes are simply used to conceal the corrupted MB. Finally, the approach that the important data are transmitted as extra side information (e.g., extra packets) and the approach with data embedding can be -12-

10 compared as follows. (1) If the important data are transmitted as extra packets, it may contain more extra overhead in maintaining the inter-packet synchronization between the important data packets and the image/video data packets. Furthermore, the delay jitter of the important data packets may also introduce extra delay in error concealment performed at the decoder, since it may need to wait for the important data packets when errors occur. However, if the important data are embedded, less extra overheads are needed. (2) If the important data transmitted as extra packets are variable-length coded, extra synchronization codewords will be required to protect these data. On the other hand, if the important data are embedded into the compressed image/video bitstream, they are protected explicitly without extra synchronization codewords. (3) Based on [27]-[28], the bit rate increments induced by transmitting the important data as extra packets are more significant than those induced by the approach with data embedding when image/video qualities are similar. However, when perceptibly invisible image/video quality degradation is allowed, the bit rate will be only slightly increased. An illustrated example is shown in Fig. 7. (a) (b) (c) (d) (e) (f) Fig. 7. The error-free and concealed H.263 video frames (the Y component) of a P-frame (the fourteenth frame) within the Foreman sequence at frame rate = 10 fps with VPLR = 30% and bit rate = 48kbps: (a) the error-free frame; (b)-(f) the concealed frames by Zero-S, TMN-11, DEVCS, ERDE, and the proposed scheme, respectively. 4. Concluding Remarks In this study, a survey of error resilient coding schemes based on data embedding -13-

11 is presented. For future researches, new important data helpful for image/video error resiliency, new data embedding schemes, and new error detection, correction, and concealment schemes can be investigated. References [1] Y. Wang and Q. F. Zhu, Error control and concealment for video communication: a review, Proceedings of the IEEE, vol. 86, no. 5, pp , May [2] Y. Wang, S. Wenger, J. Wen, and A. K. Katsaggelos, Error resilient video coding techniques, IEEE Signal Processing Magazine, vol. 17, no. 4, pp , July [3] L. W. Kang and J. J. Leou, A new hybrid error concealment scheme for MPEG-2 video transmission, in Proc. of IEEE Int. Workshop on Multimedia Signal Processing, St. Thomas, US Virgin Islands, Dec. 2002, pp [4] L. W. Kang and J. J. Leou, A hybrid error concealment scheme for MPEG-2 video transmission based on best neighborhood matching algorithm, in Proc. of IEEE Int. Conf. on Multimedia and Expo, Taipei, Taiwan, June [5] H. H. Yu and P. Yin, Multimedia data recovery using information hiding, in Proc. of IEEE Int. Global Telecommunications Conference, San Francisco, CA, USA, Nov. 2000, vol. 3, pp [6] P. Yin, B. Liu, and H. H. Yu, Error concealment using data hiding, in Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, May 2001, vol. 3, pp [7] C. Y. Lin, D. Sow, and S. F. Chang, Using self-authentication-and-recovery images for error concealment in wireless environments, in Proc. of SPIE, vol. 4518, Aug. 2001, pp [8] L. W. Kang and J. J. Leou, A new error resilient coding scheme for JPEG image transmission based on data embedding and vector quantization, in Proc. of IEEE Int. Symposium on Circuits and Systems, Bangkok, Thailand, May 2003, vol. 2, pp

12 [9] J. Wang and L. Ji, A region and data hiding based error concealment scheme for images, IEEE Trans. on Consumer Electronics, vol. 47, no. 2, pp , May [10] M. Kurosaki, K. Munadi, and H. Kiya, Error concealment using layer structure for JPEG2000 images, in Proc. of IEEE Asia-Pacific Conf. on Circuits and Systems, 2002, pp [11] C. S. Lu, Wireless multimedia error resilience via a data hiding technique, in Proc. of IEEE Int. Workshop on Multimedia Signal Processing, St. Thomas, US Virgin Islands, Dec. 2002, pp [12] L. W. Kang and J. J. Leou, Two error resilient coding schemes for wavelet-based image transmission based on data embedding and genetic algorithms, in Proc. of IEEE Int. Conf. on Image Processing, Barcelona, Spain, Sept. 2003, pp [13] T. H. Wang, T. H. Lee, and P. C. Chang, Error Detection by Parity Checks for H.263 Compatible Video Coding, in Proc. of IEEE Data Compression Conference, Snowbird, Utah, March 2001, p [14] Z. W. Gao and W. N. Lie, MPEG-4 video error detection by using data hiding techniques, in Proc. of IEEE Int. Symposium on Circuits and Systems, May 2002, vol. 3, pp [15] P. Zhou and Y. He, A fragile watermark error detection scheme for JVT, in Proc. of IEEE Int. Symposium on Circuits and Systems, Bangkok, Thailand, May 2003, vol. 2, pp [16] F. Bartolini, A. Manetti, A. Piva, and M. Barni, A data hiding approach for correcting errors in H.263 video transmitted over a noisy channel, in Proc. of IEEE Int. Workshop on Multimedia Signal Processing, Cannes, France, Oct. 2001, pp [17] D. L. Robie and R. M. Mersereau, Video error correction using data hiding techniques, in Proc. of IEEE Int. Workshop on Multimedia Signal Processing, Cannes, France, Oct. 2001, pp [18] D. L. Robie and R. M. Mersereau, Video error correction using steganography, EURASIP Journal on Applied Signal Processing, vol. 2002, no. -15-

13 2, pp , [19] D. L. Robie, N. Wu, and R. M. Mersereau, The use of steganography to enhance error detection and correction in MPEG-2 video, in Proc. of IEEE Asilomar Conf. on Signals, Systems and Computers, Nov. 2002, vol. 2, pp [20] J. Song, and K. J. R. Liu, A data embedded video coding scheme for error-prone channels, IEEE Trans. on Multimedia, vol. 3, no. 4, pp , [21] M. Carli, D. Bailey, M. Farias, and S. K. Mitra, Error control and concealment for video transmission using data hiding, in Proc. of IEEE Int. Symposium on Wireless Personal Multimedia Communications, Oct. 2002, vol. 2, pp [22] C. B. Adsumilli, M. Farias, M. Carli, and S. K. Mitra, A hybrid constrained unequal error protection and data hiding scheme for packet video transmission, in Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, April 2003, vol. 5, pp [23] A. Yilmaz and A. A. Alatan, Error concealment of video sequences by data hiding, in Proc. of IEEE Int. Conf. on Image Processing, Barcelona, Spain, Sept. 2003, pp [24] W. Zeng, Spatial-temporal error concealment with side information for standard video codecs, in Proc. of IEEE Int. Conf. on Multimedia and Expo, Baltimore, Maryland, USA, July 2003, pp [25] L. W. Kang and J. J. Leou, A new error resilient coding scheme for H.263 video transmission, in Proc. of IEEE Pacific-Rim Conf. on Multimedia, Hsinchu, Taiwan, Dec. 2002, pp [26] S. W. Lin, J. J. Leou, and L. W. Kang, An error resilient coding scheme for H.26L video transmission based on data embedding, Journal of Visual Communication and Image Representation, vol. 15, no. 2, pp , [27] L. W. Kang and J. J. Leou, An error resilient coding scheme for H.264 video transmission based on data embedding, in Proc. of 2004 IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, Montreal, Quebec, Canada, May 2004, vol. 3, pp

14 [28] L. W. Kang and J. J. Leou, An error resilient coding scheme for H.264/AVC video transmission based on data embedding, Journal of Visual Communication and Image Representation, vol. 16, no. 1, pp , [29] J. R. Chen, C. S. Lu, and K. C. Fan, A significant motion vector protection-based error-resilient scheme in H.264, to appear in Proc. of 2004 IEEE Int. Workshop on Multimedia Signal Processing, Siena, Italy, Sept

Video Coding Basics. Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu

Video Coding Basics. Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu Video Coding Basics Yao Wang Polytechnic University, Brooklyn, NY11201 yao@vision.poly.edu Outline Motivation for video coding Basic ideas in video coding Block diagram of a typical video codec Different

More information

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA nandakishore@qualcomm.com K.

More information

Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet

Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet DICTA2002: Digital Image Computing Techniques and Applications, 21--22 January 2002, Melbourne, Australia Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet K. Ramkishor James. P. Mammen

More information

Module 8 VIDEO CODING STANDARDS. Version 2 ECE IIT, Kharagpur

Module 8 VIDEO CODING STANDARDS. Version 2 ECE IIT, Kharagpur Module 8 VIDEO CODING STANDARDS Version ECE IIT, Kharagpur Lesson H. andh.3 Standards Version ECE IIT, Kharagpur Lesson Objectives At the end of this lesson the students should be able to :. State the

More information

WATERMARKING FOR IMAGE AUTHENTICATION

WATERMARKING FOR IMAGE AUTHENTICATION WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data

More information

Index Terms Audio streams, inactive frames, steganography, Voice over Internet Protocol (VoIP), packet loss. I. Introduction

Index Terms Audio streams, inactive frames, steganography, Voice over Internet Protocol (VoIP), packet loss. I. Introduction Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Advanced Integrated Steganographic

More information

Performance Analysis and Comparison of JM 15.1 and Intel IPP H.264 Encoder and Decoder

Performance Analysis and Comparison of JM 15.1 and Intel IPP H.264 Encoder and Decoder Performance Analysis and Comparison of 15.1 and H.264 Encoder and Decoder K.V.Suchethan Swaroop and K.R.Rao, IEEE Fellow Department of Electrical Engineering, University of Texas at Arlington Arlington,

More information

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- sumedha.phatak@mavs.uta.edu Objective: A study, implementation and comparison of

More information

Study and Implementation of Video Compression standards (H.264/AVC, Dirac)

Study and Implementation of Video Compression standards (H.264/AVC, Dirac) Study and Implementation of Video Compression standards (H.264/AVC, Dirac) EE 5359-Multimedia Processing- Spring 2012 Dr. K.R Rao By: Sumedha Phatak(1000731131) Objective A study, implementation and comparison

More information

Transform-domain Wyner-Ziv Codec for Video

Transform-domain Wyner-Ziv Codec for Video Transform-domain Wyner-Ziv Codec for Video Anne Aaron, Shantanu Rane, Eric Setton, and Bernd Girod Information Systems Laboratory, Department of Electrical Engineering Stanford University 350 Serra Mall,

More information

http://www.springer.com/0-387-23402-0

http://www.springer.com/0-387-23402-0 http://www.springer.com/0-387-23402-0 Chapter 2 VISUAL DATA FORMATS 1. Image and Video Data Digital visual data is usually organised in rectangular arrays denoted as frames, the elements of these arrays

More information

Department of Electrical and Computer Engineering, Northwestern University, e-mail: faggk,faisal,lkon,hongg@ece.nwu.edu,

Department of Electrical and Computer Engineering, Northwestern University, e-mail: faggk,faisal,lkon,hongg@ece.nwu.edu, ERROR RESILIENCE AND CONCEALMENT IN VIDEO CODING A. K. Katsaggelos, F. Ishtiaq, L. P. Kondi, M.-C. Hong, M. Banham +,J.Brailean + Department of Electrical and Computer Engineering, Northwestern University,

More information

302 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 19, NO. 2, FEBRUARY 2009

302 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 19, NO. 2, FEBRUARY 2009 302 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 19, NO. 2, FEBRUARY 2009 Transactions Letters Fast Inter-Mode Decision in an H.264/AVC Encoder Using Mode and Lagrangian Cost Correlation

More information

Combating Anti-forensics of Jpeg Compression

Combating Anti-forensics of Jpeg Compression IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): 1694-814 www.ijcsi.org 454 Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng

More information

Image Authentication Scheme using Digital Signature and Digital Watermarking

Image Authentication Scheme using Digital Signature and Digital Watermarking www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for

More information

A comprehensive survey on various ETC techniques for secure Data transmission

A comprehensive survey on various ETC techniques for secure Data transmission A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and

More information

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and

More information

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity

More information

Video Transmission over Wireless LAN. Hang Liu Hang.liu@thomson.net

Video Transmission over Wireless LAN. Hang Liu Hang.liu@thomson.net Video Transmission over Wireless LAN Hang Liu Hang.liu@thomson.net Page 1 Introduction! Introduction! Wi-Fi Multimedia and IEEE 802.11e for QoS Enhancement! Error Control Techniques Page 2 Introduction!

More information

Introduction to image coding

Introduction to image coding Introduction to image coding Image coding aims at reducing amount of data required for image representation, storage or transmission. This is achieved by removing redundant data from an image, i.e. by

More information

Reversible Data Hiding for Security Applications

Reversible Data Hiding for Security Applications Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.

More information

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

DYNAMIC REGION OF INTEREST TRANSCODING FOR MULTIPOINT VIDEO CONFERENCING

DYNAMIC REGION OF INTEREST TRANSCODING FOR MULTIPOINT VIDEO CONFERENCING DYNAMIC REGION OF INTEREST TRANSCODING FOR MULTIPOINT VIDEO CONFERENCING Chia-Wen Lin Department of Computer Science and Information Engineering National Chung Cheng University Chiayi Taiwan R.O.C. cwlin@cs.ccu.edu.tw

More information

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and

More information

Wireless Ultrasound Video Transmission for Stroke Risk Assessment: Quality Metrics and System Design

Wireless Ultrasound Video Transmission for Stroke Risk Assessment: Quality Metrics and System Design Wireless Ultrasound Video Transmission for Stroke Risk Assessment: Quality Metrics and System Design A. Panayides 1, M.S. Pattichis 2, C. S. Pattichis 1, C. P. Loizou 3, M. Pantziaris 4 1 A.Panayides and

More information

Intra-Prediction Mode Decision for H.264 in Two Steps Song-Hak Ri, Joern Ostermann

Intra-Prediction Mode Decision for H.264 in Two Steps Song-Hak Ri, Joern Ostermann Intra-Prediction Mode Decision for H.264 in Two Steps Song-Hak Ri, Joern Ostermann Institut für Informationsverarbeitung, University of Hannover Appelstr 9a, D-30167 Hannover, Germany Abstract. Two fast

More information

Complexity-rate-distortion Evaluation of Video Encoding for Cloud Media Computing

Complexity-rate-distortion Evaluation of Video Encoding for Cloud Media Computing Complexity-rate-distortion Evaluation of Video Encoding for Cloud Media Computing Ming Yang, Jianfei Cai, Yonggang Wen and Chuan Heng Foh School of Computer Engineering, Nanyang Technological University,

More information

Friendly Medical Image Sharing Scheme

Friendly Medical Image Sharing Scheme Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer

More information

How To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3

How To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3 Recognizing Voice Over IP: A Robust Front-End for Speech Recognition on the World Wide Web. By C.Moreno, A. Antolin and F.Diaz-de-Maria. Summary By Maheshwar Jayaraman 1 1. Introduction Voice Over IP is

More information

QOS Requirements and Service Level Agreements. LECTURE 4 Lecturer: Associate Professor A.S. Eremenko

QOS Requirements and Service Level Agreements. LECTURE 4 Lecturer: Associate Professor A.S. Eremenko QOS Requirements and Service Level Agreements LECTURE 4 Lecturer: Associate Professor A.S. Eremenko Application SLA Requirements Different applications have different SLA requirements; the impact that

More information

Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation

Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation Sunil Karthick.M PG Scholar Department of ECE Kongu Engineering College Perundurau-638052 Venkatachalam.S Assistant Professor

More information

Asia-Pacific Advanced Network

Asia-Pacific Advanced Network Frame aggregations in the wireless LANs: A review paper Presented by: Anwar Saif Asia-Pacific Advanced Network Wireless communication 2009 Abstract The overhead induced by the IEEE 802.11 PHY and MAC layer

More information

Some Publications and Patents on Data Hiding, Steganalysis, Forensics and Security Yun Q. Shi 25 December, 2008

Some Publications and Patents on Data Hiding, Steganalysis, Forensics and Security Yun Q. Shi 25 December, 2008 Some Publications and Patents on Data Hiding, Steganalysis, Forensics and Security Yun Q. Shi 25 December, 2008 Data hiding: strategy and robustness Book chapter 1. X. Kang, J. Huang and Y. Q. Shi, DWT

More information

Sachin Dhawan Deptt. of ECE, UIET, Kurukshetra University, Kurukshetra, Haryana, India

Sachin Dhawan Deptt. of ECE, UIET, Kurukshetra University, Kurukshetra, Haryana, India Abstract Image compression is now essential for applications such as transmission and storage in data bases. In this paper we review and discuss about the image compression, need of compression, its principles,

More information

Generating Robust Digital Signature for Image/Video Authentication

Generating Robust Digital Signature for Image/Video Authentication Generating Robust Digital Signature for Image/Video Authentication Ching-Yung Lin and Shih-Fu Chang Department of Electrical Engineering and New Media Technology Center Columbia University New York, NY

More information

JPEG Image Compression by Using DCT

JPEG Image Compression by Using DCT International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-4 E-ISSN: 2347-2693 JPEG Image Compression by Using DCT Sarika P. Bagal 1* and Vishal B. Raskar 2 1*

More information

Multimedia Document Authentication using On-line Signatures as Watermarks

Multimedia Document Authentication using On-line Signatures as Watermarks Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824

More information

A Fragile Watermark Error Detection Scheme For Wireless Video Communications

A Fragile Watermark Error Detection Scheme For Wireless Video Communications 1 A Fragile Watermark Error Detection Scheme For Wireless Video Communications Minghua Chen, Yun He and Reginald L. Lagendijk State Key Lab. of Microwave and Digital Communications Department of Electrical

More information

Figure 1: Relation between codec, data containers and compression algorithms.

Figure 1: Relation between codec, data containers and compression algorithms. Video Compression Djordje Mitrovic University of Edinburgh This document deals with the issues of video compression. The algorithm, which is used by the MPEG standards, will be elucidated upon in order

More information

An Incomplete Cryptography based Digital Rights Management with DCFF

An Incomplete Cryptography based Digital Rights Management with DCFF An Incomplete Cryptography based Digital Rights Management with DCFF Ta Minh Thanh Department of Computer Science Tokyo Institute of Technology 2-12-2, Ookayama, Meguro, Tokyo, 152-8552, Japan. Email:thanhtm@ks.cs.titech.ac.jp

More information

ROBUST AND SECURE DIGITAL SIGNATURE FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS

ROBUST AND SECURE DIGITAL SIGNATURE FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS ROBUST AND SECURE DIGITAL SIGNATURE FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNELS J Sravanthi #1, Dr. MHM Krishna Prasad *2 # Dept. of Computer Science, UCEV Vizianagaram, Andhra Pradesh, India * Associate

More information

Efficient Coding Unit and Prediction Unit Decision Algorithm for Multiview Video Coding

Efficient Coding Unit and Prediction Unit Decision Algorithm for Multiview Video Coding JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 13, NO. 2, JUNE 2015 97 Efficient Coding Unit and Prediction Unit Decision Algorithm for Multiview Video Coding Wei-Hsiang Chang, Mei-Juan Chen, Gwo-Long

More information

Video Encryption Exploiting Non-Standard 3D Data Arrangements. Stefan A. Kramatsch, Herbert Stögner, and Andreas Uhl uhl@cosy.sbg.ac.

Video Encryption Exploiting Non-Standard 3D Data Arrangements. Stefan A. Kramatsch, Herbert Stögner, and Andreas Uhl uhl@cosy.sbg.ac. Video Encryption Exploiting Non-Standard 3D Data Arrangements Stefan A. Kramatsch, Herbert Stögner, and Andreas Uhl uhl@cosy.sbg.ac.at Andreas Uhl 1 Carinthia Tech Institute & Salzburg University Outline

More information

Quality Estimation for Scalable Video Codec. Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden)

Quality Estimation for Scalable Video Codec. Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden) Quality Estimation for Scalable Video Codec Presented by Ann Ukhanova (DTU Fotonik, Denmark) Kashaf Mazhar (KTH, Sweden) Purpose of scalable video coding Multiple video streams are needed for heterogeneous

More information

Dynamic Region of Interest Transcoding for Multipoint Video Conferencing

Dynamic Region of Interest Transcoding for Multipoint Video Conferencing 982 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 10, OCTOBER 2003 Dynamic Region of Interest Transcoding for Multipoint Video Conferencing Chia-Wen Lin, Member, IEEE, Yung-Chang

More information

Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object

More information

Internet Video Streaming and Cloud-based Multimedia Applications. Outline

Internet Video Streaming and Cloud-based Multimedia Applications. Outline Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, yhe@ee.ryerson.ca Ling Guan, lguan@ee.ryerson.ca 1 Outline Internet video streaming Overview Video coding Approaches for video

More information

Secret Communication through Web Pages Using Special Space Codes in HTML Files

Secret Communication through Web Pages Using Special Space Codes in HTML Files International Journal of Applied Science and Engineering 2008. 6, 2: 141-149 Secret Communication through Web Pages Using Special Space Codes in HTML Files I-Shi Lee a, c and Wen-Hsiang Tsai a, b, * a

More information

Parametric Comparison of H.264 with Existing Video Standards

Parametric Comparison of H.264 with Existing Video Standards Parametric Comparison of H.264 with Existing Video Standards Sumit Bhardwaj Department of Electronics and Communication Engineering Amity School of Engineering, Noida, Uttar Pradesh,INDIA Jyoti Bhardwaj

More information

Review of Error Resilient Coding Techniques for Real-Time Video Communications

Review of Error Resilient Coding Techniques for Real-Time Video Communications Review of Error Resilient Coding Techniques for Real-Time Video Communications Yao Wang, Stephan Wenger, Jiangtao Wen, and Aggelos K. Katsaggelos 1 Abstract In this paper we review error resilience techniques

More information

MEDICAL IMAGE COMPRESSION USING HYBRID CODER WITH FUZZY EDGE DETECTION

MEDICAL IMAGE COMPRESSION USING HYBRID CODER WITH FUZZY EDGE DETECTION MEDICAL IMAGE COMPRESSION USING HYBRID CODER WITH FUZZY EDGE DETECTION K. Vidhya 1 and S. Shenbagadevi Department of Electrical & Communication Engineering, College of Engineering, Anna University, Chennai,

More information

Multiple Embedding Using Robust Watermarks for Wireless Medical Images

Multiple Embedding Using Robust Watermarks for Wireless Medical Images Multiple Embedding Using Robust Watermarks for Wireless Medical Images Dominic Osborne and Derek Abbott Centre for Biomedical Engineering (CBME) The University of Adelaide, SA 5005, Australia Matthew Sorell

More information

Multiple Description Coding (MDC) and Scalable Coding (SC) for Multimedia

Multiple Description Coding (MDC) and Scalable Coding (SC) for Multimedia Multiple Description Coding (MDC) and Scalable Coding (SC) for Multimedia Gürkan Gür PhD. Candidate e-mail: gurgurka@boun.edu.tr Dept. Of Computer Eng. Boğaziçi University Istanbul/TR ( Currenty@UNITN)

More information

SINCE 1997, the ITU-T s Video Coding Experts Group

SINCE 1997, the ITU-T s Video Coding Experts Group IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 7, JULY 2003 657 H.264/AVC in Wireless Environments Thomas Stockhammer, Miska M. Hannuksela, and Thomas Wiegand Abstract Video

More information

(51) Int Cl.: H04N 7/24 (2011.01)

(51) Int Cl.: H04N 7/24 (2011.01) (19) TEPZZ_79 49 B_T (11) EP 1 792 492 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 04.12.13 Bulletin 13/49 (21) Application number: 08021. (22)

More information

Multimedia Data Hiding

Multimedia Data Hiding Multimedia Data Hiding Introduction! Digital Watermarking / Multimedia Data Hiding Hide secondary data in digital image/video/audio/3d! Uses of hidden data: ownership verification, alteration detection

More information

Complexity-bounded Power Control in Video Transmission over a CDMA Wireless Network

Complexity-bounded Power Control in Video Transmission over a CDMA Wireless Network Complexity-bounded Power Control in Video Transmission over a CDMA Wireless Network Xiaoan Lu, David Goodman, Yao Wang, and Elza Erkip Electrical and Computer Engineering, Polytechnic University, Brooklyn,

More information

Mike Perkins, Ph.D. perk@cardinalpeak.com

Mike Perkins, Ph.D. perk@cardinalpeak.com Mike Perkins, Ph.D. perk@cardinalpeak.com Summary More than 28 years of experience in research, algorithm development, system design, engineering management, executive management, and Board of Directors

More information

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique B.Sai Kiran M.Tech (VLSI), CMR Institute of Technology. Mr.Shahbaz Khan Associate Professor, CMR Institute of Technology.

More information

THE EMERGING JVT/H.26L VIDEO CODING STANDARD

THE EMERGING JVT/H.26L VIDEO CODING STANDARD THE EMERGING JVT/H.26L VIDEO CODING STANDARD H. Schwarz and T. Wiegand Heinrich Hertz Institute, Germany ABSTRACT JVT/H.26L is a current project of the ITU-T Video Coding Experts Group (VCEG) and the ISO/IEC

More information

Figure 2 Left: original video frame; center: low-delay image plane; right: high-delay image plane.

Figure 2 Left: original video frame; center: low-delay image plane; right: high-delay image plane. To appear in Proceedings of the SPIE: Human Vision and Image Processing 1998 Effects of Temporal Jitter on Video Quality: Assessment Using Psychophysical Methods Yuan-Chi Chang a, Thom Carney b,c, Stanley

More information

ACN2005 Term Project Improve VoIP quality

ACN2005 Term Project Improve VoIP quality ACN2005 Term Project Improve VoIP quality By introducing TCP-Friendly protocol Burt C.F. Lien ( 連 矩 鋒 ) CSIE Department, National Taiwan University p93007@csie.ntu.edu.tw Abstract The most notorious of

More information

MULTIMEDIA applications involving the transmission

MULTIMEDIA applications involving the transmission IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 20, NO. 3, MARCH 2010 407 Unequal Error Protection for Robust Streaming of Scalable Video Over Packet Lossy Networks Ehsan Maani, Student

More information

TRANSPARENT ENCRYPTION FOR HEVC USING BIT-STREAM-BASED SELECTIVE COEFFICIENT SIGN ENCRYPTION. Heinz Hofbauer Andreas Uhl Andreas Unterweger

TRANSPARENT ENCRYPTION FOR HEVC USING BIT-STREAM-BASED SELECTIVE COEFFICIENT SIGN ENCRYPTION. Heinz Hofbauer Andreas Uhl Andreas Unterweger TRANSPARENT ENCRYPTION FOR HEVC USING BIT-STREAM-BASED SELECTIVE COEFFICIENT SIGN ENCRYPTION Heinz Hofbauer Andreas Uhl Andreas Unterweger University of Salzburg, Jakob Haringer Str. 2, 2 Salzburg, Austria

More information

Chapter 3 ATM and Multimedia Traffic

Chapter 3 ATM and Multimedia Traffic In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very

More information

MOST error-correcting codes are designed for the equal

MOST error-correcting codes are designed for the equal IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 3, MARCH 2007 387 Transactions Letters Unequal Error Protection Using Partially Regular LDPC Codes Nazanin Rahnavard, Member, IEEE, Hossein Pishro-Nik,

More information

White paper. H.264 video compression standard. New possibilities within video surveillance.

White paper. H.264 video compression standard. New possibilities within video surveillance. White paper H.264 video compression standard. New possibilities within video surveillance. Table of contents 1. Introduction 3 2. Development of H.264 3 3. How video compression works 4 4. H.264 profiles

More information

Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images

Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images Sergio Vicente D. Pamboukian 1, Hae Yong Kim 2 1 Universidade Presbiteriana Mackenzie, Brazil. 2 Universidade de São

More information

Classes of multimedia Applications

Classes of multimedia Applications Classes of multimedia Applications Streaming Stored Audio and Video Streaming Live Audio and Video Real-Time Interactive Audio and Video Others Class: Streaming Stored Audio and Video The multimedia content

More information

Video compression: Performance of available codec software

Video compression: Performance of available codec software Video compression: Performance of available codec software Introduction. Digital Video A digital video is a collection of images presented sequentially to produce the effect of continuous motion. It takes

More information

Performance Analysis of Interleaving Scheme in Wideband VoIP System under Different Strategic Conditions

Performance Analysis of Interleaving Scheme in Wideband VoIP System under Different Strategic Conditions Performance Analysis of Scheme in Wideband VoIP System under Different Strategic Conditions Harjit Pal Singh 1, Sarabjeet Singh 1 and Jasvir Singh 2 1 Dept. of Physics, Dr. B.R. Ambedkar National Institute

More information

A Digital Audio Watermark Embedding Algorithm

A Digital Audio Watermark Embedding Algorithm Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, 3008, China tangxh@hziee.edu.cn,

More information

MULTI-RESOLUTION PERCEPTUAL ENCODING FOR INTERACTIVE IMAGE SHARING IN REMOTE TELE-DIAGNOSTICS. Javed I. Khan and D. Y. Y. Yun

MULTI-RESOLUTION PERCEPTUAL ENCODING FOR INTERACTIVE IMAGE SHARING IN REMOTE TELE-DIAGNOSTICS. Javed I. Khan and D. Y. Y. Yun MULTI-RESOLUTION PERCEPTUAL ENCODING FOR INTERACTIVE IMAGE SHARING IN REMOTE TELE-DIAGNOSTICS Javed I. Khan and D. Y. Y. Yun Laboratories of Intelligent and Parallel Systems Department of Electrical Engineering,

More information

Rate control algorithms for video coding. Citation. Issued Date 2000. http://hdl.handle.net/10722/31094

Rate control algorithms for video coding. Citation. Issued Date 2000. http://hdl.handle.net/10722/31094 Title Rate control algorithms for video coding Author(s) Ng, Cheuk-yan; 吳 卓 恩 Citation Issued Date 2000 URL http://hdl.handle.net/10722/31094 Rights The author retains all proprietary rights, (such as

More information

RESEARCH PROFILE: VIDEO TECHNOLOGIES FOR NETWORKED MULTIMEDIA APPLICATIONS

RESEARCH PROFILE: VIDEO TECHNOLOGIES FOR NETWORKED MULTIMEDIA APPLICATIONS RESEARCH PROFILE: VIDEO TECHNOLOGIES FOR NETWORKED MULTIMEDIA APPLICATIONS Chia-Wen Lin ( 林 嘉 文 ) cwlin@cs.ccu.edu.tw Tel: (05) 272-0411 ext. 33120 Networked Video Lab Dept. CSIE National Chung Cheng University

More information

Unequal Packet Loss Resilience for Fine-Granular-Scalability Video

Unequal Packet Loss Resilience for Fine-Granular-Scalability Video IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 3, NO. 4, DECEMBER 2001 381 Unequal Packet Loss Resilience for Fine-Granular-Scalability Video Mihaela van der Schaar Hayder Radha, Member, IEEE Abstract Several embedded

More information

AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS

AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,

More information

Quality Optimal Policy for H.264 Scalable Video Scheduling in Broadband Multimedia Wireless Networks

Quality Optimal Policy for H.264 Scalable Video Scheduling in Broadband Multimedia Wireless Networks Quality Optimal Policy for H.264 Scalable Video Scheduling in Broadband Multimedia Wireless Networks Vamseedhar R. Reddyvari Electrical Engineering Indian Institute of Technology Kanpur Email: vamsee@iitk.ac.in

More information

We are presenting a wavelet based video conferencing system. Openphone. Dirac Wavelet based video codec

We are presenting a wavelet based video conferencing system. Openphone. Dirac Wavelet based video codec Investigating Wavelet Based Video Conferencing System Team Members: o AhtshamAli Ali o Adnan Ahmed (in Newzealand for grad studies) o Adil Nazir (starting MS at LUMS now) o Waseem Khan o Farah Parvaiz

More information

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010 Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication

More information

Region of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR-2006-1

Region of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR-2006-1 Region of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR-2006-1 Ying Liu and William A. Pearlman January 2006 Center for Image Processing Research Rensselaer Polytechnic

More information

Video Coding Technologies and Standards: Now and Beyond

Video Coding Technologies and Standards: Now and Beyond Hitachi Review Vol. 55 (Mar. 2006) 11 Video Coding Technologies and Standards: Now and Beyond Tomokazu Murakami Hiroaki Ito Muneaki Yamaguchi Yuichiro Nakaya, Ph.D. OVERVIEW: Video coding technology compresses

More information

H.264/AVC for Wireless Applications

H.264/AVC for Wireless Applications Thomas STOCKHAMMER (1), and Thomas WIEGAND (8) (1) Institute for Communications Engineering (LNT), Munich University of Technology (TUM), D-80290 Munich, Germany, E- mail: stockhammer@ei.tum.de (2) Image

More information

Radio Resource Allocation in GSM/GPRS Networks

Radio Resource Allocation in GSM/GPRS Networks Radio Resource Allocation in GSM/GPRS Networks Jean-Lien C. Wu 1, Wei-Yeh Chen 2, and Hung-Huan Liu 1 1 Department of Electronic Engineering, National Taiwan University of Science and Technology, 43, Keelung

More information

Very Low Frame-Rate Video Streaming For Face-to-Face Teleconference

Very Low Frame-Rate Video Streaming For Face-to-Face Teleconference Very Low Frame-Rate Video Streaming For Face-to-Face Teleconference Jue Wang, Michael F. Cohen Department of Electrical Engineering, University of Washington Microsoft Research Abstract Providing the best

More information

Error Detection and Data Recovery Architecture for Systolic Motion Estimators

Error Detection and Data Recovery Architecture for Systolic Motion Estimators Error Detection and Data Recovery Architecture for Systolic Motion Estimators L. Arun Kumar #1, L. Sheela *2 # PG Scholar, * Assistant Professor, Embedded System Technologies, Regional Center of Anna University

More information

A Survey of Video Processing with Field Programmable Gate Arrays (FGPA)

A Survey of Video Processing with Field Programmable Gate Arrays (FGPA) A Survey of Video Processing with Field Programmable Gate Arrays (FGPA) Heather Garnell Abstract This paper is a high-level, survey of recent developments in the area of video processing using reconfigurable

More information

OBJECTIVE VIDEO QUALITY METRICS: A PERFORMANCE ANALYSIS

OBJECTIVE VIDEO QUALITY METRICS: A PERFORMANCE ANALYSIS OBJECTIVE VIDEO QUALITY METRICS: A PERFORMANCE ANALYSIS José Luis Martínez, Pedro Cuenca, Francisco Delicado and Francisco Quiles Instituto de Investigación en Informática Universidad de Castilla La Mancha,

More information

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero

More information

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos (gss7@sfu.ca) (sna14@sfu.ca)

More information

H.263 Based Video Codec for Real-Time Visual Communications Over Wireless Radio Networks

H.263 Based Video Codec for Real-Time Visual Communications Over Wireless Radio Networks Based Video Codec for Real-Time Visual Communications Over Wireless Radio Networks Abstract Paramvir Bahl Microsoft Corporation Redmond, Washington, USA bahl@microsoft.com With the emergence of the International

More information

Introduction to Medical Image Compression Using Wavelet Transform

Introduction to Medical Image Compression Using Wavelet Transform National Taiwan University Graduate Institute of Communication Engineering Time Frequency Analysis and Wavelet Transform Term Paper Introduction to Medical Image Compression Using Wavelet Transform 李 自

More information

Image Transmission over IEEE 802.15.4 and ZigBee Networks

Image Transmission over IEEE 802.15.4 and ZigBee Networks MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Image Transmission over IEEE 802.15.4 and ZigBee Networks Georgiy Pekhteryev, Zafer Sahinoglu, Philip Orlik, and Ghulam Bhatti TR2005-030 May

More information

QoS Guarantee for Wireless Transmission of Medical Imaging, Telemedicine. Lei Cao Dept. of Electrical Engineering The University of Mississippi

QoS Guarantee for Wireless Transmission of Medical Imaging, Telemedicine. Lei Cao Dept. of Electrical Engineering The University of Mississippi QoS Guarantee for Wireless Transmission of Medical Imaging, Telemedicine Lei Cao Dept. of Electrical Engineering The University of Mississippi Contents Telemedicine Services and Status Existing work in

More information

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering

More information

Data Link Layer Overview

Data Link Layer Overview Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,

More information

Overview: Video Coding Standards

Overview: Video Coding Standards Overview: Video Coding Standards Video coding standards: applications and common structure Relevant standards organizations ITU-T Rec. H.261 ITU-T Rec. H.263 ISO/IEC MPEG-1 ISO/IEC MPEG-2 ISO/IEC MPEG-4

More information

MULTI-STREAM VOICE OVER IP USING PACKET PATH DIVERSITY

MULTI-STREAM VOICE OVER IP USING PACKET PATH DIVERSITY MULTI-STREAM VOICE OVER IP USING PACKET PATH DIVERSITY Yi J. Liang, Eckehard G. Steinbach, and Bernd Girod Information Systems Laboratory, Department of Electrical Engineering Stanford University, Stanford,

More information

Image Compression through DCT and Huffman Coding Technique

Image Compression through DCT and Huffman Coding Technique International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul

More information

1932-4553/$25.00 2007 IEEE

1932-4553/$25.00 2007 IEEE IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, VOL. 1, NO. 2, AUGUST 2007 231 A Flexible Multiple Description Coding Framework for Adaptive Peer-to-Peer Video Streaming Emrah Akyol, A. Murat Tekalp,

More information