Temporal Error Concealment Algorithm Using Adaptive Multi- Side Boundary Matching Principle

Similar documents
Adaptive Key Frame Selection for Efficient Video Coding

AN IMPROVED ERROR CONCEALMENT STRATEGY DRIVEN BY SCENE MOTION PROPERTIES FOR H.264/AVC DECODERS

Robust 3-D Video System Based on Modified Prediction Coding and Adaptive Selection Mode Error Concealment Algorithm

An Efficient Low Bit-Rate Video-Coding Algorithm Focusing on Moving Regions

ERROR CONCEALMENT TECHNIQUES IN H.264 VIDEO TRANSMISSION OVER WIRELESS NETWORKS

Selective Intra Prediction Mode Decision for H.264/AVC Encoders

ROBUST ADAPTIVE INTRA REFRESH FOR MULTIVIEW VIDEO

Skip Length and Inter-Starvation Distance as a Combined Metric to Assess the Quality of Transmitted Video

Research Topic. Error Concealment Techniques in H.264/AVC for Wireless Video Transmission in Mobile Networks

Fast Mode Decision Algorithm for Intra prediction in H.264/AVC Video Coding

Error Resilient Video Coding Using Unequally Protected Key Pictures

Fast MBAFF/PAFF Motion Estimation and Mode Decision Scheme for H.264

Express Letters. A Novel Four-Step Search Algorithm for Fast Block Motion Estimation

FAST SPATIAL AND TEMPORAL CORRELATION-BASED REFERENCE PICTURE SELECTION

Error Concealment for SNR Scalable Video Coding

Motion Re-estimation for MPEG-2 to MPEG-4 Simple Profile Transcoding. Abstract. I. Introduction

Constant Bit Rate for Video Streaming Over Packet Switching Networks

University of Bristol - Explore Bristol Research. Link to published version (if available): /ICIP

176 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 2, FEBRUARY 2003

Improved Error Concealment Using Scene Information

FRAME RATE CONVERSION OF INTERLACED VIDEO

Efficient Implementation of Neural Network Deinterlacing

Joint Optimization of Source-Channel Video Coding Using the H.264/AVC encoder and FEC Codes. Digital Signal and Image Processing Lab

Robust Transmission of H.264/AVC Video using 64-QAM and unequal error protection

Robust Transmission of H.264/AVC Video Using 64-QAM and Unequal Error Protection

PACKET-SWITCHED networks have become ubiquitous

ERROR CONCEALMENT TECHNIQUES IN H.264

Performance Evaluation of Error Resilience Techniques in H.264/AVC Standard

Bit Rate Control for Video Transmission Over Wireless Networks

FLEXIBLE SWITCHING AND EDITING OF MPEG-2 VIDEO BITSTREAMS

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ISCAS.2005.

Region Adaptive Unsharp Masking based DCT Interpolation for Efficient Video Intra Frame Up-sampling

Chapter 10 Basic Video Compression Techniques

Module 8 VIDEO CODING STANDARDS. Version 2 ECE IIT, Kharagpur

Using Motion-Compensated Frame-Rate Conversion for the Correction of 3 : 2 Pulldown Artifacts in Video Sequences

Error prevention and concealment for scalable video coding with dual-priority transmission q

Contents. xv xxi xxiii xxiv. 1 Introduction 1 References 4

Research Article Network-Aware Reference Frame Control for Error-Resilient H.264/AVC Video Streaming Service

THE TRANSMISSION and storage of video are important

MULTI-STATE VIDEO CODING WITH SIDE INFORMATION. Sila Ekmekci Flierl, Thomas Sikora

A Novel Approach towards Video Compression for Mobile Internet using Transform Domain Technique

Error-Resilience Video Transcoding for Wireless Communications

New Approach to Multi-Modal Multi-View Video Coding

Motion Video Compression

Error concealment techniques in H.264 video transmission over wireless networks

SCALABLE video coding (SVC) is currently being developed

1022 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 19, NO. 4, APRIL 2010

Error Resilience for Compressed Sensing with Multiple-Channel Transmission

ROBUST REGION-OF-INTEREST SCALABLE CODING WITH LEAKY PREDICTION IN H.264/AVC. Qian Chen, Li Song, Xiaokang Yang, Wenjun Zhang

PAPER Wireless Multi-view Video Streaming with Subcarrier Allocation

A Cell-Loss Concealment Technique for MPEG-2 Coded Video

DWT Based-Video Compression Using (4SS) Matching Algorithm

Automatic Commercial Monitoring for TV Broadcasting Using Audio Fingerprinting

Rate-distortion optimized mode selection method for multiple description video coding

Dual Frame Video Encoding with Feedback

A robust video encoding scheme to enhance error concealment of intra frames

Video coding standards

AN UNEQUAL ERROR PROTECTION SCHEME FOR MULTIPLE INPUT MULTIPLE OUTPUT SYSTEMS. M. Farooq Sabir, Robert W. Heath and Alan C. Bovik

Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks Abstract:

MPEG has been established as an international standard

Line-Adaptive Color Transforms for Lossless Frame Memory Compression

ABSTRACT ERROR CONCEALMENT TECHNIQUES IN H.264/AVC, FOR VIDEO TRANSMISSION OVER WIRELESS NETWORK. Vineeth Shetty Kolkeri, M.S.

Design of a Fast Multi-Reference Frame Integer Motion Estimator for H.264/AVC

Concealment of Whole-Picture Loss in Hierarchical B-Picture Scalable Video Coding Xiangyang Ji, Debin Zhao, and Wen Gao, Senior Member, IEEE

Objective video quality measurement techniques for broadcasting applications using HDTV in the presence of a reduced reference signal

Comparative Analysis of Wavelet Transform and Wavelet Packet Transform for Image Compression at Decomposition Level 2

EAVE: Error-Aware Video Encoding Supporting Extended Energy/QoS Tradeoffs for Mobile Embedded Systems 1

TERRESTRIAL broadcasting of digital television (DTV)

Chapter 2 Introduction to

Highly Efficient Video Codec for Entertainment-Quality

Implementation of an MPEG Codec on the Tilera TM 64 Processor

AUDIOVISUAL COMMUNICATION

(12) Patent Application Publication (10) Pub. No.: US 2006/ A1

Hierarchical SNR Scalable Video Coding with Adaptive Quantization for Reduced Drift Error

Spatial Error Concealment Technique for Losslessly Compressed Images Using Data Hiding in Error-Prone Channels

A Novel Video Compression Method Based on Underdetermined Blind Source Separation

Video Over Mobile Networks

OBJECT-BASED IMAGE COMPRESSION WITH SIMULTANEOUS SPATIAL AND SNR SCALABILITY SUPPORT FOR MULTICASTING OVER HETEROGENEOUS NETWORKS

Interlace and De-interlace Application on Video

A Study of Encoding and Decoding Techniques for Syndrome-Based Video Coding

CM3106 Solutions. Do not turn this page over until instructed to do so by the Senior Invigilator.

VISUAL CONTENT BASED SEGMENTATION OF TALK & GAME SHOWS. O. Javed, S. Khan, Z. Rasheed, M.Shah. {ojaved, khan, zrasheed,

Multimedia Communications. Video compression

Multi-Directional Spatial Error Concealment Using Adaptive Edge Thresholding

Operating Bio-Implantable Devices in Ultra-Low Power Error Correction Circuits: using optimized ACS Viterbi decoder

Parameters optimization for a scalable multiple description coding scheme based on spatial subsampling

Joint source-channel video coding for H.264 using FEC

Scalable Foveated Visual Information Coding and Communications

UC San Diego UC San Diego Previously Published Works

ARTICLE IN PRESS. Signal Processing: Image Communication

PAPER Error Robust H.263 Video Coding with Video Segment Regulation and Precise Error Tracking

Research Article Spatial Multiple Description Coding for Scalable Video Streams

Interframe Bus Encoding Technique for Low Power Video Compression

WE CONSIDER an enhancement technique for degraded

Systematic Lossy Forward Error Protection for Error-Resilient Digital Video Broadcasting

A Framework for Segmentation of Interview Videos

REDUCING DYNAMIC POWER BY PULSED LATCH AND MULTIPLE PULSE GENERATOR IN CLOCKTREE

Region Based Laplacian Post-processing for Better 2-D Up-sampling

WYNER-ZIV VIDEO CODING WITH LOW ENCODER COMPLEXITY

New Architecture for Dynamic Frame-Skipping Transcoder

Transcription:

184 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, December 2008 Temporal Error Concealment Algorithm Using Adaptive Multi- Side Boundary Matching Principle Seung-Soo Jeong and Chae-Bong Sohn VIA-Multimedia Center, Kwangwoon University, 447-1, Wolgye-Dong, Nowon-Gu, 139-701, Seoul, Korea Summary The environment of transmission via a wireless network is not always error-free. The loss of data or impairment caused by errors degrades the quality of image. The error concealment is the method that finds the best substitute information from the previous reference image with the boundary information around lost block. Therefore, This paper proposes an Adaptive Multi- Side Boundary Matching principle (AMSBM). AMSBM has two steps. First, the boundary matching degree examination on the boundary information is conducted. Second, AMSBM decides which data is the most reliable and conceals the lost block with the most reliable data. Experimental results show an improved performance of 0.36 db on average compared to the previous method Key words: Adaptive Multi-Side Boundary Matching, Temporal Error Concealment Algorithm 1. Introduction Compressed video bitstream under wireless transmission environment is strongly correlated. In some circumstances, data packets may suffer from network congestion or bit errors caused by defective physical network channels, including wire and wireless networks. The errors or lost data may result in unusable received data. A bit error that occurs in the bitstream will propagate through the bitstream. Error concealment techniques conceal the corrupted blocks by exploiting high correlation among video frames. Based on the types of correlation used, we classify error concealment techniques into two classes. One is the concealment method in the spatial domain. Image or video coding involves a spatial correlation among adjacent pixels across a few macrobloks (MBs) which can be used to conceal the damaged MB from its neighboring information. This method utilizes the smoothness of adjacent pixels by exploiting the fact that human eyes are not highly sensitive to the high-frequency component. The other is the concealment method in the temporal domain. The temporal correlation between adjacent frames provides an estimate of error concealment. The repeated appearance of similar content and the consistency of motion over a certain period enable an approximate block in the temporal reference frame to be obtained as an estimate for the current error block[1]. Among the researches related to temporal domain, the temporal error concealment using multi-side boundary matching principle (MSBM) carried out improved performance. Because it conceals the lost block using more boundary data than the former researches. MSBM carried out block matching by selecting fixed position s data as reference data[2]. However, if the data that was incorrectly concealed is used as reference data of the following lost block, another error is generated. It causes not only subjective degradation of image quality, but also objective degradation of image quality. In this paper, we propose AMSBM that carries out an examination of boundary matching degree and decides the position and size of the reference data block adaptively. It can reduce the degradation of performance that occurs by the error propagation. 2. Temporal error concealment algorithm using multi-side boundary block matching MSBM is the temporal error concealment method. MSBM uses the boundary data of the lost block as a reference data and conducts block matching in the reference frame. The best matching data in reference frame has the smallest sum of absolute difference (SAD). When there are MB errors caused by channel errors, MSBM method divides one lost MB into four sub-blocks. Four sub-blocks are concealed step by step. According to the available boundary data, the location of the reference boundary data can be different. Chapter 2.1 illustrates the method when a single block error occurs. Chapter 2.2 illustrates the method when a single-slice error and a multi-slice error occur that come to the consecutive MB errors. Manuscript received December 5, 2008 Manuscript revised December 20, 2008

IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, December 2008 185 2.1 Sub-block matching algorithm for a single block error 7+ N 7 SAD(E br) = E br( x+ i, y+ -E br '( x+ dx+ i, y+ dy+ j= 8 i = 0 7 7+ M + + + + + + + j= 0 i = 8 E br( x i, y -E br '( x dx i, y dy (4) where x and y are the most top and most left position of the lost sub-block in the current frame, dx and dy are the displacement between the lost sub-block in current frame and the candidate sub-block in the reference frame. N and M are fixed to 3 in MSBM[2]. The sub-block Etl, Etr, Ebl, Ebr are concealed by the sub-block with the minimum SAD from Eq. (1),(2),(3),(4), respectively. E is the corrupted frame and E' is the reference frame. 2.2 Sub-block matching algorithm for slice errors Fig.1. Rows and columns used in block matching principle A corrupted MB is divided into four sub-blocks as shown in Fig. 1. E tl, E tr, E bl, E br are the divided sub-blocks at different location, respectively. The nearest adjacent N rows and M columns pixels of the MB are used to find the best block on the reference frame. In the case of a single block error, every boundary data is available. The search range is set to be 15 herein, and the full search (FS) is used to evaluate all possible candidate blocks within the search range. The best sub-block to conceal a lost one is determined by the minimum SAD. For the four sub-blocks, their SADs are calculated by the following equations: -1 7 SAD(E tl) = E tl( x+ i, y+ -E tl '( x+ dx+ i, y+ dy+ j= -N i = 0 7-1 + E( tl x+ i, y+ -E'( tl x+ dx+ i, y+ dy+ (1) j= 0 i = -M -1 7 SAD(E tr) = E tr( x+ i, y+ -E tr '( x+ dx+ i, y+ dy+ j= -N i = 0 7 7+ M + E tr( x+ i, y+ -E tr '( x+ dx+ i, y+ dy+ (2) j= 0 i = 8 7+ N 7 SAD(E bl) = E bl( x+ i, y+ -E bl '( x+ dx+ i, y+ dy+ j= 8 i = 0 7-1 + E( bl x+ i, y+ -E'( bl x+ dx+ i, y+ dy+ (3) j= 0i = -M Fig.2 MSBM error concealment algorithm for single-slice ( left ) and for multi-slice ( right ) In the case of a single slice error and a multi-slice error, every boundary data cannot be available such like the case of a single block error. Fig. 2 depicts the error concealment methods according to each error pattern. In the case of a single slice error, Etl and Etr are concealed in a row. MSBM conducts multi-side block matching using N rows and M columns. The best sub-block to conceal a lost sub-block is determined by the minimum SAD using Eq. (1). Then, Ebl and Ebr are concealed using the down and left boundary data of lost sub-block instead of up and left boundary data. The best sub-block to conceal a lost sub-block by the minimum SAD using Eq. (3). In the case of multi-slice error, Etl, Etr, Ebl and Ebr are concealed in a row. In this step, to find best sub-block, MSBM uses the up and left boundary data of a lost subblock. It conducts block matching using Eq. (1).

186 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.12, December 2007 3. Proposed method The type of a single slice error has sequential MB error. When a single slice error occurs, MSBM conceals lost blocks by the unit of a MB sequentially. In the case of concealing two upper sub-blocks, MSBM uses up and left boundary data, regularly. In the case of concealing two below sub-blocks, it uses down and left boundary data regularly. Since this kind of error has the sequential MB error, lost blocks should be correctly concealed successively. When MSBM conceals a MB, the lost data is concealed by using conducting block matching in the reference frame. The concealed data is not original image data. That data is artificial for the high visual quality about human visual system. However, if this data is not concealed correctly, the effect of this incorrect data can propagate error to the following MB concealment process. The reason why video coding involves temporal correlation between adjacent video frames which is used to achieve high compression efficiency by removing temporal redundancy. slice error type, the available data is upper and left boundary data of Etl. The left boundary data was concealed in the process of previous MB concealment and the left upper data of sub-block Etl is error free data in a single slice error type. Before concealing the sub-block Etl, AMSBM conducts the matching degree examination of boundary data. Fig.3 Boundary matching degree examination step 1 for single slice The AMSBM decides if it uses the boundary data as the reference data after examining a boundary matching degree between the previous concealed block and its upper original data. According to the result of the examination, AMSBM makes the lost block concealed without error propagation at maximum by changing the size of reference boundary data. The chapter 3.1 explains the examination of the matching degree of boundary data. The chapter 3.2 explains how to decide the position and size of variable reference block data by the result of the boundary matching degree. 3.1 Examination of the matching degree of boundary data There is the former method related to the analysis of boundary data. It determines the edge direction at the boundary of the lost block and then decides which boundary data is relatively efficient to be the reference data for concealing the lost block[3]. However, it doesn t offer an adaptive threshold value and cannot be applied to each boundary, independently. We propose the advanced the boundary matching degree examination. Fig.3 and Fig.4 show AMSBM in concealing Etl with error. Fig.3 shows the matching degree examination step 1 of boundary data. Here, since AMSBM considers a single Fig.4 Boundary matching degree examination step 2 for single slice First, AMSBM conducts the matching degree examination of error free 8x2 pixels which are located on left upper data of sub-block Etl as shown in Fig. 3. The examination cost functions of matching degree according to each direction are Eq. (5),(6),(7), respectively. N -2 1 Do = P( x+ i, y)- P( x+ i+ 1, y-1) (5) N -1 i = 0 N -1 1 Dv = P( x+ i, y)- P( x+ i, y-1) (6) N i = 0 N -1 1 Di = P( x+ i, y)- P( x+ i-1, y-1) (7) -1 N i = 1

IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, December 2008 187 Do is the cost function that is applied to the oblique edge direction. DV and Di are the cost functions for each vertical and inverse oblique line edge direction. Also, x and y mean the positions of the bottom line's first pixel among 8x2 pixels. In this step 1, x and y are the most bottom line's first pixel of left upper sub-block of sub-block Etl as shown in Fig. 3. Using these cost functions, AMSBM can gain the cost function s result value for each direction. It decides a direction with the minimum value into the dominant direction of the boundary and fixes that result value of the dominant direction as a result value R. The result value R is used as a standard value that is compared with result values under a pixel. If the dominant direction is decided, a cost functions are applied to the similar directions under a pixel according to the dominant direction. If an oblique direction is decided into the dominant direction, cost functions are applied to an oblique and a vertical direction under a line as shown in Fig. 4. If an inverse oblique direction is decided into the dominant direction, cost functions are applied to a vertical and an inverse direction. If a vertical direction is decided into the dominant direction, cost functions are applied to an oblique, vertical and inverse oblique direction under a pixel. boundary matching degree about lower pixels of the left sub-block. In the case of a single slice error type, the lower data of the left sub-block can be used to decide if the left sub-block was correctly concealed through the comparison with pixel data concealed in the process of previous MB concealment. Since the lower data is error free, it can be used as an efficient value to gain the result value R. For concealing the sub-block Ebl, AMSBM examines boundary matching degree with the same method that carried out on the upper pixel lines before concealing sub-block Ebl. For concealing the sub-block Etr and Ebr, AMSBM applies the same examination of the boundary matching degree such as Etl and Ebl, respectively. 3.2 Decision method of variable block position and size by examination boundary match In the process of chapter 3.1, we can examine reliability about the pixels on the left boundary of the sub-block that will be concealed. This method decides which position s boundary data is used to conceal the lost sub-block according to the result of examination. According to the dominant direction, it gains the difference value group between result value R and the result values of cost functions under a pixel. For example, if the dominant direction is decided to the oblique direction at the upper pixel lines, the cost function is applied to the oblique direction and vertical direction at the below pixel lines. And then, we can gain the group of two difference values. One is the difference value between the result value R and the result value of the oblique direction. The other is the difference value between the result value R and the result value of the vertical direction. Among the difference values of the group, if there is a smaller value than predefined threshold T, the boundary of these sub-blocks is determined to be natural and be well concealed. If there isn t a smaller value than predefined threshold T, the boundary of this sub-block is not determined to be natural and be well concealed. The predefined threshold T is fixed as the most suitable value 4 by an experiment. We experimented by fixing threshold T as 4 in this paper. Also, for sub-block Ebl below Etl, AMSBM examines the boundary matching degree with the same method. Then, instead of examining boundary matching degree about upper pixels of the left sub-block of Etl, it examines Fig.5 Flowchart of proposed method If AMSBM determines the left boundary data has reliability in the process of chapter 3.1, it conceals the lost sub-block with existing method. However, if it is determined that the left boundary data has no reliability, we refer only the upper boundary data of the sub-block that will be concealed. The reason is why the data is error free. We solve the lacking guarantee matter related to amount of the reliable reference data by referring more pixel data located on the upper sub-block using Eq. (8),(9). K value is 6. We can check through block diagram of the total method in Fig. 5.

188 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.12, December 2007-1 7 SAD(E tl) = E tl( x+ i, y+ -E tl'( x+ dx+ i, y+ dy+ (8) j= -K i= 0 7+ K 7 SAD(E bl)= E bl( x+ i, y+ -E bl'( x+ dx+ i, y+ dy+ (9) j= 8 i= 0 4. Experimental Results Four test sequences were used to compare objective quality of MSBM method with the proposed method. Four sequences are Football, Foreman, Stefan and Silent. We applied to H.264 reference software (JM 10.2) and used 100 frames that coded with IPPP structure. GOP size is 3. We inserted the block loss to P frame. (a) Errorfree Table 1 shows each different MB ratio, test sequences and the average PSNR of each frame in concealing error with each method after losing MB randomly to 5%, 10%, 15% and 20% on frame except for the first frame of each test sequences. Therefore, it has a structure that uses by referring concealed image of the former page in the following frame. AMSBM has higher performance than MSBM in every test sequence. It means AMSBM shows higher performance in terms of not only subjective image quality, but also objective image quality. Table 1: Simulation results for different MB loss ratios (b) Erroneous Test Sequence Football Foreman Stefan Silent PSNR MB Loss Ratio (db) 5% 10% 15% 20% MSBM 34.809 30.484 27.868 25.959 AMSBM 35.470 31.134 28.447 26.185 MSBM 41.638 35.992 32.021 29.078 AMSBM 42.250 36.378 32.364 29.114 MSBM 36.600 32.069 29.162 27.024 AMSBM 37.178 32.565 29.506 27.160 MSBM 48.071 40.692 35.163 31.188 AMSBM 48.073 41.036 35.321 31.281 (c) MSBM

IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, December 2008 189 [3] Jian Feng, Kwok-Tung Lo, Mehrpour H, Error concealment for MPEG video transmissions, IEEE Trans. Consumer Electronics, vol. 43, issue 2, pp. 183-187, May 1997. (d) Proposed Fig. 6 Frame #56 of the Stefan : (a) Error free, (b) Erroneous(20% MB loss), (c) MSBM, (d) Proposed 5. Conclusion In this paper, AMSBM that uses examination of the boundary matching degree brings better performance by using adapted image reference pixels considering edge direction between boundaries. AMSBM can prevent error propagation that causes in the process of error concealment and it brings largely improved performance in terms of subjective image quality and also better performance on every test sequence in the PSNR part that means objective image quality. Experimental results show an improved performance of 0.36 db on average compared to the previous method. Seung-Soo Jeong was born in Seoul, South Korea, in 1981. He received the B.S. degree in electronics engineering from Kwangwoon University, Seoul, Korea in 2007. He is currently working toward the M.S. degree in electronics engineering from Kwangwoon University, Seoul, Korea. His research interests include video coding and error concealment. Chae-Bong Sohn received the B.S., M.S., and Ph.D. degree in electronics engineering from Kwangwoon University, Seoul, Korea in 1993, 1995, and 2006, respectively. From 2000 to 2005, he worked in Hanyang Women s College as a full-time lecturer. He is currently an assistant professor in department of Electronics and Communications Engineering, Kwangwoon University. His research interests include image compression, transcoding, digital broadcasting systems. Acknowledgments The present Research has been conducted by the Research Grant of Kwangwoon University in 2008. References [1] Mei-juan Chen, Che-Shing Chen, Ming-Chieh Chi, Temporal error concealment algorithm by recursive blockmatching principle, IEEE Trans. On Circuits and Systems for Video Technology, vol. 5, no. 11, pp.1385-1393, Nov. 2005 [2] Chung-Yen Su, Shia-Hao Huang, Temporal Error Concealment Algorithm Using Multi-Side Boundary Matching Principle, Signal Processing and Information Technology, pp.448-453, Aug. 2006.