Please use this identifier to cite or link to this item:
|Title: ||A neighbourhood analysis based technique for real-time error concealment in H.264 intra pictures|
|Authors: ||Beesley, Steven T.C.|
Edirisinghe, Eran A.
|Issue Date: ||2007|
|Publisher: ||© 2007 SPIE|
|Citation: ||BEESLEY, S.T.C., GRECOS, C. and EDIRISINGHE, E.A., 2007. A neighbourhood analysis based technique for real-time error concealment in H.264 intra pictures. IN: Creutzburg, R., Takala, J. and Cai, J. (eds.) Multimedia on Mobile Devices 2007, Proc. of SPIE-IS&T Electronic Imaging, 6507, 650706, 9pp.|
|Abstract: ||H.264s extensive use of context-based adaptive binary arithmetic or variable length coding makes streams highly
susceptible to channel errors, a common occurrence over networks such as those used by mobile devices. Even a single
bit error will cause a decoder to discard all stream data up to the next fixed length resynchronisation point, the worst
scenario is that an entire slice is lost. In cases where retransmission and forward error concealment are not possible, a
decoder should conceal any erroneous data in order to minimise the impact on the viewer. Stream errors can often be
spotted early in the decode cycle of a macroblock which if aborted can provide unused processor cycles, these can
instead be used to conceal errors at minimal cost, even as part of a real time system. This paper demonstrates a technique
that utilises Sobel convolution kernels to quickly analyse the neighbourhood surrounding erroneous macroblocks before
performing a weighted multi-directional interpolation. This generates significantly improved statistical (PSNR) and
visual (IEEE structural similarity) results when compared to the commonly used weighted pixel value averaging.
Furthermore it is also computationally scalable, both during analysis and concealment, achieving maximum performance
from the spare processing power available.|
|Description: ||Copyright 2007 Society of Photo-Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic electronic or print reproduction and distribution, duplication of any material in this paper for a fee or for commercial purposes, or modification of the content of the paper are prohibited. This paper can also be found at: http://dx.doi.org/10.1117/12.704866|
|Appears in Collections:||Conference Papers (Computer Science)|
Files associated with this item:
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.