1 / 15

Error detection and concealment for Multimedia Communications

Error detection and concealment for Multimedia Communications. Senior Design Fall 06 and Spring 07. Outline. Introduction to multimedia communications Overview of JPEG2000 Error detection and concealment of corrupted regions in the received images due to transmission over a noisy channel.

reina
Download Presentation

Error detection and concealment for Multimedia Communications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Error detection and concealment for Multimedia Communications Senior Design Fall 06 and Spring 07

  2. Outline • Introduction to multimedia communications • Overview of JPEG2000 • Error detection and concealment of corrupted regions in the received images due to transmission over a noisy channel.

  3. Multimedia Communication Objectives and Requirements • Transmitting a large amount of data in real time using the least amount of channel bandwidth • Transmitted data are robust to channel impairments

  4. Transmission of a 1 second movie clip Pixel intensity levels 0 to 255 8 Bits 512x512 gray level image 2.1MB 512x512 color image 6.3MB 1 second movie clip 189 MB/sec Channel Bandwidth 94.5 MHz

  5. JPEG Compression Based on Discrete Cosine Transform (DCT) • Data Compression to reduce the transmitted data • Divide Image into Blocks • Discrete Cosine Transform • Quantization • Run length channel coding 77 66 68 67 98 93 79 81 79 61 61 71 61 78 88 94 79 93 84 64 72 76 95 94 97 65 71 75 75 72 95 111 120 81 82 76 72 77 78 83 150 146 112 83 78 62 91 85 156 145 158 125 107 121 95 86 158 166 147 146 153 149 129 107

  6. Compression Ratio 10:1 776 46 42 15 -1 5 6 9 -165 -90 8 -2 15 0 1 3 82 6 -46 18 -14 -13 2 -6 -37 34 12 5 6 0 4 5 8 -30 -19 21 20 -2 4 2 11 4 -9 -7 -4 -4 9 7 11 12 9 -1 -11 -19 -23 9 0 8 -18 5 -12 -3 13 -1 49 4 4 1 0 0 0 0 -14 -7 1 0 1 0 0 0 6 0 -3 1 0 0 0 0 -3 2 1 0 0 0 0 0 0 -1 -1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 16 11 10 16 24 40 51 61 12 12 14 19 26 58 60 55 14 13 16 24 40 57 69 56 14 17 22 29 51 87 80 62 18 22 37 56 68 109 103 77 24 35 55 64 81 104 113 92 49 64 78 87 103 121 120 101 72 92 95 98 112 100 103 99 49 * 16 = 784 Quantization

  7. OriginalImage CompressedImage

  8. The Drawback of Compression Images received after transmission over noisy channels

  9. JPEG 2000: Architectural Overview Image Sample Level offset Color Transform RGB->CbCr Source Coding Wavelet Transform Channel Coding Quantization Transmission Block Coder Region of Interest

  10. Concealment with Edge Information –Transmitted Side Information Edge image size = 0.32% of original image

  11. Concealment with Edge Information - Received Side Information

  12. Concealment with Edge Information- Edge of Received Image

  13. Concealment with Edge Information- Edge of Received Image

  14. Senior Design Tasks • Learn the JPEG2000 standard. • Search the literature and the internet for the different methods of error detection and concealment for images transmitted by JPEG2000 standard. • Design a method to compress the binary image that contain the edge information. • Design a method to conceal the error by estimating the corrupted pixels using the edge information. • Evaluate your design by running a simulation of the noisy channel and implementing your design in recovering the corrupted images.

  15. Skills Needed for the Error Detection and Concealment • Ability to read the literature. • Ability to use Matlab run the simulations of the proposed algorithms. • Ability to understand the mechanism of wavelet to use the relationships between coefficients in estimating corrupted pixels. • Ability to use some probability and statistics to estimate the values of the corrupted pixels. • Organization, determination, and team work ethic.

More Related