Bi-direction motion vector retrieval based error concealment scheme for H.264/AVC

Yichun Tang, Jun Wang, Satoshi Goto

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

As the newest video coding standard, H.264/AVC [1] adopts the high-efficiently predictive coding and variable length entropy coding to achieve high compression efficiency. On the other side, transmission errors become the major problem faced by video broadcasting service providers. Error concealment (EC) [2] here is adopted to handle slices with huge conjunctive corrupted areas inside. Considering Error propagation from corrupted slice to succeeding ones is the key factor affecting the video quality, this paper proposes a novel temporal EC scheme including the bi-direction Motion Vector (MV) retrieval method and an adaptive EC ordering basing on it. Background and motional steady shift part of slice will be given top and second priority, respectively. Combined with our proposed Improved Boundary Matching Algorithm (IBMA) which provides more accurate distortion function, experiments results show that our proposal achieves better performance under different error rate channel, compared with EC algorithm adopted in H.264 reference software [3].

Original languageEnglish
Title of host publicationProceedings of 2009 5th International Colloquium on Signal Processing and Its Applications, CSPA 2009
Pages191-194
Number of pages4
DOIs
Publication statusPublished - 2009
Event2009 5th International Colloquium on Signal Processing and Its Applications, CSPA 2009 - Kuala Lumpur
Duration: 2009 Mar 62009 Mar 8

Other

Other2009 5th International Colloquium on Signal Processing and Its Applications, CSPA 2009
CityKuala Lumpur
Period09/3/609/3/8

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computer Science Applications
  • Computer Vision and Pattern Recognition
  • Signal Processing

Fingerprint Dive into the research topics of 'Bi-direction motion vector retrieval based error concealment scheme for H.264/AVC'. Together they form a unique fingerprint.

Cite this