CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Image Concealment based on FEC

by Aniruddha D. Shelotkar, Vishwajit K. Barbudhe
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 54 - Number 16
Year of Publication: 2012
Authors: Aniruddha D. Shelotkar, Vishwajit K. Barbudhe
10.5120/8648-2454

Aniruddha D. Shelotkar, Vishwajit K. Barbudhe . Image Concealment based on FEC. International Journal of Computer Applications. 54, 16 ( September 2012), 8-12. DOI=10.5120/8648-2454

@article{ 10.5120/8648-2454,
author = { Aniruddha D. Shelotkar, Vishwajit K. Barbudhe },
title = { Image Concealment based on FEC },
journal = { International Journal of Computer Applications },
issue_date = { September 2012 },
volume = { 54 },
number = { 16 },
month = { September },
year = { 2012 },
issn = { 0975-8887 },
pages = { 8-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume54/number16/8648-2454/ },
doi = { 10.5120/8648-2454 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:55:49.686773+05:30
%A Aniruddha D. Shelotkar
%A Vishwajit K. Barbudhe
%T Image Concealment based on FEC
%J International Journal of Computer Applications
%@ 0975-8887
%V 54
%N 16
%P 8-12
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Any error-concealment technique can be applied at the decoder, it is necessary first to find out whether and where a transmission error has occurred. Error detection can be performed at the transport coder/decoder and at the image decoder. One way to perform error detection at the transport coder is by adding header information containing a sequence number. At the transport decoder, the sequence number can be used for packet-loss detection. Another method at the transport level is to use a forward error correction (FEC). There are also methods that can exploit the characteristics of natural image signals where the differences of pixel values between two neighboring lines are used for detecting transmission errors. When the difference is greater than a threshold, the current image segment is declared to be damaged. When VLC is used in the source code, any damage to a single bit can cause resynchronization, resulting in the subsequent bits being undecodable. However, this property can be used as a means to detect transmission errors. In addition, the syntax embedded in the bit stream can also be used for error detection.

References
  1. J. W. Park and S. U. Lee, "Recovery of corrupted image data based on the NURBS interpolation," IEEE Trans. Circuits Syst. Video Technol. , vol. 9, pp. 1003–1008, Oct. 1999.
  2. X. Lee, Y. Zhang, and A. Leon-Garcia, "Information loss recovery for block-based image coding techniques—A fuzzy logic approach," IEEE Trans. Image Processing, vol. 4, pp. 259–273, Mar. 1995.
  3. J. -W. Suh and Y. -S. Ho, "Error concealment based on directional interpolation," IEEE Trans. Consumer Electron. , vol. 43, pp. 295–302, Aug. 1997.
  4. Z. Wang, Y. Yu, and D. Zhang, "Best neighborhood matching: An information loss restoration technique for block-based image coding systems," IEEE Trans. Image Processing, vol. 7, pp. 1056–1061, Jul. 1998.
  5. W. -M. Lam and A. Reibman, "An error concealment algorithm for images Subject to channel errors," IEEE Trans. Image Processing, vol. 4, pp. 533–542, May 1995.
  6. W. Zhu, Y. Wang, and Q. Zhu, "Second-order derivative-based smoothness measure for error concealment in DCT-based codec's," IEEE Trans. Circuits Syst. Video Technol. , vol. 8, pp. 713–718, Oct. 1998.
  7. K. Jung, J. Chang, and C. Lee, "Error concealment technique using projection data for block-based image coding," in Proc. SPIE Conf. Visual Communication and Image Processing, vol. 2308, 1994, pp. 1466–1476.
  8. H. Sun and W. Kwok, "Concealment of damaged block transform coded images using projections onto convex sets," IEEE Trans. Image Process. , vol. 4, no. 4, pp. 470–477, Apr. 1995.
  9. G. S. Yu, M. M. K. Liu, and M. W. Marcellin, "POCS-based error concealment for packet video using multiframe overlap information," IEEE Trans. Circuits Syst. Video Technol. , vol. 8, no. 4, pp. 422–434, Aug. 1998.
  10. A. Bilgin, Z. Wu, and M. W. Marcellin, "Decompression of corrupt Jpeg2000 codestreams," in Proc. IEEE Data Compression Conf. , Snowbird, UT, Mar. 2003, pp. 123–132.
  11. I. Moccagatta, S. Soudagar, J. Liang, and H. Chen, "Error-resilient coding in JPEG-2000 and MPEG-4," IEEE J. Sel. Areas Commun. , vol. 18, no. 6, pp. 899–914, Jun. 2000.
  12. A. Natu and D. Taubman, "Unequal error protection of JPEG2000 codestream in wireless channels," in Proc. IEEE Global Telecommunications Conf. , vol. 1, Taipei, Taiwan, R. O. C. , Nov. , 2002, pp. 534 –5348.
  13. D. Nicholson, C. Lamy, C. Poulliat, and X. Naturel, "Result of core experiments on header error protection (JPWL C01)," ISO/IEC JTC 1/SC 29/WG 1 N 2935, May 2003.
  14. JPEG 2000 Part 1—Core Coding System.
Index Terms

Computer Science
Information Sciences

Keywords

Forward Error Concealment interpolation joint source channel coding robust image transmission image system model