SlideShare a Scribd company logo
Indonesian Journal of Electrical Engineering and Computer Science
Vol. 6, No. 3, June 2017, pp. 671 ~ 681
DOI: 10.11591/ijeecs.v6.i3.pp671-681  671
Received January 2, 2017; Revised April 25, 2017; Accepted May 11, 2017
A Concealment Aware UEP Scheme for H.264 using RS
Codes
D. Indoonundon*, T. P. Fowdur, K. M. S Soyjaudah
Department of Electrical and Electronic Engineering, University of Mauritius Reduit, Mauritius
*Corresponding author, e-mail: deevya.indoonundon1@umail.uom.ac.mu
Abstract
H.264/AVCis currently the most widely adopted video coding standard due to its high
compression capability and flexibility. However, compressed videos are highly vulnerable to channel errors
which may result in severe quality degradation of a video. This paper presentsa concealment aware
Unequal Error Protection (UEP) scheme for H.264 video compression using Reed Solomon (RS) codes.
The proposed UEP technique assigns a code rate to each Macroblock (MB) based on the type of
concealment and a Concealment Dependent Index (CDI). Two interleaving techniques, namely Frame
Level Interleaving (FLI) and Group Level Interleaving (GLI) have also been employed. Finally, prioritised
concealment is applied in cases where error correction is beyond the capability of the RS decoder.
Simulation results have demonstrated that the proposed framework provides an average gain of 2.96 dB
over a scheme that used Equal Error Protection (EEP).
Keywords: H.264 video compression, RS codes, UEP, interleaving; prioritised concealment
Copyright © 2017 Institute of Advanced Engineering and Science. All rights reserved.
1. Introduction
With the emergence of highly sophisticated mobiles devices, there has been an
explosive growth in video traffic. Video compression standards have constantly received high
attention due to their ability to reduce the size of a video in order to meet the increasing
bandwidth requirements of video traffic over the internet [1-3]. H.264 is today one of the most
popular and most commonly adopted video compression standard among users. In 2013,
H.265, which is the successor of H.264 was developed and has shown to provide up to 50%
compression ratio as compared to H.264 [2]. However, H.264 is still the most widely utilised
video compression standard due to its lower complexity and capability of providing excellent
video quality. Several recent works on H.264 have been proposed in [4, 5, 6]. However,
compressed videos are highly vulnerable to errors during transmission over communication
channels. Therefore, there is a need to find solutions to cater for the problem of channel errors
in order to ensure efficient transmission of compressed video over unreliable channels. Anerror
correcting technique which has received consistently high attention during the last few decades
is Reed Solomon codes introduced by I. S. Reed and G. Solomon in 1960 [7]. The basic idea
behind the use of RS codes with H.264 video coding standard is to add redundant information
to the original compressed video data with the aim to allow error detection and correction by the
receiver in case errors might have occurred during transmission [8].Moreover, interleaving can
be applied to the RS coded video data to improve the error correction capability of the RS
decoder. An interesting approach is to apply UEP to the RS coded video packets based on the
type of concealment which will be used for error correction. An outline of forward error
correction codes and UEP techniques developed for H.264 video transmission is given next.
Over the past decade, many error correcting codes have been studied with the H.264
video coding standard in order to ensure better Quality of Service. An interesting concept using
UEP Luby transform codes at the application layer and rate-compatible punctured convolutional
codes at the physical layer was proposed in [9] for robust H.264 video transmission. Simulation
results have shown that the proposed cross-layer forward error correction scheme surpassed
other forward error correction schemes that used either UEP coding at the physical layer alone
or equal error protection schemes at the application layer and the physical layer. For instance
in [10], an effective error correction algorithm was proposed which used the H.264 codec in
conjunction with turbo coding and experimental results have shown that the proposed technique
 ISSN: 2502-4752
IJEECS Vol. 6, No. 3, June 2017 : 671 – 681
672
produced higher Quality of Experience. In addition in [11], the authors proposed a novel point-
to-point H.264 Video Streaming over IEEE 802.15.4 together with RS Error Correction. The
results have demonstrated that real-time video streaming is achieved with more reliability [11].
The application of UEP with error correcting codes has proved to be a very powerful
method of combatting the problem of packet losses over erroneous communication channels.
For example in [12], a new trapezoidal UEP scheme was proposed which has shown to achieve
higher robustness while reducing the coding redundancy as compared to a traditional UEP
scheme. Moreover, the authors in [13], used the H.264 error resilient tool of data partitioning to
apply UEP to different data partitions. Thesimulation results have shown that the proposed
scheme in [13] demonstrated efficient adaptation to the network conditions and graceful
reconstruction quality degradation against a large range of packet loss rate and available
bandwidth. Along the same line, in [14], Expanding Window Random Linear Codes which are
an UEP fountain coding scheme was proposed for H.264 slice-partitioned data and results have
shown the effectiveness of using the proposed scheme for multimedia broadcast applications.
In this paper a novel concealment aware UEP scheme for H.264 using RS Codes is
proposed. The proposed UEP technique assigns a code rate to each Macroblock (MB) based
on two factors. The first factoris the type of concealment, spatial or temporal, which will be used
in case of loss during transmission. The second factor is the Concealment Dependent Index
(CDI) which determines the effectiveness of the concealment algorithm based on the location of
the MB in a frame. In addition, two types of interleaving techniques referred as Frame Level
Interleaving (FLI) and Group Level Interleaving (GLI) are also used with UEP to further improve
the error correction capability of the RS decoder. Another concept referred as, prioritised
concealment [15] is also applied in cases where error correction is beyond the capability of the
RS decoder. Simulation results have demonstrated that the proposed framework provides an
average gain of 2.96 dB over EEP. Moreover, with the use of prioritised concealment an
additional gain of 0.96 dB is achieved. Results have also shown that FLI outperforms GLI by
4.17 dB at a packet loss rate of 0.2. However, at a packet loss rate of 0.4, GLI has shown to
outperform FLI by 5dB.
The remainder of this paper is organized as follows. Section 2 presents the research
method of the proposed framework. Section 3 demonstrates the experimental results and finally
Section 4 draws some conclusions and scope for future works.
2. Research Method
In Figure 1 the encoder of the proposed framework is shown. The input to the encoder
consists of the video sequence containing N frames. Each frame, which is made up of 99 MBs,
is processed by the H.264 encoder to create 99 arrays of bits each representing a MB. Each
sequence of bits of length, Ls is then converted into k symbols by the RS encoder using a bit
rate, Rb, such that:
(1)
Where:
Ls represents the length of a bitstream.krepresents the total number of symbols obtained.Rbis
thenumber of bits per symbol.
After the transformation from bits to symbols, each symbol array is converted into a
Galois field array before the code rate allocation is performed. In this work, a UEP scheme is
proposed with RS codes such that the most important MBs are given higher protection. The
importance of each MB is determined based on the type of concealment, spatial or temporal,
used during H.264 encoding and the CDI which checks the location of each MB in a frame.
IJEECS ISSN: 2502-4752 
A Concealment Aware UEP Scheme for H.264 using RS Codes (D. Indoonundon)
673
H.264
Encoder
Input Video
N Frames 101000..
110111..
001001..
101011..
MB 1
MB 2
MB 3
MB 99
Convert
into
symbols
7 2 1 3..
9 1 4 8 ..
8 3 4 9..
4 7 3 1..
MB 1
MB 2
MB 3
MB 99
UEP EEP
S1
RS
Encode
S2
Frame Level
Interleaving
Group Level
Interleaving
packets
Network
1 2
1
2
Galois Field
Conversion
….
N…..2 1
Figure 1. Proposed Encoder
To select the UEP scheme switch S1 is placed in position 1. For the EEP scheme,
switch S1 is placed in position 2. The UEP scheme is further explained in section 2.1. During
RS encoding, each symbol array of length k is converted into an array of length n, consisting of,
n-k, parity symbols [7, 8]. In addition, two types of interleaving referred as Frame level
Interleaving (FLI) and Group Level Interleaving (GLI) are performed. When using FLI, switch S2
is placed into position 1. To select FLI, packets are formed such that each one of them contains
symbols from all the 99 MBs in a frame. With GLI, a frame is first divided into nine groups of 11
MBs and interleaving is performed across each group. For instance, a packet will contain
symbols from a group of 11 MBs. This whole process is repeated for each frame after which the
packets are transmitted over a communication channel. Further details on the interleaving
schemes are given in section 2.2. Figure 2 illustrates the decoder of the proposed system.
Frame Level
De-Interleaving
Group Level
De-
Interleaving
UEP
EEP
RS
Decode
H.264
Decoder
Packets
101000..
110111..
001001..
101011..
MB 1
MB 2
MB 3
MB 99
Convert
into bits
7 2 1 3..
9 1 4 8 ..
8 3 4 9..
4 7 3 1..
MB 1
MB 2
MB 3
MB 99
Prioritised
Concealment
Output Video
S3 S4
1
2
1
2
Figure 2. Proposed Decoder
 ISSN: 2502-4752
IJEECS Vol. 6, No. 3, June 2017 : 671 – 681
674
De-Interleaving is first performed at the decoder so that the symbols are restored into
their original positions. Either FLI or GLI de-interleaving is performed depending on the type of
interleaving used at the encoder. If FLI de-interleaving is used switch S3 is placed at position 1.
Otherwise, if GLI de-interleaving is used S3 is placed at position 2. RS decoding is then
performed using either UEP or EEP. If the UEP scheme is used, S4 is placed in position 1 and
for the EEP scheme, S4 is placed in position 2. RS decoding is then performed on each packet
where error correction is performed. The RS decoder outputs arrays of symbols which are then
converted into bits before sending them to the H.264 decoder. The H.264 decoder converts the
bits into frames. Finally, prioritised concealment as proposed in [16] is performed.Concealment
of MBs is required because at high packet loss rates, error correction might be beyond the
capability of the RS decoder.
2.1. Unequal Error Protection (UEP)
In this work, UEP has been used with RS codes to offer higher protection to the most
important MBs from packet loss. The importance of a MB is determined by two factors which is
the type of concealment, either spatial or temporal, and the CDI value. In video compression, an
I-frame represents a frame which is intra coded and is least compressed as compared to a P
frame which is inter coded and more compressed. Therefore, an I frame needs to be given more
protection as compared to a P frame which, in fact, uses the I frame as a reference frame for
decoding. The CDI metric calculates the total number of MBs available to allow concealment of
a lost MB. In this work, FSE [16] which is spatial concealment method is used for I frames and
LI [17] which is a temporal concealment technique is used for P-Frames. For spatial
concealment, a total of 8 neighbouring MBs are required for an effective concealment of a lost
MB. On the other hand, for temporal concealment, 4 MBs located on the top, bottom, left and
right of the lost MB is needed for concealment.
Figure 3 illustrates four MBs: MB
I
M, MB
I
T, MB
P
M and MB
P
T. Figure 3(a) shows MB
I
M
which is located in the middle of an I frame. Since MB
I
M is surrounded by 8 MBs, MB1, MB2,
MB3, MB4, MB5, MB6, MB7 and MB8, in case MB
I
M is lost, all the surrounding MBs can be
used for spatial concealment. Therefore CDI is 8 in this case. Figure 3(b) shows MB
I
T which is
located in the topmost border of an I frame. MB
I
T is surrounded by only 3 MBs, MB1, MB2 and
MB3. In case MB
I
T is lost only 3 MBs will be available to be used for concealment, therefore CDI
is 3 in this case. Figure 3(c) shows MB
P
M which is located in the middle of a P frame. In case
MB
P
M is lost during transmission, it requires four MBs located in the top, bottom, right and left for
temporal concealment. Since MB
P
M islocated in the center, the neighbouring MBs: MB1, MB2,
MB3 and MB4 can be used for concealment, therefore CDI is 4 in this case. Figure 3(d) shows
MB
P
T which is located at the topmost border of a P frame. In case MB
P
M is lost during
transmission, only two MBs, MB1 and MB2 are available to be used for temporal concealment.
Therefore CDI is 2 in this case.
MBLMBI
M
MBL
MBI
T
MB1 MB2 MB3
MB4
MB5MB6MB7
MB8
MB1
MB2MB3
MBL
MBT MB1
(a) CDI = 8 (b) CDI = 3
(c) CDI = 4 (d) CDI = 2
P Frame
Temporal Concealment
I Frame
Spatial Concealment
MBP
T
MB2
MBT MB1MBP
M
MB2
MB3
MB4
Figure 3. CDI for spatial and temporal concealment
IJEECS ISSN: 2502-4752 
A Concealment Aware UEP Scheme for H.264 using RS Codes (D. Indoonundon)
675
Hence, to ensure an effective spatial concealment, the CDI of a lost MB must be 8.
Furthermore, to achieve an efficient temporal concealment, the CDI of a lost MB must be 4.
Hence, higher protection needs to be given to MBs with lower CDI to ensure that they are
correctly received and can further be used for concealment of other MBs.
The rate assigned to each MB is given by Equation 2 [7, 8]:
(2)
Where:
k represents the length of the symbol array of a MB.n represents the length of the
codeword after RS encoding.
Therefore, n consists of k data symbols and n-k parity symbols. The error correcting
capability, t is given by Equation (3) [7, 8]:
(3)
From equation 2 and 3 it can be concluded that a high number of parity symbols leads
to a greater error correcting capability of the RS decoder. Consequently, the lower the rate, the
higher the number of parity symbols which can be used for error correction which therefore
results in greater protection.
Figure 4 illustrates a flowchart which describes the UEP rate allocation process.
First, the algorithm checks whether the MB belongs to an I frame or a P frame. If it
belongs to an I frame, higher protection is given to the MB. I-frame also implies that spatial
concealment must be used. Next, the algorithm checks whether, the CDI of the MB is less than
eight. If it is less than eight, this implies that in case of loss, the concealment of the MB will not
be effective. Higher protection is therefore given to a MB with CDI less than 8. A lower rate is
assigned to a P –frame as compared to an I frame. For a P frame if the CDI is less than 4,
higher protection is given to the MB.
Rate 1 is assigned to the MB belonging to an I frame and having a CDI less than eight.
Rate 2 is assigned to the MB belonging to an I frame and having a CDI of eight. Rate 3 is
assigned to the MB belonging to a P frame and having a CDI less than four. Rate 4 is assigned
to the MB belonging to a P frame and having a CDI of four.
In general, Rate 1 < Rate 2 < Rate 3 < Rate 4.
Does MB belong to
an I Frame?
Is CDI < 8? Is CDI < 4?
YES
NO
YES NO YES NO
Rate 4Rate 3Rate 2Rate 1
P-Frame
I-Frame
Higher Rate
Lower Rate
Lower Rate Lower RateHigher Rate Higher Rate
Figure 4. Flowchart Illustrating the Rate Allocation process
 ISSN: 2502-4752
IJEECS Vol. 6, No. 3, June 2017 : 671 – 681
676
2.2. Interleaving
Consider for example a frame with 99 MBs as shown in Figure 5. In the interleaving
block, packets are formed in such a way that each of them consists of symbols from either a
group of 11 MBs referred as GLI or a whole frame consisting of 99 MBs namely FLI interleaving.
This allows information pertaining to a specific MB to be propagated across several packets. In
case of packet loss, the MB can be recovered with the information contained in the remaining
correctly received packets. Therefore, with the use of the parity symbols, the RS decoder can
perform error correction. A description of each interleaving scheme is given next.
2.2.1. FLI
Figure 5 illustrates the FLI interleaving process. Figure 5(a) shows a typical Foreman
video frame of size 144x176 which is made up of 99 MBs each of size 16x16. In addition, each
MB after RS encoding is represented by an array of length, n, which comprises of both data and
parity symbols.
The idea behind FLI interleaving is to form packets made up of symbols from each of
the 99 MBs. Ns which represents the number of symbols required from each MB to creates
packet is obtained using equation (4) below:
(4)
Where,
nrepresents the length of a symbol array representing a MB.
For example, in Figure 5, packet 1 is created by taking the first symbols from each of
the 99 MBs. This process continues until the last packet (packet 99) is created using the last
symbols of length, from each MB. After this process, all the symbols have been re-arranged
to form 99 packets each of length n.
4 7 8 8 3 7 3 3 ….. 8 5 5 7 2 5 6 8 1 3 …. 8 9 8 1 4 5 6 9 3 6 ... 2 6
MB 1 MB 2 MB 99
4 7 5 7 …………..….. 8 1
Ns symbols
from MB1 Ns symbols
from MB2
Ns symbols
from MB 99
Packet 1
Packet 2
8 5 8 9 ………………….2 6
Packet 99
1 432 5 876 9 1110
12 151413 16 191817 20 2221
23 262524 27 302928 31 3332
34 373635 38 414039 42 4443
45 484746 49 525150 53 5554
56 595857 60 636261 64 6665
67 706968 71 747372 75 7776
78 818079 82 858483 86 8887
89 929190 93 969594 97 9998
Frame Macroblock Allocation
(a) A typical frame from
Foreman video
(b) A sample Frame consisting
of 99 Macroblocks
Interleaver
H.264
Encoder
RS
Encoder
Figure 5. Illustration of Frame Level Interleaving process
IJEECS ISSN: 2502-4752 
A Concealment Aware UEP Scheme for H.264 using RS Codes (D. Indoonundon)
677
2.2.2. GLI
Figure 6 illustrates the GLI process where a typical Foreman video frame of size
144x176 is made up of 9 rows (slices) each containing 11 MBs. With GLI, the MBs are first
grouped to form 9 slices following which interleaving is performed across each slice. Therefore,
in this case each packet is made up of Nssymbols belonging to 11 MBs. With GLI, Ns, is
calculated as follows:
(5)
For example in Figure 6, it can be observed that packet 1 is formed from the first symbols of
length obtained from each of the 11 MBs belonging to slice 1. Packet 11 is created by using
the last symbols of length, , from each of the 11 MBs. This process is repeated until all the 9
slices are interleaved to form 99 packets.
1 432 5 876 9 1110
12 151413 16 191817 20 2221
23 262524 27 302928 31 3332
34 373635 38 414039 42 4443
45 484746 49 525150 53 5554
56 595857 60 636261 64 6665
67 706968 71 747372 75 7776
78 818079 82 858483 86 8887
89 929190 93 969594 97 9998
1 432 5 876 9 1110
12 151413 16 191817 20 2221
23 262524 27 302928 31 3332
34 373635 38 414039 42 4443
45 484746 49 525150 53 5554
56 595857 60 636261 64 6665
67 706968 71 747372 75 7776
78 818079 82 858483 86 8887
89 929190 93 969594 97 9998
Group 1
Group 2
Group 3
Group 4
Group 5
Group 6
Group 7
Group 8
Group 9
Frame Macroblock Allocation
(a) A typical frame from
Foreman video
(b) A sample Frame consisting
of 99 Macroblocks (c) Slices from a Frame
4 7 8 8 3 7 3…..6 3 8 5 5 7 2 5 6 8 1 …5 3 8 9 8 1 4 5 6 9 3 6..1 6 2 6
MB 1 MB 2 MB 11
4 7 8 8 5 7 2 5….8 1 4 5
Ns symbols
from MB1
Ns symbols
from MB2
Ns symbols from
MB 11
Packet 1
6 3 8 5 5 3 8 9..……1 6 2 6
Packet 11
Each Slice is processed by the
Interleaver
H.264
Encoder
RS
Encoder
Figure 6. Illustration of Group Level Interleaving process
3. Results and Analysis
In line with the goals of this work, four different schemes have been compared. The list
of parameters used for the simulations is given below:
Video Sequences : Foreman, News
Framerate : 25 frames per second
Number of Frames : 300
Frame size : 144x176
Channel Model : Gilbert Elliot Channel.
The schemes have been simulated using Matlab. The UEP and EEP rate allocation
schemes for each video sequence are given in Table 1.
 ISSN: 2502-4752
IJEECS Vol. 6, No. 3, June 2017 : 671 – 681
678
Table 1. Rate Allocation for UEP and EEP schemes
Foreman Sequence News Sequence
UEP
Rate Allocation
EEP
Rate Allocation
UEP
Rate Allocation
EEP
Rate Allocation
I Frame
CDI < 8 1/4 7/20 1/3 1/2
CDI = 8 1/3 7/20 2/5 1/2
P Frame
CDI < 4 4/11 7/20 5/8 1/2
CDI = 4 1/2 7/20 2/3 1/2
A brief description of each scheme is given in Table 2 where scheme 1 represents the
proposed framework which uses UEP and prioritisation based on autocorrelation for
concealment [15]. Scheme 2 uses UEP but does not employ prioritised concealment. Scheme 3
uses EEP and prioritised concealment whereas Scheme 4 utilises EEP but does not make use
of prioritised concealment. In all the simulations, FSE [16] is used as spatial concealment and LI
[17] is used as temporal concealment. The simulation is carried out with both FLI and GLI and
the results are analysed.
Table 2. Schemes tested
Schemes Rate Allocation Prioritised Concealment
UEP EEP
1 Yes No Yes
2 Yes No No
3 No Yes Yes
4 No Yes No
3.1. Results using FLI using Foreman and News Sequences
Figure 7 shows a graph of Y-PSNR against Packet Loss Rate for the Foreman
sequence with GOP length = 3 using FLI. It is observed that scheme 1 which uses UEP and
prioritised concealment provides an average gain of 2.98 dB over scheme 3 which uses EEP
and prioritised concealment. This is because with UEP, higher protection is given to the most
important MBs, hence the MBs are recovered correctly. In addition, scheme 1 provides an
average gain of 0.96 dB in the range of 0.1 ≤ Packet Loss Rate ≤ 0.4 over scheme 2 which does
not use prioritised concealment.
Figure 8 shows a Graph of Y-PSNR against Packet Loss Rate for the News sequence
with GOP length = 3 using FLI. It is observed that scheme 1 which uses UEP and prioritised
concealment provides an average gain of 1.07 dB over scheme 3 which uses EEP and
prioritised concealment. In addition, scheme 1 provides an average gain of 0.214 dB in the
range of 0.1 ≤ Packet Loss Rate ≤ 0.4 over scheme 2 which does not use prioritised
concealment.
Figure 7. Graph of Y-PSNR(dB) against
Packet loss Rate for the Foreman sequence
using FLI
Figure 8. Graph of Y-PSNR(dB) against
packet loss rate for the News sequence using
FLI
IJEECS ISSN: 2502-4752 
A Concealment Aware UEP Scheme for H.264 using RS Codes (D. Indoonundon)
679
3.2. Results with GLI using Foreman and News Sequences
Figure 9 shows a Graph of Y-PSNR against Packet Loss Rate for the Foreman
sequence with GOP length = 3 using GLI. It is observed that scheme 1 which uses UEP and
prioritised concealment provides an average gain of 1.26 dB over scheme 3 which uses EEP
and prioritised concealment. In addition, scheme 1 provides an average gain of 1.06 dB in the
range of 0.1 ≤ Packet Loss Rate ≤ 0.4 over scheme 2 which does not use prioritised
concealment.
Figure 10 shows a Graph of Y-PSNR against Packet Loss Rate for the News sequence
with GOP length = 3 using GLI. It is observed that scheme 1 which uses UEP and prioritised
concealment provides an average gain of 1.31 dB over scheme 3 which uses EEP and
prioritised concealment. In addition, scheme 1 provides an average gain of 0.215 dB in the
range of 0.1 ≤ Packet Loss Rate ≤ 0.4 over scheme 2 which does not use prioritised
concealment.
Figure 9. Graph of Y-PSNR(dB) against Packet
loss Rate for the Foreman sequence using GLI
Figure 10. Graph of Y-PSNR(dB) against
Packet loss Rate for the News sequence
using GLI
3.3. Comparison between FLI and GLI
Figure 11 represents the results obtained by comparing the two types of interleaving,
FLI and GLI. It can be observed at low Packet Loss Rates (PLR <0.24), FLI is seen to
outperform GLI whereas at high Packet Loss Rates (PLR > 0.24) GLI surpasses FLI. For
example, at a Packet Loss Rate of 0.2 with the News sequence, FLI achieves a gain of 4.17 dB
over GLI. When using FLI, the burst errors are propagated across 99 packets as compared to
GLI where the errors are propagated across 11 packets of one group. Hence, the number of
errors contained in a packet created using FLI is less than that which uses GLI which allows the
RS decoder to correct all the errors when using FLI. While, when using GLI, the errors
contained in one packet are beyond the error correcting capability of the RS decoder.
Figure 11. Graph of Y-PSNR (dB) against Packet loss Rate comparing the performance of FLI
and GLI for both the Forman and news sequence
 ISSN: 2502-4752
IJEECS Vol. 6, No. 3, June 2017 : 671 – 681
680
On the other hand at a Packet Loss Rate of 0.4 with the News sequence, GLI
outperforms FLI by 5 dB.At high Packet Loss Rate, the number of errors is beyond the error
correcting capability of the RS decoder when using both FLI and GLI. With the use FLI at high
Packet Loss Rates, a large amount of errors are distributed across 99 packets which causes
severe degradation of the whole frame. However, when using GLI at high Packet Loss Rates
the burst errors may affect only part of the 9 groups causing some of the groups to be correctly
decoded. This allows better performance of GLI as compared to FLI at high Packet Loss Rates.
4. Conclusion
The aim of this paper is to enhance the performance of H.264 video transmission with
the use of UEP with RS codes and two interleaving methods. The objective of using UEP with
RS codes is to protect the most important MBs from packet loss. The importance of a MB is
determined by two factors which are the type of concealment, spatial and temporal, and the CDI
value. Since an I-frame contains more significant information as compared to a P frame, higher
protection is given to an I frame. The CDI measures the effectiveness of the concealment
algorithm in case of packet loss. A low CDI will lead to an ineffective concealment. Therefore,
higher protection is given to MBs having lower CDI to ensure that they are corrected by the RS
decoder in case they have been subject to packet loss without the need for concealment. In
addition, two types of interleaving referred as FLI and GLI are proposed. The FLI technique
creates packets which consist of symbols from all the 99 MBs in a frame. With GLI, the MBs are
grouped into slices and interleaving is performed within each group. FLI has shown to perform
better than GLI at low packet loss rates whereas GLI proved to be more efficient at high packet
loss rates. Simulation results have demonstrated that the proposed framework outperformed an
EEP scheme by an average gain of2.96 dB when using the Foreman sequence with FLI.
Moreover, the use of prioritised concealment has shown to further improve the results by an
average gain of 0.96 dB.Numerous future works can be considered from this proposed
technique.An interesting future work would be to explore the way in which an existing FMO and
MDC scheme can be integrated with the proposed scheme. Finally the proposed scheme can
be analysed with H.265 and the results compared with H.264.
Acknowledgements
The authors are thankful to the University of Mauritius and the Tertiary Education
Commission for providing the necessary facilities and financial support for conducting this
research.
References
[1] Wiegand T, Draft ITU-T Recommendation and Final Draft International Standard of Joint Video
Specification (ITU-T Rec. H.264 |ISO/IEC 14496-10AVC, ITU-T Rec.H.264 | ISO/IEC 14496-10AVC.
2003.
[2] Bross B, Han WJ, Ohm JR, Sullivan GJ, Wiegand T. High Efficiency Video Coding (HEVC) Text
Specification Draft 9, Joint Collaborative Team on Video Coding (JCT-VC) of ITU-T SG 16 WP 3 and
ISO/IEC JTC 1/SC 29/WG 11, document JCTVC-K1003, Shanghai, China. 2012.
[3] Richardson I. The h.264 advanced video compression standard. 1st ed. Hoboken, N.J.: Wiley; 2013.
[4] Di Laura C, Pajuelo D, Kemper G. A Novel Steganography Technique for SDTV-H.264/AVC Encoded
Video. International Journal of Digital Multimedia Broadcasting. 2016; 2016: 1-9.
[5] Hamdy S, Ibrahim M, Osman M. Performance evaluation of a new efficient H.264 intraprediction
scheme. Turkish Journal of Electrical Engineering & Computer Sciences. 2016; 24: 1967-1983.
[6] Bernatin T, Sundari G, Gayethri B, Ramesh S. Performance Analysis of Rate Control Scheme in
H.264 Video Coding. Indian Journal of Science and Technology. 2016; 9(30).
[7] Reed I, Solomon G. Polynomial Codes Over Certain Finite Fields. Journal of the Society for Industrial
and Applied Mathematics. 1960; 8(2): 300-304.
[8] Clarke CKP, R&D White Paper. Reed-Solomon error correction. WHP 031. 2002.
[9] Talari A, Kumar S, Rahnavard N, Paluri S, Matyjas J. Optimized cross-layer forward error correction
coding for H.264 AVC video transmission over wireless channels. EURASIP Journal on Wireless
Communications and Networking. 2013; 2013(1): 206.
IJEECS ISSN: 2502-4752 
A Concealment Aware UEP Scheme for H.264 using RS Codes (D. Indoonundon)
681
[10] Jayasooriya J, Midipolawatta Y, Dissanayake M. Error correction technique based on forward error
correction for H.264 codec. 2012 IEEE 7th International Conference on Industrial and Information
Systems (ICIIS). 2012.
[11] Pham CK, Tung WC, Huu TH, Dao DT. Point-to-point H.264 Video Streaming over IEEE 802.15.4
with Reed-Solomon Error Correction. International Conference on Green and Human Information
Technology (ICGHIT). 2014: 89-93.
[12] Sun Y, Zhang X, Tang F, Fowler S, Cui H, Dong X. Layer-Aware Unequal Error Protection for
Scalable H.264 Video Robust Transmission over Packet Lossy Networks. 2011 14th International
Conference on Network-Based Information Systems. 2011.
[13] Zhao, Zenghua, Long S. RD-Based Adaptive UEP for H.264 Video Transmission in Wireless
Networks. 2010 International Conference on Multimedia Information Networking and Security. 2010.
[14] Nazir S, Stanković V, Andonović I, Vukobratović D. Application Layer Systematic Network Coding for
Sliced H.264/AVC Video Streaming. Advances in Multimedia. 2012; 2012: 1-9.
[15] Fowdur TP, D Indoonundon and Soyjaudah K M S. A Novel Prioritised Concealment and Flexible
Macroblock Ordering Scheme for Video Transmission. International Journal of Computer
Applications. 2016; 150(6): 35-42.
[16] 5. Kaup A, Meisinger K, Aach T. Frequency selective signal extrapolation with applications to error
concealment in image communication. AEU - International Journal of Electronics and
Communications. 2005; 59(3): 147-156.
[17] Zheng J, Chau LP. A temporal error concealment algorithm for (H.264) using Lagrange interpolation.
Proceedings of the 2004 International Symposium on Circuits and Systems, ISCAS 04. 2004: 133–
136.

More Related Content

What's hot

A new channel coding technique to approach the channel capacity
A new channel coding technique to approach the channel capacityA new channel coding technique to approach the channel capacity
A new channel coding technique to approach the channel capacity
ijwmn
 
haffman coding DCT transform
haffman coding DCT transformhaffman coding DCT transform
haffman coding DCT transform
aniruddh Tyagi
 
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.comFEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
MapYourTech
 
Report
ReportReport
Report
Videoguy
 
Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2
sangusajjan
 
Y25124127
Y25124127Y25124127
Y25124127
IJERA Editor
 
Fpga implemented multichannel hdlc transceiver
Fpga implemented multichannel hdlc transceiverFpga implemented multichannel hdlc transceiver
Fpga implemented multichannel hdlc transceiver
iaemedu
 
CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
Dsunte Wilson
 
Forward Bit Error Correction - Wireless Communications
Forward Bit Error Correction - Wireless Communications Forward Bit Error Correction - Wireless Communications
Forward Bit Error Correction - Wireless Communications
Surya Chandra
 
Simulation of Turbo Convolutional Codes for Deep Space Mission
Simulation of Turbo Convolutional Codes for Deep Space MissionSimulation of Turbo Convolutional Codes for Deep Space Mission
Simulation of Turbo Convolutional Codes for Deep Space Mission
IJERA Editor
 
Turbocode
TurbocodeTurbocode
Turbocode
Mustafa Khaleel
 
The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...
The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...
The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...
IJCI JOURNAL
 
On tap ccent
On tap ccentOn tap ccent
On tap ccent
Tung Nguyen Duong
 
Complexity Analysis in Scalable Video Coding
Complexity Analysis in Scalable Video CodingComplexity Analysis in Scalable Video Coding
Complexity Analysis in Scalable Video Coding
Waqas Tariq
 
exam2
exam2exam2
exam2
EMChief
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
An efficient transcoding algorithm for G.723.1 and G.729A ...
An efficient transcoding algorithm for G.723.1 and G.729A ...An efficient transcoding algorithm for G.723.1 and G.729A ...
An efficient transcoding algorithm for G.723.1 and G.729A ...
Videoguy
 
Resume_Jayachandra
Resume_JayachandraResume_Jayachandra
Resume_Jayachandra
jayachandra vudumula
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
aniruddh Tyagi
 
Ch 2
Ch 2Ch 2

What's hot (20)

A new channel coding technique to approach the channel capacity
A new channel coding technique to approach the channel capacityA new channel coding technique to approach the channel capacity
A new channel coding technique to approach the channel capacity
 
haffman coding DCT transform
haffman coding DCT transformhaffman coding DCT transform
haffman coding DCT transform
 
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.comFEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
 
Report
ReportReport
Report
 
Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2
 
Y25124127
Y25124127Y25124127
Y25124127
 
Fpga implemented multichannel hdlc transceiver
Fpga implemented multichannel hdlc transceiverFpga implemented multichannel hdlc transceiver
Fpga implemented multichannel hdlc transceiver
 
CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
 
Forward Bit Error Correction - Wireless Communications
Forward Bit Error Correction - Wireless Communications Forward Bit Error Correction - Wireless Communications
Forward Bit Error Correction - Wireless Communications
 
Simulation of Turbo Convolutional Codes for Deep Space Mission
Simulation of Turbo Convolutional Codes for Deep Space MissionSimulation of Turbo Convolutional Codes for Deep Space Mission
Simulation of Turbo Convolutional Codes for Deep Space Mission
 
Turbocode
TurbocodeTurbocode
Turbocode
 
The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...
The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...
The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...
 
On tap ccent
On tap ccentOn tap ccent
On tap ccent
 
Complexity Analysis in Scalable Video Coding
Complexity Analysis in Scalable Video CodingComplexity Analysis in Scalable Video Coding
Complexity Analysis in Scalable Video Coding
 
exam2
exam2exam2
exam2
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
An efficient transcoding algorithm for G.723.1 and G.729A ...
An efficient transcoding algorithm for G.723.1 and G.729A ...An efficient transcoding algorithm for G.723.1 and G.729A ...
An efficient transcoding algorithm for G.723.1 and G.729A ...
 
Resume_Jayachandra
Resume_JayachandraResume_Jayachandra
Resume_Jayachandra
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
Ch 2
Ch 2Ch 2
Ch 2
 

Similar to 22 29 may17 27feb 14758 deevya indoonundon(edit)

The impact of jitter on the HEVC video streaming with Multiple Coding
The impact of jitter on the HEVC video streaming with  Multiple CodingThe impact of jitter on the HEVC video streaming with  Multiple Coding
The impact of jitter on the HEVC video streaming with Multiple Coding
HakimSahour
 
AVC VIDEO SECURITY ON WIRELESS CHANNEL
AVC VIDEO SECURITY ON WIRELESS CHANNELAVC VIDEO SECURITY ON WIRELESS CHANNEL
AVC VIDEO SECURITY ON WIRELESS CHANNEL
ijma
 
Motion Vector Recovery for Real-time H.264 Video Streams
Motion Vector Recovery for Real-time H.264 Video StreamsMotion Vector Recovery for Real-time H.264 Video Streams
Motion Vector Recovery for Real-time H.264 Video Streams
IDES Editor
 
ERROR RESILIENT FOR MULTIVIEW VIDEO TRANSMISSIONS WITH GOP ANALYSIS
ERROR RESILIENT FOR MULTIVIEW VIDEO TRANSMISSIONS WITH GOP ANALYSIS ERROR RESILIENT FOR MULTIVIEW VIDEO TRANSMISSIONS WITH GOP ANALYSIS
ERROR RESILIENT FOR MULTIVIEW VIDEO TRANSMISSIONS WITH GOP ANALYSIS
ijma
 
Error resilient for multiview video transmissions with gop analysis
Error resilient for multiview video transmissions with gop analysisError resilient for multiview video transmissions with gop analysis
Error resilient for multiview video transmissions with gop analysis
ijma
 
Spatial Scalable Video Compression Using H.264
Spatial Scalable Video Compression Using H.264Spatial Scalable Video Compression Using H.264
Spatial Scalable Video Compression Using H.264
IOSR Journals
 
E010132529
E010132529E010132529
E010132529
IOSR Journals
 
[IJET-V1I2P1] Authors :Imran Ullah Khan ,Mohd. Javed Khan ,S.Hasan Saeed ,Nup...
[IJET-V1I2P1] Authors :Imran Ullah Khan ,Mohd. Javed Khan ,S.Hasan Saeed ,Nup...[IJET-V1I2P1] Authors :Imran Ullah Khan ,Mohd. Javed Khan ,S.Hasan Saeed ,Nup...
[IJET-V1I2P1] Authors :Imran Ullah Khan ,Mohd. Javed Khan ,S.Hasan Saeed ,Nup...
IJET - International Journal of Engineering and Techniques
 
A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...
A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...
A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...
csandit
 
A04840107
A04840107A04840107
A04840107
IOSR-JEN
 
report
reportreport
Analyzing Video Streaming Quality by Using Various Error Correction Methods o...
Analyzing Video Streaming Quality by Using Various Error Correction Methods o...Analyzing Video Streaming Quality by Using Various Error Correction Methods o...
Analyzing Video Streaming Quality by Using Various Error Correction Methods o...
IJERA Editor
 
H264 final
H264 finalH264 final
H264 final
Walid El-Shafai
 
H2B2VS (HEVC hybrid broadcast broadband video services) – Building innovative...
H2B2VS (HEVC hybrid broadcast broadband video services) – Building innovative...H2B2VS (HEVC hybrid broadcast broadband video services) – Building innovative...
H2B2VS (HEVC hybrid broadcast broadband video services) – Building innovative...
Raoul Monnier
 
H017653645
H017653645H017653645
H017653645
IOSR Journals
 
QoS Constrained H.264/SVC video streaming over Multicast Ad Hoc Networks
QoS Constrained H.264/SVC video streaming over Multicast Ad Hoc NetworksQoS Constrained H.264/SVC video streaming over Multicast Ad Hoc Networks
QoS Constrained H.264/SVC video streaming over Multicast Ad Hoc Networks
IJERA Editor
 
Performance Evaluation of H.264 AVC Using CABAC Entropy Coding For Compound I...
Performance Evaluation of H.264 AVC Using CABAC Entropy Coding For Compound I...Performance Evaluation of H.264 AVC Using CABAC Entropy Coding For Compound I...
Performance Evaluation of H.264 AVC Using CABAC Entropy Coding For Compound I...
DR.P.S.JAGADEESH KUMAR
 
QoS and QoE evaluation analysis of Skype multimedia service
QoS and QoE evaluation analysis of Skype multimedia serviceQoS and QoE evaluation analysis of Skype multimedia service
QoS and QoE evaluation analysis of Skype multimedia service
Konstantinos Stamatakis
 
Overview of the EVS codec architecture
Overview of the EVS codec architecture Overview of the EVS codec architecture
Overview of the EVS codec architecture
Ericsson
 
PERFORMANCE EVALUATION OF H.265/MPEG-HEVC, VP9 AND H.264/MPEGAVC VIDEO CODING
PERFORMANCE EVALUATION OF H.265/MPEG-HEVC, VP9 AND H.264/MPEGAVC VIDEO CODINGPERFORMANCE EVALUATION OF H.265/MPEG-HEVC, VP9 AND H.264/MPEGAVC VIDEO CODING
PERFORMANCE EVALUATION OF H.265/MPEG-HEVC, VP9 AND H.264/MPEGAVC VIDEO CODING
ijma
 

Similar to 22 29 may17 27feb 14758 deevya indoonundon(edit) (20)

The impact of jitter on the HEVC video streaming with Multiple Coding
The impact of jitter on the HEVC video streaming with  Multiple CodingThe impact of jitter on the HEVC video streaming with  Multiple Coding
The impact of jitter on the HEVC video streaming with Multiple Coding
 
AVC VIDEO SECURITY ON WIRELESS CHANNEL
AVC VIDEO SECURITY ON WIRELESS CHANNELAVC VIDEO SECURITY ON WIRELESS CHANNEL
AVC VIDEO SECURITY ON WIRELESS CHANNEL
 
Motion Vector Recovery for Real-time H.264 Video Streams
Motion Vector Recovery for Real-time H.264 Video StreamsMotion Vector Recovery for Real-time H.264 Video Streams
Motion Vector Recovery for Real-time H.264 Video Streams
 
ERROR RESILIENT FOR MULTIVIEW VIDEO TRANSMISSIONS WITH GOP ANALYSIS
ERROR RESILIENT FOR MULTIVIEW VIDEO TRANSMISSIONS WITH GOP ANALYSIS ERROR RESILIENT FOR MULTIVIEW VIDEO TRANSMISSIONS WITH GOP ANALYSIS
ERROR RESILIENT FOR MULTIVIEW VIDEO TRANSMISSIONS WITH GOP ANALYSIS
 
Error resilient for multiview video transmissions with gop analysis
Error resilient for multiview video transmissions with gop analysisError resilient for multiview video transmissions with gop analysis
Error resilient for multiview video transmissions with gop analysis
 
Spatial Scalable Video Compression Using H.264
Spatial Scalable Video Compression Using H.264Spatial Scalable Video Compression Using H.264
Spatial Scalable Video Compression Using H.264
 
E010132529
E010132529E010132529
E010132529
 
[IJET-V1I2P1] Authors :Imran Ullah Khan ,Mohd. Javed Khan ,S.Hasan Saeed ,Nup...
[IJET-V1I2P1] Authors :Imran Ullah Khan ,Mohd. Javed Khan ,S.Hasan Saeed ,Nup...[IJET-V1I2P1] Authors :Imran Ullah Khan ,Mohd. Javed Khan ,S.Hasan Saeed ,Nup...
[IJET-V1I2P1] Authors :Imran Ullah Khan ,Mohd. Javed Khan ,S.Hasan Saeed ,Nup...
 
A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...
A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...
A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...
 
A04840107
A04840107A04840107
A04840107
 
report
reportreport
report
 
Analyzing Video Streaming Quality by Using Various Error Correction Methods o...
Analyzing Video Streaming Quality by Using Various Error Correction Methods o...Analyzing Video Streaming Quality by Using Various Error Correction Methods o...
Analyzing Video Streaming Quality by Using Various Error Correction Methods o...
 
H264 final
H264 finalH264 final
H264 final
 
H2B2VS (HEVC hybrid broadcast broadband video services) – Building innovative...
H2B2VS (HEVC hybrid broadcast broadband video services) – Building innovative...H2B2VS (HEVC hybrid broadcast broadband video services) – Building innovative...
H2B2VS (HEVC hybrid broadcast broadband video services) – Building innovative...
 
H017653645
H017653645H017653645
H017653645
 
QoS Constrained H.264/SVC video streaming over Multicast Ad Hoc Networks
QoS Constrained H.264/SVC video streaming over Multicast Ad Hoc NetworksQoS Constrained H.264/SVC video streaming over Multicast Ad Hoc Networks
QoS Constrained H.264/SVC video streaming over Multicast Ad Hoc Networks
 
Performance Evaluation of H.264 AVC Using CABAC Entropy Coding For Compound I...
Performance Evaluation of H.264 AVC Using CABAC Entropy Coding For Compound I...Performance Evaluation of H.264 AVC Using CABAC Entropy Coding For Compound I...
Performance Evaluation of H.264 AVC Using CABAC Entropy Coding For Compound I...
 
QoS and QoE evaluation analysis of Skype multimedia service
QoS and QoE evaluation analysis of Skype multimedia serviceQoS and QoE evaluation analysis of Skype multimedia service
QoS and QoE evaluation analysis of Skype multimedia service
 
Overview of the EVS codec architecture
Overview of the EVS codec architecture Overview of the EVS codec architecture
Overview of the EVS codec architecture
 
PERFORMANCE EVALUATION OF H.265/MPEG-HEVC, VP9 AND H.264/MPEGAVC VIDEO CODING
PERFORMANCE EVALUATION OF H.265/MPEG-HEVC, VP9 AND H.264/MPEGAVC VIDEO CODINGPERFORMANCE EVALUATION OF H.265/MPEG-HEVC, VP9 AND H.264/MPEGAVC VIDEO CODING
PERFORMANCE EVALUATION OF H.265/MPEG-HEVC, VP9 AND H.264/MPEGAVC VIDEO CODING
 

More from IAESIJEECS

08 20314 electronic doorbell...
08 20314 electronic doorbell...08 20314 electronic doorbell...
08 20314 electronic doorbell...
IAESIJEECS
 
07 20278 augmented reality...
07 20278 augmented reality...07 20278 augmented reality...
07 20278 augmented reality...
IAESIJEECS
 
06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...
IAESIJEECS
 
05 20275 computational solution...
05 20275 computational solution...05 20275 computational solution...
05 20275 computational solution...
IAESIJEECS
 
04 20268 power loss reduction ...
04 20268 power loss reduction ...04 20268 power loss reduction ...
04 20268 power loss reduction ...
IAESIJEECS
 
03 20237 arduino based gas-
03 20237 arduino based gas-03 20237 arduino based gas-
03 20237 arduino based gas-
IAESIJEECS
 
02 20274 improved ichi square...
02 20274 improved ichi square...02 20274 improved ichi square...
02 20274 improved ichi square...
IAESIJEECS
 
01 20264 diminution of real power...
01 20264 diminution of real power...01 20264 diminution of real power...
01 20264 diminution of real power...
IAESIJEECS
 
08 20272 academic insight on application
08 20272 academic insight on application08 20272 academic insight on application
08 20272 academic insight on application
IAESIJEECS
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing survey
IAESIJEECS
 
06 20273 37746-1-ed
06 20273 37746-1-ed06 20273 37746-1-ed
06 20273 37746-1-ed
IAESIJEECS
 
05 20261 real power loss reduction
05 20261 real power loss reduction05 20261 real power loss reduction
05 20261 real power loss reduction
IAESIJEECS
 
04 20259 real power loss
04 20259 real power loss04 20259 real power loss
04 20259 real power loss
IAESIJEECS
 
03 20270 true power loss reduction
03 20270 true power loss reduction03 20270 true power loss reduction
03 20270 true power loss reduction
IAESIJEECS
 
02 15034 neural network
02 15034 neural network02 15034 neural network
02 15034 neural network
IAESIJEECS
 
01 8445 speech enhancement
01 8445 speech enhancement01 8445 speech enhancement
01 8445 speech enhancement
IAESIJEECS
 
08 17079 ijict
08 17079 ijict08 17079 ijict
08 17079 ijict
IAESIJEECS
 
07 20269 ijict
07 20269 ijict07 20269 ijict
07 20269 ijict
IAESIJEECS
 
06 10154 ijict
06 10154 ijict06 10154 ijict
06 10154 ijict
IAESIJEECS
 
05 20255 ijict
05 20255 ijict05 20255 ijict
05 20255 ijict
IAESIJEECS
 

More from IAESIJEECS (20)

08 20314 electronic doorbell...
08 20314 electronic doorbell...08 20314 electronic doorbell...
08 20314 electronic doorbell...
 
07 20278 augmented reality...
07 20278 augmented reality...07 20278 augmented reality...
07 20278 augmented reality...
 
06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...
 
05 20275 computational solution...
05 20275 computational solution...05 20275 computational solution...
05 20275 computational solution...
 
04 20268 power loss reduction ...
04 20268 power loss reduction ...04 20268 power loss reduction ...
04 20268 power loss reduction ...
 
03 20237 arduino based gas-
03 20237 arduino based gas-03 20237 arduino based gas-
03 20237 arduino based gas-
 
02 20274 improved ichi square...
02 20274 improved ichi square...02 20274 improved ichi square...
02 20274 improved ichi square...
 
01 20264 diminution of real power...
01 20264 diminution of real power...01 20264 diminution of real power...
01 20264 diminution of real power...
 
08 20272 academic insight on application
08 20272 academic insight on application08 20272 academic insight on application
08 20272 academic insight on application
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing survey
 
06 20273 37746-1-ed
06 20273 37746-1-ed06 20273 37746-1-ed
06 20273 37746-1-ed
 
05 20261 real power loss reduction
05 20261 real power loss reduction05 20261 real power loss reduction
05 20261 real power loss reduction
 
04 20259 real power loss
04 20259 real power loss04 20259 real power loss
04 20259 real power loss
 
03 20270 true power loss reduction
03 20270 true power loss reduction03 20270 true power loss reduction
03 20270 true power loss reduction
 
02 15034 neural network
02 15034 neural network02 15034 neural network
02 15034 neural network
 
01 8445 speech enhancement
01 8445 speech enhancement01 8445 speech enhancement
01 8445 speech enhancement
 
08 17079 ijict
08 17079 ijict08 17079 ijict
08 17079 ijict
 
07 20269 ijict
07 20269 ijict07 20269 ijict
07 20269 ijict
 
06 10154 ijict
06 10154 ijict06 10154 ijict
06 10154 ijict
 
05 20255 ijict
05 20255 ijict05 20255 ijict
05 20255 ijict
 

Recently uploaded

Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
b0754201
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
Unit -II Spectroscopy - EC I B.Tech.pdf
Unit -II Spectroscopy - EC  I B.Tech.pdfUnit -II Spectroscopy - EC  I B.Tech.pdf
Unit -II Spectroscopy - EC I B.Tech.pdf
TeluguBadi
 
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEERDELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
EMERSON EDUARDO RODRIGUES
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
paraasingh12 #V08
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
sydezfe
 
comptia-security-sy0-701-exam-objectives-(5-0).pdf
comptia-security-sy0-701-exam-objectives-(5-0).pdfcomptia-security-sy0-701-exam-objectives-(5-0).pdf
comptia-security-sy0-701-exam-objectives-(5-0).pdf
foxlyon
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
vmspraneeth
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
PreethaV16
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUESAN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
drshikhapandey2022
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Introduction to Artificial Intelligence.
Introduction to Artificial Intelligence.Introduction to Artificial Intelligence.
Introduction to Artificial Intelligence.
supriyaDicholkar1
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
felixwold
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
pvpriya2
 
Impartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 StandardImpartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 Standard
MuhammadJazib15
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 

Recently uploaded (20)

Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
Unit -II Spectroscopy - EC I B.Tech.pdf
Unit -II Spectroscopy - EC  I B.Tech.pdfUnit -II Spectroscopy - EC  I B.Tech.pdf
Unit -II Spectroscopy - EC I B.Tech.pdf
 
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEERDELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
 
comptia-security-sy0-701-exam-objectives-(5-0).pdf
comptia-security-sy0-701-exam-objectives-(5-0).pdfcomptia-security-sy0-701-exam-objectives-(5-0).pdf
comptia-security-sy0-701-exam-objectives-(5-0).pdf
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUESAN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Introduction to Artificial Intelligence.
Introduction to Artificial Intelligence.Introduction to Artificial Intelligence.
Introduction to Artificial Intelligence.
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
 
Impartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 StandardImpartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 Standard
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 

22 29 may17 27feb 14758 deevya indoonundon(edit)

  • 1. Indonesian Journal of Electrical Engineering and Computer Science Vol. 6, No. 3, June 2017, pp. 671 ~ 681 DOI: 10.11591/ijeecs.v6.i3.pp671-681  671 Received January 2, 2017; Revised April 25, 2017; Accepted May 11, 2017 A Concealment Aware UEP Scheme for H.264 using RS Codes D. Indoonundon*, T. P. Fowdur, K. M. S Soyjaudah Department of Electrical and Electronic Engineering, University of Mauritius Reduit, Mauritius *Corresponding author, e-mail: deevya.indoonundon1@umail.uom.ac.mu Abstract H.264/AVCis currently the most widely adopted video coding standard due to its high compression capability and flexibility. However, compressed videos are highly vulnerable to channel errors which may result in severe quality degradation of a video. This paper presentsa concealment aware Unequal Error Protection (UEP) scheme for H.264 video compression using Reed Solomon (RS) codes. The proposed UEP technique assigns a code rate to each Macroblock (MB) based on the type of concealment and a Concealment Dependent Index (CDI). Two interleaving techniques, namely Frame Level Interleaving (FLI) and Group Level Interleaving (GLI) have also been employed. Finally, prioritised concealment is applied in cases where error correction is beyond the capability of the RS decoder. Simulation results have demonstrated that the proposed framework provides an average gain of 2.96 dB over a scheme that used Equal Error Protection (EEP). Keywords: H.264 video compression, RS codes, UEP, interleaving; prioritised concealment Copyright © 2017 Institute of Advanced Engineering and Science. All rights reserved. 1. Introduction With the emergence of highly sophisticated mobiles devices, there has been an explosive growth in video traffic. Video compression standards have constantly received high attention due to their ability to reduce the size of a video in order to meet the increasing bandwidth requirements of video traffic over the internet [1-3]. H.264 is today one of the most popular and most commonly adopted video compression standard among users. In 2013, H.265, which is the successor of H.264 was developed and has shown to provide up to 50% compression ratio as compared to H.264 [2]. However, H.264 is still the most widely utilised video compression standard due to its lower complexity and capability of providing excellent video quality. Several recent works on H.264 have been proposed in [4, 5, 6]. However, compressed videos are highly vulnerable to errors during transmission over communication channels. Therefore, there is a need to find solutions to cater for the problem of channel errors in order to ensure efficient transmission of compressed video over unreliable channels. Anerror correcting technique which has received consistently high attention during the last few decades is Reed Solomon codes introduced by I. S. Reed and G. Solomon in 1960 [7]. The basic idea behind the use of RS codes with H.264 video coding standard is to add redundant information to the original compressed video data with the aim to allow error detection and correction by the receiver in case errors might have occurred during transmission [8].Moreover, interleaving can be applied to the RS coded video data to improve the error correction capability of the RS decoder. An interesting approach is to apply UEP to the RS coded video packets based on the type of concealment which will be used for error correction. An outline of forward error correction codes and UEP techniques developed for H.264 video transmission is given next. Over the past decade, many error correcting codes have been studied with the H.264 video coding standard in order to ensure better Quality of Service. An interesting concept using UEP Luby transform codes at the application layer and rate-compatible punctured convolutional codes at the physical layer was proposed in [9] for robust H.264 video transmission. Simulation results have shown that the proposed cross-layer forward error correction scheme surpassed other forward error correction schemes that used either UEP coding at the physical layer alone or equal error protection schemes at the application layer and the physical layer. For instance in [10], an effective error correction algorithm was proposed which used the H.264 codec in conjunction with turbo coding and experimental results have shown that the proposed technique
  • 2.  ISSN: 2502-4752 IJEECS Vol. 6, No. 3, June 2017 : 671 – 681 672 produced higher Quality of Experience. In addition in [11], the authors proposed a novel point- to-point H.264 Video Streaming over IEEE 802.15.4 together with RS Error Correction. The results have demonstrated that real-time video streaming is achieved with more reliability [11]. The application of UEP with error correcting codes has proved to be a very powerful method of combatting the problem of packet losses over erroneous communication channels. For example in [12], a new trapezoidal UEP scheme was proposed which has shown to achieve higher robustness while reducing the coding redundancy as compared to a traditional UEP scheme. Moreover, the authors in [13], used the H.264 error resilient tool of data partitioning to apply UEP to different data partitions. Thesimulation results have shown that the proposed scheme in [13] demonstrated efficient adaptation to the network conditions and graceful reconstruction quality degradation against a large range of packet loss rate and available bandwidth. Along the same line, in [14], Expanding Window Random Linear Codes which are an UEP fountain coding scheme was proposed for H.264 slice-partitioned data and results have shown the effectiveness of using the proposed scheme for multimedia broadcast applications. In this paper a novel concealment aware UEP scheme for H.264 using RS Codes is proposed. The proposed UEP technique assigns a code rate to each Macroblock (MB) based on two factors. The first factoris the type of concealment, spatial or temporal, which will be used in case of loss during transmission. The second factor is the Concealment Dependent Index (CDI) which determines the effectiveness of the concealment algorithm based on the location of the MB in a frame. In addition, two types of interleaving techniques referred as Frame Level Interleaving (FLI) and Group Level Interleaving (GLI) are also used with UEP to further improve the error correction capability of the RS decoder. Another concept referred as, prioritised concealment [15] is also applied in cases where error correction is beyond the capability of the RS decoder. Simulation results have demonstrated that the proposed framework provides an average gain of 2.96 dB over EEP. Moreover, with the use of prioritised concealment an additional gain of 0.96 dB is achieved. Results have also shown that FLI outperforms GLI by 4.17 dB at a packet loss rate of 0.2. However, at a packet loss rate of 0.4, GLI has shown to outperform FLI by 5dB. The remainder of this paper is organized as follows. Section 2 presents the research method of the proposed framework. Section 3 demonstrates the experimental results and finally Section 4 draws some conclusions and scope for future works. 2. Research Method In Figure 1 the encoder of the proposed framework is shown. The input to the encoder consists of the video sequence containing N frames. Each frame, which is made up of 99 MBs, is processed by the H.264 encoder to create 99 arrays of bits each representing a MB. Each sequence of bits of length, Ls is then converted into k symbols by the RS encoder using a bit rate, Rb, such that: (1) Where: Ls represents the length of a bitstream.krepresents the total number of symbols obtained.Rbis thenumber of bits per symbol. After the transformation from bits to symbols, each symbol array is converted into a Galois field array before the code rate allocation is performed. In this work, a UEP scheme is proposed with RS codes such that the most important MBs are given higher protection. The importance of each MB is determined based on the type of concealment, spatial or temporal, used during H.264 encoding and the CDI which checks the location of each MB in a frame.
  • 3. IJEECS ISSN: 2502-4752  A Concealment Aware UEP Scheme for H.264 using RS Codes (D. Indoonundon) 673 H.264 Encoder Input Video N Frames 101000.. 110111.. 001001.. 101011.. MB 1 MB 2 MB 3 MB 99 Convert into symbols 7 2 1 3.. 9 1 4 8 .. 8 3 4 9.. 4 7 3 1.. MB 1 MB 2 MB 3 MB 99 UEP EEP S1 RS Encode S2 Frame Level Interleaving Group Level Interleaving packets Network 1 2 1 2 Galois Field Conversion …. N…..2 1 Figure 1. Proposed Encoder To select the UEP scheme switch S1 is placed in position 1. For the EEP scheme, switch S1 is placed in position 2. The UEP scheme is further explained in section 2.1. During RS encoding, each symbol array of length k is converted into an array of length n, consisting of, n-k, parity symbols [7, 8]. In addition, two types of interleaving referred as Frame level Interleaving (FLI) and Group Level Interleaving (GLI) are performed. When using FLI, switch S2 is placed into position 1. To select FLI, packets are formed such that each one of them contains symbols from all the 99 MBs in a frame. With GLI, a frame is first divided into nine groups of 11 MBs and interleaving is performed across each group. For instance, a packet will contain symbols from a group of 11 MBs. This whole process is repeated for each frame after which the packets are transmitted over a communication channel. Further details on the interleaving schemes are given in section 2.2. Figure 2 illustrates the decoder of the proposed system. Frame Level De-Interleaving Group Level De- Interleaving UEP EEP RS Decode H.264 Decoder Packets 101000.. 110111.. 001001.. 101011.. MB 1 MB 2 MB 3 MB 99 Convert into bits 7 2 1 3.. 9 1 4 8 .. 8 3 4 9.. 4 7 3 1.. MB 1 MB 2 MB 3 MB 99 Prioritised Concealment Output Video S3 S4 1 2 1 2 Figure 2. Proposed Decoder
  • 4.  ISSN: 2502-4752 IJEECS Vol. 6, No. 3, June 2017 : 671 – 681 674 De-Interleaving is first performed at the decoder so that the symbols are restored into their original positions. Either FLI or GLI de-interleaving is performed depending on the type of interleaving used at the encoder. If FLI de-interleaving is used switch S3 is placed at position 1. Otherwise, if GLI de-interleaving is used S3 is placed at position 2. RS decoding is then performed using either UEP or EEP. If the UEP scheme is used, S4 is placed in position 1 and for the EEP scheme, S4 is placed in position 2. RS decoding is then performed on each packet where error correction is performed. The RS decoder outputs arrays of symbols which are then converted into bits before sending them to the H.264 decoder. The H.264 decoder converts the bits into frames. Finally, prioritised concealment as proposed in [16] is performed.Concealment of MBs is required because at high packet loss rates, error correction might be beyond the capability of the RS decoder. 2.1. Unequal Error Protection (UEP) In this work, UEP has been used with RS codes to offer higher protection to the most important MBs from packet loss. The importance of a MB is determined by two factors which is the type of concealment, either spatial or temporal, and the CDI value. In video compression, an I-frame represents a frame which is intra coded and is least compressed as compared to a P frame which is inter coded and more compressed. Therefore, an I frame needs to be given more protection as compared to a P frame which, in fact, uses the I frame as a reference frame for decoding. The CDI metric calculates the total number of MBs available to allow concealment of a lost MB. In this work, FSE [16] which is spatial concealment method is used for I frames and LI [17] which is a temporal concealment technique is used for P-Frames. For spatial concealment, a total of 8 neighbouring MBs are required for an effective concealment of a lost MB. On the other hand, for temporal concealment, 4 MBs located on the top, bottom, left and right of the lost MB is needed for concealment. Figure 3 illustrates four MBs: MB I M, MB I T, MB P M and MB P T. Figure 3(a) shows MB I M which is located in the middle of an I frame. Since MB I M is surrounded by 8 MBs, MB1, MB2, MB3, MB4, MB5, MB6, MB7 and MB8, in case MB I M is lost, all the surrounding MBs can be used for spatial concealment. Therefore CDI is 8 in this case. Figure 3(b) shows MB I T which is located in the topmost border of an I frame. MB I T is surrounded by only 3 MBs, MB1, MB2 and MB3. In case MB I T is lost only 3 MBs will be available to be used for concealment, therefore CDI is 3 in this case. Figure 3(c) shows MB P M which is located in the middle of a P frame. In case MB P M is lost during transmission, it requires four MBs located in the top, bottom, right and left for temporal concealment. Since MB P M islocated in the center, the neighbouring MBs: MB1, MB2, MB3 and MB4 can be used for concealment, therefore CDI is 4 in this case. Figure 3(d) shows MB P T which is located at the topmost border of a P frame. In case MB P M is lost during transmission, only two MBs, MB1 and MB2 are available to be used for temporal concealment. Therefore CDI is 2 in this case. MBLMBI M MBL MBI T MB1 MB2 MB3 MB4 MB5MB6MB7 MB8 MB1 MB2MB3 MBL MBT MB1 (a) CDI = 8 (b) CDI = 3 (c) CDI = 4 (d) CDI = 2 P Frame Temporal Concealment I Frame Spatial Concealment MBP T MB2 MBT MB1MBP M MB2 MB3 MB4 Figure 3. CDI for spatial and temporal concealment
  • 5. IJEECS ISSN: 2502-4752  A Concealment Aware UEP Scheme for H.264 using RS Codes (D. Indoonundon) 675 Hence, to ensure an effective spatial concealment, the CDI of a lost MB must be 8. Furthermore, to achieve an efficient temporal concealment, the CDI of a lost MB must be 4. Hence, higher protection needs to be given to MBs with lower CDI to ensure that they are correctly received and can further be used for concealment of other MBs. The rate assigned to each MB is given by Equation 2 [7, 8]: (2) Where: k represents the length of the symbol array of a MB.n represents the length of the codeword after RS encoding. Therefore, n consists of k data symbols and n-k parity symbols. The error correcting capability, t is given by Equation (3) [7, 8]: (3) From equation 2 and 3 it can be concluded that a high number of parity symbols leads to a greater error correcting capability of the RS decoder. Consequently, the lower the rate, the higher the number of parity symbols which can be used for error correction which therefore results in greater protection. Figure 4 illustrates a flowchart which describes the UEP rate allocation process. First, the algorithm checks whether the MB belongs to an I frame or a P frame. If it belongs to an I frame, higher protection is given to the MB. I-frame also implies that spatial concealment must be used. Next, the algorithm checks whether, the CDI of the MB is less than eight. If it is less than eight, this implies that in case of loss, the concealment of the MB will not be effective. Higher protection is therefore given to a MB with CDI less than 8. A lower rate is assigned to a P –frame as compared to an I frame. For a P frame if the CDI is less than 4, higher protection is given to the MB. Rate 1 is assigned to the MB belonging to an I frame and having a CDI less than eight. Rate 2 is assigned to the MB belonging to an I frame and having a CDI of eight. Rate 3 is assigned to the MB belonging to a P frame and having a CDI less than four. Rate 4 is assigned to the MB belonging to a P frame and having a CDI of four. In general, Rate 1 < Rate 2 < Rate 3 < Rate 4. Does MB belong to an I Frame? Is CDI < 8? Is CDI < 4? YES NO YES NO YES NO Rate 4Rate 3Rate 2Rate 1 P-Frame I-Frame Higher Rate Lower Rate Lower Rate Lower RateHigher Rate Higher Rate Figure 4. Flowchart Illustrating the Rate Allocation process
  • 6.  ISSN: 2502-4752 IJEECS Vol. 6, No. 3, June 2017 : 671 – 681 676 2.2. Interleaving Consider for example a frame with 99 MBs as shown in Figure 5. In the interleaving block, packets are formed in such a way that each of them consists of symbols from either a group of 11 MBs referred as GLI or a whole frame consisting of 99 MBs namely FLI interleaving. This allows information pertaining to a specific MB to be propagated across several packets. In case of packet loss, the MB can be recovered with the information contained in the remaining correctly received packets. Therefore, with the use of the parity symbols, the RS decoder can perform error correction. A description of each interleaving scheme is given next. 2.2.1. FLI Figure 5 illustrates the FLI interleaving process. Figure 5(a) shows a typical Foreman video frame of size 144x176 which is made up of 99 MBs each of size 16x16. In addition, each MB after RS encoding is represented by an array of length, n, which comprises of both data and parity symbols. The idea behind FLI interleaving is to form packets made up of symbols from each of the 99 MBs. Ns which represents the number of symbols required from each MB to creates packet is obtained using equation (4) below: (4) Where, nrepresents the length of a symbol array representing a MB. For example, in Figure 5, packet 1 is created by taking the first symbols from each of the 99 MBs. This process continues until the last packet (packet 99) is created using the last symbols of length, from each MB. After this process, all the symbols have been re-arranged to form 99 packets each of length n. 4 7 8 8 3 7 3 3 ….. 8 5 5 7 2 5 6 8 1 3 …. 8 9 8 1 4 5 6 9 3 6 ... 2 6 MB 1 MB 2 MB 99 4 7 5 7 …………..….. 8 1 Ns symbols from MB1 Ns symbols from MB2 Ns symbols from MB 99 Packet 1 Packet 2 8 5 8 9 ………………….2 6 Packet 99 1 432 5 876 9 1110 12 151413 16 191817 20 2221 23 262524 27 302928 31 3332 34 373635 38 414039 42 4443 45 484746 49 525150 53 5554 56 595857 60 636261 64 6665 67 706968 71 747372 75 7776 78 818079 82 858483 86 8887 89 929190 93 969594 97 9998 Frame Macroblock Allocation (a) A typical frame from Foreman video (b) A sample Frame consisting of 99 Macroblocks Interleaver H.264 Encoder RS Encoder Figure 5. Illustration of Frame Level Interleaving process
  • 7. IJEECS ISSN: 2502-4752  A Concealment Aware UEP Scheme for H.264 using RS Codes (D. Indoonundon) 677 2.2.2. GLI Figure 6 illustrates the GLI process where a typical Foreman video frame of size 144x176 is made up of 9 rows (slices) each containing 11 MBs. With GLI, the MBs are first grouped to form 9 slices following which interleaving is performed across each slice. Therefore, in this case each packet is made up of Nssymbols belonging to 11 MBs. With GLI, Ns, is calculated as follows: (5) For example in Figure 6, it can be observed that packet 1 is formed from the first symbols of length obtained from each of the 11 MBs belonging to slice 1. Packet 11 is created by using the last symbols of length, , from each of the 11 MBs. This process is repeated until all the 9 slices are interleaved to form 99 packets. 1 432 5 876 9 1110 12 151413 16 191817 20 2221 23 262524 27 302928 31 3332 34 373635 38 414039 42 4443 45 484746 49 525150 53 5554 56 595857 60 636261 64 6665 67 706968 71 747372 75 7776 78 818079 82 858483 86 8887 89 929190 93 969594 97 9998 1 432 5 876 9 1110 12 151413 16 191817 20 2221 23 262524 27 302928 31 3332 34 373635 38 414039 42 4443 45 484746 49 525150 53 5554 56 595857 60 636261 64 6665 67 706968 71 747372 75 7776 78 818079 82 858483 86 8887 89 929190 93 969594 97 9998 Group 1 Group 2 Group 3 Group 4 Group 5 Group 6 Group 7 Group 8 Group 9 Frame Macroblock Allocation (a) A typical frame from Foreman video (b) A sample Frame consisting of 99 Macroblocks (c) Slices from a Frame 4 7 8 8 3 7 3…..6 3 8 5 5 7 2 5 6 8 1 …5 3 8 9 8 1 4 5 6 9 3 6..1 6 2 6 MB 1 MB 2 MB 11 4 7 8 8 5 7 2 5….8 1 4 5 Ns symbols from MB1 Ns symbols from MB2 Ns symbols from MB 11 Packet 1 6 3 8 5 5 3 8 9..……1 6 2 6 Packet 11 Each Slice is processed by the Interleaver H.264 Encoder RS Encoder Figure 6. Illustration of Group Level Interleaving process 3. Results and Analysis In line with the goals of this work, four different schemes have been compared. The list of parameters used for the simulations is given below: Video Sequences : Foreman, News Framerate : 25 frames per second Number of Frames : 300 Frame size : 144x176 Channel Model : Gilbert Elliot Channel. The schemes have been simulated using Matlab. The UEP and EEP rate allocation schemes for each video sequence are given in Table 1.
  • 8.  ISSN: 2502-4752 IJEECS Vol. 6, No. 3, June 2017 : 671 – 681 678 Table 1. Rate Allocation for UEP and EEP schemes Foreman Sequence News Sequence UEP Rate Allocation EEP Rate Allocation UEP Rate Allocation EEP Rate Allocation I Frame CDI < 8 1/4 7/20 1/3 1/2 CDI = 8 1/3 7/20 2/5 1/2 P Frame CDI < 4 4/11 7/20 5/8 1/2 CDI = 4 1/2 7/20 2/3 1/2 A brief description of each scheme is given in Table 2 where scheme 1 represents the proposed framework which uses UEP and prioritisation based on autocorrelation for concealment [15]. Scheme 2 uses UEP but does not employ prioritised concealment. Scheme 3 uses EEP and prioritised concealment whereas Scheme 4 utilises EEP but does not make use of prioritised concealment. In all the simulations, FSE [16] is used as spatial concealment and LI [17] is used as temporal concealment. The simulation is carried out with both FLI and GLI and the results are analysed. Table 2. Schemes tested Schemes Rate Allocation Prioritised Concealment UEP EEP 1 Yes No Yes 2 Yes No No 3 No Yes Yes 4 No Yes No 3.1. Results using FLI using Foreman and News Sequences Figure 7 shows a graph of Y-PSNR against Packet Loss Rate for the Foreman sequence with GOP length = 3 using FLI. It is observed that scheme 1 which uses UEP and prioritised concealment provides an average gain of 2.98 dB over scheme 3 which uses EEP and prioritised concealment. This is because with UEP, higher protection is given to the most important MBs, hence the MBs are recovered correctly. In addition, scheme 1 provides an average gain of 0.96 dB in the range of 0.1 ≤ Packet Loss Rate ≤ 0.4 over scheme 2 which does not use prioritised concealment. Figure 8 shows a Graph of Y-PSNR against Packet Loss Rate for the News sequence with GOP length = 3 using FLI. It is observed that scheme 1 which uses UEP and prioritised concealment provides an average gain of 1.07 dB over scheme 3 which uses EEP and prioritised concealment. In addition, scheme 1 provides an average gain of 0.214 dB in the range of 0.1 ≤ Packet Loss Rate ≤ 0.4 over scheme 2 which does not use prioritised concealment. Figure 7. Graph of Y-PSNR(dB) against Packet loss Rate for the Foreman sequence using FLI Figure 8. Graph of Y-PSNR(dB) against packet loss rate for the News sequence using FLI
  • 9. IJEECS ISSN: 2502-4752  A Concealment Aware UEP Scheme for H.264 using RS Codes (D. Indoonundon) 679 3.2. Results with GLI using Foreman and News Sequences Figure 9 shows a Graph of Y-PSNR against Packet Loss Rate for the Foreman sequence with GOP length = 3 using GLI. It is observed that scheme 1 which uses UEP and prioritised concealment provides an average gain of 1.26 dB over scheme 3 which uses EEP and prioritised concealment. In addition, scheme 1 provides an average gain of 1.06 dB in the range of 0.1 ≤ Packet Loss Rate ≤ 0.4 over scheme 2 which does not use prioritised concealment. Figure 10 shows a Graph of Y-PSNR against Packet Loss Rate for the News sequence with GOP length = 3 using GLI. It is observed that scheme 1 which uses UEP and prioritised concealment provides an average gain of 1.31 dB over scheme 3 which uses EEP and prioritised concealment. In addition, scheme 1 provides an average gain of 0.215 dB in the range of 0.1 ≤ Packet Loss Rate ≤ 0.4 over scheme 2 which does not use prioritised concealment. Figure 9. Graph of Y-PSNR(dB) against Packet loss Rate for the Foreman sequence using GLI Figure 10. Graph of Y-PSNR(dB) against Packet loss Rate for the News sequence using GLI 3.3. Comparison between FLI and GLI Figure 11 represents the results obtained by comparing the two types of interleaving, FLI and GLI. It can be observed at low Packet Loss Rates (PLR <0.24), FLI is seen to outperform GLI whereas at high Packet Loss Rates (PLR > 0.24) GLI surpasses FLI. For example, at a Packet Loss Rate of 0.2 with the News sequence, FLI achieves a gain of 4.17 dB over GLI. When using FLI, the burst errors are propagated across 99 packets as compared to GLI where the errors are propagated across 11 packets of one group. Hence, the number of errors contained in a packet created using FLI is less than that which uses GLI which allows the RS decoder to correct all the errors when using FLI. While, when using GLI, the errors contained in one packet are beyond the error correcting capability of the RS decoder. Figure 11. Graph of Y-PSNR (dB) against Packet loss Rate comparing the performance of FLI and GLI for both the Forman and news sequence
  • 10.  ISSN: 2502-4752 IJEECS Vol. 6, No. 3, June 2017 : 671 – 681 680 On the other hand at a Packet Loss Rate of 0.4 with the News sequence, GLI outperforms FLI by 5 dB.At high Packet Loss Rate, the number of errors is beyond the error correcting capability of the RS decoder when using both FLI and GLI. With the use FLI at high Packet Loss Rates, a large amount of errors are distributed across 99 packets which causes severe degradation of the whole frame. However, when using GLI at high Packet Loss Rates the burst errors may affect only part of the 9 groups causing some of the groups to be correctly decoded. This allows better performance of GLI as compared to FLI at high Packet Loss Rates. 4. Conclusion The aim of this paper is to enhance the performance of H.264 video transmission with the use of UEP with RS codes and two interleaving methods. The objective of using UEP with RS codes is to protect the most important MBs from packet loss. The importance of a MB is determined by two factors which are the type of concealment, spatial and temporal, and the CDI value. Since an I-frame contains more significant information as compared to a P frame, higher protection is given to an I frame. The CDI measures the effectiveness of the concealment algorithm in case of packet loss. A low CDI will lead to an ineffective concealment. Therefore, higher protection is given to MBs having lower CDI to ensure that they are corrected by the RS decoder in case they have been subject to packet loss without the need for concealment. In addition, two types of interleaving referred as FLI and GLI are proposed. The FLI technique creates packets which consist of symbols from all the 99 MBs in a frame. With GLI, the MBs are grouped into slices and interleaving is performed within each group. FLI has shown to perform better than GLI at low packet loss rates whereas GLI proved to be more efficient at high packet loss rates. Simulation results have demonstrated that the proposed framework outperformed an EEP scheme by an average gain of2.96 dB when using the Foreman sequence with FLI. Moreover, the use of prioritised concealment has shown to further improve the results by an average gain of 0.96 dB.Numerous future works can be considered from this proposed technique.An interesting future work would be to explore the way in which an existing FMO and MDC scheme can be integrated with the proposed scheme. Finally the proposed scheme can be analysed with H.265 and the results compared with H.264. Acknowledgements The authors are thankful to the University of Mauritius and the Tertiary Education Commission for providing the necessary facilities and financial support for conducting this research. References [1] Wiegand T, Draft ITU-T Recommendation and Final Draft International Standard of Joint Video Specification (ITU-T Rec. H.264 |ISO/IEC 14496-10AVC, ITU-T Rec.H.264 | ISO/IEC 14496-10AVC. 2003. [2] Bross B, Han WJ, Ohm JR, Sullivan GJ, Wiegand T. High Efficiency Video Coding (HEVC) Text Specification Draft 9, Joint Collaborative Team on Video Coding (JCT-VC) of ITU-T SG 16 WP 3 and ISO/IEC JTC 1/SC 29/WG 11, document JCTVC-K1003, Shanghai, China. 2012. [3] Richardson I. The h.264 advanced video compression standard. 1st ed. Hoboken, N.J.: Wiley; 2013. [4] Di Laura C, Pajuelo D, Kemper G. A Novel Steganography Technique for SDTV-H.264/AVC Encoded Video. International Journal of Digital Multimedia Broadcasting. 2016; 2016: 1-9. [5] Hamdy S, Ibrahim M, Osman M. Performance evaluation of a new efficient H.264 intraprediction scheme. Turkish Journal of Electrical Engineering & Computer Sciences. 2016; 24: 1967-1983. [6] Bernatin T, Sundari G, Gayethri B, Ramesh S. Performance Analysis of Rate Control Scheme in H.264 Video Coding. Indian Journal of Science and Technology. 2016; 9(30). [7] Reed I, Solomon G. Polynomial Codes Over Certain Finite Fields. Journal of the Society for Industrial and Applied Mathematics. 1960; 8(2): 300-304. [8] Clarke CKP, R&D White Paper. Reed-Solomon error correction. WHP 031. 2002. [9] Talari A, Kumar S, Rahnavard N, Paluri S, Matyjas J. Optimized cross-layer forward error correction coding for H.264 AVC video transmission over wireless channels. EURASIP Journal on Wireless Communications and Networking. 2013; 2013(1): 206.
  • 11. IJEECS ISSN: 2502-4752  A Concealment Aware UEP Scheme for H.264 using RS Codes (D. Indoonundon) 681 [10] Jayasooriya J, Midipolawatta Y, Dissanayake M. Error correction technique based on forward error correction for H.264 codec. 2012 IEEE 7th International Conference on Industrial and Information Systems (ICIIS). 2012. [11] Pham CK, Tung WC, Huu TH, Dao DT. Point-to-point H.264 Video Streaming over IEEE 802.15.4 with Reed-Solomon Error Correction. International Conference on Green and Human Information Technology (ICGHIT). 2014: 89-93. [12] Sun Y, Zhang X, Tang F, Fowler S, Cui H, Dong X. Layer-Aware Unequal Error Protection for Scalable H.264 Video Robust Transmission over Packet Lossy Networks. 2011 14th International Conference on Network-Based Information Systems. 2011. [13] Zhao, Zenghua, Long S. RD-Based Adaptive UEP for H.264 Video Transmission in Wireless Networks. 2010 International Conference on Multimedia Information Networking and Security. 2010. [14] Nazir S, Stanković V, Andonović I, Vukobratović D. Application Layer Systematic Network Coding for Sliced H.264/AVC Video Streaming. Advances in Multimedia. 2012; 2012: 1-9. [15] Fowdur TP, D Indoonundon and Soyjaudah K M S. A Novel Prioritised Concealment and Flexible Macroblock Ordering Scheme for Video Transmission. International Journal of Computer Applications. 2016; 150(6): 35-42. [16] 5. Kaup A, Meisinger K, Aach T. Frequency selective signal extrapolation with applications to error concealment in image communication. AEU - International Journal of Electronics and Communications. 2005; 59(3): 147-156. [17] Zheng J, Chau LP. A temporal error concealment algorithm for (H.264) using Lagrange interpolation. Proceedings of the 2004 International Symposium on Circuits and Systems, ISCAS 04. 2004: 133– 136.