SlideShare a Scribd company logo
1 of 15
Download to read offline
Error-Tolerant Audio Coding Workshop
                          Networked Audio Track : Event N1

            David Trainor, Director of Advanced Audio Research, CSR
                                                     26th October 2012




                                                  133rd AES Convention
Workshop Overview


 Some networked audio trends
   – Hierarchical broadcast / multicast networks
      • Wide-, local- and personal-area
   – Real-time / interactive / low-delay audio services e.g. gaming
   – Networks with more complex QoS characteristics (e.g. wireless)
      • Convenient and inexpensive, but reliability is an issue


 Audio coding is vital (e.g. network bandwidth management)
   – Minimally affected by network reliability fluctuations


 This workshop discusses
   – Approaches to and capabilities of error-tolerant audio coding
   – Recent advances in state-of-the-art

                                                          133rd AES Convention
                                                                        Page 2
Your Panellists


 Dr David Trainor, CSR (Workshop Chair)
 Dr Gary Spittle, Dolby Labs
 Dr Deepen Sinha, ATC Labs
 Dr Bernhard Grill, Fraunhofer IIS

 Workshop Format
    – 25 minute presentation by each panellist
       • (20 minutes + 5 minutes Q&A)
    – 15-20 minute general Q&A session




                                                 133rd AES Convention
                                                               Page 3
Error-Tolerant Audio Coding
      General Concepts and Techniques




                        133rd AES Convention
Classification of Audio Error Control Strategies


 Error correction
    – FEC versus ARQ
    – Dependent source coding versus independent source coding
    – Typically exhibits two levels of success
       • Corrects each error event flawlessly or fails completely


 Error limiting
    –   Limiting of catastrophic propagation of error events
    –   Sender-based, Receiver-based or Sender-and-Receiver-based
    –   Dependent source coding versus independent source coding
    –   Several levels and measures of “success” in perceptual terms
          • Error propagation can continue to different degrees, but not
            beyond a prescribed limit


                                                           133rd AES Convention
                                                                         Page 5
Classification of Audio Error Control Strategies (2)


 Error concealment
    –   Reduce perceptual significance of error events
    –   Sender-based, Receiver-based or Sender-and-Receiver-based
    –   Dependent source coding versus independent source coding
    –   Many levels and measures of “success” in perceptual terms
         • PEAQ/PESQ objective testing
         • Subjective quality measurements




                                                       133rd AES Convention
                                                                     Page 6
Error Correction with Independent Source Coding


 Applied at networking baseband or media access layer
    – CRC-based detection
    – FEC codes
    – ARQ retransmissions


 Redundancy not applied in an audio-optimized way
    – Packet payload treated as arbitrary data (equal error protection)


 Bit-rate and delay compromises
    – Packet-based networks may require additional time-domain
      interleaving, etc




                                                          133rd AES Convention
                                                                        Page 7
Error Correction with Dependent Source Coding


 Coded syntax protection prioritization
    – Each field protected according to perceptual significance
    – Unequal error protection across coded frame/stream fields


 Scalable coding
    – Each coded layer protected according to perceptual significance
    – Unequal error protection across coded layers


 These techniques augmented by network QoS prioritization
    – Send critical coded frame values or coded audio layers over
      network channels with higher QoS parameters




                                                        133rd AES Convention
                                                                      Page 8
Unequal Error Protection Examples
                              NON-SCALABLE CODEC

 Field
   1
          Field 2         Field 3          ...   Field
                                                 N-1
                                                             Field N        Coded Frame




                               SCALABLE CODEC

  Field
    1
           Field
             2
                          Field 3          ...   Field
                                                 N-1
                                                             Field N
                                                                           Mid-Quality Stereo
                                                                           Base Layer


 Field
   1
            Field 2            Field 3     ...   Field N-1
                                                               Field High-Quality Stereo
                                                                N    Enhancement Layer


 Field
   1
          Field
            2
                    Field 3      Field 4   ...   Field N-1
                                                               Field Parametric Upmixing
                                                                N    Enhancement Layer

Green = low protection
Orange = medium protection
                                                                       133rd AES Convention
Red = high protection
                                                                                     Page 9
Error Correction with Dependent Source Coding (2)


 Joint quantization and error control code insertion
    – Trade small quantization noise increase for improved robustness


 Dynamic data segmentation
    – Encode time-varying amounts of audio data
    – Choose audio block size based on (for example)
       • Communications channel reliability (probability of data loss)
       • Network baseband packet size


 Possible compromises of error correction + audio coding
    – Bit-rate, delay, codec computational complexity




                                                          133rd AES Convention
                                                                       Page 10
Error Limiting with Dependent Source Coding


 Key goal is to provide frequent points of resynchronization
    – Error event can’t propagate beyond the next synchronization point


 Special synchronization codes/values
    – Zero or low probability of occurrence in actual coded audio values


 Error Resilient Entropy Coding
    –   Insert variable-length entropy codes into fixed-length “slots”
    –   Partial codes take up spare space at the end of future slots
    –   Each slot guaranteed to start with first bit of a valid entropy code
    –   Codes are self-delimiting, hence frequent synchronization points




                                                              133rd AES Convention
                                                                           Page 11
Error Resilient Entropy Coding Concept




                                                          Insert variable length
                                                          codes in fixed-length
                                                          slots



Slot 1 Slot 2 Slot 3 Slot 4 Slot 5 Slot 6 Slot 7 Slot 8


                                                          Partial codes that don’t
                                                          fit in their slot are put into
                                                          the spare space in later
                                                          slots




            Start of a code.
            Frequent point of synchronization
                                                             133rd AES Convention
                                                                          Page 12
Error Limiting with Dependent Source Coding (2)


 Reversible Variable Length Codes
    – Code sequence readable both forward and backwards in time
    – Parsing in both directions can reveal inconsistencies and hence
      errors.


 Fixed-length coding techniques

 Limit differential coding techniques
    – Restart the differential or progressive coding technique




                                                          133rd AES Convention
                                                                       Page 13
Error Concealment with Independent Source Coding


 Padding silence or wideband noise

 Pitch estimation and synthesis
    – Estimate dominant pitches from previous good frames
    – Smooth discontinuities at boundaries


 Replacement with previous best-matching segments
    – Simpler forms may be correlation-based
    – Sophisticated forms
       • SoFi (University of Ulster). MPEG-7 + semantic song analysis.


 Filtered wideband noise generation
    – Noise shaped using spectrum of previous good frames

                                                       133rd AES Convention
                                                                    Page 14
Error Concealment with Independent Source Coding


 Dynamic data segmentation (discussed previously)

 Coded domain interleaving
    – Spectral (packet loss only affects specific frequencies)
    – Linear Prediction quantized prediction errors


 Linear Predictive Coding specific methods
    – Coder parameters
        • Copy coder parameters from last good frame
        • Coder parameters from last good frame with scaled-down gains
    – Stimulate predictor with statistically-shaped synthesized data
      (coded residuals)



                                                          133rd AES Convention
                                                                       Page 15

More Related Content

What's hot

Basics of speech coding
Basics of speech codingBasics of speech coding
Basics of speech codingsakshij91
 
Speech Analysis and synthesis using Vocoder
Speech Analysis and synthesis using VocoderSpeech Analysis and synthesis using Vocoder
Speech Analysis and synthesis using VocoderIJTET Journal
 
AN OPTIMIZED H.264-BASED VIDEO CONFERENCING SOFTWARE FOR ...
AN OPTIMIZED H.264-BASED VIDEO CONFERENCING SOFTWARE FOR ...AN OPTIMIZED H.264-BASED VIDEO CONFERENCING SOFTWARE FOR ...
AN OPTIMIZED H.264-BASED VIDEO CONFERENCING SOFTWARE FOR ...Videoguy
 
[NUGU CONFERENCE 2019] 트랙 A-4 : Zero-shot learning for Personalized Text-to-S...
[NUGU CONFERENCE 2019] 트랙 A-4 : Zero-shot learning for Personalized Text-to-S...[NUGU CONFERENCE 2019] 트랙 A-4 : Zero-shot learning for Personalized Text-to-S...
[NUGU CONFERENCE 2019] 트랙 A-4 : Zero-shot learning for Personalized Text-to-S...NUGU developers
 
[NUGU CONFERENCE 2019] 트랙 A-2 : NUGU call 적용 기술 및 서비스 소개
[NUGU CONFERENCE 2019] 트랙 A-2 : NUGU call 적용 기술 및 서비스 소개[NUGU CONFERENCE 2019] 트랙 A-2 : NUGU call 적용 기술 및 서비스 소개
[NUGU CONFERENCE 2019] 트랙 A-2 : NUGU call 적용 기술 및 서비스 소개NUGU developers
 

What's hot (13)

Widex Aids at a glance
Widex Aids at a glanceWidex Aids at a glance
Widex Aids at a glance
 
Basics of speech coding
Basics of speech codingBasics of speech coding
Basics of speech coding
 
B034205010
B034205010B034205010
B034205010
 
Telemetry systems
Telemetry systemsTelemetry systems
Telemetry systems
 
Ph.D. thesis defense
Ph.D. thesis defensePh.D. thesis defense
Ph.D. thesis defense
 
Prime Trex Ip Terminal
Prime Trex Ip TerminalPrime Trex Ip Terminal
Prime Trex Ip Terminal
 
Speech Analysis and synthesis using Vocoder
Speech Analysis and synthesis using VocoderSpeech Analysis and synthesis using Vocoder
Speech Analysis and synthesis using Vocoder
 
Network and DNS Vulnerabilities
Network and DNS VulnerabilitiesNetwork and DNS Vulnerabilities
Network and DNS Vulnerabilities
 
43 131-1-pb
43 131-1-pb43 131-1-pb
43 131-1-pb
 
AN OPTIMIZED H.264-BASED VIDEO CONFERENCING SOFTWARE FOR ...
AN OPTIMIZED H.264-BASED VIDEO CONFERENCING SOFTWARE FOR ...AN OPTIMIZED H.264-BASED VIDEO CONFERENCING SOFTWARE FOR ...
AN OPTIMIZED H.264-BASED VIDEO CONFERENCING SOFTWARE FOR ...
 
[NUGU CONFERENCE 2019] 트랙 A-4 : Zero-shot learning for Personalized Text-to-S...
[NUGU CONFERENCE 2019] 트랙 A-4 : Zero-shot learning for Personalized Text-to-S...[NUGU CONFERENCE 2019] 트랙 A-4 : Zero-shot learning for Personalized Text-to-S...
[NUGU CONFERENCE 2019] 트랙 A-4 : Zero-shot learning for Personalized Text-to-S...
 
Rc016 csharp online
Rc016 csharp onlineRc016 csharp online
Rc016 csharp online
 
[NUGU CONFERENCE 2019] 트랙 A-2 : NUGU call 적용 기술 및 서비스 소개
[NUGU CONFERENCE 2019] 트랙 A-2 : NUGU call 적용 기술 및 서비스 소개[NUGU CONFERENCE 2019] 트랙 A-2 : NUGU call 적용 기술 및 서비스 소개
[NUGU CONFERENCE 2019] 트랙 A-2 : NUGU call 적용 기술 및 서비스 소개
 

Viewers also liked

Impact of cloud connected, location-aware, media-rich world on consumers, ent...
Impact of cloud connected, location-aware, media-rich world on consumers, ent...Impact of cloud connected, location-aware, media-rich world on consumers, ent...
Impact of cloud connected, location-aware, media-rich world on consumers, ent...CSR
 
Deep Indoors Location 1st August 2012
Deep Indoors Location 1st August 2012Deep Indoors Location 1st August 2012
Deep Indoors Location 1st August 2012CSR
 
Seeed Manufacturing Service Introduction
Seeed Manufacturing Service IntroductionSeeed Manufacturing Service Introduction
Seeed Manufacturing Service IntroductionMengmeng Chen
 
Csr location hamid october 23-v3 dn-p1
Csr location  hamid october 23-v3 dn-p1Csr location  hamid october 23-v3 dn-p1
Csr location hamid october 23-v3 dn-p1CSR
 
Icuwb 2013 keynote uwb past and future - lansford - final
Icuwb 2013 keynote   uwb past and future - lansford - finalIcuwb 2013 keynote   uwb past and future - lansford - final
Icuwb 2013 keynote uwb past and future - lansford - finalCSR
 
Bluetooth Reinvented. Smart connectivity in consumer devices: Bluetooth Low ...
Bluetooth Reinvented.  Smart connectivity in consumer devices: Bluetooth Low ...Bluetooth Reinvented.  Smart connectivity in consumer devices: Bluetooth Low ...
Bluetooth Reinvented. Smart connectivity in consumer devices: Bluetooth Low ...CSR
 

Viewers also liked (6)

Impact of cloud connected, location-aware, media-rich world on consumers, ent...
Impact of cloud connected, location-aware, media-rich world on consumers, ent...Impact of cloud connected, location-aware, media-rich world on consumers, ent...
Impact of cloud connected, location-aware, media-rich world on consumers, ent...
 
Deep Indoors Location 1st August 2012
Deep Indoors Location 1st August 2012Deep Indoors Location 1st August 2012
Deep Indoors Location 1st August 2012
 
Seeed Manufacturing Service Introduction
Seeed Manufacturing Service IntroductionSeeed Manufacturing Service Introduction
Seeed Manufacturing Service Introduction
 
Csr location hamid october 23-v3 dn-p1
Csr location  hamid october 23-v3 dn-p1Csr location  hamid october 23-v3 dn-p1
Csr location hamid october 23-v3 dn-p1
 
Icuwb 2013 keynote uwb past and future - lansford - final
Icuwb 2013 keynote   uwb past and future - lansford - finalIcuwb 2013 keynote   uwb past and future - lansford - final
Icuwb 2013 keynote uwb past and future - lansford - final
 
Bluetooth Reinvented. Smart connectivity in consumer devices: Bluetooth Low ...
Bluetooth Reinvented.  Smart connectivity in consumer devices: Bluetooth Low ...Bluetooth Reinvented.  Smart connectivity in consumer devices: Bluetooth Low ...
Bluetooth Reinvented. Smart connectivity in consumer devices: Bluetooth Low ...
 

Similar to Error-Tolerant Audio Coding Techniques

Lecture 8 audio compression
Lecture 8 audio compressionLecture 8 audio compression
Lecture 8 audio compressionMr SMAK
 
Lecture 8 audio compression
Lecture 8 audio compressionLecture 8 audio compression
Lecture 8 audio compressionMr SMAK
 
signal encoding techniques
signal encoding techniquessignal encoding techniques
signal encoding techniquesSrinivasa Rao
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Chapter%202%20 %20 Text%20compression(2)
Chapter%202%20 %20 Text%20compression(2)Chapter%202%20 %20 Text%20compression(2)
Chapter%202%20 %20 Text%20compression(2)nes
 
Amir Zmora’s Presentation at eComm 2009
Amir Zmora’s Presentation at eComm 2009Amir Zmora’s Presentation at eComm 2009
Amir Zmora’s Presentation at eComm 2009eCommConf
 
Spread spectrum seminar
Spread spectrum seminarSpread spectrum seminar
Spread spectrum seminarDeepika Patil
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Wpmc2004 phy protection
Wpmc2004 phy protectionWpmc2004 phy protection
Wpmc2004 phy protectionArpan Pal
 
05 signal encodingtechniques
05 signal encodingtechniques05 signal encodingtechniques
05 signal encodingtechniquesOrbay Yeşil
 
Hacking RF based IoT devices
Hacking RF based IoT devicesHacking RF based IoT devices
Hacking RF based IoT devicesErez Metula
 
A new channel coding technique to approach the channel capacity
A new channel coding technique to approach the channel capacityA new channel coding technique to approach the channel capacity
A new channel coding technique to approach the channel capacityijwmn
 

Similar to Error-Tolerant Audio Coding Techniques (20)

Lecture 8 audio compression
Lecture 8 audio compressionLecture 8 audio compression
Lecture 8 audio compression
 
Lecture 8 audio compression
Lecture 8 audio compressionLecture 8 audio compression
Lecture 8 audio compression
 
signal encoding techniques
signal encoding techniquessignal encoding techniques
signal encoding techniques
 
Turbo codes
Turbo codesTurbo codes
Turbo codes
 
Lte course
Lte courseLte course
Lte course
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Telecommunications Concentration
Telecommunications ConcentrationTelecommunications Concentration
Telecommunications Concentration
 
Chapter%202%20 %20 Text%20compression(2)
Chapter%202%20 %20 Text%20compression(2)Chapter%202%20 %20 Text%20compression(2)
Chapter%202%20 %20 Text%20compression(2)
 
Amir Zmora’s Presentation at eComm 2009
Amir Zmora’s Presentation at eComm 2009Amir Zmora’s Presentation at eComm 2009
Amir Zmora’s Presentation at eComm 2009
 
Y25124127
Y25124127Y25124127
Y25124127
 
Astricon 2007
Astricon 2007Astricon 2007
Astricon 2007
 
Spread spectrum seminar
Spread spectrum seminarSpread spectrum seminar
Spread spectrum seminar
 
11 cdma
11 cdma11 cdma
11 cdma
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Wpmc2004 phy protection
Wpmc2004 phy protectionWpmc2004 phy protection
Wpmc2004 phy protection
 
05 signal encodingtechniques
05 signal encodingtechniques05 signal encodingtechniques
05 signal encodingtechniques
 
Hacking RF based IoT devices
Hacking RF based IoT devicesHacking RF based IoT devices
Hacking RF based IoT devices
 
Turbo Code
Turbo Code Turbo Code
Turbo Code
 
A new channel coding technique to approach the channel capacity
A new channel coding technique to approach the channel capacityA new channel coding technique to approach the channel capacity
A new channel coding technique to approach the channel capacity
 
Coding
CodingCoding
Coding
 

Recently uploaded

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Error-Tolerant Audio Coding Techniques

  • 1. Error-Tolerant Audio Coding Workshop Networked Audio Track : Event N1 David Trainor, Director of Advanced Audio Research, CSR 26th October 2012 133rd AES Convention
  • 2. Workshop Overview  Some networked audio trends – Hierarchical broadcast / multicast networks • Wide-, local- and personal-area – Real-time / interactive / low-delay audio services e.g. gaming – Networks with more complex QoS characteristics (e.g. wireless) • Convenient and inexpensive, but reliability is an issue  Audio coding is vital (e.g. network bandwidth management) – Minimally affected by network reliability fluctuations  This workshop discusses – Approaches to and capabilities of error-tolerant audio coding – Recent advances in state-of-the-art 133rd AES Convention Page 2
  • 3. Your Panellists  Dr David Trainor, CSR (Workshop Chair)  Dr Gary Spittle, Dolby Labs  Dr Deepen Sinha, ATC Labs  Dr Bernhard Grill, Fraunhofer IIS  Workshop Format – 25 minute presentation by each panellist • (20 minutes + 5 minutes Q&A) – 15-20 minute general Q&A session 133rd AES Convention Page 3
  • 4. Error-Tolerant Audio Coding General Concepts and Techniques 133rd AES Convention
  • 5. Classification of Audio Error Control Strategies  Error correction – FEC versus ARQ – Dependent source coding versus independent source coding – Typically exhibits two levels of success • Corrects each error event flawlessly or fails completely  Error limiting – Limiting of catastrophic propagation of error events – Sender-based, Receiver-based or Sender-and-Receiver-based – Dependent source coding versus independent source coding – Several levels and measures of “success” in perceptual terms • Error propagation can continue to different degrees, but not beyond a prescribed limit 133rd AES Convention Page 5
  • 6. Classification of Audio Error Control Strategies (2)  Error concealment – Reduce perceptual significance of error events – Sender-based, Receiver-based or Sender-and-Receiver-based – Dependent source coding versus independent source coding – Many levels and measures of “success” in perceptual terms • PEAQ/PESQ objective testing • Subjective quality measurements 133rd AES Convention Page 6
  • 7. Error Correction with Independent Source Coding  Applied at networking baseband or media access layer – CRC-based detection – FEC codes – ARQ retransmissions  Redundancy not applied in an audio-optimized way – Packet payload treated as arbitrary data (equal error protection)  Bit-rate and delay compromises – Packet-based networks may require additional time-domain interleaving, etc 133rd AES Convention Page 7
  • 8. Error Correction with Dependent Source Coding  Coded syntax protection prioritization – Each field protected according to perceptual significance – Unequal error protection across coded frame/stream fields  Scalable coding – Each coded layer protected according to perceptual significance – Unequal error protection across coded layers  These techniques augmented by network QoS prioritization – Send critical coded frame values or coded audio layers over network channels with higher QoS parameters 133rd AES Convention Page 8
  • 9. Unequal Error Protection Examples NON-SCALABLE CODEC Field 1 Field 2 Field 3 ... Field N-1 Field N Coded Frame SCALABLE CODEC Field 1 Field 2 Field 3 ... Field N-1 Field N Mid-Quality Stereo Base Layer Field 1 Field 2 Field 3 ... Field N-1 Field High-Quality Stereo N Enhancement Layer Field 1 Field 2 Field 3 Field 4 ... Field N-1 Field Parametric Upmixing N Enhancement Layer Green = low protection Orange = medium protection 133rd AES Convention Red = high protection Page 9
  • 10. Error Correction with Dependent Source Coding (2)  Joint quantization and error control code insertion – Trade small quantization noise increase for improved robustness  Dynamic data segmentation – Encode time-varying amounts of audio data – Choose audio block size based on (for example) • Communications channel reliability (probability of data loss) • Network baseband packet size  Possible compromises of error correction + audio coding – Bit-rate, delay, codec computational complexity 133rd AES Convention Page 10
  • 11. Error Limiting with Dependent Source Coding  Key goal is to provide frequent points of resynchronization – Error event can’t propagate beyond the next synchronization point  Special synchronization codes/values – Zero or low probability of occurrence in actual coded audio values  Error Resilient Entropy Coding – Insert variable-length entropy codes into fixed-length “slots” – Partial codes take up spare space at the end of future slots – Each slot guaranteed to start with first bit of a valid entropy code – Codes are self-delimiting, hence frequent synchronization points 133rd AES Convention Page 11
  • 12. Error Resilient Entropy Coding Concept Insert variable length codes in fixed-length slots Slot 1 Slot 2 Slot 3 Slot 4 Slot 5 Slot 6 Slot 7 Slot 8 Partial codes that don’t fit in their slot are put into the spare space in later slots Start of a code. Frequent point of synchronization 133rd AES Convention Page 12
  • 13. Error Limiting with Dependent Source Coding (2)  Reversible Variable Length Codes – Code sequence readable both forward and backwards in time – Parsing in both directions can reveal inconsistencies and hence errors.  Fixed-length coding techniques  Limit differential coding techniques – Restart the differential or progressive coding technique 133rd AES Convention Page 13
  • 14. Error Concealment with Independent Source Coding  Padding silence or wideband noise  Pitch estimation and synthesis – Estimate dominant pitches from previous good frames – Smooth discontinuities at boundaries  Replacement with previous best-matching segments – Simpler forms may be correlation-based – Sophisticated forms • SoFi (University of Ulster). MPEG-7 + semantic song analysis.  Filtered wideband noise generation – Noise shaped using spectrum of previous good frames 133rd AES Convention Page 14
  • 15. Error Concealment with Independent Source Coding  Dynamic data segmentation (discussed previously)  Coded domain interleaving – Spectral (packet loss only affects specific frequencies) – Linear Prediction quantized prediction errors  Linear Predictive Coding specific methods – Coder parameters • Copy coder parameters from last good frame • Coder parameters from last good frame with scaled-down gains – Stimulate predictor with statistically-shaped synthesized data (coded residuals) 133rd AES Convention Page 15