An error resilient coding scheme for H.264 video transmission based on data embedding

Li Wei Kang*, Jin Jang Leou

*Corresponding author for this work

Research output: Contribution to journalConference articlepeer-review

11 Citations (Scopus)

Abstract

For entropy-coded H.264 video frames, a transmission error in a codeword will not only affect the underlying codeword but also may affect subsequent codewords, resulting in a great degradation of the received video frames. In this study, an error resilient coding scheme for H.264 video transmission is proposed. At the encoder, for an H.264 I frame, the important data for each macroblock (MB) are extracted and embedded into the next frame by the proposed MB-interleaving slice-based data embedding scheme for I frames. For an H.264 P frame, two types of important data for each MB are extracted and embedded into the next frame by the proposed MB-interleaving slice-based data embedding scheme for P frames. At the decoder, if the important data for a corrupted MB can be correctly extracted, the extracted important data for the corrupted MB will facilitate the employed error concealment scheme to conceal the corrupted MB; otherwise, the employed error concealment scheme is used to conceal the corrupted MB. Based on the simulation results obtained in this study, the proposed scheme can recover high-quality H.264 video frames from the corresponding corrupted video frames up to a video packet loss rate of 20%.

Original languageEnglish
Pages (from-to)III257-III260
JournalICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings
Volume3
Publication statusPublished - 2004
Externally publishedYes
EventProceedings - IEEE International Conference on Acoustics, Speech, and Signal Processing - Montreal, Que, Canada
Duration: 2004 May 172004 May 21

ASJC Scopus subject areas

  • Software
  • Signal Processing
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'An error resilient coding scheme for H.264 video transmission based on data embedding'. Together they form a unique fingerprint.

Cite this