Joint source-channel coding for wireless object-based video communications utilizing data hiding

Haohong Wang*, Sotirios A. Tsaftaris, Aggelos K Katsaggelos

*Corresponding author for this work

Research output: Contribution to journalArticle

19 Scopus citations

Abstract

In recent years, joint source-channel coding for multimedia communications has gained increased popularity. However, very limited work has been conducted to address the problem of joint source-channel coding for object-based video. In this paper, we propose a data hiding scheme that improves the error resilience of object-based video by adaptively embedding the shape and motion information into the texture data. Within a rate-distortion theoretical framework, the source coding, channel coding, data embedding, and decoder error concealment are jointly optimized based on knowledge of the transmission channel conditions. Our goal is to achieve the best video quality as expressed by the minimum total expected distortion. The optimization problem is solved using Lagrangian relaxation and dynamic programming. The performance of the proposed scheme is tested using simulations of a Rayleigh-fading wireless channel, and the algorithm is implemented based on the MPEG-4 verification model. Experimental results indicate that the proposed hybrid source-channel coding scheme significantly outperforms methods without data hiding or unequal error protection.

Original languageEnglish (US)
Pages (from-to)2158-2169
Number of pages12
JournalIEEE Transactions on Image Processing
Volume15
Issue number8
DOIs
StatePublished - Aug 1 2006

Keywords

  • Data embedding
  • Data hiding
  • Joint source-channel coding
  • MPEG-4 standard
  • Object-based video
  • Rate-distortion
  • Unequal error protection (UEP)
  • Video coding
  • Video communications
  • Wireless channel

ASJC Scopus subject areas

  • Software
  • Computer Graphics and Computer-Aided Design

Fingerprint Dive into the research topics of 'Joint source-channel coding for wireless object-based video communications utilizing data hiding'. Together they form a unique fingerprint.

  • Cite this