Shape error concealment based on a shape-preserving boundary approximation

Evaggelia Tsiligianni*, Lisimachos P. Kondi, Aggelos K. Katsaggelos

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

8 Scopus citations

Abstract

In object-based video representation, video scenes are composed of several arbitrarily shaped video objects (VOs), defined by their texture, shape and motion. In error-prone communications, packet loss results in missing information at the decoder. The impact of transmission errors is minimized through error concealment. In this paper, we propose a spatial error concealment technique for recovering lost shape data. We consider a geometric shape representation consisting of the object boundary, which can be extracted from the $\alpha$-plane. Missing macroblocks result in a broken boundary. A B-spline curve is constructed to replace a missing boundary segment, based on a T-spline representation of the received boundary. We use T-splines because they produce shape-preserving approximations and do not change the characteristics of the original boundary. The representation ensures a good estimation of the first derivatives at the points touching the missing segment. Applying smoothing conditions, we manage to construct a new spline that joins smoothly with the received boundary, leading to successful concealment results. Experimental results on object shapes with different concealment difficulty demonstrate the performance of the proposed method. Comparisons with prior proposed methods are also presented.

Original languageEnglish (US)
Article number6177257
Pages (from-to)3573-3585
Number of pages13
JournalIEEE Transactions on Image Processing
Volume21
Issue number8
DOIs
StatePublished - Jul 27 2012

Keywords

  • COM-ERC
  • Error concealment
  • Shape coding
  • T-splines

ASJC Scopus subject areas

  • Software
  • Computer Graphics and Computer-Aided Design

Fingerprint Dive into the research topics of 'Shape error concealment based on a shape-preserving boundary approximation'. Together they form a unique fingerprint.

Cite this