Robust error detection methods for H.264/AVC videos
Visualitza/Obre
Estadístiques de LA Referencia / Recolecta
Inclou dades d'ús des de 2022
Cita com:
hdl:2099.1/6134
Tipus de documentProjecte Final de Màster Oficial
Data2008-09-23
Condicions d'accésAccés obert
Llevat que s'hi indiqui el contrari, els
continguts d'aquesta obra estan subjectes a la llicència de Creative Commons
:
Reconeixement-NoComercial-CompartirIgual 3.0 Espanya
Abstract
The 3rd generation of mobile systems is mainly focused on enabling multimedia
services such as video streaming, video call and conferencing. In order to achieve
this, the Universal Mobile Telecommunications System (UMTS), is the standard that
has been developed by the 3rd Generation Partnership ect (3GPP) in Europe,
including the baseline profile of H.264/AVC in the specification. With the union of
both technologies a great improvement on video transmission over mobile networks,
and even modification of the user habits towards the use of the mobile phone is expected.
Nevertheless, video transmission has always been related to wired networks
and unfortunately the migration to wireless networks is not as easy as it seems.
In real time applications the delay is a critical constraint. Usually, transmission
protocols without delivery warranties, like the User Network Protocol (UDP) for IP
based networks, are used. This works under the assumption that in real time applications
dropped packets are preferable to delayed packets. Moreover, in UMTS the
network needs to be treated in a different way, thus the wireless channel is a prone
error channel due to its high time variance. Typically, when transmitting video, the
receiver checks whether the information packet is corrupted (by means of a checksum)
or if its temporal mark exceeds the specified delay. This approach is suboptimal, due to the fact that
perhaps the video information is not damaged and could still be used.
Instead, residual redundancy on the video stream can be used to locate the errors
in the corrupted packet, increasing the granularity of the typical upper-layer checksum
error detection. Based on this, the amount of information previous to the error
detection can be decoded as usually.
The aim of this thesis is to combine some of the more effective methods concretely, Syntax check, Watermarking and Checksum schemes have
been reformulated, combined and simulated.
Fitxers | Descripció | Mida | Format | Visualitza |
---|---|---|---|---|
memoria.pdf | memòria | 685,3Kb | Visualitza/Obre |